symmetric computations
play

symmetric computations amir yehudayoff Technion algebraic - PowerPoint PPT Presentation

symmetric computations amir yehudayoff Technion algebraic complexity field F ( char ( F ) = 2) variables X = { x 1 , . . . , x n } polynomial f F [ X ] questions: what is the circuit or formula size of f ? specifically, lower bounds?


  1. symmetric computations amir yehudayoff Technion

  2. algebraic complexity field F ( char ( F ) � = 2) variables X = { x 1 , . . . , x n } polynomial f ∈ F [ X ] questions: what is the circuit or formula size of f ? specifically, lower bounds? study simpler/restricted models of computation like monotone, multilinear, constant depth, ...

  3. removing graph structure theorem [Valiant]: 1. if f has a formula of size s then f = det ( M ) with M of size ≈ s and M i , j ∈ affine ( X ) 2 ∗ . if f has a circuit of size s then f = perm ( M ) with M of size ≈ s and M i , j ∈ affine ( X )

  4. determinantal complexity if f has a formula of size s then f = det ( M ) with M of size s × s and M i , j ∈ affine ( X ) Definition: dc ( f ) = min { s : f = det ( M ) } an algebraic analog of formula size

  5. GCT [Mulmuley] an approach for investigating dc ( perm ) based on symmetry V = lin F ( X ) GL ( V ) acts on V ⇒ GL ( V ) acts on F [ X ]: ( hf )( x ) = f ( h − 1 x ) the stabilizer 1 of f is G f = { h : hf = f } idea: G perm is far from G det so dc ( perm ) is large again, simpler/restricted models of “computation” 1 there is also a projective version

  6. equivariance [Landsberg-Ressayre] consider f = det ( M ) think of M as a device for computing f question: does device respect symmetries of f ? every h ∈ GL ( V ) acts on both sides of equality hf = h det ( M ) = det ( hM ) we can investigate what h does to M

  7. equivariance consider f = det ( M ) with M = A + B , A i , j ∈ lin ( X ) , B i , j ∈ F let G M = { g ∈ G det : gA ( V ) = A ( V ) , gB = B } “the part of symmetries of det that respects the device” M is an equivariant representation of f if for every h ∈ G f there is g ∈ G M so that hM = gM h acts on M from “inside” while g from “outside” edc ( f ) = min { s : f = det ( M ) } question: edc ( f ) < ∞ ?

  8. statements theorems [Landsberg-Ressayre]: over C � 2 n � 1. edc ( perm n ) = − 1 for n ≥ 3 n �� n i =1 x 2 � 2. edc = n + 1 i

  9. example: quadratics let n � x 2 q = i i =1 thus G q = { h ∈ GL ( V ) : h − 1 = h T }

  10. example: quadratics let n � x 2 q = i i =1 thus G q = { h ∈ GL ( V ) : h − 1 = h T } properties: i. dc C ( q ) ≤ n 2 + 1 for n even ii. edc C ( q ) = n + 1 iii. dc R ( q ) = n + 1

  11. upper bound claim: for  0 − x 1 − x 2  x n . . . � 0 y 1 1 0 0 . . .   � − x   M = 0 1 0 := y 2 . . .   y I   . . .   0 0 1 y n . . . we have n � x i y i = det ( M ) i =1

  12. upper bound on edc � 0 � − x ⇒ q = � n i =1 x 2 know: M = i = det ( M ) x I corollary: edc ( q ) ≤ n + 1

  13. upper bound on edc � 0 � − x ⇒ q = � n i =1 x 2 know: M = i = det ( M ) x I corollary: edc ( q ) ≤ n + 1 proof: for h ∈ G q , we have h − 1 = h T − ( h − 1 ) T x � � 0 hM = h − 1 x I and g defined by � 1 � 1 � � 0 0 M ′ �→ M ′ h − 1 ( h − 1 ) T 0 0 g is so that g ∈ G det and hM = gM

  14. real versus complex �� 0 �� − x = � n know: det i =1 x i y i y I corollary: 1. dc R ( q ) ≤ edc R ( q ) ≤ n + 1 2. dc C ( q ) = n 2 + 1:     0 − x 1 − ix 2 x 3 − ix 4 x n − 1 − ix n . . . x 1 − ix 2 1 0 0 . . .         det x 3 − ix 4 0 1 0 . . .         . . .     x n − 1 + ix n 0 0 1 . . . = ( x 1 + ix 2 )( x 1 − ix 2 ) + . . . = q

  15. real lower bound claim: if q = det ( M ) with M real and s × s then s ≥ n + 1

  16. real lower bound claim: if q = det ( M ) with M real and s × s then s ≥ n + 1 idea:

  17. real lower bound claim: if q = det ( M ) with M real and s × s then s ≥ n + 1 idea: a. q is degree 2 homogeneous and “smooth” & symmetries of det ⇒ M = A + B with B = diag (0 , 1 , 1 , . . . , 1)

  18. real lower bound claim: if q = det ( M ) with M real and s × s then s ≥ n + 1 idea: a. q is degree 2 homogeneous and “smooth” & symmetries of det ⇒ M = A + B with B = diag (0 , 1 , 1 , . . . , 1) b. first column of A must contain a copy of V ; otherwise can choose v � = 0 so that first column of A | x = v is 0 0 � = q ( x ) = det ( A | x = v ) = 0

  19. real lower bound claim: if q = det ( M ) with M real and s × s then s ≥ n + 1 idea: a. q is degree 2 homogeneous and “smooth” & symmetries of det ⇒ M = A + B with B = diag (0 , 1 , 1 , . . . , 1) b. first column of A must contain a copy of V ; otherwise can choose v � = 0 so that first column of A | x = v is 0 0 � = q ( x ) = det ( A | x = v ) = 0 wrong over C

  20. complex lower bound claim: if q = det ( M ) with M equivariant and s × s then s ≥ n + 1

  21. complex lower bound claim: if q = det ( M ) with M equivariant and s × s then s ≥ n + 1 idea: deep structural properties of Lie groups

  22. complex lower bound claim: if q = det ( M ) with M equivariant and s × s then s ≥ n + 1 idea: deep structural properties of Lie groups a. q is degree 2 homogeneous and “smooth” & symmetries of det ⇒ M = A + B with B = diag (0 , 1 , 1 , . . . , 1)

  23. complex lower bound claim: if q = det ( M ) with M equivariant and s × s then s ≥ n + 1 idea: deep structural properties of Lie groups a. q is degree 2 homogeneous and “smooth” & symmetries of det ⇒ M = A + B with B = diag (0 , 1 , 1 , . . . , 1) b. G M which fixes B has a specific structure

  24. complex lower bound claim: if q = det ( M ) with M equivariant and s × s then s ≥ n + 1 idea: deep structural properties of Lie groups a. q is degree 2 homogeneous and “smooth” & symmetries of det ⇒ M = A + B with B = diag (0 , 1 , 1 , . . . , 1) b. G M which fixes B has a specific structure c. first column of A must contain a copy of V

  25. summary the algebraic language yields new types of “restricted models” for equivariant representations, we can understand things (better) also yields algorithms (“Ryser’s formula”)

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend