Escolar Documentos
Profissional Documentos
Cultura Documentos
Course 236604:
Table of Contents
1.1 1.2 1.3 1.4 1.5 1.6
Lecture 5: The Width Method, part II Lecture 6: Width of Explicit Encodings Lecture 7: A Combinatorial Characterization of Width
. . . . . . . . . . . . .
Res[k]
9.2.1 9.2.2 9.2.3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
9.3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Lecture 12: Random 3-CN F and Res[k] refutations Part III Lecture 13: TBD
13.1 13.2 13.3 13.4
Res[k]
Frege
- Conclusion
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Resolution
Open Questions
Homework assignments
Assignment 1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HW1 Assignment 2 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HW3 Assignment 3 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . HW4
References
Lecture 1
Eli Ben-Sasson
Scribe:
we can think of the language as a collection of form x L, and of a proof as a sequence of claims
A good proof is one that assures us that some claim is true; this means that by
reading the proof we can be convinced that a claim is true, and that false claims cannot be proved in a similar manner. This is treated formally by the notion of a proof checking algorithm. We turn now to formal denitions:
Denition 1.1.
inputs:
proof system for a language L is an algorithm P which receives two x (a claim) and (a proof string), and outputs Accept or Reject, such that
A
: P(x, )= Accept
: P(x, )= Reject
(x, )
and accepts
i C()
=1
and
|| = ||
|C|O(1) . The hardness of nding a proof is not known and is equivalent to the
check
{C| :
a string
C()
= 0}
C()
= 1.
prove such claims. Of course, we have a trivial proof system for SAT: for an input C and
of a length
2n n
is that this kind of proof is long, cumbersome and not elegant, and its hard (exponentially hard) to check. Let us assume that we have a circuit C with a given structure C
(C )
where C is a sub-
circuit. It is easy to prove that this C is unsatisable regardless of C 's structure, therefore sometimes one
can
prove unsatisability in a much more "elegant" way then going over all
much
more easily
11
true
or
false.
Example:
"Today is a rainy day or today is not a rainy day" is a claim that always holds
x(x) (x).
in any context. In general, a tautology is a boolean circuit who's output is always matter what the input is.
true
no
Now we turn to a result which connects the study of proof systems to that of the relation between
NP
and
coNP: NP = coNP if and only if there exists a super proof system has the following property: For all x L
NP = coNP then since SAT coNP we have SAT NP. Therefore, by the denition of NP we have a polynomial proof system for SAT, i.e. an algorithm P such that O(1) such that P(x, ) = Accept- hence a for all x SAT there exists a proof , || |x| super proof system for SAT. On the other hand, assume a super proof system for SAT exists, then SAT NP - but SAT is known to be coNP-complete, and hence coNP NP. It is easy to see that this implies coNP = NP, since if L NP we have by denition L coNP and hence L NP, so again by denition we have L = L coNP.
If
Proof.
NP-complete.
The
algorithms are not ecient in time on any given SAT clause, but they work well in practice in most cases. This is interesting, or instance, in formal verication one can encounter the following problem: Given a function computes
f,
meaning that
f and a circuit C , we want to verify x1 x2 ...xn : f (x1 , ...xn ) C(x1 , ...xn ). Yet again
that a
indeed
claim.
Denition 1.3.
words
,...,x , and derivation rules of the form x1 ,x2y n . We say that the axioms
x1 , . . . , x n
z,
{x1 , x2 , . . . , xn }
y1 , y2 , . . . , yk
1.
z = yk
for some j ) or yi is derived from previous yj1 ,...,yjk claims by one of the derivation rules (i.e. such that jt < i). yi either is an axiom (i.e.
2. For all
yi ,
yi
yi = x j
satised C
= (x y) (y z) x z one can look at this C as a set of axioms = {(x y), (y z), x, z} and we shall prove sequentiality that C x y, x y 0
which is unsatisable both yield a new constraint:
1. the constraints: 2. 3.
z y
and and
yz y
yields
Now let us consider a dierent proof system axioms are given as inequalities: 1. 2. 3. 4.
x + (1 y) 1 y + (1 z) 1 (1 x) 1 z1
(This is equivalent to
x y)
34
- a contradiction.
This proof system is better than Resolution since proofs are shorter, and it has a geometric taste.
P = NP
(even assuming
it is correct)?. We will also try to understand the connection between computations and proofs, and whether something that is easy to prove is also easy to compute and vice versa. Sometimes the answer is positive. Some important questions in the eld are 1. Is there a
super
NP = coNP)
this question.
13
2. Is there an optimal proof system? i.e. as good as any other system (similar to the optimal hardness of problems which are answer this question as well. 3. Specic systems, like Resolution, Cutting Planes, Frege - are they super? We know that Resolution and Cutting Planes are not super, but the question is still open for Frege. 4. How to nd a proof - sometimes we can nd a proof eciently.
NP-complete)
14
Lecture 2
Eli Ben-Sasson
Scribe:
The only good system, is the sound system . In this lecture we will introduce one of the simplest proof systems Resolution and a SAT-solving algorithm related to it, DPLL. Like other proof systems discussed in this course, resolution allows to prove that a formula is unsatisable. To dene resolution we need a few preliminary denitions.
2.1 Denitions
Denition 2.1. Denition 2.2. Denition 2.3.
[literal] A [clause] A
literal clause
over
is either
or
x.
is a disjunction of literals.
[CNF formula] A
CNF formula
is a set of clauses.
We consider a CNF formula as a set of constraints; we need to nd an assignment satisfying at least one literal in each constraint. In a
proof
following from previous statements or an axiom. stating which new statements can be
Derivation rules
derived
a specic statement has to be sequentially derived: in this course, since we try to prove unsatisability, we try to derive the false statement.
Denition 2.4. Denition 2.5. Denition 2.6. Denition 2.7. Denition 2.8.
We also denote
is a proof system
derivation rule
Ai ,...,Ak . B
axiom
B.
proof
obtained from previous lines by using one of the derivation rules. A derivation rule must be veriable in polynomial time. [length] The
length
of a proof
L ().
is the
L (C
0)
as the
minimal
0.
Some rastafarian
21
Note.
A implies B , A derives B ,
and denote by
A |= B
if for each
if
is satised by
then
Denition 2.10.
be obtained from
A P.
if
can
In this course, we will only deal with refutation proof systems. A refutation proof system is equivalent to a tautology proof system; recall that a proving in a refutation proof system means obtaining a contradiction, while in a tautology proof system, it is by obtaining a tautology (not necessarily without axioms and/or assumptions). If we can prove a CNF formula is unsatisable, it means its negation is a tautology. This way, we can show satisability of formulas, by showing their negation is unsatisable.
sound
if
A,
if
then
A |= 0
(this
A : (A
P)
(A |=)).
complete
if
A,
if
A |= 0
then
0.
Note. A proof system for tautologies is dened symmetrically: and complete i A : (|= A) ( P A)
sound
Resolution Rule:
clauses and
Derive
CD
from
{C x, D x}
Cx D x CD R, where
C, D
are any
is any variable.
Lemma 2.13.
Proof.
We show that the resolution rule is locally sound and complete, and therefore show
22
1.
Soundness : , C, D, x : [C x] () = 1 and [D x] () = 1 then [C D] () = 1. Assume by contradiction that [C D] () = 0. This means that both C () = 0 and D () = 0. Therefore, x must be satised for the rst part to hold, whereas x must
be satised for the second part to hold, contradiction.
2.
Completeness: C : C |= 0 C R 0. If C |= 0 does not hold, we're done. If C |= 0, there pure, by which we mean that both x and x appear
C
be such a
in a formula
C,
that if
Basis: Step:
n = 1:
x x,
therefore by
resolution we get
0. n1
variables, and we show that it holds for formulas with which is not pure. We divide the formula
n variables.
Let
x1
be a variable
Cx1 (clauses that contain x1 ), Cx1 (clauses that contain x1 ) and C (the rest) such C = Cx1 Cx1 C . We note that |Cx1 | , |Cx1 | > 0. Dene A x B to be all possible resolutions between a A and b B such that variable x is removed. Denote C = (Cx1 Cx1 ) C . Note that because x1 does not appear in C we conclude C contains at most n 1 variables. We need to show that C |= 0. Assume by contradiction that an (n 1)-variable assignment exists, s.t. C () = 1. WLOG we can write Cx1 as {[Cx1 ]i x1 }. Denote Cx1 = {[Cx1 ]i } (meaning, we took out the pure variable x1 ) and similarly Cx1 = {[Cx1 ]i }. If both Cx1 () = 0 and Cx1 () = 0, there exists A Cx1 and B Cx1 such that A |= 0 and B |= 0. In this case, the clause A B is derived and appears in (Cx1 Cx1 ), and is not satised, hence the entire C is not satised. Therefore either Cx1 () = 1 or Cx1 () = 1. Assume wlog Cx1 () = 1. We extend into by dening (x1 ) = 0. We get WLOG that:
that (a)
|= Cx1 |= C
because
(x1 ) = 0,
because
C () = 1 C |= 0.
