ABSTRACT
The purpose of this paper is to explore the possibility that purely graph-theoretic reasons may account for the superlinear complexity of wide classes of computational problems. The results are therefore of two kinds: reductions to graph theoretic conjectures on the one hand, and graph theoretic results on the other.
We show that the graph of any algorithm for any one of a number of arithmetic problems (e.g. polynomial multiplication, discrete Fourier transforms, matrix multiplication) must have properties closely related to concentration networks.
- 1.Aho, A.V., Hirschberg, D.S. and Ullman, J.D. Bounds on the Complexity of the longest subsequence problem. Proc. 15th Symp. on SWAT 104-109, (1974).Google ScholarDigital Library
- 2.Aho, A.V., Hopcroft, J.E. and Ullman, J.D. The Design and Analysis of Computer Algorithms. Addison-Wesley, Reading, Mass. (1974). Google ScholarDigital Library
- 3.Borodin, A. and Munro, I. Computational Complexity of Algebraic and Numeric Problems. American Elsevier. (1975).Google Scholar
- 4.Cook, S.A. and Reckhow, R. A. Time bounded random access machines. JCSS 7, 354-375, (1973).Google ScholarDigital Library
- 5.Fischer, M.J. and Paterson, M.S. String-matching and other products. MAC Technical memorandum 41, MIT, (1974). Google ScholarDigital Library
- 6.Fischer, M.J. and Pippinger, N. To appear.Google Scholar
- 7.Floyd, R.W. Permuting information in idealized two-level storage. In Complexity of Computer Computations, R. E. Miller and J. W. Thatcher (eds.), Plenum Press (1972).Google Scholar
- 8.Knuth, D.E. The Art of Computer Programming, Vol. 3, Addison Wesley, Reading, Mass. (1973). Google ScholarDigital Library
- 9.Morris, J.H. and Pratt, V.R. A linear pattern-matching algorithm. TR-40, Computer Center, University of California at Berkeley (1970).Google Scholar
- 10.Pinsker, M.S. On the complexity of a concentrator. 7th International Teletraffic Congress, Stockholm. (1973).Google Scholar
- 11.Pippenger, N. The complexity theory of switching networks. Technical Report 487, Res. Lab. of Electronics, MIT, (1973).Google Scholar
- 12.Savage, J.E. The Complexity of Computing, Chapter 2, (manuscript). Google ScholarDigital Library
- 13.Strassen, V. Die Berechnungkomplexitat von elementarsymmetrischen Funktionen und von Interpolationskoeffizienten. Numer. Math 20, (1973).Google Scholar
- 14.Valiant, L.G. Parallelism in comparison problems. SIAM J. on Computing, (to appear).Google Scholar
- 15.Wagner, R. A., and Fischer, M. J. The string to string correction problem. JACM 21:1, 168-173, (1974). Google ScholarDigital Library
- 16.Waksman, A. A permutation network. JACM 15, 159-163 (1968). Google ScholarDigital Library
- 17.Yao, F.F. personal communication.Google Scholar
- 18.Yao, A.C.-C., and Yao, F.F. Lower bounds on merging networks. Manuscript (1974).Google Scholar
Index Terms
- On non-linear lower bounds in computational complexity
Recommendations
Computational complexity of generalized domination: a complete dichotomy for chordal graphs
WG'07: Proceedings of the 33rd international conference on Graph-theoretic concepts in computer scienceThe so called (σ, ρ)-domination, introduced by J.A. Telle, is a concept which provides a unifying generalization for many variants of domination in graphs. (A set S of vertices of a graph G is called (σ, ρ)- dominating if for every vertex v ∈ S, |S ∩ N(...
Edge Lower Bounds for List Critical Graphs, Via Discharging
A graph G is k-critical if G is not (k ? 1)-colorable, but every proper subgraph of G is (k ? 1)-colorable. A graph G is k-choosable if G has an L-coloring from every list assignment L with |L(v)|=k for all v, and a graph G is k-list-critical if G is ...
Lower and upper bounds for long induced paths in 3-connected planar graphs
Let G be a 3-connected planar graph with n vertices and let p ( G ) be the maximum number of vertices of an induced subgraph of G that is a path. Substantially improving previous results, we prove that p ( G ) ź log ź n 12 log ź log ź n . To demonstrate ...
Comments