Deterministic Black-Box Identity Testing π-Ordered Algebraic Branching Programs

被引:6
|
作者
Jansen, Maurice [1 ]
Qiao, Youming [1 ]
Sarma, Jayalal M. N. [1 ]
机构
[1] Tsinghua Univ, Inst Theoret Comp Sci, Beijing, Peoples R China
来源
IARCS ANNUAL CONFERENCE ON FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE (FSTTCS 2010) | 2010年 / 8卷
基金
中国国家自然科学基金;
关键词
ARITHMETIC CIRCUITS; LOWER BOUNDS; COMPLEXITY;
D O I
10.4230/LIPIcs.FSTTCS.2010.296
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we study algebraic branching programs (ABPs) with restrictions on the order and the number of reads of variables in the program. An ABP is given by a layered directed acyclic graph with source s and sink t, whose edges are labeled by variables taken from the set {x(1), x(2), . . . , x(n)} or field constants. It computes the sum of weights of all paths from s to t, where the weight of a path is defined as the product of edge-labels on the path. Given a permutation pi of the n variables, for a pi-ordered ABP (pi-OABP), for any directed path p from s to t, a variable can appear at most once on p, and the order in which variables appear on p must respect pi. One can think of OABPs as being the arithmetic analogue of ordered binary decision diagrams (OBDDs). We say an ABP A is of read r, if any variable appears at most r times in A. Our main result pertains to the polynomial identity testing problem, i.e. the problem of deciding whether a given n-variate polynomial is identical to the zero polynomial or not. We prove that over any field F, and in the black-box model, i.e. given only query access to the polynomial, read r pi-OABP computable polynomials can be tested in DTIME[2(O(r log r.log2 n log log n))]. In case F is a finite field, the above time bound holds provided the identity testing algorithm is allowed to make queries to extension fields of F. To establish this result, we combine some basic tools from algebraic geometry with ideas from derandomization in the Boolean domain. Our next set of results investigates the computational limitations of OABPs. It is shown that any OABP computing the determinant or permanent requires size Omega(2(n)/n) and read Omega(2(n)/n(2)). We give a multilinear polynomial p in 2n + 1 variables over some specifically selected field G, such that any OABP computing p must read some variable at least 2(n) times. We prove a strict separation for the computational power of read (r - 1) and read r OABPs. Namely, we show that the elementary symmetric polynomial of degree r in n variables can be computed by a size O(rn) read r OABP, but not by a read (r - 1) OABP, for any 0 < 2r - 1 <= n. Finally, we give an example of a polynomial p and two variables orders pi not equal pi', such that p can be computed by a read-once pi-OABP, but where any pi'-OABP computing p must read some variable at least 2(n) times.
引用
收藏
页码:296 / 307
页数:12
相关论文
共 50 条
  • [1] Deterministic black-box identity testing π-ordered algebraic branching programs
    Jansen, Maurice
    Qiao, Youming
    Jayalal Sarma, M.N.
    Leibniz International Proceedings in Informatics, LIPIcs, 2010, 8 : 296 - 307
  • [2] Equivalence, identity, and unitarity checking in black-box testing of quantum programs
    Long, Peixun
    Zhao, Jianjun
    JOURNAL OF SYSTEMS AND SOFTWARE, 2024, 211
  • [3] Black-Box Identity Testing of Noncommutative Rational Formulas in Deterministic Quasipolynomial Time
    Arvind, V.
    Chatterjee, Abhranil
    Mukhopadhyay, Partha
    PROCEEDINGS OF THE 56TH ANNUAL ACM SYMPOSIUM ON THEORY OF COMPUTING, STOC 2024, 2024, : 106 - 117
  • [4] Testing Functional Black-Box Programs Without a Specification
    Walkinshaw, Neil
    MACHINE LEARNING FOR DYNAMIC SOFTWARE ANALYSIS: POTENTIALS AND LIMITS, 2018, 11026 : 101 - 120
  • [5] A TEST CASE GENERATION METHOD FOR BLACK-BOX TESTING OF CONCURRENT PROGRAMS
    ARAKAWA, N
    SONEOKA, T
    IEICE TRANSACTIONS ON COMMUNICATIONS, 1992, E75B (10) : 1081 - 1089
  • [6] Black-Box Identity Testing of Depth-4 Multilinear Circuits
    Saraf, Shubhangi
    Volkovich, Ilya
    COMBINATORICA, 2018, 38 (05) : 1205 - 1238
  • [7] Black-Box Identity Testing of Depth-4 Multilinear Circuits
    Saraf, Shubhangi
    Volkovich, Ilya
    STOC 11: PROCEEDINGS OF THE 43RD ACM SYMPOSIUM ON THEORY OF COMPUTING, 2011, : 421 - 430
  • [8] Black-Box Identity Testing of Depth-4 Multilinear Circuits
    Shubhangi Saraf
    Ilya Volkovich
    Combinatorica, 2018, 38 : 1205 - 1238
  • [9] Establishing trust in black-box programs
    Xia, Ying
    Fairbanks, Kevin
    Owen, Henry
    PROCEEDINGS IEEE SOUTHEASTCON 2007, VOLS 1 AND 2, 2007, : 462 - 465
  • [10] Tailoring of black-box testing methods
    Murnane, Tafline
    Reed, Karl
    Hall, Richard
    2006 AUSTRALIAN SOFTWARE ENGINEERING CONFERENCE, PROCEEDINGS, 2006, : 292 - +