Dataset Viewer
question_id
string | site
string | title
string | body
string | link
string | tags
list | votes
int64 | creation_date
timestamp[s] | comments
list | comment_count
int64 | category
string | diamond
int64 |
---|---|---|---|---|---|---|---|---|---|---|---|
1
|
bioacoustics
|
How do animals adapt to a partially or fully deaf individual of their group?
|
In eusocial animals for which hearing is important to communicate between individuals, is there any species apart humans for which there are some evidence that the group adapts their acoustic communication to a fully or partially deaf individual of the group?
For instance, by systematically vocalizing louder/closer to a partially deaf individual, or switching the communication modality (e.g. acoustics to touching) for a fully deaf individual, or by showing more support to them when an alarm call is raised, etc.
I have not found any information after a quick search on the web and Google Scholar.
|
https://bioacoustics.stackexchange.com/questions/1235/how-do-animals-adapt-to-a-partially-or-fully-deaf-individual-of-their-group
|
[
"hearing",
"adaptation"
] | 6 | 2022-11-14T07:01:24 |
[
"Thanks @DanStowell, done!",
"Did you search for possible literature? If so it would be good to give some indication of that. Also, I think \"eurosocial\" should be \"eusocial\", right?"
] | 2 |
Science
| 0 |
2
|
codegolf
|
Minimum cost of solving the Eni-Puzzle
|
You're tasked with writing an algorithm to efficiently estimate cost of solving an [Eni-Puzzle](http://www.enipuzzles.com/buy/eni-braille-puzzle-with-bold-colors) from a scrambled state as follows:
You're given m lists of containing n elements each(representing the rows of the puzzle). The elements are numbers between 0 and n-1 inclusive (representing the colors of tiles). There are exactly m occurrences of each integers across all m lists (one for each list).
For example:
m=3, n=4 :
[[3, 0, 3, 1], [[1, 3, 0, 1],
[1, 0, 2, 2], or [0, 2, 3, 1],
[3, 0, 1, 2]] [0, 3, 2, 2]]
You can manipulate these lists in two ways:
1: Swapping two elements between circularly adjacent indices in (non circularly) adjacent lists. Cost=1.
Ex:
m=3, n=4 :
Legal:
Swap((0,0)(1,1))
Swap((1,0)(2,3)) (circularly adjacent)
Illegal:
Swap((0,0)(0,1)) (same list)
Swap((0,0)(2,1)) (lists are not adjacent)
Swap((0,0)(1,0)) (indices are not circularly adjacent (they're the same)
Swap((0,0)(1,2)) (indices are not circularly adjacent)
2. Circularly shifting one of the lists (Cost=number of shifts)
Your algorithm must efficiently calculate minimum cost required to manipulate the lists such that the resulting lists are all rotations of each other (meaning the puzzle can be fully solved from this state using only rotation moves) i.e.:
[[0, 1, 2, 3] [[2, 1, 0, 3]
[3, 0, 1, 2] and [0, 3, 2, 1]
[1, 2, 3, 0]] [3, 2, 1, 0]]
...are both valid final states.
Instead of lists, you may use any data structure(s) of your choice to represent the puzzle, so long as the cost of simulating a valid move (sliding or rotating) on the puzzle with this representation is O(n*m). The setup cost of initializing this data structure can be disregarded.
A winning solution will compute the cost in the lowest asymptotic runtime in terms of m and n. Execution time will be assessed as a tie breaker.
|
https://codegolf.stackexchange.com/questions/182647/minimum-cost-of-solving-the-eni-puzzle
|
[
"puzzle-solver",
"fastest-algorithm",
"sliding-puzzle"
] | 6 | 2019-04-03T19:53:28 |
[
"@Jonah Because The costs I've outlined here are not the actual number of moves required to make equivalent moves on the puzzle. \"Swapping\" moves have a higher cost. To solve the actual puzzle, you first reach the state I described, or a state that is only one sliding move away. Because my specifications don't allow direct sliding moves (swapping equal indices) like the puzzle does for the blank space, I don't need to consider this latter case. This reduces the problem so that only the two move types I described need to be considered and the concept of a moving \"blank space\" can be ignored.",
"@JonathanAllan Yes. I've edited this to be more clear.",
"why not define the winning state as the actual state where they're all lined up?",
"I edited the tags. Thanks!",
"Hi and welcome to PPCG :) I think you do not need fastest-code or code-challenge since you only actually specify the winning criterion as the algorithmic speed. Further, I think you should specify if you mean the asymptotic worst case, or average case (best case is not a good idea, for reasons that are hopefully obvious). For future use, we have a sandbox to post challenges to work out issues before you post to the main site. Good luck!"
] | 5 |
Technology
| 0 |
3
|
crypto
|
Share Conversion between Different Finite Fields
|
Let us have any linear secret sharing scheme (LSSS) that works on some field $Z_{p}$, where p is some prime or a power of a prime e.g., Shamir Secret Sharing, Additive secret Sharing. The problem at hand is simple, for any secret shared value in $Z_{p}$, is it possible to convert it (and its shares) to elements on $Z_{q}$, where q could be either greater or smaller than p? Note that **I do not need** conversion from $Z_{2^n}$ to $Z_{2}$.
I am aware of the results on [PRSS](http://link.springer.com/chapter/10.1007%2F978-3-540-30576-7_19), and well as in this [2008](https://eprint.iacr.org/2008/221.pdf) work, however the former does not address field conversion, and the latter, have explanations that are not clear nor it offers perfect security.
Any help is more than welcome!
|
https://crypto.stackexchange.com/questions/47554/share-conversion-between-different-finite-fields
|
[
"secret-sharing",
"multiparty-computation",
"finite-field",
"garbled-circuits",
"function-evaluation"
] | 11 | 2017-05-19T06:58:27 |
[
"@Dragos... Btw.... Are you from Bristol's group? that Dragos?",
"I see..Even converting shares from $Z_p \\rightarrow Z_2^{r}$ is a hard problem - at least I have encountered it several times and don't know how to solve it efficiently other than bit decompose and simulate the binary circuit in $Z_p$.",
"@Dragos. My inputs are bounded by the conversion target, if I do any transformation to a smaller field, let say $Z_{2}$ I would loose information (or be forced to use bit decomposition which I also want to avoid). This is why I cannot use $Z_{2}$, as I pointed out. Any idea is welcome!",
"For me, arithmetic means $Z_p$. You can use the method above by first converting from $Z_p \\rightarrow Z_2$ and then from $Z_2 \\rightarrow Z_q$.",
"@Dragos, as I pointed out on the explanation of the problem I 'm not interested on $Z_{2}$ to $Z_{2^r}$ conversions. Thanks anyways!",
"There is a way to do share conversion from binary to arithmetic and vice-versa using this paper: thomaschneider.de/papers/DSZ15.pdf"
] | 6 |
Technology
| 0 |
4
|
crypto
|
RSA key such that pi deciphers to your name per RSA-OAEP
|
Can you efficiently construct an RSA public/private key pair with $8k$-bit public modulus such that $C=\left\lfloor\pi\,2^{8k-2}\right\rfloor$ deciphers per RSA-OAEP to your name as a bytestring in ASCII or UTF-8?
The decryption must be per RSAES-OAEP of [PKCS#1v2.2](http://mpqs.free.fr/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp_EMC_Corporation_Public-Key_Cryptography_Standards_\(PKCS\).pdf#page=21), SHA-256 hash, no label, MGF1 with SHA-256, and sucessful. The key pair must conform¹ to [section 3](http://mpqs.free.fr/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp_EMC_Corporation_Public-Key_Cryptography_Standards_\(PKCS\).pdf#page=6). It could come as $n$, $e$, $d$, or as a PEM text encoding of the private key per the format of [section A.1.2](http://mpqs.free.fr/h11300-pkcs-1v2-2-rsa-cryptography-standard-wp_EMC_Corporation_Public-Key_Cryptography_Standards_\(PKCS\).pdf#page=41) acceptable by an [ASN.1 decoder](https://lapo.it/asn1js/). Kudos if it passes² OpenSSL's [`RSA_check_key`](https://gitlab.com/gitlab-org/build/omnibus-mirror/openssl/blob/706457b7bda7fdbab426b8dce83b318908339da4/crypto/rsa/rsa_chk.c), more kudos if $8k\ge1024$, the higher the better.
$C$ is the first $k$ bytes of [these](http://mpqs.free.fr/C.txt) (in hex) for $8k$ up to $2^{16}$ bits.
* * *
Update: [this](https://crypto.stackexchange.com/a/80322/555) answers in the affirmative, for whatever usual $k$, with $p$ and $q$ equal-size primes, and $N$ hard to factor. The next frontier is a low $e$, say in $[3,2^{256})$, ideally $65537$.
Further stunts are possible, like having $C$ or $2$ the signature of anything per any usual RSA signature scheme, even deterministic and/or with message recovery.
As a consequence: verifying a signature of a file against Alice's RSA public key (including, certified and used for other purposes) is proof neither that the file is unchanged since signature, nor that Alice was the signer.
Example where that matters: the signature of a file is on a trusted site, the file is not. Alice manages to get her public key (which she uses normally) in the verifier's keystore (with the key identifier of the legitimate signer, if there is such thing in the signature). The verifier, who just uses crypto as a magic tool, sees that the signature verifies, and (rightly) trusts the secure site to hold only trusted signatures of trusted files. There is a chance that a file alteration by Alice goes uncaught, or/and that she can wrongly convince the verifier that she made the signature at the date notarized by the trusted site.
Update 2: Some consequences of the same possibility are discussed in Dennis Jackson, Cas Cremers, Katriel Cohn-Gordon and Ralf Sasse's [_Seems Legit: Automated Analysis of Subtle Attacks on Protocols that Use Signatures_](https://eprint.iacr.org/2019/779), originally in [proceedings of CCS 2019](https://doi.org/10.1145/3319535.3339813).
* * *
¹ That is: public modulus $n$ must be the product of $u\ge2$ distinct odd primes, odd public exponent $e$ with $3\le e<n$, private exponent $d$ with $0<d<n$ and $e\,d\equiv1\pmod{r-1}$ for each prime $r$ divisor of $n$.
² For keys otherwise per the above, it limits $u$ (including $u=2$ for $n$ less than 1024-bit, $u\le3$ for $n$ less than 4096-bit, see [`rsa_multip_cap`](https://gitlab.com/gitlab-org/build/omnibus-mirror/openssl/-/blob/706457b7bda7fdbab426b8dce83b318908339da4/crypto/rsa/rsa_mp.c#L100)). It also requires the full factorization of $n$ to be given, as well as reduced exponents and multiplicative inverses.
|
https://crypto.stackexchange.com/questions/80211/rsa-key-such-that-pi-deciphers-to-your-name-per-rsa-oaep
|
[
"rsa",
"oaep"
] | 13 | 2020-04-23T04:22:27 |
[] | 0 |
Technology
| 0 |
5
|
crypto
|
Finding $x$ such that $g^x\bmod p<p/k$?
|
In a Schnorr group as used for DSA, of prime modulus $p$, prime order $q$, generator $g$ (with $p/g$ small), how can we efficiently exhibit an $x$ with $0<x<q$ such that $g^x\bmod p<p/k$, for sizable $k$ but $k\ll\sqrt q$ ?
I see that for small $k$, it is enough to try incremental values of $x$ until finding an $x$ that fits, with expected cost $O(k)$ modular multiplications in $\mathbb Z_p^*$. Is there better?
Assume $p$ is an $l$-bit prime; $q$ is an $n$-bit prime with $q$ dividing $p-1$; and $g=h^{(p-1)/q}$ for some (random?) $h$ in $\mathbb Z_p^*$. For concrete values, assume $l\approx1024$, $n\approx160$, $k\approx2^{64}$.
Update: I'm expecting the problem to be hard, and thus that the more difficult problem of exhibiting $x$ with $g^x\bmod p$ in a range of width $p/k$ must be hard.
|
https://crypto.stackexchange.com/questions/48503/finding-x-such-that-gx-bmod-pp-k
|
[
"discrete-logarithm",
"group-theory"
] | 19 | 2017-06-20T08:57:11 |
[
"Can you please provide me with some real values of variables in question instead of me attempting with random values.",
"@pintor: no, I have made no progress nor got more feedback than the above comments.",
"@fgrieu, did you get any more updates on the problem? I'm also curious",
"This seems to reduce to a discrete logarithm problem in the multi-target setting, with a potentially very high target number depending on $k$. For a $k\\approx \\sqrt{p}$ index calculus seems like the best choice. Once you have one solution, getting more is relatively fast. Unsure if there's something better.",
"@SamuelNeves: yes; the only constraint on $g^x\\bmod p$ is that it is small (about $\\log_2(k)$-bit smaller than $p$ is).",
"Do you get to choose what the $g^x \\mod p$ value is?",
"@puzzlepalace: thank you for finding a hole; plugged it.",
"Choose $x = 0$ ? Runs in $\\Theta(1)$ ;)"
] | 8 |
Technology
| 0 |
6
|
crypto
|
Time-memory tradeoffs in Shor's algorithm
|
Can a quantum computer with insufficient qubits to factor an integer of a given size make _any_ progress in factoring it? For example, what if a quantum computer is only one qubit short of what is necessary to attack a specific integer? Is it capable of making any progress in factoring it, or would it be just as useless as a 2 qubit machine? Assume qubits refer to logical qubits in a general-purpose cryptanalytic quantum computer with sufficient quantum error correction to solve the problem of decoherence.
Given that qubits can be thought of as the memory for quantum computers, I am essentially asking if time-memory tradeoffs are possible with Shor's algorithm when too few qubits are available.
|
https://crypto.stackexchange.com/questions/67910/time-memory-tradeoffs-in-shors-algorithm
|
[
"factoring",
"quantum-cryptanalysis",
"shors-algorithm"
] | 8 | 2019-03-09T22:20:47 |
[
"Interesting question. One problem certainly could occur when you have less qubits than the number of the period $r$ ($a^r \\bmod N$). This would probably mess up the inverse quantum fourier transform which amplifies the correct period (quantum wave interference), thus rendering the whole computation impractical. In that case you can't find $r$.",
"Quantum computers, like classical ones, needs a minimum amount of memory to calculate any given pair of algorithm and input. This is why Turing completeness assumes infinite memory. Even quantum computers can only evaluate the the possibilities that fits in the qubit memory it has. Every algorithm and input has different limits, but it always exists. Exceeding the minimum necessary memory allows you to add further optimizations to attempt to improve performance. However, sometimes you can break the algorithm into smaller individual steps that each need less memory.",
"This answer from Quantum Computing.SE gives some interesting references in the third paragraph."
] | 3 |
Technology
| 0 |
7
|
crypto
|
Does the bias in RC4 drop asymptotically further in the keystream?
|
It's well-known that the RC4 keystream has significant biases that become less prominent later in the keystream. The most severe bias is in the second byte, which has a 128-1 bias towards zero. Other biases remain, and it's typically recommended to drop between 768 and 3072 bytes of the keystream.
Will dropping one more byte _always_ reduce the bias, or is there a point when the bias is as low as it is going to get and it won't get lower as the keystream goes on? It doesn't matter if the bias is negligible.
Note that I am only talking about short-term biases, not long-term ones which RC4-dropN can't solve.
**Does an _N_ exist that results in minimum bias in RC4-dropN?**
|
https://crypto.stackexchange.com/questions/72353/does-the-bias-in-rc4-drop-asymptotically-further-in-the-keystream
|
[
"stream-cipher",
"rc4",
"distinguisher"
] | 7 | 2019-08-03T01:44:25 |
[
"@MaartenBodewes I have not yet, but I also haven't done much research into it. There's a lot of academic text on the (in)security of RC4 which I should familiarize myself with.",
"Hey Forest. This question popped up again. Unfortunately I don't know the answer, but maybe you've found one in the mean time?",
"@kodlu The paper I referenced in my first comment is rc4nomore.com/vanhoef-usenix2015.pdf.",
"please point to the right paper, there are a few with these authors. also, proving convergence rates in random processes is notoriously hard, in general.",
"@IlmariKaronen I am asking whether a minimum level of bias can be reached in a finite number of steps.",
"If I understand your last paragraph right, you seem to actually be asking whether the asymptotic long-term level of bias is actually attained within a finite number of steps, or whether the asymptote is only approached but never reached. Is that correct?",
"I'm reading the Vanhoef and Piessens paper from 2015 to see if I can find the answer myself. If this is a particularly stupid question (it probably is) and the answer turns out to be obvious, I'll delete or self-answer it."
] | 7 |
Technology
| 0 |
8
|
cstheory
|
Partial circulant matrices: Is there a non-zero vector $v\in \{-1,0,1\}^n$ such that $Mv=0$?
|
The following question arose as a side product of some work I have been part of recently. An $m$ by $n$ $(0,1)$-matrix $M$ is partial circulant if it can be formed by taking the first $m$ rows of a [circulant matrix](http://en.wikipedia.org/wiki/Circulant_matrix) and all its entries are either $0$ or $1$. We assume that $m\leq n$.
Given such a partial circulant matrix $M$, what is the computational complexity of the following question?
> Is there a non-zero vector $v\in \\{-1,0,1\\}^n$ such that $Mv=0$?
The problem is clearly in NP but my guess is that it is not NP-hard (unlike [this related question](https://cstheory.stackexchange.com/questions/20277/decide-whether-a-matrixs-kernel-contains-any-non-zero-vector-all-of-whose-entri)). I have not, however, found a poly time solution.
|
https://cstheory.stackexchange.com/questions/12060/partial-circulant-matrices-is-there-a-non-zero-vector-v-in-1-0-1-n-such
|
[
"cc.complexity-theory",
"ds.algorithms",
"matrices"
] | 20 | 2014-11-04T06:46:47 |
[
"The circulant case was in fact considered at mathoverflow.net/questions/168474/… . However, it seems that there is fatal bug in one of the answers and the other answer is not a complete solution.",
"would it be more natural to study the circulant case 1st vs the partial circulant? also (idea) the other problem answers are formulated in terms of subset sum problem, how would this problem be formulated that way (ie as a constrained or special case of subset sum problem)? note there are many subset sum variants studied in the literature that might be close..."
] | 2 |
Science
| 1 |
9
|
cstheory
|
Are monotone Boolean functions in P well-approximated by monotone polynomial-size circuits?
|
**Question 1:** Is it true that for every polynomial $p(n)$ and $\epsilon >0$ there is a polynomial $q(n)$ such that every monotone Boolean function on $n$ variables that can be expressed by a Boolean circuit of size $p(n)$ can be $\epsilon$-approximated by a _monotone_ Boolean circuit of size at most $q(n)$.
A function $f$ is $\epsilon$-approximated by a function $g$ if they agree on at least $(1-\epsilon)$ fraction of inputs.
We can ask a slightly more general question. Let $\mu_p$ denote the Bernoulli measure on $\\{0,1\\}^n$ where every variable is '1' with probability $p$. For a (non-constant) monotone function $f$ let $p_c(f)$ be the value such that $\mu_{p_c}(\\{x: f(x)=1\\})=1/2$.
**Question 2:** Is it true that for every polynomial $p(n)$ and $\epsilon >0$ there is a polynomial $q(n)$ such that every monotone Boolean function $f$ on $n$ variables, there is a Boolean function $g$ that can be expressed by a monotone Boolean circuit of size $q(n)$ such that for $p=p_c(f)$, $\mu_p(\\{x: f(x) \ne g(x) \\}) \le \epsilon$.
Of course, the instinctive thought is that the answers for both these question is **NO**. Is it known? Razborov famously proved that matching cannot be expressed by a monotone Boolean circuit of polynomial size. But matching can be approximated in its critical probability by the property that there are no isolated vertices and this property admits a monotone (low depth) circuit.
I asked the analog questions (Problems 1,2,3) for $AC^0$ and $TC^0$ in [this blog post](https://gilkalai.wordpress.com/2010/02/10/noise-stability-and-threshold-circuits/).
|
https://cstheory.stackexchange.com/questions/31473/are-monotone-boolean-functions-in-p-well-approximated-by-monotone-polynomial-siz
|
[
"cc.complexity-theory",
"circuit-complexity",
"pr.probability"
] | 18 | 2015-05-12T23:58:06 |
[
"Dear Gil, now I see the point: I just wrongly interpreted your question! We indeed have that every monotone circuit, which needs only to coincide with b-Clique on an extremely small, but special set of inputs, must be large. You, however, do not specify this subset of \"hard\" inputs, only its ratio $1-\\epsilon$. This is a very interesting question. B.t.w. that result (on clique approximation) is Thm. 9.26 in my book.",
"\"Every monotone circuit separating graphs consisting of complete a-partite graphs with a > 32 from graphs consisting of b-cliques for a < b < n/32 must have size exponential in min{a,n/b}^{1/4}.\"This is interesting (reference?) but I am not sure it is relevent - namely I don't see that my notion of $\\epsilon$-approximation is relevant to the result you mention.",
"Dear Gil, I interpreted your Question 1 as \"if a monotone boolean function $f$ cannot be $\\epsilon$-approximated by a small monotone circuit, then $f$ has no small non-monotone circuits\" (with \"small\" meaning \"of polynomial size\"). If the interpretation is correct, the function I mentioned only weakly approximates b-Clique function, and still requires large monotone circuits.",
"Dear Stasy, I don't see how the results you mention refer to Questions 1 and 2. (As I said, I also expect a 'no' answer..)",
"Gill, what about the fact that every monotone circuit separating graphs consisting of complete a-partite graphs with a > 32 from graphs consisting of b-cliques for a < b < n/32 must have size exponential in min{a,n/b}^{1/4}. The approximation density seems to be here enough (is it?) to say that your conjecture would definitely imply P!=NP.",
"Thanks Gil, this seems like a good reason to update my prior to \"NO\".",
"Dear Andras, Alas, counting arguments are too weak for things of this kind. A YES answer will tell you that an argument that (1) some monotone NP-complete problem cannot be approximated by a polynomial size monotone circuit in the critical probability, automatically implies that (2) it cannot be approximated by a polynomial size circuit in the critical probability. (2) is a stronger statement than $NP \\ne P$ but I dont regard (1) as hopeless. (You may think that the answer is YES but proving it is hopeless, but I find it easier to think that the answer is NO and its not beyond reach.)",
"Why is NO the instinctive response? Monotone functions have all sorts of nice properties, so a priori this doesn't seem all that unlikely to me. Are you perhaps thinking of a counting argument?"
