skip to main content
research-article

Undirected connectivity in log-space

Published:18 September 2008Publication History
Skip Abstract Section

Abstract

We present a deterministic, log-space algorithm that solves st-connectivity in undirected graphs. The previous bound on the space complexity of undirected st-connectivity was log4/3(⋅) obtained by Armoni, Ta-Shma, Wigderson and Zhou (JACM 2000). As undirected st-connectivity is complete for the class of problems solvable by symmetric, nondeterministic, log-space computations (the class SL), this algorithm implies that SL = L (where L is the class of problems solvable by deterministic log-space computations). Independent of our work (and using different techniques), Trifonov (STOC 2005) has presented an O(log n log log n)-space, deterministic algorithm for undirected st-connectivity.

Our algorithm also implies a way to construct in log-space a fixed sequence of directions that guides a deterministic walk through all of the vertices of any connected graph. Specifically, we give log-space constructible universal-traversal sequences for graphs with restricted labeling and log-space constructible universal-exploration sequences for general graphs.

References

  1. Ajtai, M., Komlós, J., and Szemerédi, E. 1987. Deterministic simulation in LOGSPACE. In Proceedings of the 19th Annual ACM Symposium on Theory of Computing (STOC) (New York, NY). ACM, New York, 132--140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Aleliunas, R., Karp, R. M., Lipton, R. J., Lovász, L., and Rackoff, C. 1979. Random walks, universal traversal sequences, and the complexity of maze problems. In Proceedings of the 20th Annual Symposium on Foundations of Computer Science (FOCS) (San Juan, Puerto Rico). IEEE Computer Society Press, Los Alamitos, CA, 218--223. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Alon, N. 1986. Eigenvalues and expanders. Combinatorica 6, 2, 83--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Alon, N., Galil, Z., and Milman, V. D. 1987. Better expanders and superconcentrators. J. Algorithms 8, 3, 337--347. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Alon, N., and Milman, V. D. 1985. λ1, isoperimetric inequalities for graphs, and superconcentrators. J. Combinat. Theory Ser. B 38, 1, 73--88.Google ScholarGoogle ScholarCross RefCross Ref
  6. Alon, N., and Roichman, Y. 1994. Random Cayley graphs and expanders. Rand. Struct. Algorithms 5, 2, 271--284.Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Alon, N., and Sudakov, B. 2000. Bipartite subgraphs and the smallest eigenvalue. Combinat. Probab. Comput. 9, 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Alvarez, C., and Greenlaw, R. 1996. A compendium of problems complete for symmetric logarithmic space. Electronic Colloquium on Computational Complexity (ECCC) 3, 039.Google ScholarGoogle Scholar
  9. Armoni, R., Ta-Shma, A., Wigderson, A., and Zhou, S. 2000. An o(log(n)4/3) space algorithm for (s,t) connectivity in undirected graphs. J. ACM 47, 2, 294--311. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Babai, L., Nisan, N., and Szegedy, M. 1989. Multiparty protocols, pseudorandom generators for logspace, and time-space trade-offs. In Proceedings of the 21st Annual ACM Symposium on Theory of Computing (Seattle, WA). ACM, New York, 204--232. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ben-Asher, Y., Lange, K.-J., Peleg, D., and Schuster, A. 1995. The complexity of reconfiguring network model. Inf. Comput. 21, 1, 41--58. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Borodin, A., Cook, S. A., Dymond, P. W., Ruzzo, W. L., and Tompa, M. 1989. Two applications of inductive counting for complementation problems. SIAM J. Comput. (SICOMP) 18, 3, 559--578. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Broder, A., and Shamir, E. 1987. On the second eigenvalue of random regular graphs. In Poceedings of the 28th Annual Symposium on Foundations of Computer Science (FOCS) (Los Angeles, CA). IEEE Computer Society Press, Los Alamitos, CA, 286--294. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Chung, K.-M., Reingold, O., and Vadhan, S. 2007. S-T connectivity on digraphs with known stationary distribution. In Proceedings of the 22nd Annual IEEE Conference on Computational Complexity (CCC), In IEEE Computer Society Press, Los Alamitos, CA, 236--249. (Full version posted as ECCC TR07-030). Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Dinur, I. 2007. The PCP Theorem by gap amplification. J. ACM 54, 3, 12. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Friedman, J. 1991. On the second eigenvalue and random walks in random d-regular graphs. Combinatorica 11, 4, 331--362.Google ScholarGoogle ScholarCross RefCross Ref
