Reconfiguration of Satisfying Assignments and Subset Sums: Easy to Find, Hard to Connect

Size: px
Start display at page:

Download "Reconfiguration of Satisfying Assignments and Subset Sums: Easy to Find, Hard to Connect"

Transcription

1 Reconfiguration of Satisfying Assignments and Subset Sums: Easy to Find, Hard to Connect x x in x in x in y z y in F F z in t F F z in t F F t 0 y out T y out T z out T Jean Cardinal, Erik Demaine, David Eppstein, Robert Hearn, Andrew Winslow

2 Reconfiguration: a SAT Example

3 Formula: (x1 x2) ( x1 x2 x3) ( x1 x2 x3) x1 = F x2 = F x3 = F (F F) ( F F F) ( F F F)

4 Formula: (x1 x2) ( x1 x2 x3) ( x1 x2 x3) x1 = F x2 = F x3 = F (F F) ( F F F) ( F F F) flip x3 x1 = F x2 = F x3 = T (F F) ( F F T) ( F F T)

5 Formula: (x1 x2) ( x1 x2 x3) ( x1 x2 x3) x1 = F x2 = F x3 = F (F F) ( F F F) ( F F F) flip x3 x1 = F x2 = F x3 = T (F F) ( F F T) ( F F T) flip x1 x1 = T x2 = F x3 = T (T F) ( T F T) ( T F T)

6 Formula: (x1 x2) ( x1 x2 x3) ( x1 x2 x3) x1 = F x2 = F x3 = F (F F) ( F F F) ( F F F) flip x3 x1 = F x2 = F x3 = T (F F) ( F F T) Keeping formula satisfied ( F F T) flip x1 x1 = T x2 = F x3 = T (T F) ( T F T) ( T F T)

7 Formula: (x1 x2) ( x1 x2 x3) ( x1 x2 x3) x1 = F x2 = F x3 = F (F F) ( F F F) ( F F F) x1 = T x2 = T x3 = F (T T) ( T T F) ( T F F)

8 Formula: (x1 x2) ( x1 x2 x3) ( x1 x2 x3) x1 = F x2 = F x3 = F (F F) ( F F F) ( F F F) Impossible x1 = T x2 = T x3 = F (T T) ( T T F) ( T F F)

9 Formula: (x1 x2) ( x1 x2 x3) ( x1 x2 x3) FTT TTT FFT TFT FTF TTF FFF TFF

10 Formula: (x1 x2) ( x1 x2 x3) ( x1 x2 x3) FTT TTT FFT TFT FTF TTF FFF TFF

11 Formula: (x1 x2) ( x1 x2 x3) ( x1 x2 x3) FFT TFT TTF FFF

12 Reconfiguration: a Subset Sum Example

13 Subset: {2, 3, 4, 5, 6, 7, 8} Target sum: 12 S = {2, 3, 7} = 12

14 Subset: {2, 3, 4, 5, 6, 7, 8} Target sum: 12 S = {2, 3, 7} = 12 swap 2, 3 with 5 S = {5, 7} = 12

15 Subset: {2, 3, 4, 5, 6, 7, 8} Target sum: 12 S = {2, 3, 7} = 12 swap 2, 3 with 5 S = {5, 7} = 12 swap 7 with 3, 4 S = {5, 3, 4} = 12

16 Subset: {2, 3, 4, 5, 6, 7, 8} Target sum: 12 S = {2, 3, 7} = 12 S = {5, 7} S = {5, 3, 4} swap 2, 3 with 5 swap 7 with 3, 4 Keeping sum = equal 12 to target sum = 12

17 Subset: {2, 3, 4, 5, 6, 7, 8} Target sum: 12 S = {2, 3, 7} = 12 S = {5, 7} S = {5, 3, 4} swap 2, 3 with 5 swap 7 with 3, 4 Keeping sum = equal 12 to target sum = 12 S = {2, 3, 7} = 12 S = {2, 4, 6} = 12

18 Subset: {2, 3, 4, 5, 6, 7, 8} Target sum: 12 S = {2, 3, 7} = 12 S = {5, 7} S = {5, 3, 4} swap 2, 3 with 5 swap 7 with 3, 4 Keeping sum = equal 12 to target sum = 12 S = {2, 3, 7} = 12 Impossible S = {2, 4, 6} = 12

19 3SAT Reconfiguration Problem

20 3SAT Reconfiguration Problem Input: An instance of 3SAT Φ. A satisfying assignment A of Φ. A satisfying assignment B of Φ. Output: Whether A can be reconfigured into B.

21 SAT Reconfiguration Problem Input: 3SAT formula (x1 x2) ( x1 x2 x3) ( x1 x2 x3) x1 = F, x2 = F, x3 = F. x1 = T, x2 = F, x3 = T. Output: Yes (can be reconfigured). Input: 3SAT formula (x1 x2) ( x1 x2 x3) ( x1 x2 x3) x1 = F, x2 = F, x3 = F. x1 = T, x2 = T, x3 = F. Output: No (cannot be reconfigured).

22 SAT Reconfiguration Problem Theorem: the 3SAT reconfiguration problem is PSPACE-complete. problems solvable in n O(1) space P NP PSPACE Corollary: some reconfigurations require exponentially many variable flips.

23 SAT Variants

24 1-in-3SAT One-in-three (1-in-3): satisfying assignment if 1 (but not 2 or 3) true literals per clause. (x1 x3 x4) (x2 x2 x4) (x1 x2 x4) x1 = F x2 = F x3 = F x4 = T (F F T) satisfied (F F T) (F F T) satisfied satisfied x1 = T x2 = F x3 = F x4 = T (T F T) not satisfied (F F T) (T F T) satisfied not satisfied

25 SAT Reconfiguration Problems Theorem: the 2SAT reconfiguration problem is in P. [Gopalan et al. 2009] Theorem: the 1-in-3SAT reconfiguration problem is in P (always No ). Theorem: the 3SAT reconfiguration problem is PSPACE-complete.