] | 8 |
Science
| 0 |
10
|
cstheory
|
Weighted Hamming distance
|
Basically my question is, what kind of geometry do we get if we use a "weighted" Hamming distance. This is not necessarily Theoretical Computer Science but I think similar things come up sometimes, for instance in randomness extraction.
Define:
$d(x,y)=$ the Hamming distance between binary strings $x$ and $y$ of length $n$, $=$ the cardinality of $\\{k: x(k)\ne y(k)\\}$.
For a set of strings $A$,
$d(x,A)=\min \\{ d(x,y): y\in A\\}$.
The _$r$ -fold boundary of_ $A\subseteq \\{0,1\\}^n$ is
$$\\{x\in\\{0,1\\}^n: 0 < d(x,A)\le r\\}.$$
Balls centered at $0$ are given by
$$ B(p)=\\{x: d(x,0)\le p\\}, $$ where $0$ is the string of $n$ many zeroes.
A _Hamming-sphere_ is a set $H$ with $B(p)\subseteq H\subseteq B(p+1)$. (So it's more like a ball than a sphere, but this is the standard terminology...)
Now, Harper in 1966 showed that for each $k$, $n$, $r$, one can find a Hamming-sphere that has minimal $r$-fold boundary among sets of cardinality $k$ in $\\\\{0,1\\\\}^n$. So a ball is a set having minimal boundary -- just like in Euclidean space.
The cardinality of $B(p)$ is ${n\choose 0}+\cdots {n\choose p}$.
The $r$-fold boundary of $B(p)$ is just the set $B(p+r)\setminus B(p)$, which then has cardinality ${n\choose p+1}+\cdots+{n\choose p+r}$.
So far, so good. But now suppose we replace $d$ by a different metric $D$: first let $d_j(x,y)$ be the Hamming distance between the prefixes of $x$ and $y$ of length $j$, and then $$ D(x,y)=\max_{j\le n}\ \frac{d_j(x,y)}{f(j) }$$ where $0\le f(j)\le j$. (For example we could have $f(j)=\sqrt{j}$, or $f(j)=j/\log j$.)
This is supposed to make $D(x,y)$ small if the differences of $x$ and $y$ do not clump together at small values of $j$.
# Questions
> Is the minimum $r$-fold boundary (under $D$) realized by a $D$-ball?
>
> Is there a better definition of $D$?
>
> Under the metric $D$, what's the minimum size of the $r$-fold boundary of a subset of $\\\\{0,1\\\\}^n$ having cardinality $k$? (A reasonable lower bound would be nice.)
(Cross-[posted](https://mathoverflow.net/questions/38221/geometry-in-a-hamming-box) on MathOverflow).
|
https://cstheory.stackexchange.com/questions/2637/weighted-hamming-distance
|
[
"co.combinatorics",
"randomness"
] | 20 | 2010-11-01T22:06:48 |
[] | 0 |
Science
| 1 |
11
|
cstheory
|
To what extent MSO = WS1S, when adding relations?
|
[This question has been asked on MathOverflow with no luck a month ago.]
Let me first clarify my definitions. For a word $w \in \Sigma^*$, with $\Sigma =\\{a_1, \ldots, a_n\\}$, I define two structures:
$\mathbb{N}(w) = \langle \mathbb{N}, <, Q_{a_1}, \ldots, Q_{a_n} \rangle$,
and the more usual _word model_ :
$\mathbb{N}^r(w) = \langle \\{0, \ldots, |w|-1\\}, <, Q_{a_1}, \ldots, Q_{a_n} \rangle$,
where $Q_{a_i} = \\{p \mid w_p = a_i\\}$.
Then WS1S is the set of second order formulas with models of the form $\mathbb{N}(w)$, with order, and for which second order quantification is limited to finite subsets of the domain. MSO is the set of monadic second order formulas with models of the form $\mathbb{N}^r(w)$, with order.
The usual proof that REG = WS1S proves at the same time that MSO = WS1S. My question is then, for which first or second order relations can we keep this to be true?
For instance, if we add a unary predicate $E(X)$ which says that a (monadic) second order variable contains an even number of objects, we add no power, as $E(X)$ is expressible as "there exists $X_1$ and $X_2$ that partition $X$, in such a way that if an element is in $X_i$ the next one in $X$ is in $X_j$, $i \neq j$, and the first element of $X$ is in $X_1$ and the last is in $X_2$."
Now, if we add a predicate $|X| < |Y|$, then WS1S becomes undecidable (see Klaedtke & Ruess, 10.1.1.7.3029), while MSO stays trivially decidable.
Thank you.
* * *
**Edit:** As a side question, ... is this question of interest? I mean, I'm no expert in the field, so I'm not sure this question is relevant.
|
https://cstheory.stackexchange.com/questions/15/to-what-extent-mso-ws1s-when-adding-relations
|
[
"lo.logic",
"automata-theory",
"descriptive-complexity"
] | 19 | 2010-08-16T13:32:53 |
[
"Your model $\\mathbb{N}(w)$ is very unusual : what is the need of considering a finite word on an infinite underlying structure ? If you forget the letter predicates (which do not change the problem a lot), you are in fact comparing MSO on finite linear orders, and WS1S on the order $\\omega$. This is strange, because it is more intuitive to compare different logic formalisms on the same structure.",
"What are your reasons to think this question is uninteresting? From a practical point of view, it is useful to know when you can restrict yourself to finite models, isn't it? For the record, I received no comment on MO.",
"Was there no joy on MO because they couldn't figure it out, or because they found your question uninteresting? (I'm guessing the latter)",
"also see the greasemonkey hack mentioned here: meta.cstheory.stackexchange.com/questions/3/latex-math-support",
"Ain't we just a click away from it?",
"We do need Latex math support..."
] | 6 |
Science
| 0 |
12
|
cstheory
|
Descriptive complexity of communication complexity classes
|
It is well known that some major complexity classes, like P or NP, admit a full logical characterization (e.g NP = existential 2nd order logic by Fagin's theorem). On the other hand, one can also define complexity classes in communication complexity (where P = problems solvable with poly(logN) communication etc. - see [Complexity classes in communication complexity theory](http://dl.acm.org/citation.cfm?id=1382962) for more).
My question is - are any descriptive complexity characterizations known for communication complexity classes (or do any such results from standard complexity classes transfer to communication setting easily)?
|
https://cstheory.stackexchange.com/questions/9041/descriptive-complexity-of-communication-complexity-classes
|
[
"cc.complexity-theory",
"lo.logic",
"communication-complexity"
] | 18 | 2011-11-19T14:15:36 |
[
"You may want to limit the computational power of the parties, which is not done in the usual communication complexity models."
] | 1 |
Science
| 0 |
13
|
cstheory
|
Does $EXP\neq ZPP$ imply sub-exponential simulation of BPP or NP?
|
By simulation I mean in the Impaglazzio-Widgerson [IW98] sense, i.e. sub-exponential deterministic simulation which appears correct i.o to every efficient adversary.
I think this is a proof: if $EXP\neq BPP$ then from [IW98] we get that BPP has such a simulation. Otherwise we have that $EXP=BPP$, which implies $RP=NP$ (because $NP \subseteq BPP$) and $EXP \in PH$. Now if $NP=RP=ZPP$ we have that $PH$ collapses to $ZPP$ and as a result $EXP$, but this cannot happen because of the assumption, so $RP\neq ZPP$ and this by the Kabanets paper "Easiness assumptions and hardness tests: trading time for zero error" implies that RP has such a simulation and as a result also NP.
This sounds like it could be a useful gap theorem. Does anyone know if it appears anywhere?
|
https://cstheory.stackexchange.com/questions/430/does-exp-neq-zpp-imply-sub-exponential-simulation-of-bpp-or-np
|
[
"cc.complexity-theory",
"reference-request",
"complexity-classes",
"conditional-results"
] | 29 | 2010-08-23T13:21:04 |
[
"ZPP is closed under complement, and contained in NP. So, $\\mathrm{NP\\subseteq ZPP}$ implies NP = ZPP = coNP, hence PH = NP = ZPP.",
"Why does NP in ZPP imply PH in ZPP?",
"(Just for reference): Identical question on MO: mathoverflow.net/questions/35945. Maybe someone finds the comments there inspiring.",
"Very interesting. I haven't seen this argument before, but I'm not by any means an expert in these things..."
] | 4 |
Science
| 1 |
14
|
cstheory
|
Interesting PCP characterization of classes smaller than P?
|
The PCP theorem, $\mathsf{NP} = \mathsf{PCP}(\mathsf{log}\, n, 1)$, involves probabilistically checkable proofs with polynomial time verifiers, so the smallest class that can be characterized in this way (that is, $\mathsf{PCP}(0, 0)$) must be $\mathsf{P}$. There are also PCP characterizations of larger complexity classes (for example, $\mathsf{NEXP} = \mathsf{PCP}(\mathsf{poly}, \mathsf{poly})$), also using polynomial time verifiers.
Can we achieve an interesting (that is, not immediately following from the definitions) PCP characterization of smaller complexity classes by restricting the time or space used by the verifier? For example, by using a logarithmic space verifier, or an $\mathsf{NC}$ circuit verifier?
|
https://cstheory.stackexchange.com/questions/12060/interesting-pcp-characterization-of-classes-smaller-than-p
|
[
"cc.complexity-theory",
"complexity-classes",
"pcp"
] | 20 | 2012-07-18T11:54:42 |
[
"Your comment is contradictory to your question where you count “PCP(0, 0) = P” as a PCP characterization of P.",
"I suppose I meant are there any characterizations that don't follow immediately from the definition, in the same way that PCP(log n, 1) is non-obvious characterization of NP.",
"Why not? If you restrict the space of the verifier to log, then PCP(0, 0) obviously becomes equal to L. And this is a PCP characterization of L if you count PCP(0, 0)=P as a PCP characterization of P. I cannot see the point of the question."
] | 3 |
Science
| 1 |
15
|
cstheory
|
Is Hankelability NP-hard?
|
I asked this question on [SO](https://stackoverflow.com/questions/29484864/an-algorithm-to-detect-permutations-of-hankel-matrices) on April 7 and added a bounty which has now expired but no poly time solution has been found yet.
I am trying to write code to detect if a matrix is a permutation of a Hankel matrix. Here is the spec.
**Input:** An n by n matrix M whose entries are 1 or 0.
**Output:** A permutation of the rows and columns of M so that M is a [Hankel matrix](http://en.m.wikipedia.org/wiki/Hankel_matrix) if that is possible. A Hankel matrix has constant skew-diagonals (positive sloping diagonals).
When I say a permutation, I mean we can apply one permutation to the order of the rows and a possibly different one to the columns.
A very nice $O(n^2)$ time algorithm [is known](https://stackoverflow.com/questions/20704900/determine-if-some-row-permutation-of-a-matrix-is-toeplitz) for this problem if we only allow permutation of the order of rows.
Peter de Rivaz pointed out this [paper](http://www.mat.ucsb.edu/~g.legrady/academic/courses/15w259/d/re_orderableMatrix.pdf) as a possible route to proving NP-hardness but I haven't managed to get that to work.
|
https://cstheory.stackexchange.com/questions/31174/is-hankelability-np-hard
|
[
"cc.complexity-theory"
] | 28 | 2015-04-16T10:44:55 |
[
"Cross-posted now to mathoverflow.net/questions/204294/is-hankelability-np-hard",
"@IgorShinkar I mean first some permutation on the order of the rows and then a possibly different permutation on the order of the columns, then stop.",
"Do you mean apply first some permutation on the rows and then some permutation on the columns? or do you allow more permutations?",
"@Kaveh Thanks for the question. The permutation applied to the order of the columns can be different from the one applied to the order of the rows.",
"Do you mean that the same permutation is applied to rows and columns? (my got feeling says this is in P, if a matrix is Hankelable with different diagonal values there aren't that many possibilities for the permutation.)",
"Just a guess: maybe this problem is GI-complete?"
] | 6 |
Science
| 1 |
16
|
cstheory
|
Model-checking for three-variable logics and restricted structures
|
Denote the $k$-variable fragment of logic $L$ by $L^{(k)}$. The model-checking problem for a logic $L$ with respect to a class of structures $C$, denoted $MC(L,C)$, is the decision problem
> $MC(L,C)$
> _Input:_ formula $\phi$ of $L$, structure $S$ from $C$
> _Question:_ does $S$ satisfy $\phi$?
Is there a logic $L$, with associated class of structures $C$, and a subclass $D$ of $C$, such that
1\. $MC(L^{(3)},D)$ is "easy",
2\. $MC(L,D)$ is "hard", and
3\. $MC(L^{(3)},C)$ is "hard"?
With "easy" vs. "hard" I mean decidable vs. undecidable, PTIME vs. NP-hard, LogCFL vs. P-complete, or similar dichotomies.
# Motivation
For many logics the three-variable fragment is enough to express "hard" properties (this is true for MSO and FO over ordered structures). So results about undecidability often carry across from the logic to its three-variable fragment. There is also often a way to reduce the arity of predicates used in formulas efficiently (for instance, SAT can be reduced to 3SAT with a linear increase in formula size). Reducing arity facilitates expressing some formulas with fewer variables.
On the other hand, there exist logics which are "easy" for some classes of structures yet "hard" in general. For instance, the model-checking problem for MSO is "easy" (linear time) on unordered graphs satisfying the property "has treewidth less than $k$" for any fixed $k$, but "hard" (NP-complete) on unordered graphs in general.
I am asking whether there are any known examples where the restriction to 3 variables interacts with the property defining the subclass $D$ in an essential way to yield tractability, yet where neither of these restrictions on their own is enough.
Apologies for the vagueness of the question: I am trying to leave this general because I can't think of any examples. As soon as I restrict $D$ enough to ensure condition 1 holds, condition 2 seems to break. I suspect there are some unnatural classes which would work, but ideally $D$ should be "nice", at least hereditary and closed under isomorphism. As a further non-example, model-checking for FO is PSPACE-complete while model-checking for $FO^{(3)}$ is PTIME-complete; here the restriction to a finite number of variables is already enough to ensure an "easy" model-checking problem and condition 3 fails.
Definitions for completeness: FO is [first-order logic](http://en.wikipedia.org/wiki/First-order_logic), MSO is monadic [second-order logic](http://en.wikipedia.org/wiki/Second-order_logic), where quantification over sets of individuals is allowed, as well as quantification over individuals.
|
https://cstheory.stackexchange.com/questions/2637/model-checking-for-three-variable-logics-and-restricted-structures
|
[
"cc.complexity-theory",
"co.combinatorics",
"lo.logic",
"descriptive-complexity"
] | 20 | 2010-11-03T11:47:19 |
[
"@MichaëlCadilhac alas, no.",
"Have you made any progress on that question, András?"
] | 2 |
Science
| 1 |
17
|
cstheory
|
In an $m$ by $n$ Boolean matrix, can you find a square block whose four corners are ones in $O(m \cdot n)$ time?
|
**Decision Problem**
Input: An $m$ by $n$ Boolean matrix $M$.
Decision Question: Does there exist a square block within $M$ such that upper-left corner entry == upper-right corner entry == lower-left corner entry == lower-right corner entry == 1? That is, all four corners of the square block are 1's.
**Cubic Time Solution**
We know that this problem can be solved in $O(m \cdot n \cdot min\\{m,n\\})$ time. The approach involves scanning through the matrix row by row. For each row, for each pair of 1's in that row, we check whether those 1's form an edge of a square block whose four corners are 1's.
**Our Question**
What is the time complexity of this problem? Is there a quadratic time solution? In particular, can we solve this decision problem in $O(m \cdot n)$ time?
**Extra Background**
1. If you're just looking for a rectangular block whose four corners are ones, this can be solved in $O(m \cdot n)$ time. Many variations to this problem can be solved in $O(m \cdot n)$ time as well. I co-authored a paper on this subject.
2. The paper ["Finding squares and rectangles in sets of points"](https://doi.org/10.1007/BF01931281) investigates a related problem from computational geometry where you're given a set of points in a 2D plane and you want to know if there are four points that form an axis-parallel square.
Written together with Eevvoor.
|
https://cstheory.stackexchange.com/questions/47588/in-an-m-by-n-boolean-matrix-can-you-find-a-square-block-whose-four-corners
|
[
"ds.algorithms",
"matrices",
"computational-geometry",
"search-problem",
"boolean-matrix"
] | 18 | 2020-09-18T11:04:38 |
[
"It feels somehow like an FFT would help, although I haven't been able to puzzle out details. You're looking for something translation-invariant, and working in frequency space often helps with that sort of thing. Tossing out this comment in case someone else can spot something.",
"@MichaelWehar: ok, let me know if you make some progress!",
"@MarzioDeBiasi It turns out that my reduction doesn't quite work. I'm seeing if I can fix it.",
"@MarzioDeBiasi I guess that the right isosceles triangle problem is reducible to triangle finding. We can convert the matrix to a graph where vertices are rows, columns, and diagonals. Also, entries with 1's are associated with edges. But, can we do any better than matrix multiplication time?",
"@MarzioDeBiasi Please feel welcome to share these works! I think they could be pretty helpful. :)",
"@michaelwehar my idea of right triangle is a square with three 1s on the corners (no matter where the missing one is) but there is a reduction from mine to yours, where the missing one is in the bottom right (just rotate 90 and replicate four times). BTW there are some works both on monochromatic square and triangle free grids (somewhat related if you interpret \"colors\" with small monochromatic (sub)boxes with 1s on the diagonal)",
"@MarzioDeBiasi I thought about your right isosceles triangle problem. Just to confirm, this problem is asking for a square block where upper-left corner entry == upper-right corner entry == lower-left corner entry == 1, but we don't care whether lower-right corner entry is 0 or 1? I think that I have some potentially promising ideas for this problem. I'm going to try to formalize the ideas and I hope to share in a few days. Thanks again!",
"Even if you restrict the search to right isosceles triangles, it seems impossible to have an $O(mn)$ algorithm",
"@DavidEppstein I wasn't quite sure how many 1's there could be without forcing there to be a square block so this is very helpful! User whosyourjay showed a construction related to affine planes on how many 1's there could be without forcing there to be a rectangular block whose corners are 1's. If I recall correctly, the near-tight bound was something like $m \\cdot n^{1/2}$ (it had degree 3/2).",
"This is more dead end than answer, but: there exist sets of $mn^{1-o(1)}$ nonzeros with no square, formed by filling diagonals according to a near-linear-size progression-free set (en.wikipedia.org/wiki/Salem%E2%80%93Spencer_set). So an algorithm that answers yes if dense enough to force a square and switches to the naive O(nonzeros times min(m,n)) otherwise can't be strongly subcubic.",
"@JoshuaGrochow Yes, when searching for a rectangular block, the problem is related to finding a four cycle in a graph which is solvable in quadratic time. However, when searching for a square block, I don't know what can be done. Maybe there is a way to reduce triangle finding to this problem.",
"Seems a little similar to finding a triangle in a graph. If you get a subcubic reduction from that problem that'd be the end of the story for now.",
"@daniello Yes! That's a good point. When the input matrix is rectangular, we can reduce it to the case where the input matrix is square. Thank you. :)",
"You can assume wlog that $m \\leq n$ (otherwise transpose) and that $n \\leq 2m$ since otherwise you can cover the matrix by $2n/m$ matrices of size $m \\times 2m$ that cover all square blocks. So wlog the input matrix is square $n$ by $n$."
] | 14 |
Science
| 0 |
18
|
cstheory
|
Problem unsolvable in $2^{o(n)}$ on inputs with $n$ bits, assuming ETH?
|
If we assume the Exponential-Time Hypothesis, then there is no $2^{o(n)}$ algorithm for $n$-variable 3-SAT, and many other natural problems, such as 3-COLORING on graphs with $n$ vertices. Notice though that, in general, encoding the input for $n$-variable 3-SAT or $n$-vertex 3-COLORING takes something like $O(n\log n)$ bits. For example, to describe a sparse graph as input to 3-COLORING, for each edge we would have to list its endpoints. So the lower bound is not exponential in the length of the input. Therefore, my question is the following:
Is there a problem for which no $2^{o(n)}$ algorithm exists for inputs of length $n$ bits (assuming ETH)?
Ideally, the problem would be in NP (no cheating with succinct NEXP-hard problems!) and be reasonably natural, but I won't be picky.
Let me also note that after digging around I found that there are efficient ways to encode planar graphs with $O(n)$ bits. So, if one could find a problem that takes time exponential in the number of vertices even for planar graphs, the question would be settled. However, because planar graphs have treewidth $O(\sqrt{n})$, most natural problems have sub-exponential algorithms in this case.
|
https://cstheory.stackexchange.com/questions/16148/problem-unsolvable-in-2on-on-inputs-with-n-bits-assuming-eth
|
[
"cc.complexity-theory",
"sat",
"planar-graphs",
"succinct"
] | 48 | 2013-01-19T08:24:59 |
[
"I believe that it is an open question if we can have a lower bound $2^{\\Omega(n)}$ under ETH, where $n$ is the bit size. We know that proving lower bound $\\Omega(c^n)$ under SETH would disprove SETH.",
"How about the following problem, for some large constant $c>0$? Given the encoding of a non-deterministic TM $M$ and binary string $w$, does $M(w)$ have an accepting computation of length at most $|w|^c$? This should work if anything does... (?)",
"@AviTal This paper comes to mind arxiv.org/abs/cs/0102005 . The usual keywords for this line of research seem to be \"compact\" and \"succinct\" encodings or representations. (succinct is stronger in that it is optimal up to an additive term instead of a multiplicative factor for compact).",
"Would disordered lattice tiling work? Without disorder the problem is NEXP-complete [arXiv:0905.2419] but with disorder (e.g., a vertex-dependent constraint on the tiles) the input would need to be $O(n)$. This is reasonably natural: it would arise in physics as the zero-temperature partition function of a disordered vertex model.",
"Can you point to a reference where I can find efficient ways to encode planar graphs with O(n) bits? (I assume that n is the number of vertices). If so, there are NP-Complete problems for planar graphs and maybe the problem can also be presented in O(n) bits using these methods. Thanks.",
"It is probably not possible to compress $n$ variable SAT instances to $O(n \\log n)$ as stated in the question (Dell, van Malkebeek, \"Satisfibility Allows No Nontrivial Sparsification Unless The Polynomial-Time Hierarchy Collapses\"). However, 3-SAT has no $2^{o(m)}$ algorithm where $m$ is the number of clauses, as shown by Impagliazzo and Paturi (assuming ETH). Since the hard cases have $O(m)$ variables we have $b=O(m \\log m)$, so $m=\\Omega(b/\\log b)$, so 3-SAT has no $2^{o(b/\\log b)}$ algorithm where $b$ is the input size.",
"A problem in NP for which our present algorithmic knowledge is consistent with such a ETH result is edge chromatic number in a dense graph. AFAIK, we do not yet know of any $2^{o(|E|)}$ time algorithms...",
"If you are fine with dropping the condition that the problem is in NP, then you can use any undecidable problem and you do not even need the exponential time hypothesis. So probably you should be picky."