Since by denition,
Therefore,
|= C ,
contradiction. We get
using resolution,
C R 0.
0.
can be derived
23
We end this section by noting that in certain cases there do indeed exist short resolution proofs.
Claim 14.
Proof.
0) 4 n2 .
Since every derivation yields a clause with at most two literals, the total number of
Note. 3-CNF formulas can increase L exponentially. 2n . Also, there exists a 3-CNF formula C whose L (C
L (C
0)
0) = 2n .
Considering a specic assignment, a clause which is not satised by it can easily be found. We construct a formula whose proof is exponentially long by combining clauses derived from each possible assignment. This way, to prove unsatisability, one must consider all clauses.
2n
weakening rule:
Weakening Rule:
Derive
C l
from
C Cl
Intuitively, this rule should not provide us with and additional power. This can be proven formally for an unsatisable formula with width
and length l, then there is also a proof using only resolution that used width
l.
Pure literal elimination as dened before, a pure literal is a variable that occurs in the formula with only one polarity (i.e., either only positively, or only negatively). Pure literals can always be assigned in a way that makes all clauses containing them true. Thus, these clauses do not constrain the search anymore and can be deleted.
24
x
0 0 0
z
0 1
z
1
y z
xz
x,z
Unit propagation If a clause is a unit clause, i.e. it contains only a single unassigned literal, this clause can only be satised by assigning the necessary value to make this literal true. Thus, no choice is necessary.
A run of DPLL can be described as a tree, where each node represents a choice of a variable, and each edge is a choice of a value for that variable.
Claim 15.
Given a recursive tree obtained from running DPLL on an unsatisable formula as input constitutes a resolution proof with the same treelike structure, with length at most the running time of the algorithm. Proof.
We provide a proof sketch. An example of a DPLL run is shown in Figure 1. Each leaf represents a clause which is unsatised by the assignment generated by the path starting at the root and ending in this leaf. Consider the leftmost leaf (L) in the example, and the leaf next to it (R). Both
and
z , unsatisability is due to another variable. We can weaken R into x z , and resolve L and R to get the clause x. We do the same with the leaf at the end of path 01 (y ) and 00 (x), and in the end we resolve with x. In each step, given a node and its left- and right-subtrees, we would want
This means that regardless of the value of to eliminate the variable at the node. Since each subtree leads to a contradiction, it doesn't matter what value we give to the variable at the node. Therefore, we can eliminate it. In the end, we end up with the root of the tree with two subtrees of a variable and its negation (in this example,
and
x).
Corollary 2.16.
L (C
t.R
This is because we have shown that each DPLL run induces a treelike Resolution proof, whose length equals the number of nodes in the tree. Therefore, the minimal length of a treelike resolution proof is at most Time (DPLL (C)). An augmented version of DPLL exists which is called
(we denote
it by DPLL ). In this version, when a conicting clause is reached, it is learned and a new
25
clause derived from this experience is added. The proof of the following claim is beyond the scope of this course and can be found in Beame et al. [2006].
Claim 17.
[without proof ] L (C
We conclude this lecture with a few remarks on the relation between general and treelike resolution proof size. We start by stating an obvious relation between the two
Theorem 2.18.
Proof.
L (C
0) L (C
t.R
In general, since
t.R.
proof is also a
proof,
L (C
t.R
0).
Concretely, Resolution proofs allow the reuse of past lines in the proof, regardless of their position. Treelike-Resolution, on the other hand, limits us to using lines in the proof which are directly above the current line. In essence, it is the dierence between a DAG and a tree. The proof of the following claim is beyond the scope of this course and can be found in Ben-Sasson et al. [2004].
Theorem 2.19.
There exist formulas for which L (C L formula it holds that L (C t.R 0) 2 log L log log L .
t.R
26
Lecture 3
Eli Ben-Sasson
Scribe:
Eli Ben-Sasson
In this lecture we continued surveying fundamental proof systems and then described the history of lower bounds on proof length for resolution. We shall prove such lower bounds in the next lectures.
Rn
to prove the
unsatisability of CNF formulas. The idea behind this system is as follows. Suppose an unsatisable CNF. Interpret a clause over variables function of the form
is
x1 , . . . , xn
as a
half-space,
i.e., as a
ai xi b,
i=1
For instance, the clause
where
ai , b R.
(1)
C := x1 x2 x3
is the constraint
C := x1 + x2 + (1 x3 ) 1
x1 + x2 x3 0.
F = {C1 , . . . , Cm }, is satisable if and only if its corresponding set of half-spaces F = {C1 , . . . , Cm } has a solution {0, 1}n . From a geometric point of view, the set of points in Rn that satisfy F form n n a polytope PF R and F is satisable i PF {0, 1} = . So one way of proving that F is unsatisable is to show that PF contains no points in {0, 1}n and the cutting planes
It is not hard to verify that a CNF formula, i.e., a set of clauses system, dened next, gives a formal way to prove this.
planes
Denition 3.1
(Cutting Planes)
cutting
(CP) are half-spaces as dened in Equation 1. The system has two derivation rules.
(2)
n i=1 ai xi b n ai b i=1 c xi c
A Cutting Planes (CP)
where
c N+
divides
ai , i = 1, . . . , n.
(3)
derivation
CF
31
refutation
of
is a derivation from
0 1.
Theorem 3.2
{0, 1}n
satises
then
01
cannot be satised by
any
. C F.
Assuming
satises the
Next, suppose a
. Finally, b and c N+ divides ai , then n ai i i=1 c is an integer and this integer is greater or equal to b/c. Thus, we may round b/c up and still n ai have i=1 c i b/c . This shows that all steps of a derivation all locally sound and by
in Equation 2 we use linearity to argue the bottom inequality also holds for consider the rounded division rule. If
n i=1 ai i
induction we conclude the soundness of all CP-derivations. To argue completeness we showed in class that CP that given a resolution refutation pretty much mimics
simulates
of
of
that
in the sense that the tth line of tth line of (details omitted).
NP = coNP
P.
existence of such hard-to-prove formulas, which is the most important problem considered in proof complexity, is not a simple task. The very rst super-polynomial lower bound on a natural proof system was given in Tseitin [1968] for a restricted form of the resolution system known as
regular resolution
(which we
have not dened in class). It took nearly twenty years until the rst superpolynomial bound on resolution proof length emerged, shown in Haken [1985] for the family of pigeonhole principle formulas. Shortly after, Urquhart [1987] showed exponential lower bounds on
proof length for the family of formulas rst considered by Tseitin, and this was followed by Chvtal and Szemerdi [1988] who showed that a random CNF formula with suciently many clauses requires exponential length proofs in resolution. All of these lower bounds can be obtained in a unied way by the width method of Ben-Sasson and Wigderson [2001], which is the next topic we shall study. We point out that there are lower bound results on resolution proof length that do not follow from the width method. One example is the lower bound of Pudlk [1997] that relies on the feasible interpolation method to be discussed later on in the course (in Lecture 8).
32
Another example is that of the lower bounds for the weak pigeonhole principle Raz [2004]; Razborov [2003] which are outside the scope of this course.
33
Lecture 4
Width Method
December 2nd, 2008
Lecturer:
Eli Ben-Sasson
Scribe:
In this lecture as well as the next we will prove lower bounds on the length of a resolution derivation
(m, ) expanding
formulas. We
Denition 4.1.
The
width
of a CNF-clause
is dened to be
w(c) = #literals in c.
The width of a set of clauses (or a formula)
is dened as
0 w(C
is dened
0) =
min derivation of C ,
0 w(),
C SAT C SAT
. (m, )expanding
We start by stating the main theorem, followed by the denition of what a formula is.
Theorem 4.2.
If C is kCNF over n variables and is unsatisable, and furthermore C is (m, )expanding, then it holds that
LR (C 0) exp (m k)2 n
mk 2
and
LT R (C 0) 2
. U U,
denote by
Denition 4.3.
neighborhood of
Let
G = U, V, E
N (U )
the
N (U ) = v V | e = (u, v) E, u U
A graph
. U U
with
|U | m,
41
Intuitively, an expander graph is a graph with high connectivity, in that every non-trivial cut of the graph contains a large number of edges. As a simple example, we note the vertex clique,
n-
Kn ,
3, 5, log n, . . .
formulas. let
(m, )expander
(m, )expanding CN F
formula
Denition 4.4.
