Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/73007.73025acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article
Free access

Circuits and local computation

Published: 01 February 1989 Publication History
  • Get Citation Alerts
  • Abstract

    This paper contains two parts. In Part I, we show that polynomial-size monotone threshold circuits of depth k form a proper hierarchy in parameter k. This implies in particular that monotone TC0 is properly contained in NC1. In Part II, we introduce a new concept, called local function, which tries to characterize when a function can be efficiently computed using only localized processing elements. It serves as a unifying framework for viewing related and sometimes apparently unrelated results. In particular, it will be demonstrated that the recent results on lower bounds for monotone circuits by Razborov [Ra1] and Karchmer and Wigderson [KW], as well as a main theorem in Part I of this paper, can be regarded as proving certain functions to be nonlocal. We will also suggest an approach based on locality for attacking the conjecture that (nonmonotone) TC0 is properly contained in NC1.

    References

    [1]
    H. Abelson, "Towards a theory of local and global in computation," Theoretical Computer Science 6 (1978), 41-67.
    [2]
    M. Ajtai, "E} formulae on finite structures," Annals of Pure and Applied Logic 24 (1983), 1-48.
    [3]
    M. Ajtai and Y. Gurevich, "Monotone versus positive," Journal of A C'M 34 (1987), 1004- 1015.
    [4]
    A.E. Andreev, "On one method of obtaining lower bounds of individual monotone functions,'' Dokl. Ak. Nauk. 282 (1985), 1033- 1037. (Sov. Math. Dokl. 31 (1985), 530-534.)
    [5]
    D.A. Barrington,"Bounded-width polynomial size branching programs recogni, ze exactly those languages in NC1,'' Proceedings of 18ih ACM Symposium on Theory of Computing (1986), 1-5.
    [6]
    R. Boppana, "Threshold functions and bounded depth monotone circuits," Proceedings of 16th A CM Symposium on Theory of Computing (1984), 475-479.
    [7]
    J. Bruck, "Harmonic analysis of polynomial threshold functions", preprint, IBM Almaden Research Center, July 1988.
    [8]
    A. K. Chandra, L. J. Stockmeyer, and U. Vishkin, "Constant depth reducibility," E{AM J. on Computing 13 (1984), 423-439.
    [9]
    M. Furst, J. Saxe, and M. Sipser, "Parity, circuits, and the polynomial-time hierarchy," Proceedings 22th Annual IEEE Symposium on Foundations of Computer Science, 1981, 260-270.
    [10]
    A. Hajnal, W. Maass, P. Pudl~k, M Szegedy, and G. TurSn, "Threshold circuits of bounded depth," Proceedings 28th Annual IEEE Symposium on Foundations of Computer Science, 1987, 99-110.
    [11]
    J. Hastad, "Almost optimal lower bounds for small depth circuits," Proceedings of 18th ACM Symposium on Theory of Computing (1986), 6-20.
    [12]
    J.-W. Hong and H. T. Kung, "I/O complexity: The red-blue pebble game," Proceedings of 13ih A CM Symposium on Theory of Computing (1981), 326-333.
    [13]
    M. Karchmer and A. Wigderson, "Monotone circuits for connectivity require superlogarithmic depth," Proceedings of 20th A CM Symposium on Theory of Computing (1988), 539-550.
    [14]
    M. Klawe, W. Paul, N. Pippenger, and M. Yannakakis, "On monotone formulae with restricted depth," Proceedings of 16ih A CM Symposium on Theory ojf Computing (1984), 480-487.
    [15]
    M. Minsky and $. A. Papert, Perceptrons, MiT Press, Cambridge, Massachusetts, 1969.
    [16]
    I. Parberry and G. Schnitger, "Parallel computation with threshold functions," Journal of Computer and System Science 36 (1988), 278-302.
    [17]
    A.A. Razborov, "Lower bounds for the monotone complexity of some Boolean funtions," Dokl. Akad. Nauk. 281 (1985), 798- 801. (Soy. Math. Dokl. 31 (1985), 354-357.)
    [18]
    A.A. Razborov, "Lower bounds for the size of circuits of bounded depth with basis {A, ~)}," to appear in Mat. Zametki. (Mathematical Notes of the Soviet Academy of $ci- ~nC~).
    [19]
    J. Reif, "On threshold circuits and polynomial computations," Proceedings of ~nd Structure in Compleziiy Theory Conference, 1987, 118-125.
    [20]
    M. Sipser, "Borel sets and circuit complexity,'' Proceedings of 15ih A CM Symposium on Theory of Computing (1983), 330-335.
    [21]
    R. Smolensky, "Algorithmic methods in the theory of lower bounds for Boolean circuit complexity," Proceedings of l gih A CM Symposium on Theory of Computing (1987), 77- 82.
    [22]
    I~. Tardos, "The gap between monotone and non-monotone circuit complexity is exponential,'' Combinatorica 8 (1988), 141-142.
    [23]
    Y. Uesaka, "Analog perceptron: its decomposition and order," Information and Control 27 (1975), 199-217.
    [24]
    A.C. Yao, "Separating the polynomiM-time hierarchy by oracles," Proceedings 261h Annual IEEE Symposium on Foundations of Computer Science, 1985, 1-10.