] | 8 |
Science
| 1 |
19
|
cstheory
|
Sylver Coinage Game
|
A game in which the players alternately name positive integers that are not sums of previously named integers (with repetitions being allowed). The person who names 1 (so ending the game) is the loser.
The question is: If player 1 names ‘16’, and both players play optimally thereafter, then who wins?
It has been known that if player 1 name "5n," then player 1 wins. If player name "5n+2", the result is known(maybe palyer 2 wins, but I haven't found the source yet). 16 is the minimum number of "5n+1".
I guess that this problem is PSPACE-hard, but I haven't proved it yet.
|
https://cstheory.stackexchange.com/questions/22112/sylver-coinage-game
|
[
"co.combinatorics",
"combinatorial-game-theory"
] | 18 | 2014-04-14T04:03:06 |
[
"@NealYoung The algorithm in Winning Ways only gives whether an opening move is winning or not -- in accordance with Conway's comment, it relies on a theorem saying finitely moves of the form 2^a 3^b win, and I imagine (Conway having told me of that fact before) that this is what he meant when he said that an algorithm exists. If so, he was being unclear; however, this means that Jeffe's original comment was still correct.",
"Here's an updated link for Jeffε's comment (as of May 2017). Although I read Conway's comment as suggesting the problem is decidable: \"Is there an algorithm for Sylver Coinage that tells you, by looking over all (possibly infinite) options, what the status of the a position is and what if any are the winning moves? The answer is yes (see Winning Ways) but I do not know what the algorithm is.\"",
"@PyRulez just writing down that regex is exponential time. However, there's an easy polynomial time test for whether you have to name 1 as your next move (and lose): it's true iff both 2 and 3 have already been named (and 1 hasn't). For if they have, then no higher numbers are available, and if they haven't, then one of those two numbers can be named next.",
"@SureshVenkat It is efficient. For example, if the current coins are $4$, $5$, and $7$, you effectively have a regex of (aaaa)*(aaaaa)*(aaaaaaa)*, which can be matched against efficiently.",
"I am considering using the construction of sum-free set, for example, the set of odd numbers is a sum-free subset of the integers, and the set $\\{N/2+1, ..., N\\}$ forms a large sum-free subset of the set $\\{1,...,N\\}$ ($N$ even). Fermat's Last Theorem is the statement that the set of all nonzero nth powers is a sum-free subset of the integers for $n > 2$.However, some basic problems of sum-free set are still unknown. How many sum-free subsets of $\\{1, ..., N\\}$ are there, for an integer $N$? Ben Green has shown that the answer is $O(2^{N/2})$. Can this help?",
"Is it even efficient (i.e P time) to check if someone has lost ? Seems like the \"you lost\" test is an unbounded knapsack problem.",
"Apparently it's open whether Sylver Coinage is decidable. Cool. And at least as of 2002, even Conway didn't know who wins from 16."
] | 7 |
Science
| 0 |
20
|
cstheory
|
Complexity of the homomorphism problem parameterized by treewidth
|
The _homomorphism problem_ $\text{Hom}(\mathcal{G}, \mathcal{H})$ for two classes $\mathcal{G}$ and $\mathcal{H}$ of graphs is defined as follows:
> **Input:** a graph $G$ in $\mathcal{G}$, a graph $H$ in $\mathcal{H}$
>
> **Output:** decide if there is a homomorphism from $G$ to $H$, i.e., a mapping $h$ from the vertices of $G$ to those of $H$ such that, for any edge $\\{x, y\\}$ of $G$, $\\{h(x), h(y)\\}$ is an edge of $H$.
For each $k \in \mathbb{N}$, I will call $\mathcal{T}_k$ the class of the graphs of [treewidth](http://en.wikipedia.org/wiki/Treewidth) at most $k$. I'm interested in the problem $\text{Hom}(\mathcal{T}_k, \mathcal{T}_k)$, which I see as a _parameterized_ problem (by the treewidth bound $k$). My question is: **what is the complexity of this parameterized problem?** Is it known to be FPT? or is it W[1]-hard?
Here are some things that I found about the $\text{Hom}$ problem, but which do not help me answer the question. (I write $-$ for the class of all graphs.)
* <http://www.sciencedirect.com/science/article/pii/009589569090132J>: If $\mathcal{H}$ is bipartite then $\text{Hom}(-, \mathcal{H})$ is in PTIME, otherwise it is NP-complete, but of course the NP-hardness relies on allowing arbitrary $G$.
* [http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.86.9013&rep=rep1&type=pdf](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.86.9013&rep=rep1&type=pdf): If the treewidth of $\mathcal{G}$ (modulo homomorphic equivalence) is bounded by a constant then $\text{Hom}(\mathcal{G}, -)$ is in PTIME (and otherwise it isn't, assuming FPT != W[1]). Hence, in particular my problem $\text{Hom}(\mathcal{T}_k, \mathcal{T}_k)$ is in PTIME for fixed $k$, but this doesn't tell me what is the dependency on the parameter.
* From Flum and Grohe's book _Parameterized Complexity Theory_ , Corollary 13.17: The problem $\text{Hom}(\mathcal{T}_k, -)$ is FPT when parameterized by the _size_ of $G$ (but I am parameterizing by the treewidth)
* <http://users.uoa.gr/~sedthilk/papers/homo.pdf>, Corollary 3.2: When fixing a specific graph $H$, the problem $\text{Hom}(\mathcal{T}_k, \\{H\\})$, parameterized by k, is FPT (this even holds for more complicated counting variants), but I do not want to restrict to fixed $H$.
|
https://cstheory.stackexchange.com/questions/34877/complexity-of-the-homomorphism-problem-parameterized-by-treewidth
|
[
"graph-algorithms",
"parameterized-complexity",
"treewidth",
"fixed-parameter-tractable",
"homomorphism"
] | 18 | 2016-06-02T03:37:34 |
[
"This question is still open, but one remark: there is an FPT algorithm parameterized by treewidth for the graph isomorphism problem, here: epubs.siam.org/doi/abs/10.1137/… (Daniel Lokshtanov, Marcin Pilipczuk, Michał Pilipczuk, and Saket Saurabh, \"Fixed-Parameter Tractable Canonization and Isomorphism Test for Graphs of Bounded Treewidth\", SICOMP.) As far as I know, unfortunately, this does not say anything about the homomorphism problem."
] | 1 |
Science
| 0 |
21
|
cstheory
|
Is Node Multiway Cut NP-complete on planar graphs when all terminals lie on the outer face?
|
I am interested in the following problem.
**Node Multiway Cut on Planar Graphs with terminals on the outer face**
* Instance: A plane graph G, and integer k, and a set $S \subseteq V(G)$ of terminals which are all incident on the outer face of G.
* Question: Is there a set of vertices $X \subseteq V(G)$ of size at most $k$ such that all vertices of $S \setminus X$ belong to different connected components of $G - X$?
Informally, the problem asks whether all terminals can be separated with k vertex deletions, knowing that all terminals lie on the outer face. If we replace vertex deletions by edge deletions, then this is known to be possible in polynomial time by considering multiway cuts in the planar dual, and relating them to certain kind of Steiner trees ([Efficient Algorithms for k-Terminal Cuts on Planar Graphs](https://doi.org/10.1007/3-540-45678-3_29)). Since the edge-deletion version reduces to the vertex-deletion version, the edge-deletion version seems easier; no reduction in the reverse direction is known.
The question is: is Node Multiway Cut on Planar Graphs with terminals on the outer face NP-complete? The reason I am interested in this problem is that it would provide me with a starting point for another complexity lower bound if this is indeed NP-complete.
|
https://cstheory.stackexchange.com/questions/8969/is-node-multiway-cut-np-complete-on-planar-graphs-when-all-terminals-lie-on-the
|
[
"cc.complexity-theory",
"np-hardness",
"planar-graphs"
] | 17 | 2011-11-14T09:06:13 |
[
"I know for sure that the algorithm I mentioned works for edge weighted Steiner tree, but one should be able to adapt it to work for vertices.",
"I think that this is equivalent to solving vertex weighted Steiner tree where all terminals on the outer face. The very loose idea would be something like: consider the boundary path between every pair of consecutive terminals you want to separate; connect all the vertices on that path to a new vertex, which becomes a terminal for the Steiner tree problem. Now all these Steiner terminals will all lie on the same face. This should be solvable in polynomial time using the algorithm of Erickson et al. (jstor.org/pss/3689922)."
] | 2 |
Science
| 0 |
22
|
cstheory
|
Can short-distance connectivity be harder than connectivity?
|
Has anybody seen the following (or similar) question being considered:
> Can it be **easier** to determine the presence/absence of $s$-$t$ paths than to determine the presence/absence of _short_ $s$-$t$ paths?
A bit more formally, the _distance_ -$k$ _connectivity_ problem STCON(n,k) is, given a subgraph of a complete undirected graph $K_n$ on $[n]=\\{1,\ldots,n\\}$, to decide whether there is a path from node $s=1$ to node $t=n$ of length $\leq k$. By the _length_ , I mean the number of inner nodes (just for notational convenience). The _connectivity_ problem STCON(n) corresponds to the case when $k=n-2$: is there any $s$-$t$ path at all? These problems are monotone boolean functions of $\binom{n}{2}$ variables $x_{i,j}$ corresponding to the edges of $K_n$.
It is well known, that $O(kn^2)$ fanin-$2$ AND and OR gates are enough to compute STCON(n,k). The desired monotone circuit is given by [Bellman-Ford](http://en.wikipedia.org/wiki/Bellman%E2%80%93Ford_algorithm): first compute $F_j^{(0)}=x_{s,j}$ for all nodes $j$, and then use the recursion $F_j^{(l+1)}=\bigvee_{i\in[n]} F_i^{(l)}\land x_{i,j}$. Then $F_j^{(l)}$ accepts a given graph iff it has an $s$-$j$ path of length $\leq l$. Hence, $F_n^{(k)}=$STCON(n,k).
> **Question 1:** Can STCON(n) have more than constant times **smaller** monotone circuits than STCON(n,k), for some $k\ll n$?
A boolean function $f(x_1,\ldots,x_n)$ is a _monotone projection_ of a boolean function $g(y_1,\ldots,y_m)$, if the function $f$ can be obtained from $g$ by replacing each $y$-variable by $0$ or $1$ or by some $x$-variable. Say, we trivially have that every THRESHOLD(n,k) is a monotone projection of MAJORITY(2n).
By taking $k$ copies of the input graph for STCON(n,k), one can easily show that STCON(n,k) is a monotone projection of STCON(kn). Thus, STCON(kn) cannot have smaller circuits than STCON(n,k). Can the factor "k" here be replaced by some constant?
> **Question 2:** Is STCON(n,k) a monotone projection of STCON(m) for some $m < kn$?
**ADDDED** (Apr.7 ): Among related results I know are the following:
1. _STCON and monotone**NC$^1$**_ : if a boolean function $f$ has a monotone formula of size $s$, then $f$ is a monotone projection of STCON(m) for $m=O(s)$; this is easy: just view formulas as parallel-sequential networks. In particular, this implies that _every_ monotone boolean function of $n$ variables _is_ a monotone projection of STCON(m) for some $m\leq n2^n$ (take a monotone DNF).
2. _STCON itself is not in monotone**NC$^1$**_ : every monotone circuit for STCON(n,k) requires depth about $(\log k)(\log n)$ (independent on circuit size!). This was shown by [Karchmer and Wigderson](http://www.math.ias.edu/~avi/PUBLICATIONS/MYPAPERS/KW90/KW90.pdf). As observed by [Grigni and Sipser](http://www.mathcs.emory.edu/~mic/papers/4.ps), this holds even when AND gates are allowed to have unbounded fanin! If, however, OR gates can have large fanin and AND gates have fanin-$2$, then depth $2\log k$ and size $O(n^3\log k)$ is already enough: repeated squaring of the adjacency matrix $\log k$ times.
3. _$s$-$t$ Connectivity vs. Connectivity_ : If $f=x_1x_2\lor x_3x_4\lor\cdots\lor x_{n-1}x_n$ is a monotone projection of CONN(m), then $m\geq 2^n+1$. This was proved by [Skyum and Valiant](http://dl.acm.org/citation.cfm?id=3158&CFID=497574256&CFTOKEN=86163804). Here CONN is a "sibling" of STCON: accepts a graph iff it is connected. Note that this particular function $f$ _is_ a monotone projection of STCON(m) even for $m=n$: take a bunch of $n/2$ parallel paths of length two.
4. _Formulas vs. Circuits_ : If the depth is restricted to $o(\log n)$ then STCON(n,k) requires even non-monotone(!) unbounded fanin _formulas_ of size $n^{\Omega(\log k)}$ for all $k\leq \log\log n$. This was proved by [Rossman](http://eccc.hpi-web.de/report/2013/169/download), and separated for the first time bounded-depth circuits from formulas, because for such values of $k$, repeated squaring gives the desired small (even monotone) _circuit_ of depth $2\log k\leq 2\log\log\log n=o(\log n)$.
5. _Directed vs. Undirected Connectivity_ : The directed reachability problem DSTCON(n) (where input graphs are directed) is a monotone projection of STCON(m) only if $m=n^{\Theta(\log n)}$. This was proved by [Potechin](http://eccc.hpi-web.de/report/2009/142/revision/1/download), and separated monotone versions of **L** and **NL**.
Does anybody know some results more tightly related to the STCON(n,k) vs. STCON(n) question itself?
* * *
**CORRECTION** (Apr 9): Unfortunately, just taking $k$ copies of the input graph $G$ for STCON(n,k), only shows that STCON(n,k) is a monotone projection of **D** STCON(kn), the **directed** (even acyclic) version of STCON. The difficult direction is to ensure that the modified graph $H=H_G$ has no s-t paths, when $G$ _has_ s-t paths, but all they are longer than $k$. If $H$ is allowed to be directed, this is easy to ensure by arranging the copies of $G$ into $k$ layers, and drawing _directed_ edges between layers according to $G$. But if the edges $H$ are required to be _undirected_ , this simple layering trick won't work. So, I must refine my Question 2 as (cf. with the 5-th result by Potechin above):
> **Question 2':** Is STCON(n,k) a monotone projection of **D** STCON(m) for some $m < kn$?
Both answers would be interesting. If YES, this would show that layering is not the best way to "count". If NO, this would show that every monotone switching network for STCON(n,k) requires $kn$ nodes. (By the Bellman-Ford algorithm - which itself is just the "layering trick" in disguise - $kn$ nodes are also enough.)
|
https://cstheory.stackexchange.com/questions/31005/can-short-distance-connectivity-be-harder-than-connectivity
|
[
"cc.complexity-theory",
"graph-algorithms",
"circuit-complexity",
"lower-bounds",
"dynamic-programming"
] | 17 | 2015-04-03T10:00:23 |
[] | 0 |
Science
| 0 |
23
|
cstheory
|
Sequences with sublogarithmic concat and approximate split
|
Is there a data structure for representing sequences that supports the operations:
* **concat** takes two sequences of size $m$ and $n$ and produces a new sequence of size $m+n$ by joining them in time $o(\lg \min(n,m/n))$ (or $o(\lg \min(m,n/m))$ if $n>m$).
* For some constants $c$ and $N$, **approximate split** takes a sequence of size $n > N$ and divides it into two contiguous non-overlapping sequences of sizes $p$ and $q$ such that $p+q = n$ and $1/c < p/q < c$ in time $o(\lg n)$
* **singleton** takes a single element and produces a sequence containing only that element in $O(1)$ time.
* **linearize** takes a sequence of size $n$ and produces an array of size $n$ containing the elements of the sequence in time $O(n)$.
I'm really looking for worst-case or expected bounds on the time, but amortized bounds would also be interesting. Results in the word RAM would be interesting as well.
Here are some results I am aware of. In this table, **sloppy split** is like approximate split, but the bounds are $1/c < (\lg p)/(\lg q) < c$.
structure | concat | approx split | sloppy split
==================================================================================
doubly-linked lists | O(1) | O(n) | *
arrays | O(n+m) | O(1) | *
weight balanced trees | O(lg (n+m)) | O(1) | *
treaps and skip lists | O(lg min(n,m)) ** | O(1) ** | *,**
functional finger trees | O(min(lg lg m/n, lg lg n) | O(lg n) | O(1)
*: same as approx split
**: expected
By functional finger trees I mean "[Purely functional representations of catenable sorted lists](http://www.math.tau.ac.il/~haimk/papers/loglog23.ps)" by Kaplan and Tarjan.
|
https://cstheory.stackexchange.com/questions/5964/sequences-with-sublogarithmic-concat-and-approximate-split
|
[
"ds.data-structures"
] | 17 | 2011-04-08T22:01:48 |
[] | 0 |
Science
| 0 |
24
|
cstheory
|
Linear-time algorithm to test if clique number equals degeneracy bound?
|
Given a connected simple graph $G=(V,E)$, let $d$ denote its [degeneracy](https://en.wikipedia.org/wiki/Degeneracy_\(graph_theory\)) and let $\omega$ denote the size of a [maximum clique](https://en.wikipedia.org/wiki/Clique_problem).
A well-known bound on the clique number is $\omega\le d+1$, which is helpful when solving the maximum clique problem or when [enumerating all maximal cliques](https://dl.acm.org/doi/abs/10.1145/2543629?casa_token=fxzBWpiA1ZsAAAAA:CrMNWZ-0GU9DU3L0-UE43AniI2H-2gvXWFzx341kOOA8MvUU2QnCVAQUxcpoQQGtfriWot8YZGi9TA).
How fast can one test whether this bound is tight, $\omega=d+1$? An algorithm that runs in time $O(dm)=O(m^{1.5})$ is [known](https://pubsonline.informs.org/doi/10.1287/opre.2019.1970).
Is there a faster algorithm, say, running in linear time?
Or, is $O(m^{1.5})$ best possible under something like [SETH](https://en.wikipedia.org/wiki/Exponential_time_hypothesis)?
|
https://cstheory.stackexchange.com/questions/47947/linear-time-algorithm-to-test-if-clique-number-equals-degeneracy-bound
|
[
"graph-algorithms",
"parameterized-complexity",
"clique",
"fixed-parameter-tractable"
] | 17 | 2020-11-30T14:49:56 |
[
"Maybe you are aware, but this problem recently appeared in codeforces codeforces.com/contest/1439/problem/B. It seems nobody in the discussion mentions anything better than $O(m^{1.5})$.",
"Um...it looks like their article was just published and they list your question as Open Problem 1 (minus the possible connection to SETH)...",
"Ah, I see now. (After your comment, I thought I could answer your Q, but then looked at the article and saw I just rediscovered their algorithm in the case $p=0$.) I wonder if you don't even need SETH - it seems like maybe it's possible to show that if you could do better than $O((m+n) + d^2 n)$ (which is what they have) then either you'd be able to compute $k$-cores faster than linear (not possible by query complexity) or test whether a $d$-vertex graph is a clique in $o(d^2)$ (also not possible by query complexity). I don't quite see a reduction, but maybe one can do it w/o SETH...",
"The decomposition is linear time, but I don’t think that solves the problem. It works, for example, for G=C_3 or G=C_4 but fails for their disjoint union (or for their disjoint union with an added edge between them).",
"Can't you just compute the k-core decomposition (which is quasilinear time IIRC), and then just check if the last core is a clique?"
] | 5 |
Science
| 0 |
25
|
cstheory
|
Is it possible to boost the error probability of a Consensus protocol over dynamic network?
|
Consider the binary consensus problem in a synchronous setting over dynamic network (thus, there are $n$ nodes, and some of them are connected by edges that may change round to round). Given a randomized $\delta$-error Monte Carlo protocol for Consensus in this setting, is it possible to use this protocol as a black box to obtain another Consensus protocol with smaller error?
Note that for problems with deterministic outcome (such as Sum), this can be done by repeatedly executing the protocol and taking the majority as the answer. However I am unable to figure out how for Consensus, so I wonder whether this is actually impossible to do.
\--- Details ---
**Dynamic Network.** There are $n$ nodes on a dynamic network over synchronous setting (thus the protocol will proceed in rounds). Each node has a unique ID of size $\log(n)$. There are edges connecting pairs of nodes, and this set of edges may change from round to round (but remains fixed throughout any particular round). There may be additional restrictions to the dynamic network that allows the problem to be solved by some protocol (such as having a fixed diameter), but it is irrelevant to our discussion.
The only information known to each node is their unique ID. They do not know $n$ or the topology of the network. In particular, they do not know who their neighbors are in the current round (neighbors are nodes that are adjacent to them with an edge). The only way to figure out the neighbors is after receiving messages from them.
**How nodes communicate.** The only method of communication between nodes is by broadcasting messages under the $CONGEST$ model (D. Peleg, "Distributed Computing, A Locality-Sensitive Approach"). More specifically, in each round, every node may broadcast an $O(\log n)$ sized message. Then, every node will receive ALL messages that were broadcasted by all of its neighbors in that particular round in an arbitrary order. In particular, nodes may attach their IDs onto their messages, since their IDs are of size $O(\log n)$.