26 SAT Reconfiguration Problems Theorem: the 2SAT reconfiguration problem is in P. [Gopalan et al. 2009] Theorem: the 1-in-3SAT reconfiguration problem is in P (always No ). Theorem: the 3SAT reconfiguration problem is PSPACE-complete. Is there a SAT variant whose: Solving problem ( Does a satisfying assignment exist? ) is in P. Reconfiguration problem is PSPACE-complete.

27 SAT Reconfiguration Problems Theorem: the 2SAT reconfiguration problem is in P. [Gopalan et al. 2009] Theorem: the 1-in-3SAT reconfiguration problem is in P (always No ). Theorem: the 3SAT reconfiguration problem is PSPACE-complete. Is there a SAT variant whose: Solving problem ( Does a satisfying assignment exist? ) is in P. Reconfiguration problem is PSPACE-complete. Yes, monotone planar NAE 3SAT.

28 Monotone Planar NAE 3SAT Monotone: no negated variables. Planar: graph of variables and clauses is planar. Not-All-Equal (NAE): satisfying assignment if 1 or 2 (but not 3) true literals per clause.

29 Monotone Planar NAE 3SAT (x1 x2 x4) (x2 x2 x4) (x1 x2 x3)

30 Monotone Planar NAE 3SAT (x1 x2 x4) (x2 x2 x4) (x1 x2 x3) c1 c2 c3 x1 x2 c1 x3 c2 x4 c3

31 Monotone Planar NAE 3SAT (x1 x2 x4) (x2 x2 x4) (x1 x2 x3) x1 = T x2 = F x3 = T x4 = T (T F T) satisfied (F F T) (T F T) satisfied satisfied x1 = T x2 = T x3 = T x4 = F (T T F) satisfied (T T F) (T T T) satisfied not satisfied

32 Monotone Planar NAE 3SAT Monotone planar NAE 3SAT solving is in P [Moret 1988] Theorem: monotone planar NAE 3SAT reconfiguration is PSPACE-complete. Reduction is from non-deterministic constraint logic (NCL)

33 Non-Deterministic Constraint Logic (NCL) weight 1 weight 2 Each node needs incoming weight 2

34 Non-Deterministic Constraint Logic (NCL) weight 1 weight 2 Each node needs incoming weight 2

35 Non-Deterministic Constraint Logic (NCL) weight 1 weight 2 Each node needs incoming weight 2

36 Non-Deterministic Constraint Logic (NCL) weight 1 weight 2 Each node needs incoming weight 2 NCL reconfiguration is PSPACE-complete, even for: Planar, degree-3 graphs. Only two types of nodes: Proved by [DH 2005]

37 3SAT Reconfiguration is PSPACE-hard Create a variable for orientation of each edge. Create a clause set for each node. x x (x y z) (x y) (x z) y z y z x4 ( x1 x2 x5) x1 x2 x3 x5 x6 (x1 x2) (x1 x4) (x3 x2) (x3 x6) (x5 x4) (x5 x6)

38 Theorem: monotone planar NAE 3SAT reconfiguration is PSPACE-complete. Reduction is from non-deterministic constraint logic (NCL). x (x F c) (a b c) (a y F) (b z F) y z x (x y F) (x z F) y z

39 Other easy-to-solve, hard-to-connect problems

40 Easy-to-Solve Hard-to-Connect Problems Reconfiguring planar graph 4-colorings. [Bonsma, Cerceda 2009] Reconfiguring shortest paths. [Bonsma 2013] s t s t s t

41 Unary Input Subset Sum Two options for subset sum reconfiguration: 1. Swap x, y and x+y, keep target sum. 2. Add/remove x, keep sum in target range. Option 1 Option 2 S = {2, 3, 7} S = {2, 3, 7} swap 2, 3 with 5 remove 2 S = {5, 7} S = {3, 7} swap 7 with 3, 4 add 4 S = {5, 3, 4} S = {3, 4, 7}

42 Unary Input Subset Sum Two options for subset sum reconfiguration: 1. Swap x, y and x+y, keep target sum. 2. Add/remove x, keep sum in target range. Option 1 Option 2 S = {2, 3, 7} S = {5, 7} swap 2, 3 with 5 S = {2, 3, 7} remove 2 NP-hard [Ito, S Demaine = {3, 7} 2014] swap 7 with 3, 4 add 4 S = {5, 3, 4} S = {3, 4, 7}

43 Unary Input Subset Sum Two options for subset sum reconfiguration: 1. Swap x, y and x+y, keep target sum. 2. Add/remove x, keep sum in target range. Option 1 Option 2 S = {2, 3, 7} swap 2, 3 with 5 PSPACE-complete S = (This {5, 7} work) S = {2, 3, 7} remove 2 NP-hard [Ito, S Demaine = {3, 7} 2014] swap 7 with 3, 4 add 4 S = {5, 3, 4} S = {3, 4, 7}

44 Subset Sum Reconfiguration Theorem: subset sum reconfiguration via swapping x, y and x+y is strongly PSPACE-complete. unary input Reduction is from token sliding: reconfiguring independent sets via swapping adjacent vertices. Reconfiguration problem is PSPACE-complete, even for 3-regular graphs [DH 2005]

45 Conclusion Two new easy-to-solve, hard-to-connect problems: monotone planar NAE 3SAT subset sum via swapping x, y and x+y. Open: PSPACE-hardness of subset sum via add/remove x? Meta-theorems on reconfiguration for problems in P? Dichotomy theorem for SAT [Gopalan et al. 2009]

46 Reconfiguration of Satisfying Assignments and Subset Sums: Easy to Find, Hard to Connect x x in x in x in y z y in F F z in t F F z in t F F t 0 y out T y out T z out T Jean Cardinal, Erik Demaine, David Eppstein, Robert Hearn, Andrew Winslow

Another Variant of 3sat. 3sat. 3sat Is NP-Complete. The Proof (concluded)

Another Variant of 3sat. 3sat. 3sat Is NP-Complete. The Proof (concluded) 3sat k-sat, where k Z +, is the special case of sat. The formula is in CNF and all clauses have exactly k literals (repetition of literals is allowed). For example, (x 1 x 2 x 3 ) (x 1 x 1 x 2 ) (x 1 x

More information

monotone circuit value

monotone circuit value monotone circuit value A monotone boolean circuit s output cannot change from true to false when one input changes from false to true. Monotone boolean circuits are hence less expressive than general circuits.