  17. Friedman, J., Kahn, J., and Szemerédi, E. 1989. On the second eigenvalue in random regular graphs. In Proceedings of the 21st Annual ACM Symposium on Theory of Computing (Seattle, WA), ACM, New York, 587--598. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. Gabber, O., and Galil, Z. 1981. Explicit constructions of linear-sized superconcentrators. J. Comput. Syst. Sci. 22, 3 (June), 407--420.Google ScholarGoogle ScholarCross RefCross Ref
  19. Goldreich, O. 2005. Bravely, moderately: A common theme in four recent results. Electronic Colloquium on Computational Complexity (ECCC) 098. (Also appeared as part of SIGACT news complexity theory column 51.)Google ScholarGoogle Scholar
  20. Goldreich, O. 2008. Computational Complexity: A Conceptual Perspective. Cambridge University Press. (Online drafts at http://www.wisdom.weizmann.ac.il/oded/cc-drafts.html.) Google ScholarGoogle ScholarCross RefCross Ref
  21. Goldreich, O., and Wigderson, A. 2002. Derandomization that is rarely wrong from short advice that is typically good. In Proceedings of the 6th International Workshop on Randomization and Computation (RANDOM). 209--223. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Hoory, S., and Wigderson, A. 1993. Universal traversal sequences for expander graphs. Inf. Process. Lett. 46, 2, 67--69. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Impagliazzo, R., Nisan, N., and Wigderson, A. 1994. Pseudorandomness for network algorithms. In Proceedings of the 26th Annual ACM Symposium on the Theory of Computing (STOC) (Montréal, Québec, Canada). ACM, New York, 356--364. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Jerrum, M., Sinclair, A., and Vigoda, E. 2004. A polynomial-time approximation algorithm for the permanent of a matrix with nonnegative entries. J. ACM 51, 4, 671--697. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. Jimbo, S., and Maruoka, A. 1987. Expanders obtained from affine transformations. Combinatorica 7, 4, 343--355. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Karchmer, M., and Wigderson, A. 1993. On span programs. In Proceedings of the 8th Structures in Complexity conference. 102--111.Google ScholarGoogle Scholar
  27. Klivans, A., and van Melkebeek, D. 2002. Graph nonisomorphism has subexponential size proofs unless the polynomial-time hierarchy collapses. SIAM J. Comput. (SICOMP) 31, 5, 1501--1526. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Koucky, M. 2001. Universal traversal sequences with backtracking. In Proceedings of the IEEE Conference on Computational Complexity (CCC). IEEE Computer Society Press, Los Alamitos, CA, 21--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Koucky, M. 2003. On traversal sequences, exploration sequences and completeness of kolmogorov random strings. Ph.D. dissertation, Rutgers University. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Lewis, H. R., and Papadimitriou, C. H. 1982. Symmetric space-bounded computation. Theoret. Comput. Sci. 19, 161--187.Google ScholarGoogle ScholarCross RefCross Ref
  31. Lubotzky, A., Phillips, R., and Sarnak, P. 1988. Ramanujan graphs. Combinatorica 8, 3, 261--277.Google ScholarGoogle ScholarCross RefCross Ref
  32. Madras, N., and Randall, D. 1996. Factoring Markov chains to bound mixing rates. In Proceedings of the 37th Annual Symposium on Foundations of Computer Science (FOCS). IEEE Computer Society Press, Los Alamitos, CA, 194--203. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Margulis, G. A. 1973. Explicit constructions of expanders. Problemy Peredachi Informatsii 9, 4, 71--80.Google ScholarGoogle Scholar
  34. Margulis, G. A. 1988. Explicit group-theoretic constructions of combinatorial schemes and their applications in the construction of expanders and concentrators. Problemy Peredachi Informatsii 24, 1, 51--60.Google ScholarGoogle Scholar
  35. Martin, R. A., and Randall, D. 2000. Sampling adsorbing staircase walks using a new markov chain decomposition method. In Proceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS). (Redondo Beach, CA) IEEE Computer Society Press, Los Alamitos, CA, 492--502. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Morgenstern, M. 1994. Existence and explicit constructions of q + 1 regular Ramanujan graphs for every prime power q. J. Combinat. Theory Ser. B 62, 1, 44--62. Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Nisan, N. 1992a. Pseudorandom generators for space-bounded computation. Combinatorica 12, 4, 449--461.Google ScholarGoogle ScholarCross RefCross Ref