**Binary Consensus.** The binary consensus problem over this network is as follows. Each node has a binary input ($0$ or $1$), and each must decide either $0$ or $1$ under the the validity, termination, and agreement for consensus with $\delta$ error:
* validity means that for $z \in \\{0, 1\\}$, if all nodes have $z$ as its initial input, then the only possible decision is $z$.
* termination means that each node must eventually decide.
* agreement means that all nodes must have the same decision.
* The error rate means that under worst case input and worst case network, the probability that the protocol does not satisfy any of the three conditions is at most $\delta$ over average coin flips of the protocol's coin.
**Question.** For a particular set of dynamic networks, suppose we have a lower bound on the average number of rounds incurred by any randomized $\delta$-error protocol $P$ for solving binary consensus under this settings such that $\delta < \frac{1}{3}$, under worst case dynamic network from this set, worst case nodes' inputs, and on average coin flips of the protocol. Does this bound automatically hold for any $\delta'$-error protocol for $\delta < \delta' < \frac{1}{3}$?.
|
https://cstheory.stackexchange.com/questions/32442/is-it-possible-to-boost-the-error-probability-of-a-consensus-protocol-over-dynam
|
[
"ds.algorithms",
"reductions",
"dc.distributed-comp"
] | 16 | 2015-08-23T23:24:43 |
[
"@Peter Also this question is more of a whether it is possible to obtain a better protocol using a black box protocol. For example, in Sum, each node can run the protocol multiple times (either in parallel or in a row) and takes a majority. Using Chernoff's bound, for any $0 < \\delta' < \\delta < \\frac{1}{3}$, one can obtain protocol with $\\delta'$ error from a $\\delta$ error protocol for Sum by executing the protocol a constant amount of time and taking a majority as the answer.",
"@Peter No unless your protocol is specifically designed to be able to do that. The only way for the nodes to communicate is through broadcasting and receiving messages. E.g., the lack of message from a particular node may mean something. There are no \"magical\" communication channels otherwise.",
"Do you assume that, when an instance of your blackbox consensus algorithm fails, all nodes are aware that the consensus algorithm has failed? This seems to depend on the precise properties of the dynamic network that you're assuming...",
"suggest try to fit it into the following framework. The Consensus Problem in Unreliable Distributed Systems (A Brief Survey) (2000) / Fisher. there are some impossibility results known & could your idea possibly violate any?",
"@vzn No, I'm not really familiar with this topic. Thus I thought that this question is well-known, and I was hoping for a quick answer here. Seems like this is not well-known then. I wasn't aware of the TCS stackexchange before, I'll try to ask the admin to cross post this question there.",
"are you familiar with Paxos, \"a family of protocols for solving consensus in a network of unreliable processors\"? does it not match the requirements for some reason? there are many (standard) consensus protocols, can you give an example of a \"randomized δ-error protocol for Consensus\"?",
"it appears research level to me! the whole question seems to be built on a research framework! seriously consider Theoretical Computer Science! can you define \"randomized δ-error protocol\"? try also Theoretical Computer Science Chat"
] | 7 |
Science
| 0 |
26
|
cstheory
|
complexity of checking if a subspace is a Euclidean section of L1
|
If $X$ is a linear subspace of ${\mathbb R}^n$, $X$ is high-dimensional, and for every $x\in X$ we have
$(1-\epsilon) \sqrt n ||x||_2 \leq ||x||_1 \leq \sqrt n ||x||_2$
for some small $\epsilon >0$, then we say that $X$ is an almost-Euclidean section of $\ell_1^n$, and (the matrix whose image is) X is useful in compressed sensing. A random subspace works excellently, and there is a huge research program devoted to the **explicit construction** of such spaces.
Is it known what is the complexity of approximating the "Euclidan-sectionness" of $X$? That is, given a subspace $X$, say presented via a basis, consider the problem of finding the unit (in $\ell_2$ norm) vector in $X$ of smallest $\ell_1$ norm.
> What is the complexity of this problem? Are hardness of approximation results known?
Apart from specific applications, these seem to be interesting problems. Is it known what is the complexity of finding the vector of **maximum** $\ell_1$ norm among the unit vectors of a given subspace?
|
https://cstheory.stackexchange.com/questions/4992/complexity-of-checking-if-a-subspace-is-a-euclidean-section-of-l1
|
[
"cc.complexity-theory",
"cg.comp-geom",
"norms",
"compressed-sensing"
] | 17 | 2011-02-17T18:27:44 |
[
"This is not an answer to your question. But in the vein of computational problems arising from compressed sensing applications, Koiran and Zouzias have a recent paper on checking whether a matrix satisfies the restricted isoperimetry property (RIP) and related problems.",
"Thanks Sariel, I had inverted the places of $\\ell_1$ and $\\ell_2$. (If you want $\\ell_2$ in the middle, then it should be $||x||_1/\\sqrt n \\leq ||x||_2 \\leq (1+\\epsilon)||x||_1 / \\sqrt n$, because it's always $||x||_1 \\leq \\sqrt n ||x||_2$.)",
"The above inequality is slightly wrong. You probably mean that $(1-\\varepsilon)||x||_1 /\\sqrt{n} \\leq ||x||_2 \\leq ||x||_1/\\sqrt{n}$. Indeed, for any $x$, $||x||_1 \\geq ||x||_2$."
] | 3 |
Science
| 0 |
27
|
cstheory
|
Looking for an operator on polynomials
|
I have a small, self-contained, math question, whose motivation is from theoretical computer science (specifically, list decoding of algebraic codes, derivative/multiplicity codes, etc). I wonder whether someone might have an idea.
I'm looking for an operator T that can be applied to m-variate polynomials over a finite field. When applied to a polynomial, the operator should yield a polynomial of not much higher degree. The operator should satisfy the following property: for every m-variate polynomial $F$, and m univariate non-constant polynomials $g_1,...,g_m$, if you know $g_1,...,g_m$ and $F(g_1(t),...,g_m(t))$ for a parameter t, then you can also compute $TF(g_1(t),...,g_m(t))$. The operator should be non-trivial, in the sense that for a fixing $x_1,..,x_m$, the value $F(x_1,...,x_m)$ does not determine the value of $TF(x_1,...,x_m)$.
For $m=1$, the derivative operator gives exactly that: By the chain rule $(F(g(t)))' = F'(g(t))\cdot g'(t)$, which implies that $F'(g(t)) = (F(g(t)))'/g'(t)$. My question is whether there is an operator that works for general m.
|
https://cstheory.stackexchange.com/questions/10881/looking-for-an-operator-on-polynomials
|
[
"it.information-theory",
"coding-theory",
"algebra",
"polynomials"
] | 16 | 2012-03-28T08:17:46 |
[
"Honestly, I asked this question so long ago, I only barely remember what I needed it for :-)... I believe that the issue is that multiplying by a fixed polynomial is \"trivial\" in the sense that to compute the multiplication at a point, you only need to know the value of F at the point (and nothing about F's inner-workings).",
"Dana, I may be missing something, what about $TF(x_1,...,x_n) = T(x_1,...,x_n) P(x_1, ..., x_n)$, where $P$ is some multivariate polynomial?",
"F(g(t))' and g'(t) are formal polynomials in t. You can divide the formal polynomials.",
"Suppose $g(t) = t^2$. You still can't evaluate $F'$ at 0? (I understand that you want point-wise evaluation)",
"If g' is identically zero then you can't expect anything (I'll edit the question to specify the g_i's are not identically zero).",
"Your example in one dimensional case is not flawless. What if $g'(t)=0$ ?",
"Suppose you take $TF(g_1(t),..,g_m(t)) = \\sum_{i=1}^{m} g_i'(t) dF(x_1,...,x_m)/dx_i$ (known as the total derivative). How you do compute $dF(x_1,...,x_m)/dx_i$ from $F(g_1(t),...,g_m(t))$?",
"Why total derivative wouldn't fit your requirements?"
] | 8 |
Science
| 0 |
28
|
cstheory
|
When does adding edges decrease the cover time of a graph?
|
When first learning about random walks on a graph $G$, one may have an intuitive feeling that adding edges to $G$ will decrease its cover time $C(G)$. However, this is not the case. The [path graph](https://en.wikipedia.org/wiki/Path_graph) $P_n$ has cover time $C(P_n) = \Theta(n^2)$ while the [($\frac{n}{2}$, $\frac{n}{2}$)-lollipop graph](http://mathworld.wolfram.com/LollipopGraph.html) $L_{\frac{n}{2}, \frac{n}{2}}$ has cover time $C(L_{\frac{n}{2}, \frac{n}{2}}) = \Theta(n^3)$. Eventually adding edges does decrease the cover time because the complete graph $K_n$ has cover time $C(K_n) = \Theta(n \log n)$ by analogy to the [coupon collector problem](https://en.wikipedia.org/wiki/Coupon_collector%27s_problem).
Under what assumptions though would the supposed intuition hold true? Specifically, what about [vertex transitivity](https://en.wikipedia.org/wiki/Vertex-transitive_graph)?
> Let $G$ be a vertex-transitive graph with $n$ vertices. Consider any vertex-transitive graph $G^+$ obtained from $G$ by adding edges (i.e. both $G$ and $G^+$ are vertex transitive and $G$ is a spanning subgraph of $G^+$).
>
> Is it the case that $C(G^+) \le C(G)$?
|
https://cstheory.stackexchange.com/questions/33071/when-does-adding-edges-decrease-the-cover-time-of-a-graph
|
[
"graph-theory",
"pr.probability"
] | 16 | 2015-11-12T18:35:47 |
[
"My bad, I confused spanning with induced.",
"@chazisop Those subgraphs are not spanning.",
"Wouldn't the complete graph $K_{n}$ and any of its subgraphs $K_{k}$, $k < n$ be a counterexample for general vertex transitivity?"
] | 3 |
Science
| 0 |
29
|
cstheory
|
Complexity of approximating the range of a matrix
|
Given an $m$ by $n$ matrix $M$ with $m \leq n$ and elements from $\\{-1,1\\}$, let us define:
$$S_M = |\\{Mx : x \in \\{-1,1\\}^n\\}|.$$
I believe that it is NP-hard to compute $S_M$ exactly, by applying the reductions from [Decide whether a matrix's kernel contains any non-zero vector all of whose entries are -1, 0, or 1](https://cstheory.stackexchange.com/questions/20277/decide-whether-a-matrixs-kernel-contains-any-non-zero-vector-all-of-whose-entri) to the following decision problem: does $S_M = 2^n$?
> Is it possible to approximate $S_M$ to within a constant factor in polynomial time? If not, what is the best one can do in polynomial time?
[Cross-posted to <https://mathoverflow.net/questions/229852/complexity-of-approximating-the-size-of-the-range-of-a-matrix> ]
|
https://cstheory.stackexchange.com/questions/33676/complexity-of-approximating-the-range-of-a-matrix
|
[
"cc.complexity-theory",
"approximation-algorithms",
"linear-algebra"
] | 15 | 2016-01-28T02:00:10 |
[
"(1) If there is a poly-time $2^{n^{1-\\epsilon}}$-approximation for any $\\epsilon>0$, then there is a poly-time $(1+1/q(n))$-approximation for any polynomial $q$. To see this, given $M$, consider the block-diagonal matrix $M(k)$ formed by $k$ independent copies of $M$ along the diagonal, so $S_M=(S_{M(k)})^{1/k}$. Take $k=(n q(n))^{1/\\delta}$. If $x$ is a $2^{(nk)^{1-\\epsilon}}$-approximation of $S_{M(k)}$, then $x^{1/k}$ is a $(1+1/q(n))$-approximation of $S(M)$. (2) One has $2^k\\le S_M\\le 2^n$ where $k$ is the rank of $M$, but this doesn't help as $S_M$ can be large even when $k=m=1$."
] | 1 |
Science
| 0 |
30
|
cstheory
|
Intersecting Complexity Classes with Advice
|
In [on hiding information from an oracle](http://linkinghub.elsevier.com/retrieve/pii/0022000089900184), the authors (Abadi, Feigenbaum, and Kilian) wrote:
> $(\mathsf{NP/poly} \cap \mathsf{co\text-NP}{/poly})$ ... is **not known** to be equal to $(\mathsf{NP} ∩ \mathsf{co\text-NP}){/poly}$.
They highlighted that in the conference paper, they mistook the two classes. Apparently, the latter is a subset of the former, but we don't know if the containment is strict.
Assuming $X$ and $Y$ are complexity classes, and $F$ is a set of functions specifying the length of the advice strings, are there recent results comparing $(X_{/F} \cap Y_{/F})$ and $(X \cap Y)_{/F}$, resolving issues like the one pointed above?
|
https://cstheory.stackexchange.com/questions/5839/intersecting-complexity-classes-with-advice
|
[
"cc.complexity-theory",
"reference-request",
"complexity-classes",
"advice-and-nonuniformity"
] | 15 | 2011-04-03T03:17:43 |
[
"@HenryYuen: I think that a Language $L$ is in $(NP \\cap coNP)/poly$ iff there is a language $K$ in $NP \\cap coNP$ and $a_i$ advice of polynomial length s.t. $x \\in L$ iff $(x, a_{|x|}) \\in K$.",
"@HenryYuen: Oh, I got your point. Strangely, the definition of (NP ∩ coNP)/poly in Complexity Zoo (qwiki.stanford.edu/index.php/Complexity_Zoo:N#npiconppoly) does not mention machines with advice, but \"languages\" with advice. However, quoting from An Oracle's Builder Toolkit: \"NP ∩ coNP is defined by the enumeration $M_1,M_2,\\ldots$, where $M_i$ with $i = \\langle i_1,i_2 \\rangle$ is the pair of non-deterministic oracle Turing machines $N_{i_1}$ and $N_{i_2}$ such that both machines run in time $n^i$...\" (Read page 27 for more info)",
"The reason I ask about the computational model is because I don't know what (NP ∩ coNP)/poly means. NP/poly is the set of languages that are accepted by NP machines with polynomial amount of advice. Presumably, (NP ∩ coNP)/poly is the set of languages accepted by (NP ∩ coNP) machines with polynomial advice -- or is there another definition that isn't machine-definition-dependent?",
"@HenryYuen: I actually don't know if there's an underlying model of computation, but the definitions of complexity classes are clear, as in the case of ZPP. Besides being a very interesting problem, is there any significance (to my question) if NP ∩ coNP does (or does NOT) admit a computation model?",
"If you take the definition that ZPP = RP ∩ coRP, that doesn't immediately give you a model of computation that accepts only ZPP languages: it only says that every language in ZPP has both an RP machine and a coRP machine (which is well defined). You have to prove that ZPP is the class of languages that admit Las Vegas algorithms. Similarly -- NP ∩ coNP defines a set of languages that have both NP and coNP machines, but is there a model of computation that accepts precisely NP ∩ coNP?",
"@HenryYuen: Maybe the definition of ZPP helps: ZP = RP ∩ CoRP. See en.wikipedia.org/wiki/ZPP_(complexity)#Intersection_definition.",
"What is the definition of (NP ∩ coNP)/poly? What is a NP ∩ coNP machine?"
] | 7 |
Science
| 0 |
31
|
cstheory
|
Intermediate problems between PSPACE and EXPTIME
|
Intermediate problems between P and NP are quite famous, and are sometimes considered as complexity classes by themselves.
Do you know of any problem that is known to be PSPACE-hard and in EXPTIME, and resisting all efforts to be proved complete for one of these classes ?
Lifted (succinct) versions of problems between LOGSPACE and PTIME are accepted, but even more interesting would be problems that are not of this form.
Here are some I found, this area of complexity theory seems to be the realm of games:
* Phutball: <https://arxiv.org/abs/0804.1777>
* Go (with Chinese rules): D. Lichtenstein and M. Sipser, Go is polynomial-space hard
|
https://cstheory.stackexchange.com/questions/38393/intermediate-problems-between-pspace-and-exptime
|
[
"cc.complexity-theory",
"complexity-classes",
"exp-time-algorithms",
"pspace"
] | 17 | 2017-06-09T06:50:47 |
[
"I think the more correct way of stating the question is asking for candidate problems in ExpTime - PSpace - ExpTime-hard. Note that e.g. in the case of P vs. NP we don't know if Factoring or GI is P-hard."
] | 1 |
Science
| 0 |
32
|
cstheory
|
Mutual information vs. Product sets
|
Suppose we have two _dependent_ random variables $X$ and $Y$, each of which is uniform over $\\{0,1\\}^n$, such that their mutual information $I(X;Y)$ is small, say, at most $\sqrt{n}$. Does this imply that there exist large sets $\mathcal{X}, \mathcal{Y} \subset \\{0,1\\}^n$ such that the product set $\mathcal{X} \times \mathcal{Y}$ is contained in the support of the distribution $(X,Y)$?
A variant of this question can be phrased in graph-theoretic terms: Suppose we have a sufficiently dense bipartite graph G. Does this imply that $G$ contains a large complete sub-graph $G'$? (i.e., $G'$ is required to be a complete bipartite graph with bi-partition $(A,B)$ such that $A$ and $B$ are relatively dense in the corresponding parts of $G$)
|
https://cstheory.stackexchange.com/questions/10225/mutual-information-vs-product-sets
|
[
"co.combinatorics",
"it.information-theory"
] | 15 | 2012-02-15T17:49:06 |
[
"If $(X,Y)$ is a product of iid trials $(X_i,Y_i)$ then I am inclined to say yes.",
"If my calculation is correct, a standard use of the probabilistic method shows that for sufficiently large N, there exists a bipartite graph on N+N vertices with at least (1/2)N^2 edges that does not contain K_{k,k} as a subgraph, where k = floor(2.001 lg N). (“lg” denotes the logarithm to base two.)",
"I'm not an expert, but perhaps this paper on Ramsey theory applied to bipartite graphs can help you: math.mit.edu/~fox/paper-density-theorems-final.pdf"
] | 3 |
Science
| 0 |
33
|
cstheory
|
Computability of a "weird" set
|
The starting point of this question is the observation that the smallest positive integers $a,b,c$ satisfying
$$\frac{a}{b+c} + \frac{b}{a+c} + \frac{c}{a+b} = 4$$
are [absurdly high](https://plus.google.com/+johncbaez999/posts/Pr8LgYYxvbM). This leads to the following general question: Is the set $C\subseteq {\mathbb N}$ defined by $$ C = \left\\{n\in\mathbb{N}\setminus\\{0\\}: \big(\exists a,b,c \in\mathbb{N}\setminus\\{0\\}\big):\frac{a}{b+c} + \frac{b}{a+c} + \frac{c}{a+b} = n\right\\}$$ computable?
|
https://cstheory.stackexchange.com/questions/39383/computability-of-a-weird-set
|
[
"computability"
] | 14 | 2017-10-26T07:49:40 |
[
"Cross-posted from mathoverflow.net/questions/278747/is-this-set-computable",
"I'm not an expert, but if you simplify the equation you get a cubic diophantine equation in three variables, and I think it's an open problem if universality can be achieved in such a setting. In every case, quadratic diophantine equations in two variables ($ax^2 + by + c = 0$) are already NP-complete (see NP-complete decision problems for quadratic polynomials) ... so I'm not surprised if switching to cubic+three vars leads to very hard instances (outside NP)."
] | 2 |
Science
| 0 |
34
|
cstheory
|
Can a Penrose tile cellular automaton be Turing-complete?
|
This question was based on an incorrect premise ... see Colin's comment below. Forget it.
This was inspired by the discussion on [this Math Overflow question](https://mathoverflow.net/questions/45378/undecidability-in-conways-game-of-life/45382). First, I need to define our terms.
In a Penrose tiling, there are generally several different legal patterns of tiles which will cover a given region. A Penrose tile cellular automaton should be some rule that deterministically takes a Penrose tiling $T$ to a Penrose tiling $T'$, where each tile in $T'$ is deterministically given by looking at the tiles in a radius $r$ around the corresponding spot in $T$. You should be able to implement these by having a set of rules of the form: when a region of shape $S$ is covered by a pattern $X$ of tiles, replace it with a pattern $Y$ of tiles. In order to do this deterministically, you either have to make sure no two of your replaceable regions can overlap or have some priority ranking on these replacement rules. But certainly you can ensure this, and define lots of different Penrose tiling cellular automata.
What does it mean for a Penrose tiling celluar automaton to be Turing-complete. Here's what I think it should mean (although I won't insist on it in the answers): the halting problem should be reducible to the behavior of such an automaton. Let's take some canonical Penrose tiling $T_0$ that provides constraints on our starting position. We start with an input $G$ to a universal Turing machine, and we'd like to decide whether the machine halts on input $G$. I would like some computable map from $G$ to a starting Penrose tiling $S$ such that $S$ differs from $T_0$ on only a finite set of tiles. We then run the Penrose tiling cellular automaton, starting with $S$, and wait for some finite canonical configuration $C$ at position $0$ in the Penrose tiling. I want configuration $C$ to appear at position $0$ if and only if the universal Turing machine halts on input $G$.
