Hidden Permutations to the Rescue: Multi-Pass Streaming Lower Bounds for Approximate Matchings

被引:1
作者
Assadi, Sepehr [1 ,2 ]
Sundaresan, Janani [1 ]
机构
[1] Univ Waterloo, Cheriton Sch Comp Sci, Waterloo, ON, Canada
[2] Rutgers State Univ, New Brunswick, NJ 08855 USA
来源
2023 IEEE 64TH ANNUAL SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE, FOCS | 2023年
关键词
streaming; matching; communication complexity; multi pass streaming lower bounds; COMMUNICATION COMPLEXITY; GRAPH;
D O I
10.1109/FOCS57990.2023.00058
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We prove that any semi-streaming algorithm for (1+ epsilon)-approximation of maximum bipartite matching requires Omega(log (1/epsilon/log (1/beta)) passes, where beta. (0, 1) is the largest parameter so that an n-vertex graph with n(beta) edge-disjoint induced matchings of size Theta(n) exist (such graphs are referred to as Ruzsa-Szemeredi graphs). Currently, it is known that Omega(1/log log n) <= beta <= 1 - Theta(log* n/log n) and closing this huge gap between upper and lower bounds has remained a notoriously difficult problem in combinatorics. Under the plausible hypothesis that beta = Omega(1), our lower bound result provides the first pass-approximation lower bound for (small) constant approximation of matchings in the semi-streaming model, a longstanding open question in the graph streaming literature. Our techniques are based on analyzing communication protocols for compressing (hidden) permutations. Prior work in this context relied on reducing such problems to Boolean domain and analyzing them via tools like XOR Lemmas and Fourier analysis on Boolean hypercube. In contrast, our main technical contribution is a hardness amplification result for permutations through concatenation in place of prior XOR Lemmas. This result is proven by analyzing permutations directly via simple tools from group representation theory combined with detailed information-theoretic arguments, and can be of independent interest.
引用
收藏
页码:909 / 932
页数:24
相关论文
共 94 条
[1]  
Ablayev F., 1993, Automata, Languages and Programming. 20th International Colloquium, ICALP 93 Proceedings, P241
[2]   Access to Data and Number of Iterations: Dual Primal Algorithms for Maximum Matching under Resource Constraints [J].
Ahn, Kook Jin ;
Guha, Sudipto .
ACM TRANSACTIONS ON PARALLEL COMPUTING, 2018, 4 (04)
[3]  
Ahn KJ, 2011, LECT NOTES COMPUT SC, V6756, P526, DOI 10.1007/978-3-642-22012-8_42
[4]  
Ajtai M., 1983, P 25 ACM S THEORY CO, P1, DOI DOI 10.1145/800061.808726
[5]   Testing subgraphs in large graphs [J].
Alon, N .
RANDOM STRUCTURES & ALGORITHMS, 2002, 21 (3-4) :359-370
[6]   A characterization of easily testable induced subgraphs [J].
Alon, Noga ;
Shapira, Asaf .
COMBINATORICS PROBABILITY & COMPUTING, 2006, 15 (06) :791-805
[7]  
Alon N, 2012, STOC'12: PROCEEDINGS OF THE 2012 ACM SYMPOSIUM ON THEORY OF COMPUTING, P1079
[8]  
Assadi S., 2020, 61 ANN IEEE S FDN CO
[9]  
Assadi S., 2023, STOC 23
[10]  
Assadi S, 2025, Arxiv, DOI arXiv:2307.02968