电路与后门SETH 的五种色调

Michael Lampis
{"title":"电路与后门SETH 的五种色调","authors":"Michael Lampis","doi":"arxiv-2407.09683","DOIUrl":null,"url":null,"abstract":"The SETH is a hypothesis of fundamental importance to (fine-grained)\nparameterized complexity theory and many important tight lower bounds are based\non it. This situation is somewhat problematic, because the validity of the SETH\nis not universally believed and because in some senses the SETH seems to be\n\"too strong\" a hypothesis for the considered lower bounds. Motivated by this,\nwe consider a number of reasonable weakenings of the SETH that render it more\nplausible, with sources ranging from circuit complexity, to backdoors for\nSAT-solving, to graph width parameters, to weighted satisfiability problems.\nDespite the diversity of the different formulations, we are able to uncover\nseveral non-obvious connections using tools from classical complexity theory.\nThis leads us to a hierarchy of five main equivalence classes of hypotheses,\nwith some of the highlights being the following: We show that beating brute force search for SAT parameterized by a modulator\nto a graph of bounded pathwidth, or bounded treewidth, or logarithmic\ntree-depth, is actually the same question, and is in fact equivalent to beating\nbrute force for circuits of depth $\\epsilon n$; we show that beating brute\nforce search for a strong 2-SAT backdoor is equivalent to beating brute force\nsearch for a modulator to logarithmic pathwidth; we show that beting brute\nforce search for a strong Horn backdoor is equivalent to beating brute force\nsearch for arbitrary circuit SAT.","PeriodicalId":501024,"journal":{"name":"arXiv - CS - Computational Complexity","volume":"69 1","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2024-07-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Circuits and Backdoors: Five Shades of the SETH\",\"authors\":\"Michael Lampis\",\"doi\":\"arxiv-2407.09683\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The SETH is a hypothesis of fundamental importance to (fine-grained)\\nparameterized complexity theory and many important tight lower bounds are based\\non it. This situation is somewhat problematic, because the validity of the SETH\\nis not universally believed and because in some senses the SETH seems to be\\n\\\"too strong\\\" a hypothesis for the considered lower bounds. Motivated by this,\\nwe consider a number of reasonable weakenings of the SETH that render it more\\nplausible, with sources ranging from circuit complexity, to backdoors for\\nSAT-solving, to graph width parameters, to weighted satisfiability problems.\\nDespite the diversity of the different formulations, we are able to uncover\\nseveral non-obvious connections using tools from classical complexity theory.\\nThis leads us to a hierarchy of five main equivalence classes of hypotheses,\\nwith some of the highlights being the following: We show that beating brute force search for SAT parameterized by a modulator\\nto a graph of bounded pathwidth, or bounded treewidth, or logarithmic\\ntree-depth, is actually the same question, and is in fact equivalent to beating\\nbrute force for circuits of depth $\\\\epsilon n$; we show that beating brute\\nforce search for a strong 2-SAT backdoor is equivalent to beating brute force\\nsearch for a modulator to logarithmic pathwidth; we show that beting brute\\nforce search for a strong Horn backdoor is equivalent to beating brute force\\nsearch for arbitrary circuit SAT.\",\"PeriodicalId\":501024,\"journal\":{\"name\":\"arXiv - CS - Computational Complexity\",\"volume\":\"69 1\",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2024-07-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"arXiv - CS - Computational Complexity\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/arxiv-2407.09683\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"arXiv - CS - Computational Complexity","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/arxiv-2407.09683","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

SETH 是一个对(细粒度)参数化复杂性理论具有根本重要性的假设,许多重要的严密下界都是以它为基础的。这种情况存在一些问题,因为 SETH 的有效性并没有得到普遍的认可,而且在某些意义上,SETH 对于所考虑的下界来说似乎是一个 "太强 "的假设。受此启发,我们考虑了 SETH 的一系列合理弱化,使其更加可信,其来源包括电路复杂性、SAT 求解的后门、图宽参数、加权可满足性问题等。尽管不同的提法多种多样,我们还是能够利用经典复杂性理论的工具,发现许多非显而易见的联系:我们证明,在有界路径宽度、有界树宽或对数深度的图中,对以调制器为参数的 SAT 进行蛮力搜索,实际上是同一个问题,而且事实上等价于对深度为 $\epsilon n$ 的电路进行蛮力搜索;我们证明,击败对强 2-SAT 后门的暴力搜索,等同于击败对数路径宽度调制器的暴力搜索;我们证明,击败对强 Horn 后门的暴力搜索,等同于击败对任意电路 SAT 的暴力搜索。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
Circuits and Backdoors: Five Shades of the SETH
The SETH is a hypothesis of fundamental importance to (fine-grained) parameterized complexity theory and many important tight lower bounds are based on it. This situation is somewhat problematic, because the validity of the SETH is not universally believed and because in some senses the SETH seems to be "too strong" a hypothesis for the considered lower bounds. Motivated by this, we consider a number of reasonable weakenings of the SETH that render it more plausible, with sources ranging from circuit complexity, to backdoors for SAT-solving, to graph width parameters, to weighted satisfiability problems. Despite the diversity of the different formulations, we are able to uncover several non-obvious connections using tools from classical complexity theory. This leads us to a hierarchy of five main equivalence classes of hypotheses, with some of the highlights being the following: We show that beating brute force search for SAT parameterized by a modulator to a graph of bounded pathwidth, or bounded treewidth, or logarithmic tree-depth, is actually the same question, and is in fact equivalent to beating brute force for circuits of depth $\epsilon n$; we show that beating brute force search for a strong 2-SAT backdoor is equivalent to beating brute force search for a modulator to logarithmic pathwidth; we show that beting brute force search for a strong Horn backdoor is equivalent to beating brute force search for arbitrary circuit SAT.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信