  38. Nisan, N. 1992b. RL ⊆ SC. In Proceedings of the 24th Annual ACM Symposium on Theory of Computing (STOC). ACM, New York, 619--623. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Nisan, N., Szemerédi, E., and Wigderson, A. 1989. Undirected connectivity in o(log1.5n) space. In Proceedings of the 30th Foundations of Computer Science (Research Triangle Park, NC), IEEE Computer Society Press, Los Alamitos, CA, 24--29. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Nisan, N., and Ta-Shma, A. 1995. Symmetric logspace is closed under complement. Chicago J. Theor. Comput. Sci.Google ScholarGoogle Scholar
  41. Nisan, N., and Zuckerman, D. 1996. Randomness is linear in space. J. Comput. Syst. Sci. 52, 1 (Feb.), 43--52. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Pinsker, M. S. 1973. On the complexity of a concentrator. In Proceedings of the 7th Annual Teletraffic Conference. Stockholm, 318/1--318/4.Google ScholarGoogle Scholar
  43. Raz, R., and Reingold, O. 1999. On recycling the randomness of the states in space bounded computation. In Proceedings of the 31st Annual ACM Symposium on the Theory of Computing (STOC) (Atlanta, GA). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Reif, J. H. 1984. Symmetric complementation. J. ACM 31, 2, 401--421. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Reingold, O., Trevisan, L., and Vadhan, S. P. 2006. Pseudorandom walks on regular digraphs and the RL vs. L Problem. In Proceedings of the 38th Annual ACM Symposium on Theory of Computing (STOC). ACM, New York, 457--466. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Reingold, O., Vadhan, S., and Wigderson, A. 2000. Entropy waves, the zig-zag graph product, and new constant-degree expanders and extractors. In Proceedings of the 41st Annual Symposium on Foundations of Computer Science (FOCS) (Redondo Beach, CA). IEEE Computer Society Press, Los Alamitos, CA, 3--13. Google ScholarGoogle ScholarDigital LibraryDigital Library
  47. Reingold, O., Vadhan, S., and Wigderson, A. 2002. Entropy waves, the zig-zag graph product, and new constant-degree expanders. Ann. Math. 155, 1 (January). (Extended abstract in Proceedings of FOCS '00). Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Rozenman, E., and Vadhan, S. 2005. Derandomized squaring of graphs. In Proceedings of the 8th International Workshop on Randomization and Computation (RANDOM). Lecture Notes in Computer Science, vol. 3624. Springer-Verlag, New York, 436--447. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Saks, M. 1996. Randomization and derandomization in space-bounded computation. In Proceedings of the IEEE 11th Annual Conference on Structure in Complexity Theory. IEEE Computer Society Press, Los Alamitos, CA. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Saks, M., and Zhou, S. 1999. bphspace(S) ⊆ dspace(S3/2). J. Comput. Syst. Sci. 58, 2, 376--403. Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Savitch, J. 1970. Relationship between nondeterministic and deterministic tape complexities. J. Comput. Syst. Sci. 4, 2, 177--192.Google ScholarGoogle ScholarDigital LibraryDigital Library
  52. Tanner, M. R. 1984. Explicit concentrators from generalized n-gons. SIAM J. Algeb. Disc. Meth. 5, 3, 287--293.Google ScholarGoogle ScholarCross RefCross Ref
  53. Trifonov, V. 2005. An o(log n log log n) space algorithm for undirected s,t-connectivity. In Proceedings of the 37th ACM Symposium on Theory of Computing (STOC). ACM, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Wigderson, A. 1992. The complexity of graph connectivity. In Proceedings of the 17th Mathematical Foundations of Computer Science. 112--132. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Undirected connectivity in log-space

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Journal of the ACM
        Journal of the ACM  Volume 55, Issue 4
        September 2008
        170 pages
        ISSN:0004-5411
        EISSN:1557-735X
        DOI:10.1145/1391289
        Issue’s Table of Contents

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 18 September 2008
        • Revised: 1 June 2008
        • Accepted: 1 June 2008
        • Received: 1 January 2008
        Published in jacm Volume 55, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader