Continuing our look at some toplogical methods, today we’ll see the evasiveness conjecture in decision tree complexity. In the next lecture, we’ll see how we can sometimes analyze the complexity using fixed point theorems, and their generalizations (like the Hopf index formula), following the work of Kahn, Saks, and Sturtevant. These two lectures are co-blogged with Elisa Celis, with a lot of input from Lovasz’s lecture notes.
Decision tree complexity and evasiveness
Consider a boolean function on n bits. We define the decision tree complexity of f as follows. Given an unknown input
, you are allowed to ask about the values of various bits of x, e.g.
. Your goal is to compute
using as few questions as possible, and your questions can be adaptive, depending on answers to previous questions. The complexity of such a strategy is the maximum number of questions asked for any
. The decision tree complexity, written
, is the minimum complexity of any strategy that computes f. (There are many other interesting models of decision complexity, see e.g. this survey.)
Clearly , because we can trivially query all the bits of x, and then output f(x). A function f is called evasive if this upper bound is met, i.e.
. As an example, consider the parity function
, where
is addition modulo 2. Clearly
is evasive because after
bits of x are asked about, the setting of the final bit determines the value of f.
For a more general example, consider any such that
is odd. In this case, for every
, exactly one of
or
has the same property that the number of inputs resulting in a 1 is odd. (These two functions are the natural restriction of f to functions on n-1 bits, which results from fixing the value of the ith bit.) Thus an adversary could keep answering questions “
?” so that the restricted function retains this property. Since the number of inputs yielding a 1 is always odd, the restricted function always takes both possible values, implying that f is evasive–the advesary ensures that the value cannot be determined until all n possible questions are asked.
For an example of a non-evasive property, think of a point as speciying a directed graph on
vertices, where there is exactly one directed edges connecting every pair of vertices, and x specifies the direction of this edge (this is called a tournament). Thinking of the vertices as players, a directed edge from u to v means that u defeats v. Now
if the digraph specified by x has one vertex that defeats everyone else. What is
?
Well, first we can conduct a single elimination tournament, where vertex 1 plays vertex 2, and the winner players vertex 3, and the winner of that players vertex 4, etc. At the end, there is only one remaining vertex that remains undefeated. Now asking
more questions, we can determine whether
indeeds defeats everyone else. The total number of questions was
, hence
, implying that f is not evasive.
Montone graph properties and the evasiveness conjecture
Let . In general, we can encode an arbitrary undirected N-vertex graph as an element
. A function
is called a graph property if relabeling the vertices of
doesn’t affect the value of
. The function f is monotone if the value of the function can never change from 1 to 0 when flipping one of the input bits from 0 to 1. In the setting of graph properties, this corresponds to those which are maintained under addition of edges to the graph, e.g.
“is G connected?” or
“does G have a k-clique?”
Evasiveness Conjecture (Aanderaa-Karp-Rosenberg): Every non-trivial monotone graph property is evasive.
Here, non-trivial means that , where
and
denote the all-zeros and all-ones strings, respectively.
For example, consider the example “is G connected?” The adversary is simple: When asked about a possible edge
, she answers NO unless this answer would imply that the graph is disconnected. In other words, she answers NO unless she has answered NO already for all edges across a cut
except for
, in which case she has to answer YES.
Now, suppose there is a strategy which figures out the connectivity of without asking a question about some edge
. In this case, the conclusion must be that
because the adversary always maintains that by answering everything in the future YES, she could force the graph to be connected. In this case, the edges answered YES have to form a spanning tree of G (otherwise by answering all unasked questions NO, the graph would become disconnected). Consider a path P from i to j in this YES spanning tree. Let
be the edge of P which was asked about last. Clearly the adversary answered YES for
, but this contradicts the advesary’s strategy. Since
has not been asked yet, the adversary is safe to answer NO for
, and still later by answering YES on
, she could force the graph to be connected. Thus no such strategy exists, and connectivity is evasive.
A natural generalization of the evasiveness conjecture is to general monotone functions which are invariant under a group acting transitively on the coordinates. For a permutation , let
act on
via
. We say that
is invariant under
if
for every
. Let
be the group of all permutations under which f is invariant. We will say that f is weakly symmetric if
acts transitively on
.
Generalized Evasiveness Conjecture: If f is a non-trivial, monotone, weakly symmetric function, then f is evasive.
Clearly this generalizes the previous conjecture because every graph property is invariant under permutations of the vertices (which induces a transitive action on the edges).
A proof when
is prime
We’ll end this lecture with a proof of the generalized conjecture which holds when n is prime. The proof will hint at the topological connections coming up in the next lecture.
First, we generalize the proof that f is evasive when is odd. For
, let
denote the hamming weight of x, i.e. the number of 1’s in x, and for
, define
Topologically-minded readers will recognize this as some kind of Euler characteristic, and this connection will bear out in the next lecture. We claim that if , then f is evasive. To see this, note that
. Hence if
, then one of
or
is non-zero, so an adversary can keep answering so that the restriction has
. Finally, notice that if
, then
must take both values 0 and 1, so the adversary can maintain this until all n questions are asked.
Theorem: Suppose n is prime. If is monotone, non-trivial, and weakly symmetric, then f is evasive.
Proof: We’ll show that . First, we argue that
contains a cyclic permutation. Write
, where
. By transitivity, we have
, hence
divides
. Now since n is prime, by Cauchy’s theorem there is an element
or order
(i.e. an n-cycle).
Since f is non-trivial, we know that and
. For any
with
, it is clear that all n elements
are distinct, since n is prime. But f is invariant under
, thus the set
partitions into equivalence classes
, where
for every i. But this immediately implies that
, which gives
.
This is by far my favourite use of “higher” mathematics to TCS. You might want to see this paper for some extensions to the Kahn-Saks-Sturtevant work: http://www.cs.dartmouth.edu/~ac/Pubs/sicomp-evasive.pdf.
I have not seen one new post in weeks.
Is this blog still active?