More information

Levin Reduction and Parsimonious Reductions

Levin Reduction and Parsimonious Reductions Levin Reduction and Parsimonious Reductions The reduction R in Cook s theorem (p. 266) is such that Each satisfying truth assignment for circuit R(x) corresponds to an accepting computation path for M(x).

More information

Another Variant of 3sat

Another Variant of 3sat Another Variant of 3sat Proposition 32 3sat is NP-complete for expressions in which each variable is restricted to appear at most three times, and each literal at most twice. (3sat here requires only that

More information

Practical SAT Solving

Practical SAT Solving Practical SAT Solving Lecture 1 Carsten Sinz, Tomáš Balyo April 18, 2016 NSTITUTE FOR THEORETICAL COMPUTER SCIENCE KIT University of the State of Baden-Wuerttemberg and National Laboratory of the Helmholtz

More information

Cook s Theorem: the First NP-Complete Problem

Cook s Theorem: the First NP-Complete Problem Cook s Theorem: the First NP-Complete Problem Theorem 37 (Cook (1971)) sat is NP-complete. sat NP (p. 113). circuit sat reduces to sat (p. 284). Now we only need to show that all languages in NP can be

More information

You Have an NP-Complete Problem (for Your Thesis)

You Have an NP-Complete Problem (for Your Thesis) You Have an NP-Complete Problem (for Your Thesis) From Propositions 27 (p. 242) and Proposition 30 (p. 245), it is the least likely to be in P. Your options are: Approximations. Special cases. Average

More information

Lecture 2: The Simple Story of 2-SAT

Lecture 2: The Simple Story of 2-SAT 0510-7410: Topics in Algorithms - Random Satisfiability March 04, 2014 Lecture 2: The Simple Story of 2-SAT Lecturer: Benny Applebaum Scribe(s): Mor Baruch 1 Lecture Outline In this talk we will show that

More information

The Traveling Salesman Problem. Time Complexity under Nondeterminism. A Nondeterministic Algorithm for tsp (d)

The Traveling Salesman Problem. Time Complexity under Nondeterminism. A Nondeterministic Algorithm for tsp (d) The Traveling Salesman Problem We are given n cities 1, 2,..., n and integer distances d ij between any two cities i and j. Assume d ij = d ji for convenience. The traveling salesman problem (tsp) asks

More information

Essays on Some Combinatorial Optimization Problems with Interval Data

Essays on Some Combinatorial Optimization Problems with Interval Data Essays on Some Combinatorial Optimization Problems with Interval Data a thesis submitted to the department of industrial engineering and the institute of engineering and sciences of bilkent university

More information

CMPSCI 311: Introduction to Algorithms Second Midterm Practice Exam SOLUTIONS

CMPSCI 311: Introduction to Algorithms Second Midterm Practice Exam SOLUTIONS CMPSCI 311: Introduction to Algorithms Second Midterm Practice Exam SOLUTIONS November 17, 2016. Name: ID: Instructions: Answer the questions directly on the exam pages. Show all your work for each question.

More information

SAT and DPLL. Introduction. Preliminaries. Normal forms DPLL. Complexity. Espen H. Lian. DPLL Implementation. Bibliography.

SAT and DPLL. Introduction. Preliminaries. Normal forms DPLL. Complexity. Espen H. Lian. DPLL Implementation. Bibliography. SAT and Espen H. Lian Ifi, UiO Implementation May 4, 2010 Espen H. Lian (Ifi, UiO) SAT and May 4, 2010 1 / 59 Espen H. Lian (Ifi, UiO) SAT and May 4, 2010 2 / 59 Introduction Introduction SAT is the problem

More information

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Hao Zheng Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 Email: zheng@cse.usf.edu Phone: (813)974-4757 Fax: (813)974-5456 Hao Zheng

More information

SAT and DPLL. Espen H. Lian. May 4, Ifi, UiO. Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, / 59

SAT and DPLL. Espen H. Lian. May 4, Ifi, UiO. Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, / 59 SAT and DPLL Espen H. Lian Ifi, UiO May 4, 2010 Espen H. Lian (Ifi, UiO) SAT and DPLL May 4, 2010 1 / 59 Normal forms Normal forms DPLL Complexity DPLL Implementation Bibliography Espen H. Lian (Ifi, UiO)

More information

Binary Decision Diagrams

Binary Decision Diagrams Binary Decision Diagrams Hao Zheng Department of Computer Science and Engineering University of South Florida Tampa, FL 33620 Email: zheng@cse.usf.edu Phone: (813)974-4757 Fax: (813)974-5456 Hao Zheng

More information

Handout 4: Deterministic Systems and the Shortest Path Problem

Handout 4: Deterministic Systems and the Shortest Path Problem SEEM 3470: Dynamic Optimization and Applications 2013 14 Second Term Handout 4: Deterministic Systems and the Shortest Path Problem Instructor: Shiqian Ma January 27, 2014 Suggested Reading: Bertsekas

More information

Maximizing the Spread of Influence through a Social Network

Maximizing the Spread of Influence through a Social Network Maximizing the Spread of Influence through a Social Network Han Wang Department of omputer Science ETH Zürich Problem Example 1: Spread of Rumor 2012 = end! A D E B F Problem Example 2: Viral Marketing

More information

Chapter 1. Introduction: Some Representative Problems. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved.

Chapter 1. Introduction: Some Representative Problems. Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. Chapter 1 Introduction: Some Representative Problems Slides by Kevin Wayne. Copyright 2005 Pearson-Addison Wesley. All rights reserved. Understanding the Solution Initialize each person to be free. while

More information

Version A. Problem 1. Let X be the continuous random variable defined by the following pdf: 1 x/2 when 0 x 2, f(x) = 0 otherwise.

