Professional Documents
Culture Documents
Enum-S Ps
Enum-S Ps
Enum-S Ps
[Rav98]
[Rot98a]
[Rot98b]
[Sha98]
[SST95]
[Val79]
[Wan94]
24
[GHR95]
[GJ79]
[GM96]
[Gn98]
[GRT97]
[Gur79]
[GV97]
[Hod93]
[Jer87]
[JO89]
[JO92a]
[JO92b]
[JO95a]
[JO95b]
[Joh90]
[KM96]
[KM97]
[KM99]
[Kog96]
[Mak92]
[MP96]
[MR98]
R. Greenlaw, H.J. Hoover, and W.L. Ruzzo. Limits to Parallel Computation. Oxford University Press, 1995.
M.G. Garey and D.S. Johnson. Computers and Intractability. Mathematical Series. W.H. Freeman and Company, 1979.
E. Gradel and K. Meer. Descriptive complexity theory over the real numbers. Lectures in Applied Mathematics, 32:381{403, 1996. A preliminary
version has been presented at the 27th ACM-Symposium on Theory of
Computing, Las Vegas, 1995.
M. Grohe and J. Mari no. Denability and descriptive complexity on
databases of bounded tree-width. Preprint, 1998.
V. Giakoumakis, , F. Roussel, and H. Thuillier. On P4-tidy graphs. Discrete Mathematics and Theoretical Computer Science, 1:17{41, 1997.
Y. Gurevich. Modest theory of short chains, I. Journal of Symbolic Logic,
44:481{490, 1979.
V. Giakoumakis and J. Vanherpe. On extended P4 -reducible and extended
P4-sparse graphs. Theoret. Comput. Sci., 180:269{286, 1997.
W. Hodges. Model Theory, volume 42 of Encyclopedia of Mathematics and
its Applications. Cambridge University Press, 1993.
M. Jerrum. Two{dimensional monomer{dimer systems are computationally intractable. Journal Stat. Phys., 48:121{134, 1987. Erratum in vol.
59 (1990), pages 1087-1088.
B. Jamison and S. Olariu. P4 -reducible graphs a class of tree representable
graphs. Studies Appl. Math., 81:79{87, 1989.
B. Jamison and S. Olariu. A linear-time recognition algorithm for P4 sparse graphs. SIAM J. Comput., 21:381{406, 1992.
B. Jamison and S. Olariu. A unique tree representation for P4 -sparse
graphs. Discrete Appl. Math., 35:115{129, 1992.
B. Jamison and S. Olariu. A linear-time algorithm to recognize P4 reducible graphs. Theoret. Comput. Sci., 145:329{344, 1995.
B. Jamison and S. Olariu. Linear-time optimization algorithms for P4 sparse graphs. Discrete Appl. Math., 61:155{175, 1995.
D.S. Johnson. A catalog of complexity classes. In J. van Leeuwen, editor,
Handbook of Theoretical Computer Science, volume 1, chapter 2. Elsevier
Science Publishers, 1990.
G.P. Kogan and J.A. Makowsky. Computing the permanent over elds
of characteristic 3: Where and why it becomes dicult. Technion{Israel
Institute of Technology, February 1996, submitted, 1996.
G.P. Kogan and J.A. Makowsky. The complexity of Schur functions in
nite elds of characteristic 2. May 1997, submitted, 1997.
G.P. Kogan and J.A. Makowsky. Computing Schur functions for Borchardt
matrices. in preparation, 1999.
G.P. Kogan. Computing the permanent over elds of characteristic 3:
Where and why it becomes dicult. In FOCS'96, pages 108{114. IEEE,
1996.
J.A. Makowsky. Model theory and computer science: An appetizer. In
S. Abramsky, D. Gabbay, and T. Maibaum, editors, Handbook of Logic in
Computer Science, volume 1, chapter I.6. Oxford University Press, 1992.
J.A. Makowsky and Y. Pnueli. Arity vs. alternation in second order logic.
Annals of Pure and Applied Logic, 78(2):189{202, 1996.
J. Makowsky and U. Rotics. On the cliquewidth of graphs with few P4 's.
accepted for publication in IJFCS, to appear 1999.
23
[BO98b]
[Bod93]
[Bod96]
[Bod97]
[Bod98]
[Bur98]
[CE95]
[CER93]
[CG96]
[CLS81]
[CM93]
[CMR98]
[CO98]
[Cou94]
[Cou99]
[DGP97]
[Die96]
[Dow98]
[EF95]
[FV59]
[FV98]
[GG98]
22
Acknowledgements
The second author is indebted to Gregory Kogan for introducing him to the world
of permanents as documented in [Kog96,KM96,KM97,KM99]. He would also like
to thank Peter Burgisser, who made an early version of [Bur98] available, to M.
