Abstract
We explore the intricate interdependent relationship among counting problems, considered from three frameworks for such problems: Holant Problems, counting CSP and weighted H-colorings. We consider these problems for general complex valued functions that take boolean inputs. We show that results from one framework can be used to derive results in another, and this happens in both directions. Holographic reductions discover an underlying unity, which is only revealed when these counting problems are investigated in the complex domain ℂ. We prove three complexity dichotomy theorems, leading to a general theorem for Holantc problems. This is the natural class of Holant problems where one can assign constants 0 or 1. More specifically, given any signature grid on G=(V,E) over a set of symmetric functions, we completely classify the complexity to be in P or #P-hard, according to , of
where (0, 1 are the unary constant 0, 1 functions). Not only is holographic reduction the main tool, but also the final dichotomy can be only naturally stated in the language of holographic transformations. The proof goes through another dichotomy theorem on Boolean complex weighted #CSP.
Similar content being viewed by others
References
Bulatov, A.A.: A dichotomy theorem for constraint satisfaction problems on a 3-element set. J. ACM 53, 66–120 (2006)
Bulatov, A.A.: The complexity of the counting constraint satisfaction problem. In: Aceto, L., Damgård, I., Goldberg, L.A., Halldórsson, M.M., Ingólfsdóttir, A., Walukiewicz, I. (eds.) Proceedings of 35th International Colloquium on Automata, Languages and Programming, ICALP 2008, Part I: Track A: Algorithms, Automata, Complexity, and Games, Reykjavik, Iceland, July 7–11, 2008. Lecture Notes in Computer Science, vol. 5125, pp. 646–661. Springer, Berlin (2008)
Bulatov, A.A., Dalmau, V.: Towards a dichotomy theorem for the counting constraint satisfaction problem. Inf. Comput. 205(5), 651–678 (2007)
Bulatov, A.A., Grohe, M.: The complexity of partition functions. In: Díaz, J., Karhumäki, J., Lepistö, A., Sannella, D. (eds.) Proceedings of 31st International Colloquium on Automata, Languages and Programming: ICALP 2004, Turku, Finland, July 12–16, 2004. Lecture Notes in Computer Science, vol. 3142, pp. 294–306. Springer, Berlin (2004)
Bulatov, A.A., Grohe, M.: The complexity of partition functions. Theor. Comput. Sci. 348(2–3), 148–186 (2005)
Cai, J.y., Chen, X., Lu, P.: Graph homomorphisms with complex values: A dichotomy theorem. In: Abramsky, S., Gavoille, C., Kirchner, C., Meyer auf der Heide, F., Spirakis, P.G. (eds.): Proceedings of 37th International Colloquium on Automata, Languages and Programming, Part I, ICALP 2010, Bordeaux, France, July 6–10, 2010. Lecture Notes in Computer Science, vol. 6198, pp. 275–286. Springer, Berlin (2010)
Cai, J.y., Lu, P.: Holographic algorithms: From art to science. J. Comput. Syst. Sci. 77(1), 41–61 (2011)
Cai, J.y., Lu, P., Xia, M.: Holographic algorithms by Fibonacci gates and holographic reductions for hardness. In: 49th Annual IEEE Symposium on Foundations of Computer Science, FOCS 2008, Philadelphia, PA, USA, October 25–28, 2008, pp. 644–653. IEEE Computer Society, Los Alamitos (2008)
Cai, J.Y., Lu, P., Xia, M.: Holant problems and counting CSP. In: Mitzenmacher, M. (ed.) Proceedings of the 41st Annual ACM Symposium on Theory of Computing, STOC 2009, Bethesda, MD, USA, May 31–June 2, 2009, pp. 715–724. ACM, New York (2009)