Version A. Problem 1. Let X be the continuous random variable defined by the following pdf: 1 x/2 when 0 x 2, f(x) = 0 otherwise. Math 224 Q Exam 3A Fall 217 Tues Dec 12 Version A Problem 1. Let X be the continuous random variable defined by the following pdf: { 1 x/2 when x 2, f(x) otherwise. (a) Compute the mean µ E[X]. E[X] x

More information

Tableau-based Decision Procedures for Hybrid Logic

Tableau-based Decision Procedures for Hybrid Logic Tableau-based Decision Procedures for Hybrid Logic Gert Smolka Saarland University Joint work with Mark Kaminski HyLo 2010 Edinburgh, July 10, 2010 Gert Smolka (Saarland University) Decision Procedures

More information

Discrete Mathematics for CS Spring 2008 David Wagner Final Exam

Discrete Mathematics for CS Spring 2008 David Wagner Final Exam CS 70 Discrete Mathematics for CS Spring 2008 David Wagner Final Exam PRINT your name:, (last) SIGN your name: (first) PRINT your Unix account login: Your section time (e.g., Tue 3pm): Name of the person

More information

Lecture 23: April 10

Lecture 23: April 10 CS271 Randomness & Computation Spring 2018 Instructor: Alistair Sinclair Lecture 23: April 10 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They

More information

The Stackelberg Minimum Spanning Tree Game

The Stackelberg Minimum Spanning Tree Game The Stackelberg Minimum Spanning Tree Game J. Cardinal, E. Demaine, S. Fiorini, G. Joret, S. Langerman, I. Newman, O. Weimann, The Stackelberg Minimum Spanning Tree Game, WADS 07 Stackelberg Game 2 players:

More information

Bidding Languages. Chapter Introduction. Noam Nisan

Bidding Languages. Chapter Introduction. Noam Nisan Chapter 1 Bidding Languages Noam Nisan 1.1 Introduction This chapter concerns the issue of the representation of bids in combinatorial auctions. Theoretically speaking, bids are simply abstract elements

More information

SMT and POR beat Counter Abstraction

SMT and POR beat Counter Abstraction SMT and POR beat Counter Abstraction Parameterized Model Checking of Threshold-Based Distributed Algorithms Igor Konnov Helmut Veith Josef Widder Alpine Verification Meeting May 4-6, 2015 Igor Konnov 2/64

More information

A Theory of Loss-leaders: Making Money by Pricing Below Cost

A Theory of Loss-leaders: Making Money by Pricing Below Cost A Theory of Loss-leaders: Making Money by Pricing Below Cost Maria-Florina Balcan Avrim Blum T-H. Hubert Chan MohammadTaghi Hajiaghayi ABSTRACT We consider the problem of assigning prices to goods of fixed

More information

Strong Subgraph k-connectivity of Digraphs

Strong Subgraph k-connectivity of Digraphs Strong Subgraph k-connectivity of Digraphs Yuefang Sun joint work with Gregory Gutin, Anders Yeo, Xiaoyan Zhang yuefangsun2013@163.com Department of Mathematics Shaoxing University, China July 2018, Zhuhai

More information

Submodular Minimisation using Graph Cuts

Submodular Minimisation using Graph Cuts Submodular Minimisation using Graph Cuts Pankaj Pansari 18 April, 2016 1 Overview Graph construction to minimise special class of submodular functions For this special class, submodular minimisation translates

More information

CS599: Algorithm Design in Strategic Settings Fall 2012 Lecture 6: Prior-Free Single-Parameter Mechanism Design (Continued)

CS599: Algorithm Design in Strategic Settings Fall 2012 Lecture 6: Prior-Free Single-Parameter Mechanism Design (Continued) CS599: Algorithm Design in Strategic Settings Fall 2012 Lecture 6: Prior-Free Single-Parameter Mechanism Design (Continued) Instructor: Shaddin Dughmi Administrivia Homework 1 due today. Homework 2 out

More information

The Price of Neutrality for the Ranked Pairs Method

The Price of Neutrality for the Ranked Pairs Method The Price of Neutrality for the Ranked Pairs Method Markus Brill Felix Fischer Technische Universität München University of Cambridge 26th AAAI Conference Social Choice Finite set A of alternatives Finite

More information

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC

TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC TABLEAU-BASED DECISION PROCEDURES FOR HYBRID LOGIC THOMAS BOLANDER AND TORBEN BRAÜNER Abstract. Hybrid logics are a principled generalization of both modal logics and description logics. It is well-known

More information

Complexity of Iterated Dominance and a New Definition of Eliminability

Complexity of Iterated Dominance and a New Definition of Eliminability Complexity of Iterated Dominance and a New Definition of Eliminability Vincent Conitzer and Tuomas Sandholm Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213 {conitzer, sandholm}@cs.cmu.edu

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Department of Computer Science, University of Toronto, shlomoh,szeider@cs.toronto.edu Abstract.

