1 / 44

Undirected ST-Connectivity In Log Space

Undirected ST-Connectivity In Log Space. Omer Reingold Slides by Sharon Bruckner. Today. Some history What are we adding to the mix? Connectivity in expanders Making expanders: powering it up and cutting it down Putting it together in Log-Space In conclusion. Some History.

elia
Download Presentation

Undirected ST-Connectivity In Log Space

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Undirected ST-Connectivity In Log Space Omer Reingold Slides by Sharon Bruckner

  2. Today • Some history • What are we adding to the mix? • Connectivity in expanders • Making expanders: powering it up and cutting it down • Putting it together in Log-Space • In conclusion

  3. Some History • What is ST-Connectivity? • What do we know about it? • What are we trying to accomplish?

  4. What is ST-Connectivity? • Given a graph G and two vertices s and t: • YES if there is a s-t path in G • NO otherwise • Two flavors to the problem: • STCON: G is directed • USTCON G is undirected. • Today we’ll talk about USTCON

  5. What do we know about it? • Solved easily with BFS • But – polynomial space! • USTCON is in NL (=NSPACE(log)) • Just guess the path • USTCON is in DSPACE(log2n) (Savitch) • Guess a vertex on the path, recurse • USTCON is in RL • Random walk • Randomness is a resource! • USTCON is complete for SL

  6. We would like an algorithm for USTCON which is deterministic and works in space logarithmic in the size of the graph What are we trying to accomplish?

  7. What are we adding to the mix?

  8. Useful Notations • The adjacency matrix of a graph G • We’ll use D regular graphs and the normalizedadjancecy matrix: (1/D)M ,

  9. Useful Notations • M is a stochasticmatrix, and serves as the “random walk” matrix. • Largest eigenvalue of M is 1, with eigenvector (1,1,…,1)єRn ,2nd largest eigenvalue is λ(G). • A (N,D,λ) graph is a D regular graph over N vertices with λ(G) ≤ λ

  10. Expanders – a Reminder Note that the adjacency matrix in this case in normalized! Two equivalent definitions of expander • (N,D, λ) is an expander iff the spectral gap 1- λ > 0 • (N,D, λ) is an expander if there exists ε>0 such that for any set S of at most half the vertices in G, at least (1+ ε)|S| vertices of G are connected to some vertex in S

  11. Expanders – a Reminder

  12. Connectivity in Expanders What would happen if each connected component of our graph was an expander? We could decide USTCON in logspace!

  13. Every expander has a O(log(N)) diameter Theorem: For any s and t in an expander, there’s a path from s to t of length O(log(N))

  14. Proof

  15. Logspace Algorithm for paths in an expander For a (N,D, λ) expander there is a a space O(logD*logN) algorithm which decides USTCON for any s and t Idea: • From any vertex s there are Dl=O(logN) different paths. • enumerate and check if any of them reach t.

  16. How much does it cost? • At each vertex we have a choice of D vertices, log(D) to represent 1…D. • Each path is log(N) long. • we need log(D) at each stage of a log(N) path, altogether O(logD*logN)

  17. So far We now know that if our graph G was an expander graph, USTCON can be solved in Log-Space. How can we turn G into a graph of expanders?

  18. Making expanders: • powering it up and cutting it down

  19. What do we want from the expander graph G’? • There is a path from s to t in G if and only if there is a path from s’ to t’ in G’. • Each connected component is an expander, with constant expansion • Construction in Log-Space.

  20. The Plan • New tools for our toolbox • Rotation Maps • Powering • Zig Zag products • The actual construction • Why we got what we wanted • Why we got it in Log-Space

  21. 8 Zig Zag Powering Overview • Series of powering by 8 and zig zag products, one increases the spectral gap and the other one decreases it, but not by much. O(Log(N))

  22. Rotation Maps • This is the notation we’ll use in this algorithm Let G be a D regular undirected graph. The rotation map If the edge (v,w) exists and is the ith edge coming out of v and the jth edge coming out of w

  23. Rotation Map Example 3 2 4 1 1 2 … 3 4 … v 28 17 … … u 54 54 55 55

  24. Powering No limitations on the degree → can expenderize with powering: The k-th power of the D-regular graph G is Gk where there is an edge (u,v) iff there is a path of length ≤ k between u and v in G. There can be multiple edges! ≤k

  25. Powering What is it good for? • GN is an N-clique an expander • If G = (N,D, λ) then Gk is a (N,Dk, λk) λ(G) The spectral gap • Why is this not enough?

  26. v is now Hv Zig Zag Product If G is a D-regular graph with N vertices and H is a d-regular graph with D vertices, we replace each v in G with a copy of H, Hv. Therefore, our new graph has [N]x[D] vertices. Part of G v H

  27. a’ i i’ v a’ j b z z b’ a j’ G i w b’ G H j G Z H b Zig-Zag Product The resulting graph is a d2 regular graph, with edges as follows: Hv a Hw

  28. Zig-Zag Product From last week: If G is an (N,D,λ) graph and H is a (D,d,) graph, then The zig-zag product doesn’t hurt the spectral gap too badly!

  29. Satan’s Example

  30. Technicalities

  31. G G2 12 v 5 3,12 3 8 u u w w u u v 8,5 G Gk a1 a2 ak … a1,..,ak bk b1 v b(k-1) bk,..,b1 Rotation Map for Powering

  32. (v,a) (v,a’) i i’ Hv z G H Rotation Map for Zig Zag Rot ((v,a), (i,j)) = v a’ b’ G w Hw j’ j (w,b’) (w,b)

  33. The Actual Construction Show a transformation that turns every connected component of a graph into an expander. But! Not any graph, but a D16 regular graph. How to construct such a graph - later

  34. Main Transformation On input G and H, where G is a D16 regular graph on N vertices, and H is a D-regular graph on D16 vertices Gi is a D16 regular graph, with N*(D16)i vertices

  35. Details • Set l to be the smallest integer s.t. If D is constant, then this number is O(logN). • Gl has poly(N) vertices. • Every iteration can be done in logspace! • Transforming the entire graph is equivalent to transforming each connected component separately

  36. More Details S2 S3  S1 S2 S3   S1 

  37. Why ? Show that this is true for a single iteration. Both powering and zig zag maintain the block structure Adjacency matrix sorted by connected components

  38. Why is this an expander? G and H be inputs of  above. If and G is connected and non-bipartite then Which means that the output of  is indeed an expander. Non bipartite means that G cannot be split into two sets of vertices where all the edges of G are between those two sets

  39. Proof G0=G, connected and non-bipartite. Therefore, (inequality) Since We’ll show and from the lemma we get

  40. Proof Continued We saw that if G = (N,D,λ) then Gt = (N,Dt,λt) = We can bound λ(Gi) by For each i, one of two cases occurs: Otherwise, it’s always true that

  41. What do we want from the expander graph G’? • There is a path from s to t in G if and only if there is a path from s’ to t’ in G’. • Each connected component is an expander. • Construction in Log-Space.

  42. Input Tape RotG RotH Log Space Construction Prove that for any D,  can be calculated in space O(log(N)).

  43. Proof Idea: Evaluating RotGi+1 for each pair takes just a constant additional amount of memory over evaluating RotGi. And all recursions use the same space!

  44. Proof - Continued A will allocate the variables: v in [N] (from the original G) a0, …, al in [D16] (vertex names in H)

More Related