Given a
C,
G(C)
G(C) = C, V ars, E
with two vertex sets:
C,
the set of clauses in the formula, the set of variables in the formula,
V ars,
The proof of Theorem 4.2 follows from the theorem below, as well as an additional theorem we will prove in the next lecture, which states that for a
(m, ) expanding
formula,
w(C
0)
m . 2
x=a
for
a {0, 1}
is dened as
c |x=a =
xa , x1a c / xa c otherwise
is a derivation of
1 c\ x1a
from
C.
We denote
ci =
ci |x=a
c cj2 j1 c A | x=a j1
= |x=a
(such as
1 cj ).
We can
is a derivation of
cs |x=a
from
C |x=a .
Lemma 4.6.
Proof.
We look at a derivation
Lemma 4.7.
By lemma 4.6,
which contain
a the literal x by
x1a by Cx1a a nor x1a by C . So C = C a C and the subset of clauses that do not contain x x x1a C . a c . Since we are able to derive x1a Look at a clause c Cxa , then it is of the form x C xa .
Similarly, denote the subset of clauses that contain
in width
d,
in width
note this means we can in fact derive the clauses of use that .
w(C |x=1a 0) d
to derive
in
in width
w(C 0) max {k, d}? No, e.g. let C = {x, y, z, w, xyzw}. Clearly, it holds that w(C |x=1 0) 3 and w(C |x=0 0) 1. If the lemma implied w(C 0) d, then we would have in this case w(C 0) 3, but clearly in order to derive 0 from C we have to introduce the clause xyzw of width k = 4.
Is the lemma true for
w(C
0) d
instead of
0.
be a T.R. (Tree-like Resolution) derivation of C 0 of length S = LT R (C 0) > S and on the number of variables n. S = 1, the formula must be of the form x, x. In this case we can prove C 0 be performing the resolution rule. We get w(C 0) = 1 w(C) = 1 w(C) + log LT R (C 0).
In this case, the derivation ends with
Base Step
x x 0
43
x and x were derived by T.R. derivations Tx and Tx respectively. Denote Sx = |Tx | and Sx = |Tx |, then S = Sx + Sx + 1. We may assume w.l.o.g that S Sx Sx , then Sx 2 . We note there is a tree-like derivation of 0 from C |x=0 S of length 2 . By the induction hypothesis, there is a tree-like derivation of 0 S from C |x=0 of width k + log 2 = k + log S 1. We denote d = k + log S , then w(C |x=0 0) d 1. On the other hand, the formula C |x=1 contains n 1 variables, so by induction on n we have a derivation C |x=1 of width k + log Sx k + log S = d. By lemma 4.7 , w(C 0) log S + k.
where 2. Again we prove by induction over the length
n.
Base Step
d
The proof is the same as the previous case. Let there be literals).
tS
many
dfat
dt
derivation. By the Pigeon-hole Principle, there is a literal that appears in (and there for satises) at least is
dfat clauses in |x=1 , where is a derivation of minimal d 1 d and length (that is, of length S ), is at most t 1 2n . Set a = ad = 1 2n b . We prove by induction on n and b let b be the smallest integer such that t < a that w(C 0) d + b + k . x.
So the number of
Base Step
be
0.
dfat
clauses and
w(C
C |x=a
we
w(C
0) d + k + b. w(C
So,
(tS)
=d+
4n ln S d + ln S 2nd d ln 2n = 2 2n ln S < 3 n ln S
44
Lecture 5
Eli Ben-Sasson
Scribe:
In this lecture we will focus on proving the main theorem from the previous lecture that helped us to nd lower bounds on the length of a proof. The theorem from the previous lecture:
Theorem 5.1.
In order to prove this theorem, we will use some other theorems and denitions. (Hall's marriage theorem). Assume G = (V, U, E) is a bipartite graph. We can marry every v V with u U monogamously i for every subset V V , |N (V )| |V |. Where N (V ) is the neighbours of all the nodes v V . Hall's theorem has the following corollary that will be crucial to our proof.
Theorem 5.2
Theorem 5.3
Proof.
(Tarsi). If F is minimal not-satisable formula, then |F | > |V ars(F )| By minimal we mean that removing any clause will make F satisable. Assume to the contrary that
|F | |V ars(F )|.
is mated to a unique variable and the variable's value is determined by that clause), satisable a contradiction. exists a subset
is
F F for which |V ars(F )| < |F |. We choose the maximum subset of that kind. If F = F , we get a contradiction. So F F holds. Consider a bipartite sub-graph derived by F = F \ F = and V = V ars(F ) \ V ars(F ) V ars(F ). Using the maximality of F , we apply the Hall's theorem and get that there is a marriage from F to V . By the minimality of F , F is satisable; we satisfy it by assigning values to V ars(F ). By existence of a marriage from F to V , we may also satisfy F without changing values already assigned to V ars(F ). Therefore, F is satisable a
contradiction.
F |=min C
i
F |= C
F , F |= C .
C| = 0.
assigned by
Claim 6.
F | |=min 0.
51
Proof.
F | is unsatisable; otherwise, we conclude that F |= C . Let's assume to the contrary that F | is not minimal; i.e., there exists a subset F F s.t. F | |= 0. Consider an assignment to F . If agrees with , we get F () = 0. If contradicts (in at least one variable of clause C ), we get C() = 1. Therefore, F |= C a contradiction to the minimality of F .
It is clear that Applying the Tarsi's theorem to
F | ,
we get that
This implies
Now we can return to the proof of the main theorem of this lecture.
formula
over
variables.
variables
N+
C F, C
then
(C) = 1; D, E
using resolution, then
(0) > m
(, m)-expanding
Summing up all 3 conclusions above, we can conclude that in each proof there exist a clause
Let
l, m/2 l m,
s.t.
5, we get
m . 2
Denition 5.7
lecting
(Random CNF)
Let
k,n Rm
2k
n k
clauses of size
over
variables.
k,n F Rm
means that
A random
k -CNF
formula is a formula
k,n F Rm .
For every k 3 and for every 0 < < 1/2, there 1+ k,n exists a constant K = K(k, ) that, with high probability, F Rn is an , K n/ k2 expanding CNF.
52
Using the last lemma, Theorem 5.1, and relations between width and resolution, we get the following lower bounds for random CNF.
Theorem 5.9
For every k 3 and for every 0 < < k,n 1/2, there exists a constant K = K(k, ) that, with high probability, F Rn has:
(Lower Bounds for Random CNF)
w(F LR (F
0)
K n 2 k2
1+
; K 2 k2
1+
0) exp n
k n
probability, F
Corollary 5.10
3,n Rn
an ,
n/1+2
w(F LR (F
0) =
0) = exp
2+4
0) = (n) and LR (F
0) = exp((n)).
53
Lecture 6
Eli Ben-Sasson
Scribe:
Slava Chernoy
(, m)-expanding. m . 2
If CNF
is
(, m)-
w(F
For random CNF
0)
F,
(, m)-expansion,
but for
Tseiten formulae this property can not be applied. To show this let's consider a graph with a small degree, say
deg(G) = 3.
Recall that
T (G) = {e v xe = l(v)|v V }. xe1 xe2 xe3 T (G) and expand it as a CNF, i.e., a set of clauses: {x1 x2 x3 , x1 x2 x3 , x1 x2 x3 , x1 x2 x3 }. Consider the bipartite constraint graph (V, U, E) of this set of clauses. For each clause above, there is a vertex in V, and for each variable xi , there is a vertex in U . Let V be a set of vertices formed by those 4 clauses, then E(V ) contains 3 vertices corresponding to the variables x1 , x2 , x3 . So for V we have |V | = 4 and |E(V )| = 3; i.e., the graph (V, U, E) is not (, m)-expander, T (G) is not (, m)-expanding, and the property cannot be applied. To overcome the problem we will
Let's choose a constraint use a dierent approach. We work with sets of arbitrary boolean constraints (as opposed to considering only clauses) and introduce a stronger form of expansion, called
boundary
expansion,
or
unique-neighbor expansion.
Assume
V V.
is
V = {u U |u
V }.
and
boundary expanding
(r, c)-boundary ex-
formulas.
Denition 6.2
pander
if
(Boundary Expander)
A bipartite graph
is called
V V, |V | r, |V | c |V |.
In words, every small set has a boundary that is large relative to its size.
61
Denition 6.3
expanding
(Boundary Expanding)
A set of constraints
is a
Denition 6.4
any
I [k]
such a way
Example 6.5. The Boolean functions OR and XOR are 1-sensitive at least r of its inputs are 1) and ANDr are r -sensitive.
We say that
F |=min C
if
F |= C ,
f F , F \ {f } |= C .
If a set of constraints F is (|F |, c)-boundary expanding s.t. F |=min C and every f F is l-sensitive, then |C| |F | (c l + 1). Proof. Assume is a minimal assignment s.t. C| |= 0 and || = |C|. Let's show that F | |=min 0. Assume rst that F | |= 0. Then there is an assignment satisfying F | , i.e., F | () = 1. Since C| is unsatisable, we get that F |= C a contradiction. Now assume that F | |= 0, but F | |=min 0; i.e., there is a subset F F s.t. F | |= 0. Let be an assignment s.t. C() = 0. Since is a minimal assignment falsifying C , ; hence F () = 0. This implies F |= C a contradiction. We have F | |=min 0 holds. Then for every f F , there exists an assignment s.t. (F \ {f }) | () = 1 and f | () = 0. Let's consider F . Every variable in F belongs to an unique f F . Let f has t neighbours (variables) in F . We claim that after restricting to at most l 1 of them remain free. Assume by contradiction that f | has at least l free variables in F . By the l-sensitive of f , we may change on those l variables and satisfy f . Since the variables appear in F , the value of (F \ {f }) | will not change. This implies that F | is satisable a contrudiction. We have that after restricting to , at most |F |(l1) variables of F remain free. Therefore,
|C| = || |F | |F | (l 1) |F | c |F | (l 1) = |F | (c l + 1).
Claim 6.
Before we proceed, we obtain a lower bound for Tseiten formula on a the last claim.
-edge
expander using
Denition 6.7.
d-regular
graph
G(V, E)
(i.e.,
deg G d)
is called
-edge
expander if
V V, |V |
|V | , |E(V , V )| |V |. 4
Let's recall the denition and the properties (without proof ) of the width measure on clauses.
F.
Lemma 6.9.
bipartite), then
Corollary 6.10.
0)
Proof. In the proof we denote = T (G) . that (0) = |G| = |V |, we conclude that
be a minimal proof of
T (G)
0.
Noting
s.t.
|V | |V | (C) . 8 4 |V | |V | . Recall that every function f T (G) 4 is 1-sensitive and for every vertex v V , T (G) contains an unique function fv := e v xe = l(v). Clearly, {fv |v V } = {xe |e E(V , V )}. Therefore, |V | equals to the number of edges from V to V , i.e., |V | = |E(V , V )| . Since G is -edge expander, V is (|V |, )Let
V T (G)
s.t.
V |=min C
and
|V | 8
w(T (G)
0) = w() |C| |V | (c l + 1) = |V | ( 1 + 1) = |V |
|V | . 8
Lemma 6.11
If formula (set of boolean functions) F is a (r, c)-boundary expanding s.t. every its boolean function is l-sensitive, then
(Width Lower Bounds for Explicit Encodings)
w(F
0)
r (c l + 1) , 2
Proof.
F (0) > r. Then by the properties of F , there is a clause C in a proof of F 0 1 1 s.t. 2 r < F (C) < r . This implies that there is a subset F F s.t. 2 r < |F | = F (C) < r and F |= C . Using Claim 6 again, we get
So we have
w(F
64
Lecture 7
Eli Ben-Sasson
Scribe:
Shahar Papini
Width measure, with combinatorial games, and through a series of lemmas, we will show an equivalent combinatorial way to nd the Width of a formula. We will start by introducing some pebble games, and later, relate them to Width. Moreover, we will show a dierent
measure, the Space measure, which, roughly speaking, will represent the minimal space (e.g. RAM) we must use in order to prove a formula. As it appears, Space is bounded from below by Width, and we will prove that in our lecture. Let us start with some denitions.
Denition 7.1 (Proof graph). Let = {C0 , . . . , Cn } be a proof in a sequential proof system.
A graph
G = (V, E) is called a proof graph of if G is a rooted directed acyclic graph (DAG) for which there is a bijective mapping : {C0 , . . . , Cn } V such that if {Ci1 , . . . , Cik } Cj in the proof, then n. ((Cj ), (Cin )) E .
Note.
G
A given proof
may have several distinct proof graphs associated with it. We say that the space of a rooted DAG
k,
We can place a pebble on a node if we have placed pebbles on all of its immediate predecessors. Notice that this means we can always place a pebble on a node with 0 in-degree, if we have enough pebbles.
k.
is of space
Denition 7.3
k
if
(Space of a proof )
Let
that is of space
k.
of
F.
71
Claim 5.
We immediately get
Corollary 7.6.
Denition 7.7
called a the following:
CNF. A conguration
space proof
of
. Let F be an unsatisable kMi is a set of clauses. A sequence M0 , . . . Mn of congurations is F if and only if M0 = and Mi+1 is derived from Mi using one of
Mi+1 = Mi {C}
where for
C F. Mi
using one of the
Mi+1 = Mi {C},
Erasure:
Mi+1 = Mi \{C}
for
C Mi .
F is the minimal k 1 for which there is a space proof {M0 , M1 , . . . , Ms = {0}} |Mi | k for all i s.
We have the following connection between and proof space and treelike proof size.
Space(F ) log(LT R (F )) + 2
Proof.
First, notice that in a treelike resolution proof, the graph of the proof is the tree used
to generate the treelike proof. So, we will use the pebble-cover denition of space. We will prove by induction on the size of the tree,
n,
the rules mentioned in the denition of space, using no more than For
log n + 2
pebbles.
n = 1,
the tree is a single node, and thus, we need one pebble to cover the tree.
of size
n,
T1 , T2 . |T | = 1 + |T1 | + |T2 |, so, without loss of generality, |T1 | |T | . Using the induction 2 hypothesis, we can cover T2 with no more than log(|T2 |) + 2 log(|T |) + 2 pebbles. After we do, we remove all pebbles except the one on T2 's root. Now, we do the same for T1 , using no more than lg(|T1 |) + 2 max(log(|T |) 1 + 2, 0)(Note that T1 might be an empty tree, but not T2 ), not including the pebble on T2 . Now remove all pebbles from T1 except
72
T (now there are 3 pebbles on the board). Overall we have used max(log |T | + 2, log(|T |) 1 + 2 + 1, 3). Since n 2, log n 1, so we used no more than log n + 2 pebbles.
the one on root. Now, place another pebble on the root of
T1 's
The next denition is an important one, as it introduces a kind of a combinatorial game, which is tightly associated with Width. Afterwards, we will show that the minimum
for
which this game has a winning strategy, is exactly the Width of the respective formula. We will also relate this combinatorial game, to the Space of a formula, and thus, will get a relation between Width and Space.
Denition 7.9
(Existential
game)
Given a
k -CNF
formula,
F,
the existential
game
is dened as follows: There are two players, Duplicator(D) and Spoiler(S). Each has
board. Spoiler's game board is composed of all the variables of is composed of all assignments to variables in
(e.g.
Spoiler goes rst, and in his turn he may do one of the following:
Remove a pebble from a variable. In this case, Duplicator, in his turn, must remove a matching pebble from an assignment to that variable.
Spoiler wins the game if Duplicator's pebbles form a partial assignment that falsies one of
F 's
clauses. If Spoiler has a winning strategy, Spoiler is said to win the existential
game.
game.
If there is no refutation of k -CNF, F , of width d, then Duplicator has a winning strategy for the existential d + 1 game.
C
be all clauses that are derived by
d.
Let
be
d+1
is obviously not empty since the empty assignment belongs to it (because there is no
refutation of
with width
d,
so
0 C ). /
Assume by way of contradiction that Spoiler asked for variable valid move.
x,
in
H, d
to also
x,
C ).
d+1
x,
C that after the partial assignment A x such that every variable in A x = 0 with B x. However, notice that
in
73
using the rules of resolution, those two clauses derive more than
A B.
Moreover, since
assigns no
and
AB
Thus,
is no more than
d.
Thus
AB
is in
C.
falsies a clause in
C,
contradiction.
H is
a winning strategy, and Duplicator wins the existential (Width-Existential Game Relation 2)
d+1
game.
Lemma 7.11
Proof.
Let
Given k -CNF, F , if Duplicator has a winning strategy for the existential d + 1 game, then there is no refutation of F of width d.
H
be the set of all partial assignments that can be produced by Duplicator in a
d + 1 game.
d, C0 , . . . , Cn . We will show using complete induction that each partial assignment in H does not falsify any clause Ci in the proof, and thus, this cannot be a refutation (since 0 is falsied by any
of width partial assignment). Base case:
C0
is a clause of
F,
by denition.
C0 , . . . , Ci1 hold the claim. If Ci is derived by weakening, then H still does not falsify it (in a trivial way). Otherwise, Ci = A B , where Cj = A x and Cj = B x are some clauses in the proof (i.e. derived using resolution rule). Using the induction hypothesis, each partial assignment in H does not falsify Cj nor Cj . Now, Let f be any partial assignment in H .
every partial assignment in
If If
A B,
Ci .
f covers every variable in A B , since f is achieved in the middle of the existential k +1 game by denition of H , Spoiler may remove pebbles from all other variables, and
we are left with another partial assignment. Notice, that since this is a refutation of
d dierent variables, so Spoiler has enough pebbles to x (and Duplicator answers using his winning strategy, so the resulting partial assignment is in H ). But now the partial assignment also covers A x and B x. Using the induction hypothesis, it does not falsify them, and since it covers them, it satises them. Because Resolution is sound, the clause Ci = A B
width has at most place another pebble on variable derived from the previous two clauses using Resolution rules, is satised as well. These operations did not aect the satisability of assignments to variables of
d, Ci = A B
A B.
So,
change the
Given k -CNF, F , Duplicator has a winning strategy for the existential d + 1 game if and only if there is no refutation of F of width d.
Corollary 7.12.
If Duplicator can win the s + k 1 pebble game for k -CNF F , then there is no refutation of F of space s or less.
Proof.
space
F , C0 , C1 , ..., Cn ,
of
or less (here
Ci
assignments that can be produced by Duplicator in a winning strategy, in any stage of the existential
s+k1
game.
Ci
0.
|fi |(number
of variables
that
C0
is the trivial clause(1), and thus is satised by the empty partial assignment.
C F . Using the induction hypothesis, we have fi1 H , a partial assignment that satises Ci1 (All partial assignments in H do not falsify a clause in F ), and |fi1 | |Ci1 |. Since partial assignment fi1 is in H , and |fi1 | |Ci1 | = |Ci | 1 s 1, and C is a k -clause (because F is k -CNF), then we can extend f by those k or less variables, for a total of no more than s + k 1 variables, and end up with partial assignment g H , that satises Ci . That is true because Duplicator wins s + k 1 pebble game, so he must be able to extend fi1 (in H , his winning strategy). Obviously, since fi satises it, we can pick for each clause in Ci , a literal that satises it in fi , and remain with a partial assignment fi , s.t. |fi | |Ci |. Case 2: Ci has been deduced by axiom inference, Ci = Ci1 {C}, where C is derived from clauses of Ci1 . Using the induction hypothesis, we have fi1 H , a partial assignment that satises Ci1 , and |fi1 | |Ci1 |. Because Resolution is sound, the partial assignment fi1 satises Ci as well. |fi1 | |Ci1 | |Ci |. Case 3: Ci has been deduced by memory erasure, Ci = Ci1 \{C}, where C is derived from clauses of Ci1 . Using the induction hypothesis, we have fi1 H , a partial assignment that satises Ci1 , and |fi1 | |Ci1 |. Obviously, fi1 still satises Ci . Using same sense as in Case 1, we can take one variable from every clause of Ci that satises it, and build a partial assignment fi that still satises Ci , and |fi | |Ci |. The induction is complete, and every Ci is satised. But C0 , ..., Cn is a refutation, so Cn = 0, Ci
has been deduced by axiom download, even though it is satisable, contradiction! Thus, the assumption cannot be true, the space of the minimal refutation of
must be
s + 1.
Corollary 7.14.
Let F be an unsatisable k -CNF formula. Then it holds Space(F |= 0) W idth(F |= 0) k + 1. Proof. By Width-Existential game relations, since there is no refutation of F with width W idth(F |= 0) 1, then Duplicator wins the W idth(F |= 0) pebble game. Using SpaceExistential game relation, since the Duplicator won the W idth(F |= 0) pebble game, the space of a refutation of F must be at least W idth(F |= 0) k + 1. So, Space(F |= 0) W idth(F |= 0) k + 1.
75
Lecture 8
Eli Ben-Sasson
Scribe:
David Markus
8.1 Introduction
In this lecture we dene the
bounds on certain proof systems (currently - on Resolution and CP). The method to prove lower bounds is: 1. Prove that an proof system has the feasible interpolation property. 2. Use an hard-to-compute problem (for example it's not in
P),
integer factorization,
|F | nO(1)
is an
assuming that
and prove that if an proof system has the interpolation property, the
LP (F )O(1)
where
CN F ,
and
is the
length of the input to the problem. 3. Assuming that the computational problem is hard to compute, the proof of proof system can't be short. In this lecture:
in this
We will dene the feasible interpolation method, and show some known results. We will show two computational problems: problem. deciphering and the clique/colorability
8.2 Lower bounds on proof length using the Feasible Interpolation method
The
feasible interpolation method is a reduction from proof complexity to computation comIt relies on the following intuition. If it is hard to compute a problem then it
plexity.
is reasonable to expect that it should be hard to prove things which are related to this computation. The research regarding interpolation started in the study of mathematical logic. Craig's
x, y, zA(x, z) B(y, z)
when
x, y, z
groups.
81
i.e.,
A(x, z) B(y, z), and if the value of z is set to constant value, either A(x) or B(y) must be true in T .
If T x, y, zA(x, z) B(y, z) then there is a formula C(z), which is called the interpolant of A and B , such that T A(x, z) C(z) and T C(z) B(y, z). (this means that if C(z) = 0 then A(x, z), and if C(z) = 1 then B(y, z)).
Krajek's idea: consider the notion of an interpolant in a propositional system and study
computational complexity. More to the point, assume F is a CNF, F (x, y, z) = A(x, z) B(y, z) is unsatisable. An interpolant for A B is an boolean circuit C(z) such that if C() = 0 then A(x, ) is unsatisable, and if C() = 1 then B(y, ) is unsatisable. Notice that if A B is unsatisable, there must be some interpolant.
its
Denition 8.2.
proof in proof for
P , we say that P has the feasible interpolation property A B , |C(z)| (LP (A B 0))O(1) . In words, if A B has a short
P then the size of the interpolant is small. (In the examples below, given a short A B , we'll show how to eectively construct from it a small size interpolant C ).
if
T C0 -Frege
P=
NP?)
8.2.2 Lower bounds on proof length via the feasible interpolation method
We take a hard problem and dene an interpolant which will compute it. For example, assume
and
B
is is
such that
M M
0 1.
and
A(x, z) encodes the statement z is an encryption of M , and the B(x, z) encodes the statement z is an encryption of M , and the Additional variables may be needed to allow A, B to be formulated as
must compute the rst bit of
An interpolant for
AB
E 1 (z).
hard, i.e., if there in no small circuit to compute the rst bit of short proof in resolution or in cutting planes for
E 1 ,
then there is no
A B.
A B,
feasible interpolation is unlikely for Frege.) We have now conditional lower bound, because
82
AB
is also
For CP, the only known exponential lower bound on proof length is shown via the feasible interpolation method. (Open question: are random-CNFs hard for CP?). If there are
such that
A(x, ) = 0
and
B(y, ) = 1,
and
interpolants for
AB
A, B
such
{|A(x, ) = 0}
{|B(y, ) = 1}.
If A(x, z)B(y, z) is an unsatisable CNF over distinct variables, then there exists an interpolant C(z ) for A(x, z) B(y, z) such that |C| O(LR (A B 0)). Moreover, if z appears only in positive literals (or only negative literals) in A, then C is a monotone circuit (it has only , gates).
Theorem 8.4
|C| O(LCP (A B 0)). Moreover, if z appears only in positive literals in A, then C is a monotone circuit.
Let m, n N and m < n. Z = {zij : 1 i < j n} Z represents n. zij = 1 if (i, j) is vertex in G. Am = {G|G includes m clique}, Bm = {G|G is (m 1) colorable}. Am Bm = . We dene A(x, z) = G Am , B(y, z) = G Bm . graph with size Notice that
Denition 8.5.
separates
A, B
if
C(z) = 0 g A, /
and
C(z) = 1 g B . /
n log n
2 3
Theorem 8.6.
|C| 2
1 n log n 3
, then
The previous theorem means that there is no eective interpolant for the two sets dened in Denition 8.5. We dene a CNF formula as follows.
x = {xli |l = 1..m, i = 1..n}, then A(x, z) = = 1..m}, {li xli |l = 1..m, i = i }, {li xl i |l = l }, {li xl i zij |l = l , i, j} A x x x is satisable i z contains a m-clique. The variables of z appear only in positive literals, so the circuit is monotone. m1 If we dene Y = {yis |l = 1..n, i = 1..m 1}, then B(y, z) = {s=1 yis |i = 1..n}, {is y yis |, s = s }, {is yjs zij |i, j, s} (in B z 's variables appear only in negative literals). y
Let
{n xli |l i=1
According to Theorem 8.4 and Theorem 8.6 above we have Despite that the CNF itself is short (|A
LCP (A B
0) 2
1 n log n 3
B| = O(x3 ))
83
1. Given an assignment to
z , we prove that it isn't possible to partition the clauses of the refutation to two groups: clauses which doesn't include variables from y , and clauses which doesn't include variables from x. 0)
belongs to the rst group, then
is unsatisable, and if
is unsatisable.
z,
Proof of Theorem 8.3. By induction. We say that a clause is a x-clause if it doesn't contain y -variables, and say it is a y -clause if it doesn't contain x-variables (in both cases the clause may contain z -variables). Given assignment to z , the axioms of A are x-clauses, and the axioms of B are y -clauses.
When a resolution inference is used, 1.
is literal over
z. xand
If
l() = 1 D. We did l
D E with E , y -variables.
and
and if
l() = 0
we can replace
DE
with
2. if
is variable over
x, D
are
x-clauses,
x-clause.
3. if
is variable over
- as above.
Dl and E l can be from dierent groups only if l Z . When the induction ends, 0 belongs to the x-clauses or to the y -clauses. By this it is possible to decide if A is unsatisable or B
is unsatisable. To create circuit we dene new gate: Given
sel(l, a, b) =
a l=0 b l=1
as DAG, we replace it by a circuit of size ||, which is constructed from the constants {0, 1} and from the gates , , sel. the axioms of A will be replaced by 0, the axioms of B - by 1. In junction we replace: l xab l y ab l z sel(z, a, b) (z x) y (if we start with x and then there is y -clause, it's better to continue with it, because it doesn't have x-variables, so it is shorter)
84
Lecture 9
Eli Ben-Sasson
Scribe:
9.1 Introduction
Today we shall present a family of proof systems, denoted
Res[k],
where
is a parameter,
which generalizes our well-known resolution proof system (it turns out Resolution is exactly
Res[1]).
Our nal goal is showing lower bounds for proofs for random
CN F
formulas. To
this end, we use two new ideas: a switching lemma, and a concept of local soundness, which would be explained later. Formally, we aim to show that with high probability for a random CNF with and
variables
10n
clauses:
0) > exp ( (n ))
Res[k].
9.2 Res[k]
Historically,
are weakened formulations of bounded arithmetic such that if they can prove PHP, then
LRes[k] (PHP) no(1) . Thus, in order to show that these formulations do not we show bounds on Res[k] (i.e. counting is impossible in the system). o(1) In particular, a theorem by Ajtai: I0 PHP LboundedF rege (PHP) n
is a clause that is
k DN F formulas (clauses of size k each): CN F is a set of 1 DN F formulas, and in Resolution each line 1 DN F , and so Res [1] =Resolution. Res[k]
are
The derivation rules are the rules of Resolution, and in addition creation and decomposition of DNFs (for literals lij and 1.
k DN F C ):
-introduction:
l1 C,...,lk C V ( k lj )C j=1
91
Vk
2.
-elimination:
( V
j=1 lj C
lj C lj )C,...,l1 lk D CD
3. Resolution:
The third rule is redundant, since it can be simulated by using the standard Resolution rule and rules 1-2.
In this new proof system the lines are derivation law: 1. For
C1 , . . . , Ck , D k DN F ,
if
C1 , . . . , Ck |= D
then
C1 ,...,Ck . D
It suces to show a lower bound for this proof system in order to obtain one on denition of
Res[k].
The
S Res [k] is simpler than that of Res[k], although the system may be stronger P we can similarly dene LP (F 0) LSP (F 0).
a semantic proof system
(we may be able to prove more things in it, and with shorter proofs) For every proof system general we have
S P,
and in
assignment, we traverse the tree according to the assignment and the output is the value in the leaf we reach. Therefore, a decision tree describes a function, so it makes sense to represent formulas using decision trees. Suppose now we have a proof in such that
S Res [k]:
A collection of lines,
= C1 , . . . , C s = 0
Ci
is a k-DNF.
is small, e.g.
s = no(1) .
| = C1 | , . . . , Cs |
o(1)
2. Claim that with probability greater than 0, every tree of small depth, e.g. 3. We now have that derivation). Now translate every
Ci |
d (Ti ) = log
n.
with
| = T1 , . . . , Ts = 0 Tjt
d (Ti )
small, and
92
Lecture 10
Eli Ben-Sasson
Scribe:
10.0.1 Introduction
In this lecture we start the proof that almost surely a random 3-CN F does not have a short proof in the proof system
Res[k].
a short proof, and reach a contradiction. The contradiction will be reached by proving a switching lemma and thereby showing that the width of the refutation of
must be small
on the one hand, and on the other hand showing that it must be large because
has an
expanding graph. Today we will show the switching lemma, which says that under a certain distribution on restrictions,
is of small depth.
1
There are depth bounded functions which are tough to compute. For example, for XOR on
bits,
We
sized (n ) exp nO( d ) . Another function that is tough to compute is majority. expand the model to depth d and {, , }. In the proof we will use a switching lemma
as follows:
This reduces the depth of the function to after being hit, can be represented as a
d 1. Every DN F short CN F .
We do this exclusively until we get a depth-2 function. For XOR (for example), we get an exponentially large expression of depth
2.
F.
has a short
Res[k] system, where proof lines are kDN F s. With very high probability, restriction will set to 0 some clause in F . We need an assignment which is with F .
= D1 , . . . , D s
is a
Res[k]
refutation of
F.
Assume
is small (say
s=
nO(1) ).
101
2. Apply a good restriction to all lines in prove. For resolution, 3. Argue that small
F |
is still hard to
W (F | 0)
must be large.
The third step will follow from the switching lemma we will prove today.
of variables is a cover of a
DN F D,
if every term of
S.
D D.
has a
be a
k CN F .
c k
Claim 2.
Proof.
ti = li1 lik of D be set 1 is 2k . But since whole DN F gets set to 1 goes exponentially down! P r [D | = 1]
is small.
DN F ,
If If
c(D) = c
is large,
c(D) = c DN F .
c(D)
(k 1)
Switching Lemma
Theorem 10.3.
1. k 1
2. s0 , s1 , . . . , sk1 0 3. p1 , . . . , pk 0 4. R be a distribution over restrictions satisfying: For every i k and i DN F D, Then for every kDNF it holds that
k1 k
if
c(D) si1
then
P rR [D | = 1] pi
P rR d(F | ) >
i=0
si
i=1
Pk1
j=i
sj
pi ()
102
Corollary 10.4.
Let k N such that k 1 and R be a distribution on restrictions such that for every kDNF F , we have
P rR [F | = 1] < 2c(F ) ()
s 4k
s Proof of Corollary. We set si = 4i and pi = 24si = 2si1 .We notice that k1 sj = j=i k1 1 si (1 + 1 + 16 + . . .) 2si . We can now apply the theorem with s0 , . . . , sk1 and j=i 4
p1 , . . . , p k ,
because if
then
P r [D | = 1] 2si1 = pi .
k1
by ()
So by the theorem,
P rR d(F | ) >
i=1
and
k1
P rR d(F | ) >
i=1
si
i=1
Pk1
j=i
k si
pi
i=1
22si 24si k 2
s 4k
By induction on So
k 1:
can be represented by a
Base
If
c(D) s0
then
D is a s0 . So,
s0 variables. kDN F F ,
k1 k
P rR d(F | ) >
i=0
si
i=1
pi
Pk1
j=i
si
,
This
Step
k1 ( )
and consider a
k DN F D.
then again
implies
().
c(D) sk1 , then let T be a cover for D. Then |T | sk1 . For every {0, 1}T , consider D | which is a k 1 DN F . By the induction hypothesis,
k1
P rR d ((D | ) | ) >
i=0
We will connect to each node for each
s i < 2(
Pk2
j=i
sj )
pi . (k 1)DN F
.
representing
a tree for a
103
So:
k2
k1
si < 2
k1
i=1
2(
Pk2
j=i
sj )
pi =
2(
i=1
Assume
sj )
pi .
k2 i=0 si . What concerns us is if
is good, i.e.
, d ((D | ) | )
and
and
aren't
consistent.
Claim 5.
The dtree obtained by pruning T according to gives a decision tree that represents D | (is given as homework). This claim nishes the proof.
104
Lecture 11
Eli Ben-Sasson
Scribe:
In this lecture we investigate the complexity of random Given a Res [k] refutation that
= l1 , l2 , . . . , ls = 0
of a random
restriction and from each line we derived a decision tree with small depth, which can be converted into a narrow Resolution refutaion . In this step there are no contradictions
because it's possible that under the random restriction some of the clauses became false. In order to get a contradiction, we show that the surviving system of equations is still expanding and therefore requires high-width to refute.
Ax = b.
We are going to prove a lower bound on a random system of linear equations over GF (2) with
variables and
m = 10n
Ax = b.
Ax = b be a system of equations so that A is an (r, )-boundary expander with > 0 and r = (n). A matrix Amn over GF (2) is a (r, )-boundary expander if I [m] , |I| r : |I| |I| where I is the set of all columns j [n] such that there exists exactly one row i I , that hold Ai,j = 1.
Let
Lemma 11.1.
For every I [m], |I| < r, it holds that AI x = bI is satisable, where AI is the matrix with A's rows indexed by I . Proof. Assume the contrary. Then there exists a nonzero vector v GF (2)|I| such that v T AI = 0 but v T bI = 1. Now consider I = supp (v). Then |I | = 0, but |I | < |I| < r and therefore by expansion, |I | > |I | and in particular is nonzero, contradiction.
We now want to select a set of random variables, such that every random restriction on these variables will not refute any small set of restrictions, and therefore conserves the expansion property.
111
Given
J [n]
(the closure of
J )
and
IJ
algorithm:
r 2 and
I \J <
|I |
do
IJ
is the set of lines we are going to remove from our system. These are the
lines whose both size and boundary are small. We show the following things: 1. If
|J|
is small, so does
and
IJ
2. If we remove
IJ
and
from
A,
Assuming the aforementioned, we now have a way to choose a random restriction in a way that will leave us with a formula that is still hard to prove. Denote obtained by removing from whose indices are in
A\J
all rows of
IJ
J.
r 2, 2
Lemma 11.2.
Proof.
and
-boundary expander.
I [m] \IJ
such that
|I | <
r 2
A\J I
<
|I |.
Consider a column
j I
i I
with
Ai,j = 1.
In the matrix
A\J , if j J , then this column doesn't appear at all in the j A\J I . Otherwise, j A\J . Therefore I A\J I J , and /
2
I \ J A\J I \ J <
Contradiction.
|I |is
hold. Therefore
IJ
in Algorithm 1.
Lemma 11.3.
Proof.
If |J| <
r 4
then IJ
|J|
2 IJ > |J|. Considering the last iteration 2 r of Algorithm 1 for which IJ |J| , we have IJ < 2 . In the next step, we nd I r such that |I | < 2 and I \J 2 |I |. Now consider I IJ . Its size is smaller than r r because each set is smaller than 2 . Therefore by expansion I IJ > I IJ . Therefore I IJ \J I IJ |J| > I IJ 2 I IJ = 2 I IJ . But, consider IJ after the last iteration, IJ = IJ I , IJ \J 2 IJ for the following reason: let i1 , . . . , it be a sequence of subsets of [m] which are taken when the algorithm runs
Suppose for the sake of contradiction that
112
IJ = t Il . Note that |Il \ (J supp (l <l Il ))| < |Il | because of the way l=1 2 t the algorithm adds Il 's into IJ . Now, IJ l=1 Il \ (J supp (l <l Il )). Therefore, IJ \J t |Il \ (J supp (l <l Il ))| t |Il | = IJ . Meaning, after the t'th l=1 2 l=1 2 iteration, we have IJ > IJ > 2 |J| (because of expansion). Contradiction.
such that
113
Lecture 12
Eli Ben-Sasson
Scribe:
EBS: What have we done in this lecture? Where are we heading? See Lecture 10
for an example of a good set of scribe notes.
Denition 12.1.
Init:
Given
J [n], let J , IJ
and
and
A\J
2
IJ , J J r While (I [m], 0 < |I | 2 IJ IJ I J J N (I ) return IJ , J and A\J , s.t. A\J columns J from A.
I \J <
|I |)
is the minor of
A,
IJ
and
If |J| <
r 4
then IJ <
|J| IJ ,
when
IJ
|J|.
Let
be the
IJ I = IJ I
in the next iteration(assuming by contradiction that such . Notice the following observations:
IJ , |I \J| < =
|I |. |J| <
r 4 ).
IJ
|J| <
r 4
|I | < r . Since the graph is (r, )-boundary expanding, r we get that |I | |I |, so, |I \J| |I ||J|. Since |I | > (that's how we chose IJ ), 2 we get that: |J| < 2 |I |. Therefore, |I \J| > |I | 2 |I | = 2 |I |. Contradiction!
|I | <
to
IJ ,
by the algorithm.
Denition 12.5.
denote
IV ars(t) ,
and
V (t) =
V ars(t). t is called locally consistent, if t (At x = bt ) consistent, if every term in it is locally consistent.
is satisable.
A DNF is
locally
Lemma 12.6
r 2,
Proof.
Otherwise,
I I ,
s.t.
I V (t).
But, by Lemma 4,
I t.
Since
is locally
Lemma 12.7 (6). If A is (r, ) expanding, and is a Res[k] refutation of Ax = b, then there exists a refutation = 0 1 , s.t.:
1. 0 is a resolution derivation of width Proof.
6k
t, |t| k , that is not locally consistent, t (At x = bt ) is unsatisable. 2 t k . So, V ars(t) 6k , since each line in t has three 1 s at most. t (At x = bt ) = 0 (At x = bt ) |= t
t from At x = bt . 0 is the union of all such derivations. In particular, consider Axiom clause (Ax = b). This axiom is a 1-DNF, if any term of it, i.e., any literal l Axiom, is not locally consistent, resolve l 0 with Axiom, and add to 1 only those axioms that are locally consistent. 1 follows , but whenever an axiom is mentioned in , we put in 1 the locally consistent version of it, and whenever a locally inconsistent term is introduced in :
by the implicational completeness of
Res,
l1 l2 lk 0 D
We achieved this expression using inconsistent. Thus,
l2 lk
is locally
|1 | k || A,b
Denition 12.8.
1. Pick 2. Let
Let
X V ars
at random, s.t.
|X| =
r 4 .
IX
be the closure of
X,
and
A,b
according to it.
Note.
by Lemma 3,
X < r,
AIX x = bIx
is
satisable.
Theorem 12.9
Note.
If
(Switching Lemma)
d 2k
s.t. P rR [D|p = 1]
1] (1 2k )
Assume
C(D) k
2(C(D)) ,
C(D)2k k
k -DNF D. 2k .
So,
with probability
P r[D|p =
<e
= Exp((C(D)))
D = t1 t2 tc over disjoint variables, s.t. i.ti is locally consistent. P rR [t1 (AIx x = bIx ) = 1] 2k , because t1 is locally consistent, so by Lemma 5, t1 (AIx x = bIx ) is satisable. So, t1 (AI x = bI ) is actually an ane subspace of x : AIx x = bIx of x x co-dimension k .
122
Lecture 13
TBD
Eli Ben-Sasson
Scribe:
Gadi Aleksandrowicz
3CN F
Res[k]. AC0 .
AC0
as well.
There are two ways of proving lower bounds for constant-depth circuits: 1. Switching Lemma - shows lower bounds for
2. Approximation Method - Gives lower bounds to We used the switching lemma in order to hit a
DN F
CN F
with
small width. This transforms short proofs to proofs with small width in Resolution. What about circuits of depth 2? Unknown.
13.2 Frege
After one use of the switching lemma, the system becomes
(r/2, /2)
boundary expander.
prove (in short proof ) the pigeonhole principal (this was shown by Ajtai). We pick at random
|x| = |y|,
selected holes. We remain with PHP on a smaller set. We now turn to Bounded Frege. We consider the parity function prove that a circuit functions
We
of depth
fC , g
: fC |
g|
remains complex - a contradiction. We deal similarly with proofs of PHP by a sequence of circuits and all circuits of depth
d:
we impose restriction
to get a
problem is that some of the functions become constant (tautologies or contradictions). To mend this we change the way the gates in the circuits behave, so the functions won't be constant.
13.3 Resolution
When dealing with the Resolution proof system, we saw the following: 131
Lower bounds via the width method. A connection between the width and the space of a proof. The interpolation method which connected proof length to the complexity of computations. We have shown that a short proofs implies a small circuit for computing interpolants in Resolution or Cutting Planes.
Res[k]
CN F .
G:
{0, 1} {0, 1} with n < m whose output's distribution (given the uniform distribution n m on {0, 1} as input) is indistinguishable from the uniform distribution on {0, 1} (there is,
of course, a formal denition which cannot be given now).
f : {0, 1}n {0, 1} (i.e. there is no small circuit computing f ). Suppose we have m sets I1 , . . . , IM with |Ij | = n for each set and |Ij Ik | < log n, and dene G(x) = f (x|I1 ) . . . f (x|Im ). This way every bit is calculated in
The NW-Generator is based on a hard function a complicated way, and there are only small dependencies between the dierent bits. Note that if G is a generator, i.e. have
m > n,
b {0, 1}m
we
b Im(G) /
f is hard, and G is an NW-Generator built from f , b Im(G), then the contradiction G(x) = b is hard to prove in Frege. It is known that / claim is true for Resolution and for Res[ log n].