    Cited By

    View all
    • (2023)Towards revealing the mystery behind chain of thoughtProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3669222(70757-70798)Online publication date: 10-Dec-2023
    • (2023)Depth-𝑑 Threshold Circuits vs. Depth-(𝑑+1) AND-OR TreesProceedings of the 55th Annual ACM Symposium on Theory of Computing10.1145/3564246.3585216(895-904)Online publication date: 2-Jun-2023
    • (2022)Beyond Natural Proofs: Hardness Magnification and LocalityJournal of the ACM10.1145/353839169:4(1-49)Online publication date: 23-Aug-2022
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    STOC '89: Proceedings of the twenty-first annual ACM symposium on Theory of computing
    February 1989
    600 pages
    ISBN:0897913078
    DOI:10.1145/73007
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 February 1989

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Conference

    STOC89
    Sponsor:
    STOC89: 21st Annual ACM Symposium on the Theory of Computing
    May 14 - 17, 1989
    Washington, Seattle, USA

    Acceptance Rates

    STOC '89 Paper Acceptance Rate 56 of 196 submissions, 29%;
    Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)98
    • Downloads (Last 6 weeks)19
    Reflects downloads up to 26 Jul 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2023)Towards revealing the mystery behind chain of thoughtProceedings of the 37th International Conference on Neural Information Processing Systems10.5555/3666122.3669222(70757-70798)Online publication date: 10-Dec-2023
    • (2023)Depth-𝑑 Threshold Circuits vs. Depth-(𝑑+1) AND-OR TreesProceedings of the 55th Annual ACM Symposium on Theory of Computing10.1145/3564246.3585216(895-904)Online publication date: 2-Jun-2023
    • (2022)Beyond Natural Proofs: Hardness Magnification and LocalityJournal of the ACM10.1145/353839169:4(1-49)Online publication date: 23-Aug-2022
    • (2019)On the Complexity of Hazard-free CircuitsJournal of the ACM10.1145/332012366:4(1-20)Online publication date: 23-Aug-2019
    • (2018)On the complexity of hazard-free circuitsProceedings of the 50th Annual ACM SIGACT Symposium on Theory of Computing10.1145/3188745.3188912(878-889)Online publication date: 20-Jun-2018
    • (2017)Addition is exponentially harder than counting for shallow monotone circuitsProceedings of the 49th Annual ACM SIGACT Symposium on Theory of Computing10.1145/3055399.3055425(1232-1245)Online publication date: 19-Jun-2017
    • (2016)Space-Efficient Approximations for Subset SumACM Transactions on Computation Theory10.1145/28948438:4(1-28)Online publication date: 29-Jun-2016
    • (2012)Tight bounds for monotone switching networks via fourier analysisProceedings of the forty-fourth annual ACM symposium on Theory of computing10.1145/2213977.2214024(495-504)Online publication date: 19-May-2012
    • (2012)The Complexity of Unary Subset SumComputing and Combinatorics10.1007/978-3-642-32241-9_39(458-469)Online publication date: 2012
    • (2011)Noise Sensitivity of Boolean Functions and Applications to PercolationSelected Works of Oded Schramm10.1007/978-1-4419-9675-6_12(351-389)Online publication date: 1-Jul-2011
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Get Access

    Login options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media