Grohe, who pointed out the bound on the treewidth of the incidence graph, and
to R. Bar-Yehuda, who reminded us of SAT.
References
[ACP87]
21
Open problem 14
(i) Can cliquewidth k of a graph G be recognized in polynomial time?
(ii) Can cliquewidth k of a graph G be approximated in polynomial time with
ration log k?
(iii) If G has cliquewidth at most k, can the corresponding k-expression of G be
constructed in polynomial time?
For k = 3 Rotics, [Rot98b], has given a positive answer both to the recognition
and construction problem
We have presented here our results for graphs (and problems expressible as
graph problems). Treewidth has been generalized to arbitrary relational structures by Feder and Vardi in [FV98]. Grohe and Mari~no [Gn98] have shown the
following remarkable connection betwee MS() and the -formulas of the Fixed
Point Logic LFP .
Open problem 17 Does the Feferman-Vaught Theorem hold for Monadic Sec-
20
and ( and ) in F
FM;k MS1 . The there are formulas i;j
M;k such
i;j
i;j
i;j
that
and
k(Y1 ; : : : ; Yt )kG; =
k(Y1 ; : : : ; Yt )kG;z; =
G1 ;zj=
G1 ;zj=
i;j (Y1 ;::: ;Yt)
X
i;j (Y1 ;::: ;Yt)
Remark 2. This lemma cane be generalized to other operations than i;j (G1 ) or
i!j (G1 ). In fact, any operation dened as a scalar quantierfree transduction
would do.
w(a)
and
X j (Y ; : : : ; Y ) j
t G1;h1;
X j (Y ; : : : ; Y ) j
Y k(Y ; : : : ; Y )k
X j (Y ; : : : ; Y ) j
t G2 ;h2;
t G1 ;h1;
t G1 ;h1;
Theorem 13. Let h1; and h2; be the Hintikka formulas associated with
in theorem 12. Using the notation of the previous lemma we have
and
k(Y1 ; : : : ; Yt )kG; =
as
j (Y1 ; : : : ; Yt ) jG; =
Lemma 3. Let G; G1 be graphs over the same universe V , G = i;j(G1) and let
z be an assignement into elements and subsets of V . Let and be formulas in
18
Corollary 1.
(i) For every G = hV; E i and a 2 V m1 and (U) 2 P(V )m2 there is a unique
2 HM;k (x; X)
such that G; a; U j= hG (x; X)
.
Hintikka formula hG (x; X)
(ii) Similarly, with the notation of lemma 1, for each three graphs G = G1 G2
and and a 2 V1m1 and and b 2 V2m1 and (U) 2 P(V )m2 there are unique Hin 2 HM;k(x; y; X)
such
hG (x; y; X)
hG (x; y; X);
tikka formulas hG(x; y; X);
, G1; a1; U j= hG1 (x;2X1) and G2; a; U j= hG2 (y ; X2 ).
that G; a; U j= hG (x; yX)
is nite, there are only nitely many triples G = G1 G2
(iii) As HM;k (x; y; X)
which dier with respect to their uniquely determined Hintikka formulas. The
same is true if we allow paramaters a; b and U .
2
Theorem 12 ((Feferman and Vaught)). For every formula (x; y; X)
FM;k(x; y; X) there are nitely many Hinitikka formulas h1;(x; X) 2
and h2;(y ; X)
2 HM;k (y ; X)
( 2 N) such that for every
HM;k(x; X)
-structure G = G1 G2 and every assignment z as above we have
i for at least one
G; z j= (x; y; X)
in a structure G = G1 G2.
We rst look at the terms
k(Y1 ; : : : ; Yt)kG; =
and
G;zj=(a;Y1;::: ;Yt )
w(a)
w(a)
Let h1;, h2;, be the two Hintikka formulas associated with by lemma
1.
17
proofs can be adapted to disjoint unions, but the rst to do so explicitely was
Y. Gurevich in [Gur79].
We present here an explicit version of this theorem for disjoint unions, which
allows us to solve also evaluation problems. In [CMR98] a similar proof was used.
In [Rav98] a systematic treatement of the Feferman-Vaught theorem and its use
in Database Theory is presented.
Proviso: For the remainder of this section we x a nite relational vocabulary and look at MS() formulas with all the (free and bound) variables among
x1; : : :xm1 ; y1 ; : : :ym2 ; X1 ; : : :Xm3 . Put M = m1 +m2 +m3 . The quantier rank
the set of MS()
k of MS() formulas is dened as usual. We denote by FM;k
formulas of quantier rank at most k with M variables as indicated above. If
is clear from the context we just write FM;k . For x; y; X vectors of variables
with
the subset of FM;k
among those M variables we denote by FM;k (x; y; X)
free variables x; y; X.
The following is folklore, [EF95].
are nite.
Proposition 3. Up to logical equivalence FM;k and FM;k(x; y; X)
as forming a boolean
We can look at the equivalence classes of FM;k (x; y; X)
algebra BM;k (x; y; X), with ^; _; :; T; F interpreted in the natural way.
is a formula equivalent to an atom in
A Hintikka formula h(x; y; X)
the set of Hintikka formulas in
BM;k (x; y; X). We denote by HM;k (x; y; X)
FM;k(x; y; X).
The following is straight forward (using proposition 3):
is nite.
Proposition 4. (i) HM;k(x; y; X)
(ii) The conjunction of any two non-equivalent Hintikka formulas h1; h2 2
is inconsistent.
HM;k (x; y; X)
is equivalent to a nite disjunction of Hin(iii) Every formula 2 FM;k (x; y; X)
.
tikka formulas of HM;k (x; y; X)
Theorem 10. ]SAT and SAT can be solved in
(cw()) O(N) time, where
on depends on the clique width of but not on N .
We do not know the size of f but it is at least exponential. For xed clique width
this is ultimately better than the trivial bound given by 2k O(N).
Question 11 What are the families of sets of clauses of xed clique (tree) width
and how can they be characterized in terms relevant to research in satisability?
Note that Horn clauses can have arbitrary large clique width. Note also that for
clauses of bounded size the notions of clique width and tree width coincide because
they are uniformly sparse, cf. the discussion in section 2.6.
The following variations of SAT from [GJ79, Appendix 9] (and also their
corresponding enumeration problems) are also MS1 denable.
3SAT: Given S where each clause has at most three occurrencies, is there an
assignement which makes S true ? Here n 3k.
MONOTONE SAT: Given S where each clause has only positive or only
negative occurrencies, is there an assignement which makes S true ?
NOT-ALL-EQUAL SAT: Is there an assignement A which makes S true
and such that for every non-isolated clause C 2 Clause there is either a
v 2 V ar A which has a positive occurrence in C, or there is a u 2 A which
has a negative occurrence in C.
ONE-IN-EACH SAT: Is there an assignement A such that for every nonisolated clause C 2 Clause there is either exactly one v 2 A which has a
positive occurrence in C and none in A which has a negative occurrence in
C, or there is exactly one u 2 V ar A which has a negative occurrence in
C and none in A which has a positive occurrence.
HALF SAT: Is there an assignement A which makes at least half of the nonisolated clauses in S true ?
So Theorem 10 can also be formulated for these problems.
5 Feferman-Vaught Theorem
The proof of the main theorem makes use of the Feferman-Vaught Theorem for
Monadic Second Order Logic and disjoint unions of relational structures. The
theorem states that the set of MS() sentences of quantier rank k true in
the disjoint union G1 G2 is uniquely determined by the corresponding sets of
formulas true in each of the components. As stated here this can be easily proved
using Ehrenfeucht{Frasse games, cf. [EF95]. We need a stronger version which
says exactly how the truth of one sentence in G1 G2 is determined by the truth
of certain formulas in each Gi. Such a statement can be obtained either directly
by explicit construction or via the use of Hintikka sentences (which describe
winning positions in the Ehrenfeucht{Frasse games). The rst approach is due
to Feferman and Vaught, [FV59] for generalized products. The second approach,
also for products, can be found in in W. Hodges delightful book [Hod93]. Both
15
Let F be a connected graph. Let the graph property FA(F) describe the graphs
all of whose connected components are isomorphic to F. A spanning subgraph
of a graph G which has the property FA(F) is called an F -factor of G. The
corresponding generating functions
Factn(F) = GF(Kn; FA(F))
are called the F-factor polynomials. This subsumes CF = Factn(F) for F an
m-cycle and (m) = r and n = mr. The property FA(F) is MS2 denable but,
not MS1 denable.
Deciding th existence of an F-factor is NP-complete, if F has at least three
nodes, cf. [GJ79, Problem GT12]. Burgisser showed in [Bur98]
Theorem 8 ((Burgisser 1998)). The family Factn(F) is VNPK -complete if
F has at least two nodes.
From theorem 4 we get immediately
Theorem 9. Let E be a class of graphs which is MS2 -denable and let Gn is
a family of graphs of tree width k and size n. Then GF(Gn; E ) can be computed
in time ck O(np ). In fact GF(Gn; E ) is in VPK .
Remark 1. Burgisser only considers cases where w : E ! K is a weight function
for edges. For MS1 denable generating functions it is sometimes more natural
to look at weight functions on vertices. In the case of cliques both approaches
make sense, but in the case of colorings, the vertices should be weighted.
Our next application is SAT and ]SAT, the corresponding counting problem.
We shall phrase it as a graph theoretic problem. But the clique width of sets of
clauses seems an interesting concept in itself.
]SAT:
Input: A set of clauses = fC1; : : : ; Cmg over variables p1; : : : ; pk. We denote
by N the size of , i.e. the sum of the sizes of the clauses.
Output: The cardinality of the set of assignments, i.e.
j fz : fp1 ; : : : ; pk g ! f0; 1g : z makes all the C1 ; : : : ; C m true g j
Complexity: The counting problem is ]P-complete, cf. [Val79].
We can code this as an MS1 -enumeration problem by looking at the bipartite
directed graph G = hV; C; E i connecting a variable from V with a clause from
C in one direction for positive, and in the other direction for negative occurence
in the clause. A satisfying assignment then is a subset of vertices V0 such that
every clause c there is v 2 V0 with (v; c) 2 E or there is v0 2 V V0 ) with
(c; v0) 2 E. Note that in this coding the clique width cw(G ) of G somehow
measures the complexity of the overlapping occurences of variables in clauses.
From theorem 5 we get
14
12
Denition 5 ((i!j (G))). For a k-graph G as above we denote by i!j (G) the
renaming of i into j in G such that:
gebraic expression built using the 3 type of operations mentioned above which
denes G. We call such an expression a k{expression dening G, if all the labels in the expression are in f1; : : :; kg. Clearly, for every graph G, there is an
n{expression which denes G, where n is the number of vertices of G.
{ either C US(k) for some k and then Theorems 4 and 5 are applicable i C
has bounded tree-width, and both these theorems solve the same problems;
Theorem 4 gives actually the best complexity if combined with Bodlaender's
parsing algorithm [Bod96];
{ or C 6 US(k) for any k, then only Theorem 5 is applicable, provided C has
bounded clique-widh and a polynomial parsing algorithm is available.
V and E are the sets of vertices and edges respectively, and V1 ; : : :; Vk form a
partition of V , such that Vi is the set of vertices labeled i in G. Note that some
Vi 's may be empty. A non-labeled graph G = hV; E i, will be considered as a
1-graph such that all the vertices of G are labeled by 1.
Note that G G 6= G.
Courcelle proved in [Cou99] that for each k, one can construct a scalar MStransduction that associates with every graph G 2 US(k) (considered as a relational structure interpreting the vocabulary 1 ) a structure isomorphic to I(G).
It follows that every property of a graph in US(k) expressible by an MS2 formula over G is already expressible by an MS1 -formula over I(G) which, by
this result, can be translated into an equivalent MS1 formula in G. Furthermore,
if (X) is an MS2 formula expressing a property of a set of edges X of such
a graph G, then can be translated into an MS1-formula (X1 ; :::; Xn) where
X1 ; :::; Xn denote sets of vertices and j X j=j X1 j +:::+ j Xn j and the integer
n depends only on k. It follows that MS2 denable enumeration problems are
MS1 denable on each class US(k).
However Theorems 4a and 5a are equally powerful on classes US(k), because
of the following two facts:
(i) MS2 and MS1 have the same expressive power, as explained above, and
(ii) a sub-class of US(k) has bounded tree width i it has bounded clique width.
This latter fact follows from the following proposition:
Proposition 2. If C is a class of graphs of bounded clique-width on which the
mapping G 7! I(G) is denable by a scalar MS -transduction, then it is of
bounded tree-width.
Proof. (Sketch) It is proved in [CE95, Theorem 2.1] that if C is a class of graphs
such that I(C) is a subclass of the image of a set of nite binary trees under an
MS-transduction, then it has bounded tree-width.
9
2.6 Discussion
In the following discussion we compare theorems 4 and 5.
Theorem 5 concerns more classes of graphs than Theorem 4: if a graph has
tree width k, it has clique width O(4k ), and on the other hand, cliques have
clique width 2 and unbounded tree width. It follows that every class of bounded
tree width has bounded clique width but not vice-versa.
The parsing problem for clique width is in general in NP. It is known to be
polynomial for clique width at most 3, cf. [Rot98b], but not known to be either
polynomial or NP-complete for larger values of k. For this reason Theorem 5
has an additional hypothesis that the given graphs are parsable (with respect to
clique width) in polynomialtime, in order to yield a global polynomial algorithm.
