A Non-Probabilistic Switching Lemma for the Sipser Function
نویسندگان
چکیده
Abs t r ac t . Valiant [12] showed that the clique function is structurally different than the majority function by establishing the following "switching lemma ~ : Any function f whose set of prime implicants is a large enough subset of the set of cliques (and thus requiring big ~2-circuits), has a large set of prime clauses (i.e., big II2-circuits). As a corollary, an exponential lower bound was obtained for monotone ~II~-circuits computing the clique function. The proof technique is the only non-probabilistic super polynomial lower bound method from the literature. We prove, by a non-probabflistic argument as well, a similar switching lemma for the NCl-complete Sipser function. Using this we then show that a monotone depth-3 (i.e., ~II~ or II~II) circuit computing the Sipser function must have super quasipolynomial size. Moreover, any depth-d quasipolynomial size non-monotone circuit computing the Sipser function has a depth(d 1) gate computing a function with exponentially many both prime implicants and (monotone) prime clauses. These results are obtained by a top-down analysis of the circuits.
منابع مشابه
Håstad’s Separation of Constant-Depth Circuits Using Sipser Functions
This note contains a proof of the exponential separation of depth-d circuits from depth(d + 1) circuits due to Håstad [Has89]. The separating functions are the Sipser functions, denoted fd+1,n. We use a simplified proof of Håstad’s second switching lemma due to Neil Thapen [Tha09].
متن کامل3 the Switching Lemma
Today we show that PARITY is not in AC0. AC0 is a family of circuits with constant depth, polynomial size, and unbounded fan-in for the AND and OR gates. We establish this result through an application of the Switching Lemma. This result is the first use of randomization in its full power in complexity. Circuits were defined in previous lectures. In this lecture, we always assume that the circu...
متن کاملImproved Depth Lower Bounds for Small Distance Connectivity - Foundations of Computer Science, 1995. Proceedings., 36th Annual Symposium on
We consider the problem of determining, given a graph G and specified nodes s and t , whether or not there is a path of at most k edges in G from s to t . We show that solving this problem on polynomial-size unbounded fan-in circuits, requires depth a(1og log I C ) , improving on a depth lower bound of R(log* I C ) when k = logo(')n given in [2, 81. In addition we show that there is a constant ...
متن کاملNotes on switching lemmas
We prove three switching lemmas, for random restrictions for which variables are set independently; for random restrictions where variables are set in blocks (both due to H̊astad [3]); and for a distribution appropriate for the bijective pigeonhole principle [2, 4]. The proofs are based on Beame’s version [1] of Razborov’s proof of the switching lemma in [5], except using families of weighted re...
متن کاملNovel Radial Basis Function Neural Networks based on Probabilistic Evolutionary and Gaussian Mixture Model for Satellites Optimum Selection
In this study, two novel learning algorithms have been applied on Radial Basis Function Neural Network (RBFNN) to approximate the functions with high non-linear order. The Probabilistic Evolutionary (PE) and Gaussian Mixture Model (GMM) techniques are proposed to significantly minimize the error functions. The main idea is concerning the various strategies to optimize the procedure of Gradient ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 1993