More information

Yao s Minimax Principle

Yao s Minimax Principle Complexity of algorithms The complexity of an algorithm is usually measured with respect to the size of the input, where size may for example refer to the length of a binary word describing the input,

More information

A survey on the generalized connectivity of graphs arxiv: v2 [math.co] 11 Sep 2012

A survey on the generalized connectivity of graphs arxiv: v2 [math.co] 11 Sep 2012 A survey on the generalized connectivity of graphs arxiv:107.1838v [math.co] 11 Sep 01 Xueliang Li, Yaping Mao Center for Combinatorics and LPMC-TJKLC Nankai University, Tianjin 300071, P.R. China E-mails:

More information

Black-Box Testing Techniques II

Black-Box Testing Techniques II Black-Box Testing Techniques II Software Testing and Verification Lecture 5 Prepared by Stephen M. Thebaut, Ph.D. University of Florida Cause-Effect Analysis Cause-Effect Analysis is a combinatorial approach

More information

IEOR E4004: Introduction to OR: Deterministic Models

IEOR E4004: Introduction to OR: Deterministic Models IEOR E4004: Introduction to OR: Deterministic Models 1 Dynamic Programming Following is a summary of the problems we discussed in class. (We do not include the discussion on the container problem or the

More information

Sublinear Time Algorithms Oct 19, Lecture 1

Sublinear Time Algorithms Oct 19, Lecture 1 0368.416701 Sublinear Time Algorithms Oct 19, 2009 Lecturer: Ronitt Rubinfeld Lecture 1 Scribe: Daniel Shahaf 1 Sublinear-time algorithms: motivation Twenty years ago, there was practically no investigation

More information

MAT385 Final (Spring 2009): Boolean Algebras, FSM, and old stuff

MAT385 Final (Spring 2009): Boolean Algebras, FSM, and old stuff MAT385 Final (Spring 2009): Boolean Algebras, FSM, and old stuff Name: Directions: Problems are equally weighted. Show your work! Answers without justification will likely result in few points. Your written

More information

Notes on Natural Logic

Notes on Natural Logic Notes on Natural Logic Notes for PHIL370 Eric Pacuit November 16, 2012 1 Preliminaries: Trees A tree is a structure T = (T, E), where T is a nonempty set whose elements are called nodes and E is a relation

More information

On Allocations with Negative Externalities

On Allocations with Negative Externalities On Allocations with Negative Externalities Sayan Bhattacharya, Janardhan Kulkarni, Kamesh Munagala, and Xiaoming Xu Department of Computer Science Duke University Durham NC 27708-0129. {bsayan,kulkarni,kamesh,xiaoming}@cs.duke.edu

More information

Lecture 19: March 20

Lecture 19: March 20 CS71 Randomness & Computation Spring 018 Instructor: Alistair Sinclair Lecture 19: March 0 Disclaimer: These notes have not been subjected to the usual scrutiny accorded to formal publications. They may

More information

The Probabilistic Method - Probabilistic Techniques. Lecture 7: Martingales

The Probabilistic Method - Probabilistic Techniques. Lecture 7: Martingales The Probabilistic Method - Probabilistic Techniques Lecture 7: Martingales Sotiris Nikoletseas Associate Professor Computer Engineering and Informatics Department 2015-2016 Sotiris Nikoletseas, Associate

More information

MS-E2114 Investment Science Lecture 4: Applied interest rate analysis

MS-E2114 Investment Science Lecture 4: Applied interest rate analysis MS-E2114 Investment Science Lecture 4: Applied interest rate analysis A. Salo, T. Seeve Systems Analysis Laboratory Department of System Analysis and Mathematics Aalto University, School of Science Overview

More information

CTL Model Checking. Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking!

CTL Model Checking. Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking! CMSC 630 March 13, 2007 1 CTL Model Checking Goal Method for proving M sat σ, where M is a Kripke structure and σ is a CTL formula. Approach Model checking! Mathematically, M is a model of σ if s I = M

More information

White-Box Testing Techniques I

White-Box Testing Techniques I White-Box Testing Techniques I Software Testing and Verification Lecture 7 Prepared by Stephen M. Thebaut, Ph.D. University of Florida Definition of White-Box Testing Testing based on analysis of internal

More information

Algorithms for random k-sat and k-colourings of a random graph

Algorithms for random k-sat and k-colourings of a random graph Algorithms for random k-sat and k-colourings of a random graph Dept of Computer Science University of Toronto Hard and Easy Distributions of SAT Problems. Mitchell, Selman, Levesque 1992 3-SAT: (x 1 x

More information

Problem Set 2: Answers

Problem Set 2: Answers Economics 623 J.R.Walker Page 1 Problem Set 2: Answers The problem set came from Michael A. Trick, Senior Associate Dean, Education and Professor Tepper School of Business, Carnegie Mellon University.

More information

0/1 knapsack problem knapsack problem

0/1 knapsack problem knapsack problem 1 (1) 0/1 knapsack problem. A thief robbing a safe finds it filled with N types of items of varying size and value, but has only a small knapsack of capacity M to use to carry the goods. More precisely,

More information

Finding Equilibria in Games of No Chance

Finding Equilibria in Games of No Chance Finding Equilibria in Games of No Chance Kristoffer Arnsfelt Hansen, Peter Bro Miltersen, and Troels Bjerre Sørensen Department of Computer Science, University of Aarhus, Denmark {arnsfelt,bromille,trold}@daimi.au.dk

More information

White-Box Testing Techniques I

White-Box Testing Techniques I White-Box Testing Techniques I Software Testing and Verification Lecture 7 Prepared by Stephen M. Thebaut, Ph.D. University of Florida Definition of White-Box Testing Testing based on analysis of internal

More information

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem

Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Collinear Triple Hypergraphs and the Finite Plane Kakeya Problem Joshua Cooper August 14, 006 Abstract We show that the problem of counting collinear points in a permutation (previously considered by the

More information

EE365: Risk Averse Control

EE365: Risk Averse Control EE365: Risk Averse Control Risk averse optimization Exponential risk aversion Risk averse control 1 Outline Risk averse optimization Exponential risk aversion Risk averse control Risk averse optimization

More information

Reporting Financial Information

Reporting Financial Information Learning Objectives LO1 Prepare an income statement for a service business. LO2 Calculate and analyze financial ratios using income statement amounts. Lesson 7-1 Reporting Financial Information LO1 The

More information

PARELLIZATION OF DIJKSTRA S ALGORITHM: COMPARISON OF VARIOUS PRIORITY QUEUES

PARELLIZATION OF DIJKSTRA S ALGORITHM: COMPARISON OF VARIOUS PRIORITY QUEUES PARELLIZATION OF DIJKSTRA S ALGORITHM: COMPARISON OF VARIOUS PRIORITY QUEUES WIKTOR JAKUBIUK, KESHAV PURANMALKA 1. Introduction Dijkstra s algorithm solves the single-sourced shorest path problem on a

More information

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions

CSE 21 Winter 2016 Homework 6 Due: Wednesday, May 11, 2016 at 11:59pm. Instructions CSE 1 Winter 016 Homework 6 Due: Wednesday, May 11, 016 at 11:59pm Instructions Homework should be done in groups of one to three people. You are free to change group members at any time throughout the

More information

Multiagent Systems. Multiagent Systems General setting Division of Resources Task Allocation Resource Allocation. 13.

Multiagent Systems. Multiagent Systems General setting Division of Resources Task Allocation Resource Allocation. 13. Multiagent Systems July 16, 2014 13. Bargaining Multiagent Systems 13. Bargaining B. Nebel, C. Becker-Asano, S. Wölfl Albert-Ludwigs-Universität Freiburg July 16, 2014 13.1 General setting 13.2 13.3 13.4

More information

Bidding Languages. Noam Nissan. October 18, Shahram Esmaeilsabzali. Presenter:

Bidding Languages. Noam Nissan. October 18, Shahram Esmaeilsabzali. Presenter: Bidding Languages Noam Nissan October 18, 2004 Presenter: Shahram Esmaeilsabzali Outline 1 Outline The Problem 1 Outline The Problem Some Bidding Languages(OR, XOR, and etc) 1 Outline The Problem Some

More information

Lecture 10: The knapsack problem

Lecture 10: The knapsack problem Optimization Methods in Finance (EPFL, Fall 2010) Lecture 10: The knapsack problem 24.11.2010 Lecturer: Prof. Friedrich Eisenbrand Scribe: Anu Harjula The knapsack problem The Knapsack problem is a problem

More information

The Complexity of Simple and Optimal Deterministic Mechanisms for an Additive Buyer. Xi Chen, George Matikas, Dimitris Paparas, Mihalis Yannakakis

The Complexity of Simple and Optimal Deterministic Mechanisms for an Additive Buyer. Xi Chen, George Matikas, Dimitris Paparas, Mihalis Yannakakis The Complexity of Simple and Optimal Deterministic Mechanisms for an Additive Buyer Xi Chen, George Matikas, Dimitris Paparas, Mihalis Yannakakis Seller has n items for sale The Set-up Seller has n items

More information

Single-Parameter Mechanisms

Single-Parameter Mechanisms Algorithmic Game Theory, Summer 25 Single-Parameter Mechanisms Lecture 9 (6 pages) Instructor: Xiaohui Bei In the previous lecture, we learned basic concepts about mechanism design. The goal in this area

More information

THE LYING ORACLE GAME WITH A BIASED COIN

THE LYING ORACLE GAME WITH A BIASED COIN Applied Probability Trust (13 July 2009 THE LYING ORACLE GAME WITH A BIASED COIN ROBB KOETHER, Hampden-Sydney College MARCUS PENDERGRASS, Hampden-Sydney College JOHN OSOINACH, Millsaps College Abstract

More information

On the Optimality of a Family of Binary Trees Techical Report TR

On the Optimality of a Family of Binary Trees Techical Report TR On the Optimality of a Family of Binary Trees Techical Report TR-011101-1 Dana Vrajitoru and William Knight Indiana University South Bend Department of Computer and Information Sciences Abstract In this

More information

COSC 311: ALGORITHMS HW4: NETWORK FLOW

COSC 311: ALGORITHMS HW4: NETWORK FLOW COSC 311: ALGORITHMS HW4: NETWORK FLOW Solutions 1 Warmup 1) Finding max flows and min cuts. Here is a graph (the numbers in boxes represent the amount of flow along an edge, and the unadorned numbers

More information

A. B. C. D. Graphing Quadratics Practice Quiz. Question 1. Select the graph of the quadratic function. f (x ) = 2x 2. 2/26/2018 Print Assignment

A. B. C. D. Graphing Quadratics Practice Quiz. Question 1. Select the graph of the quadratic function. f (x ) = 2x 2. 2/26/2018 Print Assignment Question 1. Select the graph of the quadratic function. f (x ) = 2x 2 C. D. https://my.hrw.com/wwtb2/viewer/printall_vs23.html?umk5tfdnj31tcldd29v4nnzkclztk3w8q6wgvr2629ca0a5fsymn1tfv8j1vs4qotwclvofjr8uon4cldd29v4

More information

Advanced Operations Research Prof. G. Srinivasan Dept of Management Studies Indian Institute of Technology, Madras

Advanced Operations Research Prof. G. Srinivasan Dept of Management Studies Indian Institute of Technology, Madras Advanced Operations Research Prof. G. Srinivasan Dept of Management Studies Indian Institute of Technology, Madras Lecture 23 Minimum Cost Flow Problem In this lecture, we will discuss the minimum cost

More information

Final Exam Economic 210A, Fall 2009 Answer any 7 questions.

Final Exam Economic 210A, Fall 2009 Answer any 7 questions. Final Exam Economic 10A, Fall 009 Answer any 7 questions For a person with income m, let us define the compensating variation of a price change from price vector p to price vector p to be the amount of

More information

CS599: Algorithm Design in Strategic Settings Fall 2012 Lecture 4: Prior-Free Single-Parameter Mechanism Design. Instructor: Shaddin Dughmi

CS599: Algorithm Design in Strategic Settings Fall 2012 Lecture 4: Prior-Free Single-Parameter Mechanism Design. Instructor: Shaddin Dughmi CS599: Algorithm Design in Strategic Settings Fall 2012 Lecture 4: Prior-Free Single-Parameter Mechanism Design Instructor: Shaddin Dughmi Administrivia HW out, due Friday 10/5 Very hard (I think) Discuss

More information

Optimal Satisficing Tree Searches

Optimal Satisficing Tree Searches Optimal Satisficing Tree Searches Dan Geiger and Jeffrey A. Barnett Northrop Research and Technology Center One Research Park Palos Verdes, CA 90274 Abstract We provide an algorithm that finds optimal