The strange thing about Penrose tiling cellular automata is that every finite legal configuration of tiles appears infinitely often in every Penrose tiling of the plane. Thus, our universal Penrose tiling is not only computing the behavior of our universal Turing machine on input $G$, it's also simultaneously carrying out the first steps of every other possible computation. This makes me doubt whether Penrose tiling cellular automata could be Turing complete. On the other hand, if they're not Turing complete, what is the class of computations that Penrose tiling cellular automata can perform?
|
https://cstheory.stackexchange.com/questions/2883/can-a-penrose-tile-cellular-automaton-be-turing-complete
|
[
"computability",
"machine-models",
"cellular-automata"
] | 15 | 2010-11-11T06:14:56 |
[
"Yes, that is true for tilings formed via the deflation process. But an arbitrary planar tiling might have a \"rift\" along a line in the plane, along which the higher level tiles do not match up (like a tiling of the plane by squares in which the upper half plane is shifted right by a fraction of a unit). This is certainly possible with Robinson tiles and Ammann tiles, and I would expect it also for the various Penrose tiles although I haven't checked. If rifts can occur, local patches along the rift will appear infinitely often in the same tiling but needn't appear in another tiling.",
"@Matt: What I should have said is that every finite pattern that appears once in an infinite Penrose tiling appears infinitely often in every Penrose tiling.",
"If every finite pattern would occur, you would not be able to \"get stuck\" when attempting to tile the plane (because your finite pattern, whatever it is so far, would be guaranteed to be part of a valid tiling of the plane). But in fact, you do need to know what you are doing in order to not get stuck, regardless of which Penrose tile set you are talking about. Only very occasionally do you really have a choice of what tile to place (in the sense that either tile would be ok for creating a full tiling of the plane), approximately once per inflation scale level.",
"Yes, it's 14 years later, but I can't help noticing that something is wrong on the internet (like the xkcd cartoon). It is not correct that every finite pattern occurs in a Penrose tiling.",
"@Peter: This question intrigued me because it seems related to one of the main open problems in tile self-assembly, which is \"the power of multiple nucleation.\" If the Penrose tiling rule were somehow limited to radiate out one tile at a stage from the origin, instead of everywhere being tileable at once, I think the model would be very close to self-assembly models. The open questions there are complexity-related, not computability, e.g.: is there a finite shape such a restricted Penrose tiling could achieve that a GCA could not achieve with only polynomial complexity increase?",
"@Colin, Actually, I was wrong about this. Forget the question. Maybe I should delete it.",
"Can you give an example of a region which may be legally covered by different patterns of tiles? I'm not familiar with the subject, but there is a unique way to break up a triangle into smaller triangles in \"up-down\" generation - see for example Prop 6.1 of Quasicrystals and geometry.",
"If someone reduced the Turing Machine Immortality Problem to a Penrose CA, would that be progress? (TMIP = given a TM with an input tape with infinitely many nonblank symbols on it, does it halt?) That problem is undecidable for TMs.",
"I don't think the existence of every finite pattern is any evidence against Turing completeness - in the game of life it seems plausible that there is a (finite) initial state that runs every turing machine G and puts a \"halt\" marker at some position f(G) if and only if G halts.",
"I hope it's clearer now. I want the rules to be deterministic and local, but exactly how they're formulated is less imporant.",
"typo: I meant \"$\\delta \\in S$\"",
"Okay, second round. There are Generalized Cellular Automata, where each cell $x$ transitions based on a \"stencil\" $\\delta_x$, which is a neighborhood of tiles around $x$, and the size and shape of these neighborhoods may vary from cell $x$ to cell $y$. Is a Penrose CA a generalization of GCA's, where now each $x$ has a stencil set $S$ (perhaps common to all cells) and some $\\delta \\subseteq S$ can be applied to $x$ and its surrounding cells? This then leads to multiple possible tilings of the plane for a single start state. Does every (\"nice\"?) start state converge to a stable tiling?",
"The replacement rules are indeed connected templates of finite size. The problem with your periodic \"halting\" state is that it can't happen. You always can find any specific finite pattern in a Penrose tiling, so if any Penrose tiling CA has a starting state that is eventually periodic, then any starting state for that Penrose tiling CA is periodic with that period.",
"I am confused by your definition, sorry. Is a Penrose CA just like a normal (2D) CA, except that the replacement rules are connected templates of finite size, instead of a local transition function that is applied cell by cell? So there's an initial configuration at time step 0 that specifies the input, and the connected templates specify the program? One way small models of computation specify \"halting\" is to repeat a special state infinitely often. So maybe if the simulated TM halts the Penrose CA keeps recreating a certain pattern, and if the TM runs forever, anything goes."
] | 14 |
Science
| 0 |
35
|
cstheory
|
NP-Hardness of 4-cycle packing problem in complete bipartite digraph?
|
A directed complete bipartite graph is a bipartite graph where there is exactly one directed edge between any two vertices from its two different parts. In other words, it's an orientation of a complete bipartite graph.
Given a directed complete bipartite graph, we are asked to find the largest set of edge-disjoint 4-cycles. Note that these 4-cycles can share node(s).
Is this problem NP-Hard? I tried to reduce from 2P2N-3SAT to this problem, but failed. On the other hand, I found no polynomial algorithm could solve it optimally.
|
https://cstheory.stackexchange.com/questions/45998/np-hardness-of-4-cycle-packing-problem-in-complete-bipartite-digraph
|
[
"graph-theory",
"np-hardness"
] | 14 | 2019-12-10T00:40:50 |
[] | 0 |
Science
| 0 |
36
|
cstheory
|
Is there a P-complete language X such that succinct-X is in P?
|
I came across a paper called "A Note on Succinct Representation of Graphs". It seems that in the discussion section they claim that for any problem $X$ that is $\mathrm{P}$-hard under projections, $\mbox{succinct-X}$ is $\mathrm{EXP}$-hard.
This made me wonder if the theorem fails for more complicated kinds of reductions. This led me to the following.
> **My Question**
>
> Are there any problems $X$ such that $X$ is $\mathrm{P}$-complete under logspace reductions and $\mbox{succinct-X}$ is in $\mathrm{P}$?
**Additional Questions:**
(1) If this is an open problem, then what are the implications if such an $X$ existed?
(2) If this is an open problem, is it still open is we weaken the requirement to $\mbox{succinct-X}$ in $PH$?
(3) It seems that such an $X$ would also satisfy that $X$ is $\mathrm{P}$-hard under logspace reductions, but not $\mathrm{P}$-hard under projections. Are such problems known to exist?
(4) I might be mistaken, but I think that I have a construction for such an $X$ assuming that $NP = L$. Would this be interesting?
**Note:** I'm still learning about projections so please let me know if I made any mistakes. Thank you!
|
https://cstheory.stackexchange.com/questions/42185/is-there-a-p-complete-language-x-such-that-succinct-x-is-in-p
|
[
"cc.complexity-theory",
"complexity-classes",
"reductions",
"succinct"
] | 14 | 2019-01-09T22:34:19 |
[
"Werent p-projections used in Valiants' original completeness and algebra paper?",
"@EmilJeřábek Yes, I noticed this too. :)",
"Seeing that projections are a restricted class of polylogtime reductions, let me add that what I wrote above about logtime reductions also applies to polylogtime reductions.",
"@EmilJeřábek Thank you for the clarification! I really appreciate it.",
"Yes, that's it. (Note that logtime Turing machines are defined so that they receive input by means of a query tape that requests individual bits instead of the usual input tape, hence they readily take input represented by a circuit.) For pspace-succinct-$X$, one can take a variant of succinct-$X$ where the input is not represented by an ordinary Boolean circuit, but by a quantified Boolean formula (or circuit).",
"@MichaëlCadilhac Thanks Michaël! I appreciate the helpful suggestions. :)",
"@user3483902 Thank you very much for the good questions! I'm still learning about projections so I think it's best if I refer you to a reference that includes a definition for time bounded projections: theoryofcomputing.org/articles/v013a004",
"@EmilJeřábek In regards to the second part of your comment, did you mean the following? If $X$ is $P$-complete under logspace reductions, it doesn't necessarily mean that $\\mbox{succinct-X}$ is $EXP$-hard. But, $\\mbox{pspace-succinct-X}$ would be $EXP$-hard where $\\mbox{pspace-succinct}$ is a more powerful notion of succinctness (that we haven't formally defined) that offers a higher compression ratio in some cases.",
"@EmilJeřábek Now, although $x$ has length $n$ and $pad$-$x$ has length $2^n$, $pad$-$x$ can be encoded as a circuit of size $n$. Further, because $r$ is in dlogtime, it can be represented by a circuit of size $n^2$ on inputs of size $2^n$. And, it seems that we can somehow combine these two circuits to get a circuit $c$ of size roughly $n^3$ that encodes $\\mbox{r(pad-x)}$ so that $x \\in L$ iff $c \\in \\mbox{succinct-X}$.",
"@EmilJeřábek Thanks for the helpful comment! So if I understand the first part correctly, the proof would go something like this? Given a language $X$ that is $P$-complete under dlogtime reductions and a language $L$ in $DTIME(2^n)$. Consider padding $L$ to get a language $pad$-$L$. Since $pad$-$L$ is in $P$, there is a dlogtime reduction $r$ from $pad$-$L$ to $X$. We have that for every input string $x$, $x \\in L$ iff $pad$-$x \\in pad$-$L$ iff $\\mbox{r(pad-x)} \\in X$.",
"A simple padding argument shows that if $X$ is P-complete under dlogtime reductions, then succinct-$X$ is EXP-complete (in fact, still under dlogtime reductions). I thought at first this would generalize to less restrictive notions of reductions so that, e.g., P-completeness of $X$ under logspace reductions would imply EXP-completess of succinct-$X$ under PSPACE reductions, but it does not seem to work that way; rather, it gives the EXP-completeness under polytime (or even more efficient) reductions of \"PSPACE-succinct\" $X$, if you get what I mean by that.",
"what is a \"projection\" , does it pertain to reductions only - reductions with logspace requirements have this property, or something that imposes succintness to the representation?",
"My 2¢ here: Question 3 certainly looks like a prerequisite, so it may be worth asking separately. If this doesn't get an answer, you may want to contact P-hardness specialists such as P. McKenzie."
] | 13 |
Science
| 0 |
37
|
cstheory
|
Fourier spectrum of the parity of two monotone Boolean functions
|
This is a question that I've been pondering, on and off, for a while, and unsuccessfully. I'd be very interested in any insight regarding this conjecture. (Or rather, these conjectures.)
Recall that, given a Boolean function $f\colon \\{-1,1\\}^n \to \\{-1,1\\}$, the Kahn—Kalai—Linial theorem states that $$\max_{i\in[n]} \operatorname{Inf}_i f \geq \operatorname{Var}[f]\cdot \Omega\\!\left(\frac{\log n}{n}\right) \tag{1} $$ from which we get that, for any _monotone_ Boolean function $f\colon \\{-1,1\\}^n \to \\{-1,1\\}$, $$\max_{i\in[n]} \widehat{f}(i) \geq \operatorname{Var}[f]\cdot \Omega\\!\left(\frac{\log n}{n}\right) = (1-\widehat{f}(0)^2)\cdot \Omega\\!\left(\frac{\log n}{n}\right) \tag{2} $$ (writing $\widehat{f}(i)$ for $\widehat{f}(\\{i\\})$, $i\in\\{0,\dots,n\\}$). Moreover, (2) is tight, as shown by considering the $\textsf{Tribes}_n$ function. In particular, this implies that $$ W^{(0)}[f]+W^{(1)}[f] = \sum_{i=0}^n \widehat{f}(i)^2 = \Omega\\!\left(\frac{\log^2 n}{n^2}\right) \tag{3} $$ for any monotone Boolean function $f\colon \\{-1,1\\}^n \to \\{-1,1\\}$, where $W^{(k)}[f] \stackrel{\rm def}{=} \sum_{S: \lvert S\rvert =k} \widehat{f}(S)^2$.
Now, consider _two_ monotone Boolean functions $f,g\colon \\{-1,1\\}^n \to \\{-1,1\\}$, and let $h\stackrel{\rm def}{=}fg$ be their parity. It is easy to see that we could have $W^{(0)}[h]+W^{(1)}[h]=0$, e.g. by considering $f,g$ to be two different dictator functions (but in that very specific case, $W^{(2)}[h]=1$). _But must there be some non-negligible Fourier mass on the first 3 Fourier levels, then?_
> What can we say about $W^{(0)}[h]+W^{(1)}[h]+W^{(2)}[h] = \sum_{S: \lvert S\rvert \leq 2} \widehat{h}(S)^2$?
**Conjecture 1.** For any two monotone Boolean functions $f,g\colon \\{-1,1\\}^n \to \\{-1,1\\}$, one must have $W^{(0)}[fg]+W^{(1)}[fg]+W^{(2)}[fg] > 0$.
Actually, I'd be actually inclined to believe the following stronger statement:
**Conjecture 2.** For any two monotone Boolean functions $f,g\colon \\{-1,1\\}^n \to \\{-1,1\\}$, one must have $W^{(0)}[fg]+W^{(1)}[fg]+W^{(2)}[fg] \geq \frac{1}{\operatorname{poly}(n)}$.
_Side note:_ this would have implications about _weak learning_ of the class of "2-monotone" functions, which are exactly those functions obtained as parity or anti-parity of $2$ monotone functions. (See e.g. [BCOST15].) But more importantly, this is a very simple-looking question, that has been nagging at me for way too long.
* * *
[BCOST15] Eric Blais, Clément L. Canonne, Igor Carboni Oliveira, Rocco A. Servedio, Li-Yang Tan. _Learning Circuits with few Negations._ APPROX-RANDOM 2015: 512-527
|
https://cstheory.stackexchange.com/questions/37722/fourier-spectrum-of-the-parity-of-two-monotone-boolean-functions
|
[
"boolean-functions",
"fourier-analysis",
"monotone"
] | 14 | 2017-03-07T06:55:43 |
[
"@daniello As far as I can tell, not much, at least in terms of blackbox interpretation of the results. The question above would have applications to weak learning (learning to advantage $1/2+1/\\mathrm{poly}(n)$), while the paper you link shows lower bound on testing (and a relaxation, parameterized testing). As far as I am aware, there is no direct connection between the two (the general connection is \"(strong) learning implies testing\").",
"Can you shed some light on what arxiv.org/pdf/1705.04205.pdf means for this question?"
] | 2 |
Science
| 0 |
38
|
cstheory
|
Is it possible to find the median with a linear size sorting network?
|
Is there a sorting network that makes only $O(n)$ comparisons and finds the median?
The AKS sorting network sorts with $O(\log n)$ parallel steps, but here I am only interested in the number of comparisons. The median of medians algorithm finds the median with $O(n)$ comparisons, but it cannot be implemented as a sorting network.
Remark. In fact, in a recent work, we needed a version that is less powerful than pairwise comparison and resembles sorting networks. In our model one could input two elements, $a$ and $b$, and the output was either "a" or "b", such that the output is at least as big as the other number. (In case of equality, either one of them, and we are interested in worst case complexity.) In this variant we could prove that there is a solution with $O(n)$ comparisons. Of course I am also interested if anyone knows anything about this model ever being studied.
|
https://cstheory.stackexchange.com/questions/27765/is-it-possible-to-find-the-median-with-a-linear-size-sorting-network
|
[
"ds.algorithms",
"sorting",
"sorting-network",
"selection"
] | 14 | 2014-12-09T06:40:04 |
[
"Actually the comparator circuit model is a bit different, since you are allowed to repeat inputs and their negations. What you are looking for is a comparator network for majority.",
"@Yuval Your result seems to be the only hit on google for \"comparator circuit complexity\" and even there I cannot see the definition as the minimum number of gates needed, but I suppose you mean the same thing as I do.",
"Equivalently, you are asking what is the comparator circuit complexity of (Boolean) majority."
] | 3 |
Science
| 0 |
39
|
cstheory
|
Exponential-time factorization of polynomials
|
Let an _explicit_ field be a field for which equality is decidable (in some standard model of computation). I am interested in the factorization of univariate polynomials over an explicit field.
It is known that over some explicit fields, testing irreducibility of polynomials is undecidable [1]. Though, over many fields, the irreducible factorization of polynomials is known to be computable in polynomial time, either deterministically (over $\mathbb Q$ [2] or any number field) or probabilistically (over finite fields [3]). Here the size of the input is the size of the _dense representation_ of the polynomial, that is the list of all its coefficients.
> Is there an explicit field for which
>
> * either the best known algorithm has an exponential running time,
> * or (better) there exists an exponential lower bound for irreducibility testing?
>
**Quick clarification:** There may be very different _explicit fields_ , depending on the complexity (for instance) on the equality test or of the standard operations (addition, multiplication). Actually, I am not aware of any result about polynomial factorization which is not a polynomial time upper bound, or undecidability. So I am interested in any kind of different result (exponential time is just an example). Conditional lower bounds are of interest too.
**References.**
[1] A. Fröhlich et J. C. Shepherdson (1955): [On the factorisation of polynomials in a finite number of steps](http://dx.doi.org/10.1007/BF01180640).
[2] A. K. Lenstra, H. W. Lenstra Jr., L. Lovász (1982): [Factoring polynomials with rational coefficients](http://dx.doi.org/10.1007/BF01457454).
[3] E.R. Berlekamp (1967): [Factoring Polynomials Over Finite Fields](http://www3.alcatel-lucent.com/bstj/vol46-1967/articles/bstj46-8-1853.pdf).
|
https://cstheory.stackexchange.com/questions/18502/exponential-time-factorization-of-polynomials
|
[
"algebraic-complexity",
"polynomials",
"exp-time-algorithms"
] | 14 | 2013-07-30T01:12:45 |
[
"Thanks @JoshuaGrochow! I found the paper incredibly easy to read, even though my German lessons are quite old now...",
"Depending on your definition of \"explicit field\", the result you cite as [1] was also proven by van der Waerden much earlier (1930). Amazingly, he proved this before the notion of computability had been formally defined! See: ams.org/mathscinet-getitem?mr=1512605",
"I was aware while writing my question that some this question should be addressed. Actually, I am interested in both cases. I would be very much interested by the implication to ETH you mention. In other words, I am also interested in conditional lower bounds.",
"What do you mean by \"explicit field\" ? Are the operations is the field given by oracles or by algorithms ? I am asking because if the field's operations are given by efficient algorithms proving an exponential lower bound for factoring seems to imply of proof of ETH."
] | 4 |
Science
| 0 |
40
|
cstheory
|
Pseudorandom functions in ACC^0?
|
In the lower bound result by Ryan Williams (Non-uniform $\mathsf{ACC}$ circuit lower bounds), there is a mention of "little evidence that Pseudorandom function generators exist in $\mathsf{ACC}^0$. Is there any development in this regard that might be of interest? (Even old results implying something along these lines will be great.)
|
https://cstheory.stackexchange.com/questions/10220/pseudorandom-functions-in-acc0
|
[
"cc.complexity-theory",
"reference-request",
"cr.crypto-security",
"circuit-complexity",
"natural-proofs"
] | 14 | 2012-02-15T01:26:37 |
[
"The following paper doesn't answer your question but does show somewhat simpler candidate PRFs ccs.neu.edu/home/viola/papers/spn.pdf"
] | 1 |
Science
| 0 |
41
|
cstheory
|
DPLL and Lovász Local Lemma
|
Let $\varphi$ be a CNF formula. Suppose that each of $\varphi$'s clauses consist of exactly $t$ literals (and, moreover, all literals within one particular clause correspond to different variables). It is well known that if every clause has less than $2^t / e$ clauses that share variables with it, then $\varphi$ is satisfiable (let us call such formulae _easy_). Satisfiability can be proved easily using [Lovász local lemma](http://en.wikipedia.org/wiki/Lov%C3%A1sz_local_lemma). Moreover, using [a recent result](http://arxiv.org/abs/0903.0544) by Moser and Tardos one can show that one of the satisfying assignments can be found in polynomial expected time using the following very simple procedure:
* Pick a random assignment
* While there exists an unsatisfied clause, resample all its variables.
On the other hand, most of modern SAT solvers are [DPLL](http://en.wikipedia.org/wiki/DPLL_algorithm)-based. It means that they try to find a satisfying assignment using brute force with two simple prunings:
* If a formula contains clause with one literal, then we can fix it.
* If one variable occurs in a formula only with (or without) negation, then we can fix it.
**The question: is it true that a version of DPLL that splits on random variables finds a satisfying assignment of any easy formula in polynomial expected time?**
|
https://cstheory.stackexchange.com/questions/7720/dpll-and-lov%c3%a1sz-local-lemma
|
[
"cc.complexity-theory",
"ds.algorithms",
"sat"
] | 14 | 2011-08-13T02:32:29 |
[
"@ilyaraz Still hoping you'll post an official answer to this question.",
"@Stasys Actually, Dmitriy Itsykson (who you probably know) convinced me that the answer is negative. I'll elaborate on it soon. Argument is more or less the following: we pick a hard unsatisfiable formula and pad it in order to make it easy.",
"I think the answer to your question is (apparently) \"No\". Hirsch (2000) exhibited a simple CNF with exactly one satisfying assignment such that no \"randomized DPLL\" (randomized local search algorithm) can find it in expected polynomial time. See my writeup thi.informatik.uni-frankfurt.de/~jukna/BFC-book/sat-chapter.pdf User: friend, password: catchthecat."
] | 3 |
Science
| 0 |
42
|
cstheory
|
Which monotone DNFs are evasive?
|
A Boolean function $\phi$ on variables $X$ is _[evasive](https://en.wikipedia.org/wiki/Evasive_Boolean_function)_ if every decision tree for $\phi$ has height $|X|$. In other words, for any strategy that picks variables of $X$ and asks for their value, an adversary can answer the queries such that the strategy needs to ask about the value of all variables of $X$ to know the value to which $\phi$ evaluates.
A _monotone DNF_ is a disjunction of conjunction of variables, representing a monotone Boolean function on the set $X$ of variables that it uses.
**Which monotone DNFs are evasive?** Is there a characterization of them? What is the complexity, given a monotone DNF, of determining whether it is evasive?
Examples of evasive monotone DNFs include single-clause DNFs, e.g., $x \land y \land z$, where we must query the value of every variable (and the adversary can answer $1$) until the last one which determines the value of the formula. For another example, take $(x \land y) \lor (y \land z)$: if I ask about $x$ or $z$ then the opponent answers $0$ and I'm left with evaluating the other clause, if I ask about $y$ the opponent answers $1$ and I must evaluate $x \lor z$ which requires me to query both variables.
However, not all monotone DNFs are evasive. For instance, for $(s \land t) \lor (t \land u) \lor (u \land v)$, I can query variable $t$. If it is false, then I know that clauses $s\land t$ and $t \land u$ are false, so I can evaluate the function just knowing $u$ and $v$ (I don't need to query $s$). If it is true, then I have to evaluate $s \lor u \lor (u \land v)$, and as the second clause subsumes the third, I just need to know $s$ and $u$ (I don't need to query $v$).
Playing a bit with the problem in the case of graph DNFs (with two variables per clause), it looks like for a path $(x_0 \land x_1) \lor \cdots \lor (x_{n-1} \land x_{n})$ with $n>0$ the function is not evasive iff $n$ is a multiple of 3, and this seems to generalize to trees if there is some kind of tree structure on nodes that are 3 steps apart. For general graphs, I have no idea. I have looked for related work about evasiveness and decision tree complexity for monotone CNFs and DNFs but I didn't find anything relevant.
On graph DNFs, the problem can be seen as a kind of game on the graph of the formula. You pick a vertex $v$ (= variable) on the graph, and the opponent can choose between:
* removing $v$ and all its incident edges (= $v$ evaluates to $0$, all clauses involving it are removed), or
* removing the open ball of radius 2 centered on $v$, i.e., $v$, its adjacent edges, the neighbors of $v$, and their adjacent edges (= $v$ evaluates to $1$, all clauses involving $v$ become singleton clauses involving $v$'s neighbors, you will need to ask about each of these neighbors because each has a singleton clause involving it, but these singleton clauses subsume all other clauses involving the neighbors so you get to remove them).
The question is about characterizing and recognizing the graphs $G$ for which you have a strategy that guarantees that you win, where "winning" means "reaching a graph with an isolated vertex" (= a variable that you do not need to ask about).
|
https://cstheory.stackexchange.com/questions/44278/which-monotone-dnfs-are-evasive
|
[
"np-hardness",
"boolean-functions"
] | 13 | 2019-07-16T13:28:04 |
[
"Since the Alexander dual of the corresponding simplicial complex consists of all the independent sets of $G$, a necessary condition for evasiveness is that the independence polynomial of $G$ vanishes at $-1$.",
"Possibly relevant references for the lazy: A survey of evasiveness: Lower bounds on the decision-tree complexity of boolean functions, Lecture Notes on Evasiveness of Graph Properties"
] | 2 |
Science
| 0 |
43
|
cstheory
|
Question on Products of Graphs
|
Let $S_{n}(G)$, $C_{n}(G)$, $T_{n}(G)$ be the $n$-fold Strong Product, Cartesian Product and Tensor Product of a graph $G$ on $|V|$ vertices.
Let the chromatic number ($\chi(G)$) and the independence number ($\alpha(G)$) of $G$ be known through a (possibly exponential time) algorithm. Is it known that the calculation of $\chi(S_{n}(G))$, $\chi(C_{n}(G))$, $\chi(T_{n}(G))$,$\alpha(S_{n}(G))$, $\alpha(C_{n}(G))$ and/or $\alpha(T_{n}(G))$ require exponential in $n$ complexity for any $n$ say even when restricted to some special graphs?
|
https://cstheory.stackexchange.com/questions/7522/question-on-products-of-graphs
|
[
"cc.complexity-theory",
"graph-theory",
"graph-colouring"
] | 14 | 2011-07-26T18:45:56 |
[
"@Andrew: The first one",
"By $n$-fold strong product do you mean $G\\boxtimes G\\boxtimes \\ldots \\boxtimes G$, or $G\\boxtimes K_n$?",
"Here is Wikipedia's article on Hedetniemi's conjecture.",
"Hi Hsien: Actually you answered part of the question. If you assume the conjecture, then we already have an $o(0)$ algorithm for those cases.",
"Hi Hsien: You are correct.",
"You mean other than the trivial case like $\\chi(C_n(G)) = \\chi(G)$, or $\\chi(T_n(G)) = \\chi(G)$ assuming Hedetniemi's Conjecture, right?"
] | 6 |
Science
| 0 |
44
|
cstheory
|
Deterministic context-free languages that can be represented as the word problem of a group
|
Consider a group $G$. We call $G$ virtually free is it contains a free subgroup of finite index.
If $G$ is finitely generated by some set $X \subseteq G$ one can consider the _word problem_ $W\\!P(G)$ that is the formal language consisting of all words over the alphabet $X \cup X^{-1}$ that evaluate to the unit in $G$.
It is a famous result by Mueller and Schupp that the $W\\!P(G)$ is context-free if and only if $G$ is virtually free.
It is also known that if $W\\!P(G)$ is context-free, it is deterministic context-free.
My question is: Do we know more about how the class of deterministic context-free languages that can be represented as the word problem of some group, is contained in the class of all (deterministic) context-free languages?
|
https://cstheory.stackexchange.com/questions/39954/deterministic-context-free-languages-that-can-be-represented-as-the-word-problem
|
[
"fl.formal-languages",
"gr.group-theory"
] | 13 | 2018-01-11T04:49:31 |
[
"I'm not sure if you're still interested in this, but it is known that such languages are closed under deletion and have universal prefix. This is true for all word problems, not just DCFL. There's a proof here: D. W. Parkes and R. M. Thomas. Groups with context-free reduced word problem. Communications in Algebra, 30:3143–3156, 2002.",
"@MichaëlCadilhac Thank you. This answer of yours is also very interesting.",
"Maybe the class of languages DLOGTIME-reducible to some WP(G) would be more robust.",
"For that above question, I believe $\\{a^nb^m \\mid m < n\\}$ is not the WP of some group. I guess you'd be quite interested in Greibach's hardest language, and her notion of jump PDAs.",
"No not in particular; but do you have a DCFL in mind that is not the WP of some group? For example: The WP of any free group is a DCFL and is solvable in logspace (Lipton, Zalcstein, 1977). Maybe there are more connections between WP of groups and DCFL solvable in logspace. But again, nothing in particular.",
"Are you just asking whether there exists a DCFL that is not the WP of some group? Or something more general?"
] | 6 |
Science
| 0 |
45
|
cstheory
|
Complexity to compute the eigenvalue signs of the adjacency matrix
|
Let $A$ be the $n\times n$ adjacency matrix of a (non-bipartite) graph. Assume that we are given the amplitudes of its eigenvalues, i.e., $|\lambda_1|=a_1,\ldots, |\lambda_n|=a_n$, and we would like to calculate their signs. Is there a faster way of computing the signs of these eigenvalues, other than recomputing the eigenvalues themselves?
|
https://cstheory.stackexchange.com/questions/16789/complexity-to-compute-the-eigenvalue-signs-of-the-adjacency-matrix
|
[
"cc.complexity-theory",
"ds.algorithms",
"linear-algebra",
"spectral-graph-theory"
] | 13 | 2013-03-07T12:38:48 |
[
"Thanks, that's exactly the point. I was wondering if the knowledge of the amplitudes made the problem any simpler. I think that this could have interesting implications in problems where eigenvalues are well approximated by the squared degrees of the graph, etc.",
"Nice question! For comparison, the best known running time for computing the eigenvalues themselves (upto additive error 1/4) is $O(n^3)$ (cstheory.stackexchange.com/a/2810/15)"
] | 2 |
Science
| 0 |
46
|
cstheory
|
Name and references for balanced variant of the long code?
|
The [long code](https://en.wikipedia.org/wiki/Long_code_%28mathematics%29) (arising in PCP theory etc) is an encoding of a set of $k$ values, using binary strings of length $2^k$ (double exponential in the number of bits needed to specify a value), with one coordinate position in the encoding for each of the $2^k$ different binary functions on the input values. Instead, I want to consider a shorter but still doubly exponential code, with one coordinate position for each of the $\tbinom{k}{k/2}/2$ partitions of the $k$ values into two equal-sized subsets (assuming $k$ is even). Each partition can be thought of as corresponding to two different binary functions (the functions whose inverse images form the given partition) and we choose arbitrarily which one of these two functions to use.
The minimum distance of the code (and in fact the distance between all pairs of codewords) is $\tbinom{k-2}{(k-2)/2}$, smaller than the length of the code by only a factor of $\tfrac{k}{2k-1}>\tfrac{1}{2}$. For instance for $k=8$ we get a code of length 35 with minimum distance 20, which <http://www.codetables.de/> tells me matches the [Griesmer bound](https://en.wikipedia.org/wiki/Griesmer_bound) for binary linear codes of the same size (rank 3 or size 8).
I am interested in this for reasons only vaguely related to coding theory, but it seems likely to me that the coding theorists have already studied this code. Unfortunately, I don't know of a good way of looking up coding schemas by the formulas for their parameters. If it has been previously studied, what is it called? And what are some references to it?
(BTW, the property I actually care about, which is easy enough to prove using Sperner's theorem, is that this is the longest possible binary code in which each two positions are independent of each other, in the sense that all four possible combinations of symbols in the two positions are realized by codewords. There appears to be something in the literature called a Sperner code but it's transposed from this — each codeword has equally many zeros and ones, rather than the property of the code I'm looking at, where each bit position has equally many codewords for which that position is a 0 or 1.)
|
https://cstheory.stackexchange.com/questions/19602/name-and-references-for-balanced-variant-of-the-long-code
|
[
"reference-request",
"coding-theory"
] | 13 | 2013-10-31T16:11:44 |
[
"Ok, if it wasn't in the literature before, it is now. See section 6 of arxiv.org/abs/1303.1136 — this code gives the smallest set of vertices to delete from a hypercube graph in order to make all remaining hypercube subgraphs have at most 1/8 of the number of vertices of the original graph."
] | 1 |
Science
| 0 |
47
|
cstheory
|
Generalizing limit-colimit coincidence to Scott-continuous adjunctions: any uses?
|
In Abramsky and Jung's 1994 handbook chapter on denotational semantics, after proving that the limit and colimit of expanding sequences exist and coincide, they have the following to say about generalizing this theorem:
> We can generalize Theorem 3.3.7 [the limit-colimit coincidence of expanding sequences in DCPO] [...] we can use general Scott-continuous adjunctions instead of e-p-pairs. [...] By the passage from embeddings to, no longer injective, lower adjoints, we allow domains not only to grow but also to shrink as we move on in the index set. Thus points, which at some stage looked different, may at a later stage be recognized to be the same. [...] For the main text, we must remind ourselves that this generalization has so far not found any application in semantics.
It's been over fifteen years since this chapter was written. Have there been any applications of this generalization in semantics since then?
|
https://cstheory.stackexchange.com/questions/2528/generalizing-limit-colimit-coincidence-to-scott-continuous-adjunctions-any-uses
|
[
"pl.programming-languages",
"semantics",
"denotational-semantics",
"domain-theory"
] | 13 | 2010-10-28T10:07:39 |
[] | 0 |
Science
| 0 |
48
|
cstheory
|
The best known upper bound for two-way probabilistic finite automata with one-counter
|
It is known that the class of languages recognized by two-way deterministic finite automata with one-counter (2D1CAs) is a proper subset of $ \mathsf{L} $ (deterministic log-space): A 2D1CA can run at most $ O(n^2) $ steps if it halts on a given input, and there is a language in $ \mathsf{L} $, i.e. \begin{equation} \mathtt{DG} = \lbrace w_0 \$ w_1 \$ \cdots \$ w_k \mid k \geq 1, w_{i \in \lbrace 0, \ldots, k \rbrace} \in \lbrace a,b\rbrace^* , \mbox{ and } w_0=w_i \mbox{ for some } 1 \leq i \leq k \rbrace, \end{equation} which cannot be recognized by any 2D1CA [(Duris and Galil, 1982)](http://www.sciencedirect.com/science/article/pii/0304397582900871).
What happens if such an automaton can use a coin?
More precisely, what is the best known upper bound for the class of languages recognized by two-way **probabilistic** finite automata with one-counter (2P1CAs) with bounded error?
|
https://cstheory.stackexchange.com/questions/11080/the-best-known-upper-bound-for-two-way-probabilistic-finite-automata-with-one-co
|
[
"cc.complexity-theory",
"reference-request",
"automata-theory",
"upper-bounds"
] | 14 | 2012-04-13T13:36:31 |
[] | 0 |
Science
| 0 |
49
|
history
|
Are there any references to entombed animals in ancient India?
|
The 13th century Hindu philosopher Arulnandi Shivacharya wrote a work called the Shiva Jnana Siddhiyar, which among other things contains a refutation of Buddhist philosophy. In [this excerpt](https://i.sstatic.net/KxNh7.jpg), various Buddhist theories of what the ultimate cause of the body is are refuted:
> If you say bodies are formed from the mixture of four elements, then these cannot unite as their natures are opposed to each other. **If you say they are formed by the union of blood and semen, then account for toads being found in the heart of rocks, and worms in the heart of trees.** If you say the real cause is good and bad Karma, then these, being opposed, cannot join and form bodies. If food is the cause, then the food which in youth develops the body is not capable of preventing decay in old age. If intelligence is the cause, then that which is formless Chaitanya cannot assume Achaitanya (non-intelligent) form. If you assert that bodies are formed from nothing, then we could cull flowers from the sky.
My question is about the part in bold, which is arguing that intercourse cannot be the ultimate cause of the body, because there are toads which are found in the center of solid rock, and they couldn't have been produced by intercourse since there's no way that toads could have gone inside a solid rock and reproduced.
This statement struck me as rather odd, but then I found out from the Wikipedia article [Entombed animal](https://en.wikipedia.org/wiki/Entombed_animal) that claims of toads being found in solid rock are surprisingly common across many cultures:
> Entombed animals are animals reportedly found alive after being encased in solid rock, or coal or wood, for an indeterminate amount of time. The accounts usually involve frogs or toads. The reputed phenomenon, sometimes called "toad in the hole", has been dismissed by mainstream science, but has remained a topic of interest to Fortean researchers.... References to entombed animals have appeared in the writings of William of Newburgh, J. G. Wood, Ambroise Paré, Robert Plot, André Marie Constant Duméril, John Wesley, and others. Even Charles Dickens mentioned the phenomenon in his journal All the Year Round. **According to the Fortean Times, about 210 entombed animal cases have been described in Europe, North America, Africa, Australia, and New Zealand since the fifteenth century.**
Conspicuously absent from that list of places is Asia. So my question is, are there any references in ancient India to entombed animals? The work I quoted above was written in the 13th century. But I'm wondering whether there are earlier references to this phenomenon. Arulnandi Shivachrya refers to this phenomenon as if it's common knowledge, so I'm guessing older sources would mention it as well.
|
https://history.stackexchange.com/questions/34768/are-there-any-references-to-entombed-animals-in-ancient-india
|
[
"india",
"science",
"animals",
"ancient-india",
"folklore"
] | 16 | 2017-01-05T23:06:24 |
[
"THe proposed edit seems to replace a question with an answer. I'm confused.",
"Unless someone can say what's available in the article I linked to above, there's not much else that can be said—at least the last time I researched this, I spent a fair bit of time and didn't uncover anything useful, but it's so very hard to prove a negative.",
"This, though not readily available online, might be useful. Didn't find anything else that would refer to this with a quick search.",
"It reminds me Schrödinger's cat..."
] | 4 |
Culture & Recreation
| 0 |
50
|
history
|
What was the first overland road from Sweden to Finland?
|
The [Swedish post road](https://en.wikipedia.org/wiki/King%27s_Road_\(Finland\)) from Norway, through Sweden, used the Åland archipelago to pass into Sweden, and this is easily found (evidence of) in the south of Finland to the present day. **When (and where) was the first overland route constructed overland from Sweden into (Swedish) Finland?**
The only (poor) evidence I have for roads existing in the north is by the [War of 1808–9](https://en.wikipedia.org/wiki/Finnish_War) where Russian forces were planning to advance overland into Sweden (along with an army group advancing across the Gulf of Bothnia). One of the WP article's references does say "In addition, several new good roads had been built into Finland greatly reducing the earlier dependency on naval support for any large operation in Finland." but it doesn't specify where these roads were.
I looked through all articles on [Swedish](https://en.wikipedia.org/wiki/Category:Roads_in_Sweden) and Finnish road networks on the English Wikipedia, and the most I found was a reference to a ['Finnmark path'](https://en.wikipedia.org/wiki/Arctic_Ocean_Highway) which was meant to have gone from Finnish Lapland to Finnmark in the 16th century. The [Finnish WP article](https://fi.wikipedia.org/wiki/J%C3%A4%C3%A4merentie) for the same page _does not_ mention the Finnmark path at all, and I couldn't find anything else on a road of that name.
I understand—from the comments—that the term "road" can be meaningless without further definition for a period much longer than a few centuries ago. For clarity, I'm defining road as purpose-built (or purpose-developed) and used regionally for that purpose, such as the post road mentioned above. This would mean hunting tracks that slowly developed don't count, while a merchant-led endeavour to expand (and maintain) the tracks between two townships would.
|
https://history.stackexchange.com/questions/62286/what-was-the-first-overland-road-from-sweden-to-finland
|
[
"transportation",
"sweden",
"finland"
] | 6 | 2020-12-21T03:13:26 |
[
"Carl Linnaeus's 1732 trip to Lapland was recorded in a fascinating book. Of course he was not interested in the speediest or easiest route, so much as the most interesting, but it does give first-hand detailed account of his travels & travel conditions. Wikipedia summary: \"Linnaeus travelled clockwise around the coast of the Gulf of Bothnia, making major inland incursions from Umeå, Luleå and Tornio. He returned from his six-month-long, over 2,000 kilometres (1,200 mi) expedition in October, having gathered and observed many plants, birds and rocks\".",
"No. It was a national road net (for low values of \"road\"). There is a map from 1742, but I cannot access it here. Whatever. There were \"roads\" a long time ago, between 1809 and 1917 it was a hostile border, and then after Finland became independent they opened a railroad.",
"@TomasBy: That's not what I wrote. \"local roads\" means those used to get around town, and its immediate vicinity. Emphasis on immediate vicinity. Magnus Ericson's law basically requires that towns build and maintain a local urban road network for commerce.",
"@PieterGeerkens are you suggesting they were not actually connected? Each man just had a small bit of private road in isolation?",
"@TomasBy: Read the next sentence, these are local roads only: \"... stipulate that the land-owning farmers are responsible for each road lot, bridge, ice road or ferry. The length of the road lot depends on the size of the agricultural property.\" It would be insanity to require small isolated villages otherwise quite content to build and maintain long-haul access rods they don't themselves use or need.",
"@PieterGeerkens history of roads in Sweden: \"The national law of Magnus Eriksson (1350) decrees that each landholder is responsible for a section of road, a bridge, an ice road, or a ferry.\".",
"Torneå was founded in the early 17th c. I assume there were roads to it from both east and west."
] | 7 |
Culture & Recreation
| 0 |
51
|
history
|
Which misdeeds of F. Reineke was J.B.B. de Lesseps "obliged to suppress"?
|
F. Reineke was commandant of Kamchatka from about 1780 to 1784. According to Витер's _История символов как история административного деления государства_ he was responsible for moving the territorial administration from Bolsheretesk to Nizhnekamchatsk. According to J.B.B. de Lesseps, Reineke resigned in 1784 ["for reasons which I am obliged to suppress"](https://archive.org/details/travelsinkamtsch01less/page/140).
It was common for Siberian administrators to be venal. According to Forsyth's _A history of the peoples of Siberia_ , the very first governor of Siberia, Matvei Gagarin, was hanged for fraud, nepotism, and selling offices; another governor in Irkutsk was relieved from office for gross corruption and replaced with his second, who was "vicious" and "ruthless".
**Was Reineke guilty of the same old corruption and exploitation, or something worse?** I'm skeptical that de Lesseps, a Frenchman, had any reason to suppress a story of Russian corruption.
|
https://history.stackexchange.com/questions/55995/which-misdeeds-of-f-reineke-was-j-b-b-de-lesseps-obliged-to-suppress
|
[
"russia",
"18th-century",
"government",
"crime",
"kamchatka"
] | 6 | 2019-12-31T20:47:10 |
[
"One more thing: According to this source, in 1786 F. Reineke moves from Kamchatka to Irkutsk and in 1798 retires from the civil service. All this suggests that his record in Kamchatka was just fine. There was some controversy related to his subordinates, as well as some misdeeds in the Russian postal service in Kamchatka during Reineke's tenure. Maybe this is what Lesseps alludes to.",
"The original says \"деятельный\"; \"Active\" might be a better translation. You can also try to get the book \"Правители Камчатки : 1700-2007\" via an interlibrary loan and look there for further information.",
"@MoisheKohan Very interesting. As Reineke was a public servant, I wonder if \"entrepreneurial\" was a backhanded compliment.",
"For what it is worth, A. S. Sgibnev in his detailed \"History of main events in Kamchatka, 1650 - 1856\", describes F. Reineke as \"honest and entrepreneurial.\"",
"Gagarin was not hanged (just) for corruption, Russian Wikipedia mentions that he attempted to form separate Siberian kingdom : ru.wikipedia.org/wiki/…",
"Thanks, Mark, for your help along the way!",
"Consistently high quality questions. Thank you for your contributions to the site."
] | 7 |
Culture & Recreation
| 0 |
52
|
history
|
Who owned the ship Ensayo, and what were they doing near Baja California in 1842?
|
According to Plummer's _The Shogun's Reluctant Ambassadors_ , in 1842, sea drifters from the _Eijū-maru_ were picked up and by the _Ensayo_ , a "Spanish pirate ship" with a Philippine crew. It was "carrying illegal goods between Spain or Mexico and Manila," and "[b]ecause it was on a 'wanted list', it could not enter any harbors freely." The Japanese men were treated badly and forced ashore on a beach in Baja California.
I found the description confusing. Of Pacific ports, only the Philippines were still Spanish. The Manila galleon system had been over for decades. During Mexico's first twenty years of independence, as far as I know, it didn't trade with East Asia. The Spanish were a minor presence in the Pacific even when they controlled a lot of its coastline.
Who owned _Ensayo_ and what was it up to?
|
https://history.stackexchange.com/questions/47476/who-owned-the-ship-ensayo-and-what-were-they-doing-near-baja-california-in-1842
|
[
"19th-century",
"spain",
"age-of-sail",
"philippines",
"piracy"
] | 6 | 2018-08-05T23:12:12 |
[
"@AlbertoYagos: I concur with T.E.D.'s view.",
"I had \"Vida en México de trece náufragos japoneses\" in my hands, but forgot to look for this point!!",
"@AlbertoYagos - I can't always speak for all our voters, but I for one would consider what you have there acceptable, with perhaps a GoodReads link to the book in question, and an admission that you are working from memory.",
"@T.E.D. I don't have access to either of those books and I can't quote more. I just have that reference. That is why it's a comment and not an answer.",
"@AlbertoYagos - Any way you could see your way to expanding that to an answer? It probably wouldn't take much, as it seems like you already put in enough research for it to be one. You ought to reap the reward for that work, and Aaron may eventually even want to accept it.",
"According to Del tratado al tratado. 120 años de relaciones entre Japón y México by Aurelio Asiain, 2008 (p. 46), the Ensayo didn't commit piracy but smuggling. She smuggled goods from and to Mexico. Adiain's source seems to be Sano, Yoshikazu, Vida en México de trece náufragos japoneses, 1842."
] | 6 |
Culture & Recreation
| 0 |
53
|
history
|
What would a criminal defense attorney charge in late 19th century America?
|
What would a criminal defense attorney charge on the [American frontier](https://en.wikipedia.org/wiki/American_frontier#The_Postbellum_West) in a murder trial in 1885? I am specifcally interested in what it would have cost three cowpokes to mount a murder defence in Rapid City, Dakota Territory 1885. I know they were defended by Colonel William Parker who was a successful lawyer and politician in the Territory at the time, but so far I have found no clue what his fees were.
|
https://history.stackexchange.com/questions/68240/what-would-a-criminal-defense-attorney-charge-in-late-19th-century-america
|
[
"united-states",
"19th-century",
"law",
"old-west"
] | 5 | 2022-02-04T11:16:22 |
[
"Would also significantly help if you documented your preliminary research. I imagine that the answer is highly variable - urban setting vs rural, proximity of a a railroad, the presence of skilled attorney vs having to recruit one from elsewhere, Of course, the cost will range from zero (self representation) to what the market will bear.",
"Please edit the question to limit it to a specific problem with enough detail to identify an adequate answer."
] | 2 |
Culture & Recreation
| 0 |
54
|
linguistics
|
In which non-Sinitic languages do negative clauses retain older constituent order in SVC-derived complex predicates?
|
Many complex predicates are historically derived from serial verb constructions. This is not only true of the Sinitic family. For example, in Saramaccan (Byrne 1987, as cited in Givón 2009):
(1) a bi-fefi di-wosu kaba.
he TNS-paint the-house finish
He finished painting the house.
However, the Chinese constructions are more innovative in that the object has been moved to the end of the sentence, for the most part. Yet in most dialects of modern Chinese except Mandarin, complex predicates also sometimes preserve the older V + O + C order similar to the Saramaccan example in (1). This is most common in negative clauses. (The C is what is traditionally termed a _complement_ in Chinese linguistics, but it's more like a _satellite_ in Talmy's sense, and is developed from the 'lighter' verb of an asymmetric serial verb construction). An example from Cantonese is (2):
(2) nei wan ngo m dou
you find me NEG arrive
You cannot find me.
My question: I know negative clauses are more conservative in general, but are there specific cases outside the Sinitic branch where object placement in complex predicates is more conservative in negative clauses? Thanks!
Givón, T. (2009). _The genesis of syntactic complexity: Diachrony, ontogeny, neuro-cognition, evolution_. John Benjamins Publishing.
|
https://linguistics.stackexchange.com/questions/21555/in-which-non-sinitic-languages-do-negative-clauses-retain-older-constituent-orde
|
[
"syntax",
"historical-linguistics",
"word-order",
"negation"
] | 7 | 2017-04-06T01:26:05 |
[] | 0 |
Science
| 0 |
55
|
linguistics
|
Are there any languages where the first person cannot be an object?
|
In some languages, nouns low on the animacy hierarchy, particularly inanimates cannot surface as A, and if a situation arises where they are underlyingly A, some reparative strategy such as a passive must be used. Some theorise that this was the case in early PIE, and a friend of mine mentioned Algonquian and Japhung Qiangic in the conversation that lead me to consider this:
Are there any languages where a similar rule is found at the other end of the animacy hierarchy, such that the 1st person is defective and cannot be O, and an underlying 1st person O requires a syntactic derivation to be used, moving the first person either to S (a passive) or oblique status (an antipassive)?
[Chukchi](https://en.wikipedia.org/wiki/Chukchi_language) seems to come close, as it has a verbal prefix _(i)ne- ~ (e)na-_ , which Comrie(1979) analyses as a "de-ergativising prefix" which in some cases acts like an antipassive is required with 1st person singular Os when the A is not 3rd person plural (in which case a 1sg.S/O suffix _is_ used), however it's not quite a full antipassive as in these cases, as while there is a change to verbal person agreement (absolutive forms are used to mark underlying A) there is not change to nominal case marking, and furthermore, in the "present II"-tense it's used with a much larger set of A/P combinations. Further examples of borderline cases like Chukchi would be fine, but what I'm really interested in is if there are any more clear-cut examples where the construction involved is clearly a syntactic derivation.
* * *
Comrie, B. 1979: _Degrees of Ergativity: Some Chukchee evidence_ , pp. 219-40 in Plank, F. 1979 (ed.): _[Ergativity - Towards a Theory of Grammatical Relations](https://drive.google.com/file/d/1f3eXlLDI2qC3yeMG1YStsmtH5RSXzHLE/view)_ , Academic Press
|
https://linguistics.stackexchange.com/questions/27161/are-there-any-languages-where-the-first-person-cannot-be-an-object
|
[
"syntax",
"grammar",
"list-of-languages",
"grammatical-object",
"person"
] | 7 | 2018-02-16T13:02:04 |
[
"Inanimate objects not being able to be agents makes some sense (if your language doesn't use a lot of metaphor), but why would any language prohibit 1st person objects? I can imagine this as a kind of taboo, but not as an actual ungrammaticality."
] | 1 |
Science
| 0 |
56
|
mathoverflow
|
2, 3, and 4 (a possible fixed point result ?)
|
The question below is related to the classical [Browder-Goehde-Kirk fixed point theorem](https://www.researchgate.net/publication/38323269_An_elementary_proof_of_the_fixed_point_theorem_of_Browder_and_Kirk).
Let $K$ be the closed unit ball of $\ell^{2}$, and let $T:K\rightarrow K$ be a mapping such that $$\Vert Tx-Ty\Vert _{\ell^{4}}\leq\Vert x-y\Vert _{\ell^{3}}$$ for all $x,y\in K$.
Is it true that $T$ has fixed points?
|
https://mathoverflow.net/questions/18264/2-3-and-4-a-possible-fixed-point-result
|
[
"fa.functional-analysis",
"open-problems",
"banach-spaces"
] | 79 | 2010-03-15T06:26:45 |
[
"$FP(p,p,\\infty)$ is false for any $p$. We can let $(Tx)_i = x_{i-1}$ for $i<1$ and $(Tx)_0 =(1/2)( 1 - \\sum_i x_i^2)$. Then $||Tx||_{\\ell_2}^2 = (1/4)(1-||x||_{\\ell_2}^2)^2+ x_{\\ell_2}^2 \\leq 1$ since $x_{\\ell_2}\\leq 1$ and, because each coordinate is a $1$-Lipschitz function in the $\\ell_2$ norm, the whole thing is a $1$-Lipschitz transformation from $\\ell^\\infty$ to $\\ell^2$.",
"As far as I understood, the BGK (Browder-Göhde/Göbel-Kirk) fixed point theorem states that every non-expansive self-mapping on a non-empty, closed and convex subset of a uniformly convex Banach space has a fixed point.",
"What are the related known results?",
"Any progress on this?",
"Would someone please state the classical Browder-Goehde-Kirk fixed point theorem?",
"@Fabrizio Polo I'm not claiming that. Just that, e.g., $FP(2,4,3)$ holds, via BGK. Please read carefully my comment.",
"@Ady: Since your question is whether or not $FP(2,3,4)$ holds, I'm confused. You seem to be claiming that BGK resolves your question.",
"BGK $\\Longrightarrow$ FP$(p,q,r)$ for 1 < p $\\leq$ r $\\leq q< \\infty $ , e.g.",
"For fun, I started considering variants of this question but made no real progress on them either. Let ${\\bf FP}(p,q,r)$ be the same statement with $2,3,4$ replaced by $p,q,r$. The BGK fixed point theorem gives us ${\\bf FP}(p,p,p)$ for $1 < p < \\infty.$ For what other values of $p,q,r$ can you prove or disprove this statement? Do you know of a counterexample to $FP(1,\\infty, \\infty)$?",
"Why did this question get a downvote? Seems interesting to me.",
"I don't think it does. I just meant to make sure other readers could easily tell what you were asking; I didn't downvote and I hope I didn't encourage anyone else to.",
"If that deserves a \"-1\", it's cool to me. ",
"It would be easier to read if you just wrote $\\|Tx−Ty\\|_4 \\le \\|x−y\\|_3$. It took me a minute to get the point of your question since I could barely see the difference between the supersubscripts"
] | 13 |
Science
| 1 |
57
|
mathoverflow
|
Grothendieck's Period Conjecture and the missing p-adic Hodge Theories
|
Singular cohomology and algebraic de Rham cohomology are both functors from the category of smooth projective algebraic varieties over $\mathbb Q$ to $\mathbb Q$-vectors spaces. They come with the extra structure of Weil cohomology theories - grading, cup product, orientation map, and cycle class map. We can consider the space of all invertible natural transformations from singular cohomology to algebraic de Rham cohomology that respect this structure. For purely formal reasons, this is an affine scheme. The coordinates are the matrix coefficients of the natural transformation for each algebraic variety, and the relations are given by the various commutative diagrams that must hold. Conjecturally, this scheme is a torsor for the motivic Galois group of $\mathbb Q$.
de Rham's theorem, together with GAGA, gives us an isomorphism between these two functors when tensored with $\mathbb C$. In other words, it gives us a $\mathbb C$-point of this affine scheme.
Grothendieck's period conjecture says that this point is a generic point - so the ring of periods in $\mathbb C$ is equal to the whole ring of functions on this scheme.
* * *
On the other hand, consider the $p$-adic analogue. $p$-adic etale cohomology and algebraic De Rham cohomology are both functors from the category of smooth projective algebraic varieties over $\mathbb Q_p$ to $\mathbb Q_p$-vector spaces. They are Weil cohomology theories.
We can consider the space of all isomorphisms between these two functors as an affine scheme over $\mathbb Q_p$.
$p$-adic Hodge theory gives a $B_{dR}$-valued point of this scheme.
However, it is not the generic point. The reason is that the isomorphism described by $p$-adic Hodge theory naturally factors through the category of $\operatorname{Gal}(\overline{\mathbb Q}_p|\mathbb Q_p)$-representations. Hence it lies in a closed subscheme that is a torsor under, not the full motivic Galois group, but the Zariski closure of $\operatorname{Gal}(\overline{\mathbb Q}_p|\mathbb Q_p)$ inside it. This group is much smaller because the Tate conjecture fails over $\mathbb Q_p$, and a map of Tannakian categories that is not a full functor corresponds to a map of Tannakian groups that is not surjective.
* * *
So the analogue of the period conjecture fails badly over $\mathbb Q_p$. This leads me to my question: Grothendieck's period conjecture essentially gives us a description of the scheme of isomorphisms betweeen singular and de Rham cohomology - it's the spectrum of the period ring. However, we do not have a similar picture of the scheme of isomorphisms between $p$-adic etale cohomology and de Rham cohomology. The period ring only gives us one point.
> Can we explicitly describe any other points of this scheme of isomorphisms?
|
https://mathoverflow.net/questions/200083/grothendiecks-period-conjecture-and-the-missing-p-adic-hodge-theories
|
[
"nt.number-theory",
"tannakian-category",
"p-adic-hodge-theory"
] | 61 | 2015-03-15T14:18:19 |
[
"I should correct myself: to obtain that \"over a finite field mixed motives are pure\" we must assume that such mixed motives exist (which follows from the Tate conjecture) and that they have a weight filtration respected by Frobenius. Then for each mixed motive $M$ appropriate polynomials in Frobenius are idempotent on $M$ which split it as a direct sum of pure motives. I am not sure how far we are from proving the Tate conjecture for varieties over finite fields; i imagine it's not considered out of reach. And i'm not sure how useful motives over finite fields are apart as source of intuition.",
"Thank you @WillSawin for this excellent question. I think that for the usual equal characteristic $0$ Grothendieck conjecture one must consider arbitrary mixed motives which complicates things. So for varieties over p-adic fields shouldn't one also consider motives of nonprojective varieties ? It seems that p-adic étale and similar cohomologies can get complicated for those. Im not familiar enough with the field. We have Voevodsky's $DM_{gm}^{eff}(Q_p,Q)$ but no t-structure i believe. Also have you thought about varieties over a finite field where mixed motives with $Q$-coefficients are pure ?",
"@AknazarKazhymurat Thanks! I have figured nothing out.",
"representation is abnormally small (compared to the full motivic group) and try to work from there (one can find examples among abelian varieties). Another question is whether you should restrict to isomorphism respecting the filtration on both sides (as I think you should).",
"Will Sawin, first of all, thank you for this interesting (but hard) question. My impression is that part of the difficulty stems from the fact that your analogy is perhaps not so close: a closer analogue might be the collection of all comparison theorems between étale cohomology for each $p$ and de Rham cohomology for a variety over $\\mathbb Q$ (rather than the single comparison theorem for a variety over $\\mathbb Q_{p}$. In that case, one recovers I believe the full motivic group. As for your precise question, I guess one can take a variety over $\\mathbb Q$, select a $p$ such that the Galois",
"To get an isomorphism between algebraic de Rham cohomology and singular cohomology one only needs de Rham's theorem and Serre's GAGA, so no Hodge theory is required.",
"@Olivier I meant to write $B_{dR}$ instead of $\\overline{\\mathbb C}_p$. Given that, do I need to use a different scheme?"
] | 7 |
Science
| 1 |
58
|
mathoverflow
|
Does every triangle-free graph with maximum degree at most 6 have a 5-colouring?
|
## A very specific case of Reed's Conjecture
Reed's $\omega$,$\Delta$, $\chi$ conjecture proposes that every graph has $\chi \leq \lceil \tfrac 12(\Delta+1+\omega)\rceil$. Here $\chi$ is the chromatic number, $\Delta$ is the maximum degree, and $\omega$ is the clique number.
When restricted to triangle-free graphs, the equivalent question is, Does every triangle-free graph have chromatic number $\leq \frac \Delta 2 +2$?
This is known for $\Delta\leq 4$. In general for triangle-free graphs, $\chi \leq O(\Delta/\log \Delta)$, so the conjecture is also true for very large $\Delta$.
How about $\Delta=5$? $\Delta=6$? Because of parity, $\Delta=6$ is the easier of these two cases (and actually easily implies the $\Delta=5$ case. Can anyone prove it?
Kostochka proved that every triangle-free graph has $\chi \leq \frac 2 3 \Delta +2$. He also proved that $\chi\leq \frac \Delta 2 +2$ for graphs of sufficiently large girth depending on $\Delta$. Can anyone prove it for girth $\geq 5$? $4$?
This would at least provide some hope for proving Reed's Conjecture for triangle-free graphs.
> Does every triangle-free graph with $\Delta\leq 6$ have $\chi \leq 5$? What about every graph with girth at least five?
|
https://mathoverflow.net/questions/37923/does-every-triangle-free-graph-with-maximum-degree-at-most-6-have-a-5-colouring
|
[
"graph-theory",
"graph-colorings",
"co.combinatorics"
] | 55 | 2010-09-06T12:58:11 |
[
"Another possible tangential attack is to establish the conjecture for the \"warmth\" $w$ of the graph, because Brightwell and Winkler proved that $w \\le \\chi$.",
"Good question; it is known to hold, without the round-up. Reed never published the result in a paper but it's in Graph Colouring and the Probabilistic Method (with Molloy), in the chapter on hard-core distributions (Chapter 23 I think). (It wouldn't let me comment twice in a row, so I deleted the old comment to add: ) A proof of a stronger result, noted by McDiarmid, appears in Section 2.2 of my thesis, which is here: columbia.edu/~ak3074/papers/phdthesis.pdf",
"This is not addressing your question, but I wonder if it is known whether Reed's conjecture holds when $\\chi$ is replaced by $\\chi_f$, the fractional chromatic number?"
] | 3 |
Science
| 1 |
59
|
mathoverflow
|
Class function counting solutions of equation in finite group: when is it a virtual character?
|
Let $w=w(x_1,\dots,x_n)$ be a word in a free group of rank $n$. Let $G$ be a finite group. Then we may define a class function $f=f_w$ of $G$ by
$$ f_w(g) = |\\{ (x_1,\dots, x_n)\in G^n\mid w(x_1,\dots,x_n)=g \\}|. $$ The question is:
> Can we characterize the words $w$ for which $f_w$ is a virtual character for any group $G$?
(A virtual character is a difference of two characters, sometimes also called generalized character.) That $f_w$ is a virtual character of $G$ is equivalent to
$$ (f_w,\chi) = \frac{1}{|G|} \sum_{x_1, \dots,x_n\in G} \chi(w(x_1, \dots,x_n)) \in \mathbb{Z} $$ for all $\chi \in \operatorname{Irr}(G)$.
Some examples and non-examples:
1. $n=1$, $w= x^k$. Then $(f_w,\chi)\in \mathbb{Z}$ is the $k$-th Frobenius-Schur-indicator.
2. $w=[x,y]=x^{-1}y^{-1}xy$. Then $(f_w,\chi)= \frac{|G|}{\chi(1)}$, so $f_w$ is in fact a character.
3. For $w=x^{-k}y^{-1}x^ly$, it can be shown that $(f_w,\chi)= \frac{|G|}{\chi(1)} a$ for some integer $a$.
4. $f_w$ is a virtual character for words of the form $w= x_1^{e_1}x_2^{e_2} \dots x_n^{e_n}$.
5. For $w=[x^2,y^2]$ and $G= SL(2,7)$, the class function $f_w$ is not a generalized character.
It is always the case that $(f_w, \chi)$ is an algebraic integer in $\mathbb{Q}(\chi)$. This follows from an old result of Solomon saying $f_w(g)$ is divisible by $|C_G(g)|$ when the number of variables is $>1$. (See also [this paper](http://de.arxiv.org/abs/1105.6066v1) by Rodriguez Villegas and Gordon, where my question is discussed very briefly.) So for rational-valued groups, $f_w$ is a virtual character for any word. (In fact, it suffices that $G$ is a normal subgroup of a rational-valued group.) In view of 4., the same is true for abelian groups, and I don't know examples of solvable groups where $f_w$ is not a virtual character.
Another remark is that $f_w$ does not change if we replace $w$ by its image under an automorphism of the free group in question. Using this, one can of course find rather complicated looking words for which $f_w$ is trivial, that is, $f_w(g)\equiv |G|^{n-1}$.
Added later:
The proofs that $(f_w,\chi)\in \mathbb{Z}$ in 2.-4. above basically use the same "trick". I'm also interested in other examples where perhaps another idea of proof is used than in the examples 1.-4., or "more conceptual" explanations why $f_w$ sometimes is a (virtual) character. (I admit that this is somewhat vague.)
A related question is when $f_w$ is a character, not only a virtual character. For $G$ the symmetric group, this is discussed in Exercise 7.69k of "Enumerative Combinatorics 2" by Richard Stanley. (Note that in this case, $f_w$ is always a virtual character.)
|
https://mathoverflow.net/questions/105854/class-function-counting-solutions-of-equation-in-finite-group-when-is-it-a-virt
|
[
"gr.group-theory",
"rt.representation-theory",
"finite-groups",
"characters"
] | 54 | 2012-08-29T08:38:56 |
[
"To add to HJRW's comment a function is a $\\mathbb Q$-linear combination of characters iff it is constant on elements generating conjugate subgroups. In your set up because it is an algebraic integer combination of characters you just need it to be a $\\mathbb Q$-linear combination to be a virtual character. So at the end of the day you need that if $m$ is relatively prime to the order of $G$ then the number of solutions for $g$ and $g^m$ are the same. For the symmetric group this happens always because $g$ and $g^m$ are conjugate. The same is true for any group with all characters rational.",
"This question is considered (although I don't think answered definitively) in this papr of Amit and Vishne: u.math.biu.ac.il/~vishne/publications/S0219498811004690.pdf ."
] | 2 |
Science
| 1 |
60
|
mathoverflow
|
How many algebraic closures can a field have?
|
Assuming the axiom of choice given a field $F$, there is an algebraic extension $\overline F$ of $F$ which is algebraically closed. Moreover, if $K$ is a different algebraic extension of $F$ which is algebraically closed, then $K\cong\overline F$ via an isomorphism which fixes $F$. We can therefore say that $\overline F$ is _the_ algebraic closure of $F$.
(In fact, much less than the axiom of choice is necessary.)
Without the axiom of choice, it is consistent that some fields do not have an algebraic closure. It is consistent that $\Bbb Q$ has two non-isomorphic algebraically closed algebraic extensions.
It therefore makes sense to ask: Suppose there are two non-isomorphic algebraically closed algebraic extensions. Is there a third? Are there infinitely many? Are there Dedekind-infinitely many?