This hypothesis is perhaps super
ous, but this remains an open problem. However, there exist several classes of graphs for which specic polynomial parsing
algorithms do exist, see section 3.
If we leave out the parsing problem, i.e. if we assume that the graphs are
given with their appropriate decompositions, then Theorems 4 and 5 have weaker
forms. Let us call them 4a and 5a respectively, where the corresponding algorithms are linear in the sizes of the trees representing the decompositions. Then
Theorem 4a is a consequence of theorem 5a. This is so because if a graph G has
tree width k, its incidence graph I(G) has tree width k + 1, hence clique width
8
We assume here that the reader is familiar with basic complexity theory as presented, say, in [Joh90,Pap94]. In dealing with evaluation problems over a eld
K it is more precise to use the algebraic complexity classes VPK and VNPK
introduced by Valiant, [Val79]. They are really based on algebraic circuits over
the eld K. A more thorough reference would be [BCS97] and [Bur98]. Computing the permanent over a xed eld K is VNPK -complete but not necessarily
in ]P unless one takes the size of the eld elements into account. Most of our
evaluation problems are ]P hard or VNPK complete over the eld K. But saying that a problem is in VPK is usually a stronger statement than just saying
it is in P if we assume unit cost for the arithmetic operations in K.
MS() denable enumeration problems over arbitrary vocabularies are solvable in PSpace, but it is not clear whether they are in ]P.
Open problem 3 Assume that PSpace ]P 6= ;. Are there SOL (MSi ) denable enumeration problems which are in PSpace ]P ?
By a result of Saluja, Subrahmanyam and Thakur [SST95], every enumeration
problem in ]P is SOL denable, actually by a particularly simple SOL formula
with second order variables for the objects to be counted, and one binary relation variable which ranges over linear orders and is existentially quantied.
All other quantications are First Order. Note that already the MS() decision
problems can be arbitrarily complex within the polynomial hierarchy, cf. [MP96].
Further investigations into logical denability of counting function were pursued
by Compton and Gradel, [CG96] and Sharell [Sha98].
The same holds for evaluation problems, provided we assume that the arithmetic
operations in K take constant time (independently of the size of the values).
Actually, the evaluation problem is in non-uniform VPK .
The proof of this theorem is based on a bottom up traversal of the nite tree
representing a tree decomposition of width at most k of the given graph. Hence
one needs to parse the graph, i.e. to construct such a decomposition. This can be
done in time 0(v + e) by [Bod96] The algorithm returns either a failure message
if the graph has tree width more than k or a tree-decomposition of width at most
k. But theorem 4 does not yield an implementable algorithm for two reasons:
7
a2X
there is a polynomial time approximation algorithm for treewidth with performance ratio O(logn), [BGHK95a]. Furthermore, checking treewidth for xed k
can be done in linear time, and if the answer is positive, the construction of a
tree decomposition can be done in linear time as well, [Bod96,BK96]. All this
together makes it attractive to use the treewidth as the parameter for xed
parameter complexity considerations.
Proposition 1. Tree width and linear rank are independent of each other. More
precisely
(i) For every n 2 N there are (n n) matrices with linear rank n and treewidth
constant k.
(ii) For every n 2 N there are (n n) matrices with linear rank 1 and treewidth
n 1.
Proof. (i): Let M be such that GM is the disjoint union of cliques of size at most
k+1 and containing at least one clique of size k+1. Then tw(GM ) = k. If K has
at least three elements2 , we can nd (j j) matrices Mj with no zero elements
which have rank j. For each clique of j elements we choose the matrix Mj and
form M by placing these along the diagonal. Now M has linear rank n.
(ii): The (n n) matrix En which has only one's as its entries has treewidth
n 1 and linear rank 1.
The linear rank of a matrix is a matrix property which depends on all the entries in the matrix and which can be computed in polynomialtime. The treewidth
of a matrix only depends on entries which do not vanish, i.e. only on GM . However, computing the exact treewidth is NP-hard, [ACP87]. On the other hand
2
As we want the matrix to have only non-zero entries, our eld must have at least
three elements
X Ym
2Sn i
i;(i)
In [Val79] these problems are called enumeration problems. This might be misleading,
as we do not enumerate the solutions but we count them
February 1999
partially supported by Grants of the French-Israeli Binational Foundation (19931995), the German Israeli Foundation (1995-1998) and by the Fund for Promotion
of Research of the Technion{Israeli Institute of Technology