Newest Questions
13,300 questions
0votes
0answers
86views
Complete problems for $L^i$ at $i\in\mathbb N$
Let $L^i=DSPACE[O(\log^in)]$ at every $i\in\mathbb N$ and let $L^1=L$. $st$-connectivity on undirected graphs is $L$-complete (through $L$ reductions) by Reingold's $SL=L$. What is the natural ...
0votes
1answer
58views
Polynomial-time approximation of poly advice
Let $q : \mathbb{N} \to \Sigma^*$ be in $\mathrm{poly}$ (that is, $|q(n)|$ is polynomially bounded; the definition is essentially the good ol' "advice" from $\mathrm{P/poly}$). Also, let $M \...
1vote
0answers
39views
Is there a polynomial-size proof for this tautology (“prime and composite”) in resolution or subset propagation redundancy?
I'm experimenting with CNF generation using SAT encodings and encountered a very simple tautology that, surprisingly, seems to require exponential time to prove unsatisfiability in practice. The ...
1vote
0answers
19views
Improving reachability checks in a sparse, transitive-reduced causal DAG
I maintain a directed acyclic graph (DAG) of events in a distributed system of n processes, with these properties: With = n: there are n independent “chains” (one per process). Transitive reduction: ...
0votes
1answer
34views
Polynomial time function with values from cofinite sets
Let $A_n \subseteq \mathbb{N}, n \in \mathbb{N}$ be cofinite, but not necessarily computable as a function of $n$. Does there always exist a function $f$ such that $f$ has a polynomial-time Turing ...
1vote
0answers
65views
Is it true that $Kt(x)<x+c$?
Liu and Pass in their 2021 paper "On the Possibility of Basing Cryptography on $EXP \neq BPP$" claim the following : I have a hard time agreeing with Fact 2.1. Reason being it seems to me ...
0votes
0answers
74views
Lower bound for undirected graph connectivity
Suppose we have an undirected graph represented by an adjacency list. In particular, we have full random access, in one step of computation we can access the j-th neighbor of vertex of i. ...
5votes
1answer
96views
Minimum number of edges in a hamiltonian cograph
I am trying to prove the following claim: Suppose $G$ is a cograph on $n$ vertices with a hamiltonian path. Then $G$ contains at least $\Omega(n^2)$ edges. In fact, $\Omega(n^{1+\varepsilon})$ would ...
1vote
0answers
54views
Is parallel s-t-reachability easier on sparse graphs?
It is known that s–t reachability in directed graphs can be solved in parallel using transitive closure via Boolean matrix multiplication in $O(log^2 n)$ time with $n^\omega$ processors, where $\omega$...
0votes
0answers
16views
Is solving a combined QUBO formulation equivalent to solve different QUBO formulations independently?
I'm trying to implement a Multiple Object Tracking algorithm based on Quantum Annealing following the approach proposed in this paper by Y. Ihara: Enhancing Multiple Object Tracking Accuracy via ...
0votes
0answers
57views
W[1] hard problems, but randomized FPT?
Does there exist W[1] hard problems, which are randomized FPT, or would that break the W hierarchy?
0votes
0answers
56views
Heuristic for Solving 3-SAT Based on Literal Sign Analysis and a Correction Phase
I am trying a heuristic approach for solving 3-SAT instances without backtracking. The method relies on an initial variable assignment based on literal signs, followed by a targeted correction phase ...
0votes
0answers
52views
Connectivity Properties of the Zig -Zag Product
Given the zig zag product of a graph $G$ with some graph $H$, $G \cdot H$. I want that for any vertices $s,t$ in G, there exists a path between them in $G$ iff there exists some vertices $s', t'$ in $...
6votes
0answers
170views
How NOT to prove that PIT is in P
Let PIT be the Polynomial Identity Testing. Suppose someone claims that PIT is in P by a simple combinatorial argument. Is there a complexity theoretic result which says that PIT $\in$ P cannot be ...
2votes
0answers
74views
Lower bound on the Among Us game
Among Us Problem: There are $2n$ undercover agents in Don's lair. Fewer than $n$ of them are terrorists, and the rest are anti-terrorists. The identities are top-secret, and no external evidence can ...