> What is provable from $\sf ZF$ about the spectrum of algebraically closed algebraic extensions of an arbitrary field? What about the rational numbers?
|
https://mathoverflow.net/questions/325756/how-many-algebraic-closures-can-a-field-have
|
[
"set-theory",
"ac.commutative-algebra",
"lo.logic",
"axiom-of-choice",
"field-extensions"
] | 54 | 2019-03-19T02:41:22 |
[
"@DavidRoberts: Should, yes. One day...",
"Shouldn't you add an answer about this now, pointing to your own paper?",
"@AsafKaragila thanks!",
"@Holo: arxiv.org/abs/1911.09285",
"@Holo: The one I am putting in arxiv later today. Check Monday's Replacements.",
"@AsafKaragila hi, may I ask which paper of yours implies this result? I would like to read it",
"@Noah: Some months ago I was talking with another MO user about this question, and I realised that one of my recent papers implies that it is consistent that every field has a proper class of pairwise non-isomorphic algebraic closures, unless it is real-closed or algebraically closed. It's still not clear whether or not we can have some of them having the same cardinality. That's a great little idea.",
"@Noah: That's a good question. I don't know. It is true that the standard axiomatization of ACF is complete.",
"What happens to the model theoretic results about algebraically closed fields without choice? Can you have uncountable nonisomorphic ACFs with the same characteristic and cardinality without choice?",
"@WillSawin My intuition says yes, but I’m not sure — perhaps field properties like being formally real or having a particular valuation could have some impact on the answer. Hopefully looking at the arguments in the paper Asaf linked above can sharpen it somewhat.",
"@AlecRhea The answer seems pretty likely to be \"proper class many\", right?",
"@Gerhard: In the case of the rationals, I guess? There is a canonically constructed closure which is countable. But it is consistent that there is an algebraically closed algebraic extension which is not countable. In fact, it does not have a real-closed subfield.",
"Does the consistency of two closures follow because there are two sets for which no bijection exists and each set is contained by one of the closures? In which case, I suspect there are more than two closures. Gerhard \"It's Not About The Algebra?\" Paseman, 2019.03.19.",
"It seems we can ask a similar question even with choice (but without global choice) about proper class sized fields like the field of fractions of the Grothendieck ring of the ordinals, since the poset/chains we want to Zorn are proper classes. It might be interesting to see how many algebraic closures a proper class sized field can have in the presence of choice without global choice.",
"@Matt: Not much, I expect. But maybe with time someone will find this interesting enough to pursue from a research point of view.",
"Oh my misunderstanding. As an outsider to this, I'm excited to see what comes out of this question. Cheers.",
"@Matt: Not really. That tells us that for the rational numbers there is a canonical algebraically closed algebraic extension, so the spectrum is non-empty. But it's pretty far from anything I'm asking.",
"Is this related? math.stackexchange.com/questions/114978/…",
"Much appreciated Asaf; it seems I take choice for granted all too often, I thought these facts were more intrinsic to field theory.",
"Alec, it appears in Hodges' Läuchli's algebraic closure of $Q$. Math. Proc. Cambridge Philos. Soc. 79 (1976), no. 2, 289–297. MR422022.",
"Very cool question, could you provide a reference/proof hint for the comment about the consistency $\\mathbb{Q}$ having more than one algebraic closure without choice?",
"Not fully sure about the tags, though."
] | 22 |
Science
| 1 |
61
|
mathoverflow
|
Atiyah's paper on complex structures on $S^6$
|
M. Atiyah has posted a preprint on arXiv on the non-existence of complex structure on the sphere $S^6$.
<https://arxiv.org/abs/1610.09366>
It relies on the topological $K$-theory $KR$ and in particular on the forgetful map from topological complex $K$-theory to $KR$.
Question: what are the nice references to learn about $KR$?
**Edit :** Thank you very much for the comments and suggestions, M. Atiyah's paper "K-theory and reality." Quart. J. Math., Oxford (2), 17 (1966),367-86 is a fantastic paper. However I have more questions.
Question 1: how to build the morphism $$KSp(\mathbb{R}^6)\rightarrow K^{7,1}(pt)?$$
Question 2: why do we use $\mathbb{R}^{7,1}$?
In fact I do not understand the sentence "The 6-sphere then appears naturally as the base of the light-cone". And why it suffices to look at this particular model of $S^6$.
|
https://mathoverflow.net/questions/253577/atiyahs-paper-on-complex-structures-on-s6
|
[
"dg.differential-geometry",
"at.algebraic-topology",
"complex-geometry",
"kt.k-theory-and-homology",
"index-theory"
] | 52 | 2016-10-31T13:01:46 |
[
"I think question should be edited to remove any implication that it is asking about possible correctness of Atiyah's paper. If the title were to say something about your actual question on KR, that would be good.",
"Regarding the map you wish to understand, I think that the KSp should be seen as coming from one specific KR. Btw web.archive.org/web/20230113145507/https://www.math.umd.edu/… should be rather useful, but I haven't been able to figure out the dimension correctly from there. Rosenberg uses a different grading to Atiyah.",
"For your final question, the section titled \"Ambient Space Construction\" on this blog entry of mine is related. Basically it is a way to fix one conformal structure on $\\mathbb{S}^6$.",
"@RyanBudney I suspect that the sentence \"integers goes to 0\" means integrable ACS goes to 0 in KR, while non-integrable ones goes to 1. It seems that he was using this map to separate integrable and non-integrable ACSs, it cannot be done if it is trivial. I feel that this might be the most crucial step, but do not have a clear idea what's going on...",
"Karoubi briefly treats KR-theory in \"K-Theory: An Introduction\" (page 177). The book is a good reference for K-Theory in general.",
"I think basics of $KR$ theory is easy to learn from [1]. What is puzzling is the claim on p.5 of arxiv.org/abs/1610.09366 that \"Because of the Atiyah-Singer theory, the linear algebra acquires a topological meaning, and that is embodied in $KR$ theory.\"",
"And the involution on the base space would be trivial.",
"@DenisNardin You go from $E$ to $E \\oplus \\overline{E}$; your involution is the obvious one that swaps factors.",
"@RyanBudney Can you explain a little bit more how to treat a complex bundle as a real bundle? You need to throw in a C_2-action and I really don't see how to do that (this is a bit embarassing because I should know KR very well).",
"I think it's just a straight-forward computation, isn't it? I've only scanned the paper and this is my first time thinking about $KR$, but I suspect what's going on is that the generator for complex k-theory is the bundle with Euler class $1$. In $KR$ theory this is twice the generator, because the generator is one where the fixed-point set of the involution is a Moebius bundle. I haven't thought about this in detail but that's what I suspect is going on.",
"Yes of course, but do you know why it is trivial?",
"The integers he's talking about is 6-dimensional complex k-theory of $S^6$, i.e. this group is infinite cyclic.",
"This sentence is on p4 of Atiyah's preprint.",
"The forgetful map appears to be that you can treat a complex bundle as a real bundle, that gives your map from complex k-theory to this \"KR\" variant. Where is the sentence you are quoting?",
"I am reading [1], it is beautifully written. However as I am a complete amateur, I would like to understand the relationships between topological complex K-theory and KR-theory. In particular this sentence: \"There are natural forgetful maps from complex K-theory to KR-theory and in dimension 6 the integers go to 0\".",
"It looks like you implicitly do not accept Atiyah's reference [1] in his paper. What isn't \"nice\" about that?"
] | 16 |
Science
| 0 |
62
|
mathoverflow
|
Concerning proofs from the axiom of choice that ℝ³ admits surprising geometrical decompositions: Can we prove there is no Borel decomposition?
|
This question follows up on a [comment](https://mathoverflow.net/questions/92919/filling-mathbbr3-with-skew-lines#comment238532_92919) I made on Joseph O'Rourke's recent [question](https://mathoverflow.net/questions/92919/filling-mathbbr3-with-skew-lines), one of several questions here on mathoverflow concerning surprising geometric partitions of space using the axiom of choice.
1. Joseph O'Rourke: [Filling $\mathbb{R}^3$ with skew lines](https://mathoverflow.net/questions/92919/filling-mathbbr3-with-skew-lines)
2. Zarathustra: [Is it possible to partition $\mathbb{R}^3$ into unit circles?](https://mathoverflow.net/questions/28647/is-it-possible-to-partition-mathbb-r3-into-unit-circles)
3. Benoît Kloeckner: [Is it still impossible to partition the plane into Jordan curves without choice?](https://mathoverflow.net/questions/21327/is-it-still-impossible-to-partition-the-plane-into-jordan-curves-without-choice)
The answers to these questions show that the axiom of choice implies, by rather easy and flexible arguments, that space admits several surprising geometrical decompositions. To give a few examples:
* $\mathbb{R}^3$ is the union of disjoint circles, all with the same radius. Proof: Well-order the points in type $\frak{c}$. At stage $\alpha$, consider the $\alpha^\text{th}$ point. If it is not yet covered, we may find a unit circle through this point that avoids the fewer-than-$\mathfrak{c}$-many previously chosen circles. QED
* $\mathbb{R}^3$ is the union of disjoint circles, with all different radii. Proof: at stage $\alpha$, find a circle of a previously unused radius that avoids the fewer-than-$\mathfrak{c}$-many previously chosen circles. QED
* $\mathbb{R}^3$ is the union of disjoint skew lines, each with a different direction. Proof: at stage $\alpha$, put a line through the $\alpha^\text{th}$ point with a different direction than any line used previously. QED (Edit: it appears that one might achieve this one constructively by using the $z$-axis and a nested collection of [hyperboloids](http://en.wikipedia.org/wiki/Ruled_surface), which unless I am mistaken would give lines of different directions.)
* $\mathbb{R}^3$ is the union of disjoint lines, each of which pierces the unit ball.
* And so on.
The excellent article _Jonsson, M.; Wästlund, J._ , [**Partitions of $\mathbb{R}^3$ into curves**](http://dx.doi.org/10.7146/math.scand.a-13850), Math. Scand. 83, No. 2, 192–204 (1998). [ZBL0951.52018](https://zbmath.org/?q=an:0951.52018). [JStor](https://www.jstor.org/stable/24493132), proves among other things that $\mathbb{R}^3$ can be partitioned into unlinked unit circles, either all with the same radius or all with different radii, and they have a very general theorem about partitioning $\mathbb{R}^3$ into isometric copies of any family of continuum many real algebraic curves.
So the general situation is that the axiom of choice constructions are both easy and flexible and not entirely ungeometrical.
Meanwhile, there are also a few concrete constructions, which do not use the axiom of choice. For example, Szulkin (see theorem 1.1 in [the Jonsson, Wästlund article](http://dx.doi.org/10.7146/math.scand.a-13850)) shows that $\mathbb{R}^3$ is the union of disjoint circles by a completely explicit method. And there are others. But my question is not about these cases where there is a concrete construction. Rather, my question is:
**Question 1.** Can we prove, in any of the cases where there is no concrete construction, that there is none?
For example, taking Borel as the measure of "explicit", the question would be: can we prove, for any of the kinds of decompositions I mention above or similar ones, that there is no Borel such decomposition? This would mean a decomposition of $\mathbb{R}^3$ such that the relation of "being on the same circle" would be a Borel subset of $\mathbb{R}^6$, and in this case, the function that maps a point to the nature of the circle on which it was to be found (the center, radius, and so on) would also be a Borel function.
A closely related question would be:
**Question 2.** Can we prove for any of the decomposition types that it requires the axiom of choice?
For example, perhaps there is an argument that in one of the standard models of $\text{ZF}+\neg\text{AC}$ that there is no such kind of decomposition.
My only idea for an attack on question 1 is this: if there were a Borel decomposition of $\mathbb{R}^3$ into circles or lines of a certain kind, then the assertion that this particular Borel definition was such a partition would be $\Pi^1_2$ and hence absolute to all forcing extensions. So the same Borel definition would work to define such a partition even in forcing extensions of the universe having additional reals. Furthermore, the ground model partitions would be a part of that new partition. And this would seem to be a very delicate geometric matter to fit the new reals into the partition in between the ground model objects. But I don't know how to push an argument through.
|
https://mathoverflow.net/questions/93601/concerning-proofs-from-the-axiom-of-choice-that-%e2%84%9d%c2%b3-admits-surprising-geometrical
|
[
"lo.logic",
"set-theory",
"axiom-of-choice",
"mg.metric-geometry",
"descriptive-set-theory"
] | 51 | 2012-04-09T13:32:24 |
[
"@LSpice Thanks!",
"Sounds like a good idea. Perhaps one could make such a kind of argument work with determinacy or $\\text{AD}_{\\mathbb{R}}$?",
"I really like these questions and every so often I go back and think about them. For me the obvious strategy to attempt is analytic - under some convenient assumption like \"all sets of reals are measurable\", show that such a decomposition cannot exist by some argument that involves, e.g. the probability distribution of the angle of the unique line through a random point. However I've been unable to make anything like this work. Is there a philosophical reason why this sort of arugment cannot be the right way to go?",
"Joel, you might be interested in this paper of Zoltan Vidnyansky: arxiv.org/pdf/1209.4267.pdf. In it, he provides a \"black box\" theorem that allows one to deduce, under the assumption $V=L$, that sets like these, which are typically produced by transfinite recursion in the way you describe, can be coanalytic. His construction is still by transfinite recursion, but he shows how to do it very carefully so that the end result is coanalytic. This does not really answer either of your main questions, but it seems relevant so I thought I should make you aware of it!",
"Good morning, Paul! Yes, of course full AC is not necessary, since as you say a well-ordering of the reals is sufficient. My question was whether one can prove that ZF (or ZF+DC), if consistent, is not able to prove the existence of decompositions. I like your selector idea, and perhaps that is a good strategy.",
"Hi Joel. The second question is whether some form (or consequence) of the Axiom of Choice not following from ZF (or ZF + DC$_{\\mathbb{R}}$) follows from the existence of one of these decompositions? For instance, a selector for some Borel equivalence relation, or even a set of reals without the Baire property? It seems that you already know that full AC is not necessary, since the constructions all work from the existence of a wellordering of the reals. Is that right? Perhaps the existence of a selector for some equivalence relation is sufficient to carry out the constructions.",
"Thanks! I'm really looking forward to hearing the outcome for the constructive case---please post an answer when you arrive at something. I would be interested to know the connection between the constructive case and the case of continuous partitions in classical logic, which could of course be viewed as a stricter form of the Borel partitions I asked about. What I expect is that one could hope to rule out continuous partitions in many of the cases, but ruling out Borel partitions seems mysterious to me.",
"The constructive version is currently discussed at groups.google.com/group/constructivenews/browse_thread/thread/…",
"@Joel: The trouble, constructively, is in showing that each sphere intersects the circles in exactly two points. When the points of intersection pass from one circle to another, as we vary the radius of the spehere, there is a discontinuity (the points jump suddenly). This is a \"model-theoretic\" way of seeing that something isn't right constructively.",
"Joseph, thanks! These lines are skew in the sense that any two of them have different directions, but not skew in the sense of your question, which I know how to achieve only by using AC. ",
"@Joel: Your idea to use hyperboloids to construct skew lines is nice!",
"Asaf, since it seems difficult to make any proof at all, it would be interesting to see that ZF alone, without DC, cannot give a certain kind of construction. So your idea of considering a model where the reals are a countable union of countable sets is a good one, but I don't see how to make it work. In that model, the two questions become in effect the same, since every set is Borel there.",
"And no, I don't think we know that we can't do all these things constructively. Perhaps there are nice explicit decompositions of each type. When there is, then we can prove that there is just by exhibiting it. But when there isn't, I don't see how we could prove that there isn't, and this is what my question is about.",
"Andrej, I was using the term \"construction\" loosely, in classical logic, but could you explain why the argument isn't constructive in your sense? You have a circle in the $xy$ plane with center at $(4k+1,0,0)$ and a sphere of radius $r$ at the origin. So you are intersecting two circles; you can solve for the intersection points, and they vary step-wise continuously with $r$. (I am guesing that this \"step-wise\" step is the issue for constructive logic...)",
"By the way, theorem 1.1 in Jonsson & Wästlund article is not constructive as far as I can tell. There is a problem with \"each sphere intersects one of the circles in exactly two points\".",
"Do we know that these things can't happen constructively?",
"Shooting from the hip, what happens when the real numbers are a countable union of countable sets? Should you require DC as well, as it ensures that most mathematics behaves normally, and at least ensures that there are more sets than Borel sets?"
] | 17 |
Science
| 1 |
63
|
mathoverflow
|
Enriched Categories: Ideals/Submodules and algebraic geometry
|
While working through Atiyah/MacDonald for my final exams I realized the following:
The category(poset) of ideals $I(A)$ of a commutative ring A is a closed symmetric monoidal category if endowed with the product of ideals
$$I\cdot J:=\langle\\{ab\mid a\in I, b\in J\\}\rangle$$
The internal Hom is given by the ideal quotient; let's denote it $[I, J]:=(J:I)=\lbrace a\in A\mid aI\subset J\rbrace$. We have
$$IJ\subset K \Leftrightarrow I\subset [J,K].$$
Furthermore the category(poset) of submodules $U(M)$ of an A-Module $M$ is enriched over the ideal category via
$$[U,V]:=\lbrace a\in A\mid aU\subset V\rbrace.$$
Where does this enrichment come from? More specifically: As in algebraic geometry we are dealing with the set of prime ideals ( wich is more or less the subcategory
$$\mathrm{Int^{op}}/A\subset\mathrm{CRing^{op}}/A$$
of ring-maps $A\to B$ with $B$ an integral domain), I'd like to see the category of Ideals as some "flattened" version of $\mathrm{CRing^{op}}/A$ by taking the kernel. Or more generally i'd like to see like to see it as a "flattened" version of the category of modules (by taking the annihilator?). So:
**Question:** Is it possible to build the enriched categories $I(A)$ and $U(M)$ out of $\mathrm{CRing^{op}}/A$ and $\mathrm{Mod}_A/M$ in a nice way? So: Can we for example write $I\cdot J$ down as a kernel of some $A\to B$? Or $\mathrm{Ann}(M)\cdot \mathrm{Ann}(N)$ just by using $N,M$ and constructions in/on $\mathrm{Mod}_A$?
|
https://mathoverflow.net/questions/76443/enriched-categories-ideals-submodules-and-algebraic-geometry
|
[
"ac.commutative-algebra",
"ag.algebraic-geometry",
"ct.category-theory",
"monoidal-categories",
"enriched-category-theory"
] | 48 | 2011-09-26T11:24:59 |
[
"\"The category(poset) of ideals $I(A)$ of a commutative ring A is a closed symmetric monoidal category if endowed with the product of ideals\" That's how I'll explain commutative algebra to my son!",
"Very interesting question. $I(A)$ is equivalent to the full subcategory of the comma-category which consists of regular epimorphisms $A \\to ?$. I've already asked here (mathoverflow.net/questions/69037/…) how we can describe the ideal product under this equivalence."
] | 2 |
Science
| 0 |
End of preview. Expand
in Data Studio
Dataset Card for UQ
Dataset Summary
UQ is a collection of 500 popular unsolved questions from StackExchange sites covering Science, Technology, Culture & Recreation, Life & Arts, and Business.
Dataset Structure
Data Instances
An example looks as follows:
{
'question_id': '5',
'site': 'crypto',
'title': 'Finding $x$ such that $g^x\\bmod p<p/k$?',
'body': "In a Schnorr group as used for DSA, of prime modulus $p$, prime order $q$, generator $g$ (with $p/g$ small), how can we efficiently exhibit an $x$ with $0<x<q$ such that $g^x\\bmod p<p/k$, for sizable $k$ but $k\\ll\\sqrt q$ ?\n\nI see that for small $k$, it is enough to try incremental values of $x$ until finding an $x$ that fits, with expected cost $O(k)$ modular multiplications in $\\mathbb Z_p^*$. Is there better?\n\nAssume $p$ is an $l$-bit prime; $q$ is an $n$-bit prime with $q$ dividing $p-1$; and $g=h^{(p-1)/q}$ for some (random?) $h$ in $\\mathbb Z_p^*$. For concrete values, assume $l\\approx1024$, $n\\approx160$, $k\\approx2^{64}$.\n\nUpdate: I'm expecting the problem to be hard, and thus that the more difficult problem of exhibiting $x$ with $g^x\\bmod p$ in a range of width $p/k$ must be hard.\n",
'link': 'https://crypto.stackexchange.com/questions/48503/finding-x-such-that-gx-bmod-pp-k',
'tags': ['discrete-logarithm', 'group-theory'],
'votes': 19,
'creation_date': datetime.datetime(2017, 6, 20, 8, 57, 11),
'comments': ['Can you please provide me with some real values of variables in question instead of me attempting with random values.', '@pintor: no, I have made no progress nor got more feedback than the above comments.', "@fgrieu, did you get any more updates on the problem? I'm also curious", "This seems to reduce to a discrete logarithm problem in the multi-target setting, with a potentially very high target number depending on $k$. For a $k\\approx \\sqrt{p}$ index calculus seems like the best choice. Once you have one solution, getting more is relatively fast. Unsure if there's something better.", '@SamuelNeves: yes; the only constraint on $g^x\\bmod p$ is that it is small (about $\\log_2(k)$-bit smaller than $p$ is).', 'Do you get to choose what the $g^x \\mod p$ value is?', '@puzzlepalace: thank you for finding a hole; plugged it.', 'Choose $x = 0$ ? Runs in $\\Theta(1)$ ;)'],
'comment_count': 8,
'category': 'Technology',
'diamond': 0,
}
Data Fields
The data fields are the same among all splits:
question_id
: unique question id (1-500)site
: name of the StackExchange sitetitle
: question titlebody
: question bodyvotes
: StackExchange vote count of the questioncreation_date
: date of question creation on StackExchangecomments
: StackExchange comments below the questioncomment_count
: Number of StackExchange commentscategory
: StackExchange category, one of{'Culture & Recreation', 'Science', 'Technology', 'Business', 'Life & Arts'}
diamond
: Whether this question is included in UQ Diamond Subset
Data Splits
Category | Site | # Questions |
---|---|---|
Technology | Stack Overflow | 21 |
Mathematica | 8 | |
Cryptography | 5 | |
Retrocomputing | 4 | |
Quantum Computing | 4 | |
Space Exploration | 3 | |
Unix & Linux | 2 | |
TeX - LaTeX | 2 | |
Code Golf | 1 | |
Signal Processing | 1 | |
Information Security | 1 | |
Subtotal | 52 | |
Science | Math Overflow | 200 |
Mathematics | 108 | |
Theoretical Computer Science | 41 | |
Computer Science | 12 | |
Cross Validated | 9 | |
Physics | 6 | |
Chemistry | 4 | |
History of Science and Mathematics | 3 | |
Linguistics | 2 | |
Proof Assistants | 2 | |
Artificial Intelligence | 1 | |
Economics | 1 | |
Bioacoustics | 1 | |
Biology | 1 | |
Medical Sciences | 1 | |
Matter Modeling | 1 | |
Operations Research | 1 | |
Computational Science | 1 | |
Subtotal | 395 | |
Culture & Recreation | Puzzling | 8 |
History | 5 | |
Mythology & Folklore | 2 | |
Role-playing Games | 1 | |
Subtotal | 16 | |
Life & Arts | Science Fiction & Fantasy | 35 |
Business | Quantitative Finance | 2 |
Total | - | 500 |
Additional Information
Licensing Information
The license is TODO.
Citation Information
TODO
- Downloads last month
- 1