132
Homework Assignment 1
Denition 1
(Cutting Planes)
Cutting Planes (CP) is the name of a sequential proof n system that relies on geometry of polytopes in R . A line of a CP proof is a half-space n , i.e., an inequality over variables x , . . . , x , with integer coecients. It has the form in R 1 n n ai xi b, where a1 , . . . , an , b Z. The CP system has the following two inference rules i=1 which are called addition and division, respectively.
n n i=1 ai xi i=1 ai xi b, n (ai + ai )xi b + b i=1
n i=1 ai xi
where
n i=1 ai xi
c, a1 , . . . , an , b Z . b/c n+1
Problem 1.
pigeons and
Let
PHPn+1 n
0) =
nO(1) .
This system can be described as a two-player game and we shall call the players Pavel and Sam (in honor of Pavel Pudlk and Sam Buss).
is an unsatisable boolean
formula over NOT, AND, OR gates (each gate has fan-in at most 2). Suppose Sam were to claim The circuit
is satised by an assignment
.
lying? One way would be to take Sam to court, and the BP-game is a formal protocol for conducting the trial and convicting Sam of lying. The game proceeds in rounds. On the some Boolean formula
ith
Ci ,
bi ,
Ci
Ci on ? and Sam's th round with Pavel asking C (the circuit response is his reply. The game starts on the 0
and We interpret as the question What is the value of that we want to prove is unsatisable) and Sam responding with
bi .
Ci
1,
C() = 1. The game continues in rounds as described above and ends when an immediate contradiction is reached. An immediate contradiction for the NOT gate (denoted ) is a pair of indices i, j such that Cj is the circuit Ci and bj = bi . An immediate contradiction of a AND gate is a triple i, j, k such that Ck is Ci Cj and bk = bi bj . (An immediate contradiction of a
both question and answer. This rst round commits Sam to his false claim that OR gate is similarly dened). To sum, a BP-proof of the circuit questions, edges are labeled by
that emerges from the sequence of questions and answers labeling the path that leads from the root to . The length of a BP-proof is the size of its tree and the BP-length of proving
C,
denoted
LBP (C
Prove:
0),
Problem 2.
LPB (C
LPB (PHPn+1 n
0) = nO(1) .
We end by noting that it is not known if the BP-system is cannot rule out the possibility that for
super.
In other words, we
every
unsatisable formula
of size
we have
0) =
nO(1) .
HW1
boolean circuit, i.e., Sam's questions are not limited to formulas. The hint is to use circuits
C t with t inputs and t + 1 outputs, where on input {0, 1}t the ith output of C t is 1 i has i 1's, i.e., the circuit C t counts the number of 1s in . The circuit C t should t/2 . Use these circuits to count various subsets of the be constructed inductively from C n+1 variables of PHPn .
The original proof of this upper bound works even when Sam is limited to asking only formulas and appears in Buss [1987].
HW2
Homework Assignment 2
Problem 3.
LR (PHPn+1 n
0).
Hints:
((n), d/2)-unique neighbor expander graph with n+1 left vertices, n right vertices and out-degree d on the left hand side, where d is a suciently large constant (say, d = 10).
Use the existence of a bipartite Consider the restriction of
PHPn+1 n
induced by
where pigeon
is allowed to go only
in
G.
Dene a suitable width measure as done in class and show every refutation of the pigeonhole principle, restricted to
G,
Problem 4.
in Lecture 7.
Prove: If
is an unsatisable
0) W(F
0) k + 1.
Hint: use the combinatorial characterization of width of Atserias and Dalmau [2008], proved
F be an unsatisable k -CNF over n variables (think of k as a constant and n k ). Suppose LR (F 0) nO(1) . By the size-width relation Theorem 4.5 we have W(F 0) O( n log n). Is there a O(1) and width O( n log n) simultaneously? resolution refutation of F of length n
Let If
The analogous question for treelike resolution, which is also open, is the following.
LT R (F O(log n)
0)
W(F
of length
nO(1)
and width
O(log n)
and
LT R (F
3-CNF formulas with n variables, O(n) clauses 0) = O(n) but for every treelike refutation one
HW3
Homework Assignment 3
Problem 6.
Prove that cutting planes has the feasible interpolation property. Let
A(x, y) B(x, z)
is unsatisable.
to
0))O(1) .
Hints:
Use the result of Buss and Clote [1996] which says that if of length
has a CP-refutation
S,
then
S O(1)
S O(1)
bits.
Let
be a CP-refutation of
F . Take each line in the proof and construct from it to A and the other to B . Call these sets of lines A , B
to
x,
at least one
A | , B | S O(1)
is a CP-refutation of
A(, y)
or
B(, y).
that decides which of
A , B
A, B ,
respectively). Let
Problem 7.
T
T1 , . . . , Ts
and
each.
Let
F1 , . . . , Fs , F
be their corresponding
representations as If In words, if
d-CNFs.
{T1 , . . . , Ts } |= T ,
W ({C1 , . . . , Cs } T
C ) (s + 1)d. C
can be derived from
{T1 , . . . , Ts } T
from
semantically imply
C1 . . . Cs
decision tree
(s + 1)d.
{T1 , . . . , Ts }
T |= T
HW4
References
1. Albert Atserias and Victor Dalmau. A combinatorical characterization of resolution width. of Computer and System Sciences, 74(3):323334, May 2008. 2. Beame, Impagliazzo, Pitassi, and Segerlind. Formula caching in DPLL. In Colloquium on Computational Complexity, technical reports, 2006. 3. Eli Ben-Sasson. Size space tradeos for resolution. In Proceedings of the 34th sium on Theory of Computing (STOC '02), pages 457464, May 2002.
Journal
ECCCTR: Electronic
4. Eli Ben-Sasson, Russell Impagliazzo, and Avi Wigderson. Near optimal separation of treelike and general resolution. Combinatorica, 24(4):585603, September 2004. 5. Eli Ben-Sasson and Avi Wigderson. Short proofs are narrowresolution made simple. the ACM, 48(2):149169, March 2001. 6. Blake. Canonical expressions in boolean algebra. plexity (ECCC), 4(20), 1997.
Journal of
7. Samuel R. Buss. Polynomial size proofs of the propositional pigeonhole principle. (4):916927, 1987.
J. Symb. Log
, 52
8. Samuel R. Buss and Peter Clote. Cutting planes, connectivity, and threshold logic, March 06 1996. URL http://citeseer.ist.psu.edu/678454.html;http://euclid.ucsd.edu/~sbuss/ ResearchWeb/cuttingplanes/paper.ps. 9. Vaek Chvtal and Endre Szemerdi. Many hard examples for resolution. (4):759768, October 1988.
Journal of the ACM
, 35
10. Stephen A. Cook and Robert A. Reckhow. The relative eciency of propositional proof systems. Symb. Log, 44(1):3650, 1979.
J.
11. Martin Davis, George Logemann, and Donald Loveland. A machine program for theorem proving. Communications of the ACM, 5(7):394397, July 1962. 12. Martin Davis and Hilary Putnam. A computing procedure for quantication theory. ACM, 7(3):201215, 1960. 13. Armin Haken. The intractability of resolution. August 1985.
Theoretical Computer Science Journal of the
, 39(2-3):297308, , 24
14. John Hopcroft, Wolfgang Paul, and Leslie Valiant. On time versus space. (2):332337, April 1977.
15. Pavel Pudlk. Lower bounds for resolution and cutting plane proofs and monotone computations. Journal of Symbolic Logic, 62(3):981998, September 1997. 16. Pavel Pudlk and Samuel R. Buss. How to lie without being (easily) convicted and the length of proofs in propositional calculus. In Leszek Pacholski and Jerzy Tiuryn, editors, CSL, volume 933 of Lecture Notes in Computer Science, pages 151162. Springer, 1994. ISBN 3-540-60017-5.
17. Ran Raz. Resolution lower bounds for the weak pigeonhole principle. 115138, 2004.
, 51(2):
18. Alexander A. Razborov. Resolution lower bounds for the weak functional pigeonhole principle. Theoretical Computer Science, 1(303):233243, June 2003. 19. Grigori Tseitin. On the complexity of derivation in propositional calculus. In A. O. Silenko, editor, Structures in Constructive Mathematics and Mathematical Logic, Part II, pages 115125. Consultants Bureau, New York-London, 1968. 20. Alasdair Urquhart. Hard examples for resolution. 1987.
Journal of the ACM
, 34(1):209219, January