More information

A DNC function that computes no effectively bi-immune set

A DNC function that computes no effectively bi-immune set A DNC function that computes no effectively bi-immune set Achilles A. Beros Laboratoire d Informatique de Nantes Atlantique, Université de Nantes July 5, 204 Standard Definitions Definition f is diagonally

More information

Course Information and Introduction

Course Information and Introduction August 20, 2015 Course Information 1 Instructor : Email : arash.rafiey@indstate.edu Office : Root Hall A-127 Office Hours : Tuesdays 12:00 pm to 1:00 pm in my office (A-127) 2 Course Webpage : http://cs.indstate.edu/

More information

UGM Crash Course: Conditional Inference and Cutset Conditioning

UGM Crash Course: Conditional Inference and Cutset Conditioning UGM Crash Course: Conditional Inference and Cutset Conditioning Julie Nutini August 19 th, 2015 1 / 25 Conditional UGM 2 / 25 We know the value of one or more random variables i.e., we have observations,

More information

Stochastic Calculus, Application of Real Analysis in Finance

Stochastic Calculus, Application of Real Analysis in Finance , Application of Real Analysis in Finance Workshop for Young Mathematicians in Korea Seungkyu Lee Pohang University of Science and Technology August 4th, 2010 Contents 1 BINOMIAL ASSET PRICING MODEL Contents

More information

Trade reduction vs. multi-stage: A comparison of double auction design approaches

Trade reduction vs. multi-stage: A comparison of double auction design approaches European Journal of Operational Research 180 (2007) 677 691 Decision Support Trade reduction vs. multi-stage: A comparison of double auction design approaches Leon Yang Chu a,b, Zuo-Jun Max Shen b, * a

More information

THREE RESULTS OF COMBINATORIAL GAME TOADS AND FROGS. 1. Introduction:

THREE RESULTS OF COMBINATORIAL GAME TOADS AND FROGS. 1. Introduction: THREE RESULTS OF COMBINATORIAL GAME TOADS AND FROGS THOTSAPORN AEK THANATIPANONDA Abstract. We prove values of the starting positions T a F b, T a F b and T a FFF. The last two positions were Erickson

More information

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable

Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Computing Unsatisfiable k-sat Instances with Few Occurrences per Variable Shlomo Hoory and Stefan Szeider Abstract (k, s)-sat is the propositional satisfiability problem restricted to instances where each

More information

Lecture 22. Survey Sampling: an Overview

Lecture 22. Survey Sampling: an Overview Math 408 - Mathematical Statistics Lecture 22. Survey Sampling: an Overview March 25, 2013 Konstantin Zuev (USC) Math 408, Lecture 22 March 25, 2013 1 / 16 Survey Sampling: What and Why In surveys sampling

More information

What is Greedy Approach? Control abstraction for Greedy Method. Three important activities

What is Greedy Approach? Control abstraction for Greedy Method. Three important activities 0-0-07 What is Greedy Approach? Suppose that a problem can be solved by a sequence of decisions. The greedy method has that each decision is locally optimal. These locally optimal solutions will finally

More information

On Polynomial-Time Preference Elicitation with Value Queries

On Polynomial-Time Preference Elicitation with Value Queries On Polynomial-Time Preference Elicitation with Value Queries Martin A. Zinkevich Carnegie Mellon University 5000 Forbes Avenue Pittsburgh, PA 15213 maz@cs.cmu.edu Avrim Blum Carnegie Mellon University

More information

COS 445 Final. Due online Monday, May 21st at 11:59 pm. Please upload each problem as a separate file via MTA.

COS 445 Final. Due online Monday, May 21st at 11:59 pm. Please upload each problem as a separate file via MTA. COS 445 Final Due online Monday, May 21st at 11:59 pm All problems on this final are no collaboration problems. You may not discuss any aspect of any problems with anyone except for the course staff. You

More information

CSV 886 Social Economic and Information Networks. Lecture 4: Auctions, Matching Markets. R Ravi

CSV 886 Social Economic and Information Networks. Lecture 4: Auctions, Matching Markets. R Ravi CSV 886 Social Economic and Information Networks Lecture 4: Auctions, Matching Markets R Ravi ravi+iitd@andrew.cmu.edu Schedule 2 Auctions 3 Simple Models of Trade Decentralized Buyers and sellers have

More information

PRIORITY QUEUES. binary heaps d-ary heaps binomial heaps Fibonacci heaps. Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley

PRIORITY QUEUES. binary heaps d-ary heaps binomial heaps Fibonacci heaps. Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley PRIORITY QUEUES binary heaps d-ary heaps binomial heaps Fibonacci heaps Lecture slides by Kevin Wayne Copyright 2005 Pearson-Addison Wesley http://www.cs.princeton.edu/~wayne/kleinberg-tardos Last updated

More information

Program Evaluation and Review Techniques (PERT) Critical Path Method (CPM):

Program Evaluation and Review Techniques (PERT) Critical Path Method (CPM): Program Evaluation and Review Techniques (PERT) Critical Path Method (CPM): A Rough Guide by Andrew Scouller PROJECT MANAGEMENT Project Managers can use project management software to keep track of the

More information

Integer Solution to a Graph-based Linear Programming Problem

Integer Solution to a Graph-based Linear Programming Problem Integer Solution to a Graph-based Linear Programming Problem E. Bozorgzadeh S. Ghiasi A. Takahashi M. Sarrafzadeh Computer Science Department University of California, Los Angeles (UCLA) Los Angeles, CA

More information

Attempt QUESTIONS 1 and 2, and THREE other questions. Do not turn over until you are told to do so by the Invigilator.

Attempt QUESTIONS 1 and 2, and THREE other questions. Do not turn over until you are told to do so by the Invigilator. UNIVERSITY OF EAST ANGLIA School of Mathematics Main Series UG Examination 2016 17 SET THEORY MTHE6003B Time allowed: 3 Hours Attempt QUESTIONS 1 and 2, and THREE other questions. Notes are not permitted

More information

Lattices and the Knaster-Tarski Theorem

Lattices and the Knaster-Tarski Theorem Lattices and the Knaster-Tarski Theorem Deepak D Souza Department of Computer Science and Automation Indian Institute of Science, Bangalore. 8 August 27 Outline 1 Why study lattices 2 Partial Orders 3

More information

OPPA European Social Fund Prague & EU: We invest in your future.

OPPA European Social Fund Prague & EU: We invest in your future. OPPA European Social Fund Prague & EU: We invest in your future. Cooperative Game Theory Michal Jakob and Michal Pěchouček Agent Technology Center, Dept. of Computer Science and Engineering, FEE, Czech

More information

Algorithms PRIORITY QUEUES. binary heaps d-ary heaps binomial heaps Fibonacci heaps. binary heaps d-ary heaps binomial heaps Fibonacci heaps

Algorithms PRIORITY QUEUES. binary heaps d-ary heaps binomial heaps Fibonacci heaps. binary heaps d-ary heaps binomial heaps Fibonacci heaps Priority queue data type Lecture slides by Kevin Wayne Copyright 05 Pearson-Addison Wesley http://www.cs.princeton.edu/~wayne/kleinberg-tardos PRIORITY QUEUES binary heaps d-ary heaps binomial heaps Fibonacci

More information

Fundamental Algorithms - Surprise Test

Fundamental Algorithms - Surprise Test Technische Universität München Fakultät für Informatik Lehrstuhl für Effiziente Algorithmen Dmytro Chibisov Sandeep Sadanandan Winter Semester 007/08 Sheet Model Test January 16, 008 Fundamental Algorithms

More information

Local monotonicities and lattice derivatives of Boolean and pseudo-boolean functions

Local monotonicities and lattice derivatives of Boolean and pseudo-boolean functions Local monotonicities and lattice derivatives of Boolean and pseudo-boolean functions Tamás Waldhauser joint work with Miguel Couceiro and Jean-Luc Marichal University of Szeged AAA 83 Novi Sad, 16 March

More information

Fibonacci Heaps Y Y o o u u c c an an s s u u b b m miitt P P ro ro b blle e m m S S et et 3 3 iin n t t h h e e b b o o x x u u p p fro fro n n tt..

Fibonacci Heaps Y Y o o u u c c an an s s u u b b m miitt P P ro ro b blle e m m S S et et 3 3 iin n t t h h e e b b o o x x u u p p fro fro n n tt.. Fibonacci Heaps You You can can submit submit Problem Problem Set Set 3 in in the the box box up up front. front. Outline for Today Review from Last Time Quick refresher on binomial heaps and lazy binomial

More information

Introduction to Fall 2011 Artificial Intelligence Midterm Exam

Introduction to Fall 2011 Artificial Intelligence Midterm Exam CS 188 Introduction to Fall 2011 Artificial Intelligence Midterm Exam INSTRUCTIONS You have 3 hours. The exam is closed book, closed notes except a one-page crib sheet. Please use non-programmable calculators

More information

Network Analysis Basic Components. The Other View. Some Applications. Continued. Goal of Network Analysis. RK Jana

Network Analysis Basic Components. The Other View. Some Applications. Continued. Goal of Network Analysis. RK Jana Network nalysis RK Jana asic omponents ollections of interconnected linear forms: Lines Intersections Regions (created by the partitioning of space by the lines) Planar (streets, all on same level, vertices

More information

Assortment Optimization Over Time

Assortment Optimization Over Time Assortment Optimization Over Time James M. Davis Huseyin Topaloglu David P. Williamson Abstract In this note, we introduce the problem of assortment optimization over time. In this problem, we have a sequence

More information

Optimal Integer Delay Budget Assignment on Directed Acyclic Graphs

Optimal Integer Delay Budget Assignment on Directed Acyclic Graphs Optimal Integer Delay Budget Assignment on Directed Acyclic Graphs E. Bozorgzadeh S. Ghiasi A. Takahashi M. Sarrafzadeh Computer Science Department University of California, Los Angeles (UCLA) Los Angeles,

More information

On the Optimality of a Family of Binary Trees

On the Optimality of a Family of Binary Trees On the Optimality of a Family of Binary Trees Dana Vrajitoru Computer and Information Sciences Department Indiana University South Bend South Bend, IN 46645 Email: danav@cs.iusb.edu William Knight Computer

More information

ExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse

ExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse ExpTime Tableau Decision Procedures for Regular Grammar Logics with Converse Linh Anh Nguyen 1 and Andrzej Sza las 1,2 1 Institute of Informatics, University of Warsaw Banacha 2, 02-097 Warsaw, Poland

More information

Rational Behaviour and Strategy Construction in Infinite Multiplayer Games

Rational Behaviour and Strategy Construction in Infinite Multiplayer Games Rational Behaviour and Strategy Construction in Infinite Multiplayer Games Michael Ummels ummels@logic.rwth-aachen.de FSTTCS 2006 Michael Ummels Rational Behaviour and Strategy Construction 1 / 15 Infinite

More information

TEST 1 SOLUTIONS MATH 1002

TEST 1 SOLUTIONS MATH 1002 October 17, 2014 1 TEST 1 SOLUTIONS MATH 1002 1. Indicate whether each it below exists or does not exist. If the it exists then write what it is. No proofs are required. For example, 1 n exists and is

More information

Issues. Senate (Total = 100) Senate Group 1 Y Y N N Y 32 Senate Group 2 Y Y D N D 16 Senate Group 3 N N Y Y Y 30 Senate Group 4 D Y N D Y 22

Issues. Senate (Total = 100) Senate Group 1 Y Y N N Y 32 Senate Group 2 Y Y D N D 16 Senate Group 3 N N Y Y Y 30 Senate Group 4 D Y N D Y 22 1. Every year, the United States Congress must approve a budget for the country. In order to be approved, the budget must get a majority of the votes in the Senate, a majority of votes in the House, and

More information