Cai, J.y., Lu, P., Xia, M.: A computational proof of complexity of some restricted counting problems. Theor. Comput. Sci. 412(23), 2468–2485 (2011)
Creignou, N., Khanna, S., Sudan, M.: Complexity Classifications of Boolean Constraint Satisfaction Problems. Society for Industrial and Applied Mathematics, Philadelphia (2001)
Dodson, C.T.J., Poston, T.: Tensor Geometry: the Geometric Viewpoint and Its Uses. Graduate Texts in Mathematics. Springer, Berlin (1991)
Dyer, M.E., Goldberg, L.A., Jerrum, M.: The complexity of weighted Boolean CSP. SIAM J. Comput. 38(5), 1970–1986 (2009)
Dyer, M.E., Goldberg, L.A., Paterson, M.: On counting homomorphisms to directed acyclic graphs. In: Bugliesi, M., Preneel, B., Sassone, V., Wegener, I. (eds.) Proceedings of 33rd International Colloquium, on Automata, Languages and Programming, Part I, ICALP 2006, Venice, Italy, July 10–14, 2006. Lecture Notes in Computer Science, vol. 4051, pp. 38–49. Springer, Berlin (2006)
Dyer, M.E., Goldberg, L.A., Paterson, M.: On counting homomorphisms to directed acyclic graphs. J. ACM 54(6) (2007)
Dyer, M.E., Greenhill, C.S.: The complexity of counting graph homomorphisms (extended abstract). In: Shmoys, David B. (ed.) Proceedings of the Eleventh Annual ACM-SIAM Symposium on Discrete Algorithms, San Francisco, CA, USA, January 9–11, 2000, pp. 246–255. ACM/SIAM, New York (2000)
Dyer, M.E., Greenhill, C.S.: Corrigendum: The complexity of counting graph homomorphisms. Random Struct. Algorithms 25(3), 346–352 (2004)
Feder, T., Vardi, M.Y.: The computational structure of monotone monadic SNP and constraint satisfaction: A study through datalog and group theory. SIAM J. Comput. 28(1), 57–104 (1998)
Freedman, M., Lovász, L., Schrijver, A.: Reflection positivity, rank connectivity, and homomorphism of graphs. J. Am. Math. Soc. 20, 37–51 (2007)
Goldberg, L.A., Grohe, M., Jerrum, M., Thurley, M.: A complexity dichotomy for partition functions with mixed signs. SIAM J. Comput. 39(7), 3336–3402 (2010)
Hell, P., Nešetřil, J.: On the complexity of h-coloring. J. Comb. Theory, Ser. B 48(1), 92–110 (1990)
Kowalczyk, M.: Classification of a class of counting problems using holographic reductions. In: Ngo, Hung Q. (ed.) Proceedings of 15th Annual International Conference on Computing and Combinatorics, COCOON 2009, Niagara Falls, NY, USA, July 13–15, 2009. Lecture Notes in Computer Science, vol. 5609, pp. 472–485. Springer, Berlin (2009)
Kowalczyk, M., Cai, J.y.: Holant problems for regular graphs with complex edge functions. In: Marion, J.-Y., Schwentick, T. (eds.) 27th International Symposium on Theoretical Aspects of Computer Science, STACS 2010, Nancy, France, March 4–6, 2010, LIPIcs, vol. 5, pp. 525–536. Schloss Dagstuhl—Leibniz-Zentrum fuer Informatik, Dagstuhl (2010)
Valiant, L.G.: Accidental algorithms. In: Proceedings of 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS 2006), Berkeley, California, USA, 21–24 October 2006, pp. 509–517. IEEE Comput. Soc., Los Alamitos (2006)
Valiant, L.G.: Holographic algorithms. SIAM J. Comput. 37(5), 1565–1594 (2008)
Xia, M., Zhang, P., Zhao, W.: Computational complexity of counting problems on 3-regular planar graphs. Theor. Comput. Sci. 384(1), 111–125 (2007)
Author information
Authors and Affiliations
Corresponding author
Appendices
Appendix A: Some Known Dichotomy Results
In this section, we review three dichotomy theorems from [9].
Theorem 7
([9])
Let be a set of symmetric non-degenerate signatures over ℂ. Then is computable in polynomial time in the following three cases. In all other cases, is #P-hard.
-
1.
Every signature in is of arity no more than two;
-
2.
There exist two constants a and b (not both zero, depending only on ), such that for every signature one of the two conditions is satisfied: (1) for every k=0,1,…,n−2, we have ax k +bx k+1−ax k+2=0; (2) n=2 and the signature [x 0,x 1,x 2] is of form [2aλ,bλ,−2aλ].
-
3.
For every signature , one of the two conditions is satisfied: (1) For every k=0,1,…,n−2, we have x k +x k+2=0; (2) n=2 and the signature [x 0,x 1,x 2] is of form [λ,0,λ].
Theorem 8
[9] Let be a set of real symmetric signatures, and let and be three families of signatures defined as
Then is computable in polynomial time if (1) After removing unary signatures from , it falls in one of the three cases of Theorem 7 (this implies is computable in polynomial time) or (2) (Without removing any unary signature) . Otherwise, is #P-hard.
Definition 5
A k-ary function f(x 1,…,x k ) is affine if it has the form
where X=(x 1,x 2,…,x k ,1), A is matrix over \(\mathbb{F}_{2}\), α j is a vector over \(\mathbb{F}_{2}\), and χ is a 0–1 indicator function such that χ AX=0 is 1 iff AX=0. Note that the inner product 〈α j ,X〉 is calculated over \(\mathbb{F}_{2}\), while the summation \(\sum_{j=1}^{n}\) on the exponent of \(i = \sqrt{-1}\) is evaluated as a sum mod 4 of 0–1 terms. We use to denote the set of all affine functions.
We use to denote the set of functions which can be expressed as a product of unary functions, binary equality functions ([1,0,1]) and binary disequality functions ([0,1,0]).
Theorem 9
[9]
Suppose is a class of functions mapping Boolean inputs to complex numbers. If or , then #CSP() is computable in polynomial time. Otherwise, #CSP() is #P-hard.
As we mentioned in [9], the class is a natural generalization of the symmetric signatures family . It is easy to show that the set of symmetric signatures in is exactly .
Appendix B: Some Useful Reductions
In this section, we list some useful simple reductions: reduction between Holant and #CSP, reduction between bipartite and non-bipartite settings, and holographic reduction.
Proposition 1
.
This says that #CSP is the same as Holant problems with Equality functions given for free.
Proposition 2
.
That is, we can transform every edge to a path of length 2 with the new vertex given (=2)=[1,0,1].
Proposition 3
.
Binary Equality functions on both sides allow the transfer of signatures.
Proposition 4
For any T∈GL 2(ℂ), .
This is a restatement of Valiant’s Holant Theorem.
Proposition 5
Let T be an orthogonal transformation (TT T=I). Then .
This follows from the invariance of (=2)=[1,0,1] under an orthogonal transformation, and Propositions 2 and 4.
Appendix C: List of Matrices in
In this section, we explicitly list all the matrices in the family
which is defined and used in the statement of Theorem 6. The following condition is given in Theorem 6:
Together with the condition in Theorem 7, this gives an effective tractability condition which is both necessary and sufficient for Holantc problems, by Theorem 6.
As noted before, the set of symmetric signatures in is exactly . We note that [1,0,1]T ⊗2, [1,0]T and [0,1]T are all symmetric, as is the requirement in Theorem 6. Thus we can replace by in the expression above.
It is obvious that the family is closed under a scalar multiplication. Thus we list them up to a scalar multiple.
After a scalar multiple, symmetric binary signatures in are precisely
Also the unary signatures in , up to a scalar multiple, are
Before we enumerate all the possibilities, we make two observations to simplify this process:
-
1.
If we exchange the two columns of T, the signature [1,0,1]T ⊗2 becomes its reversal, and the two numbers in [1,0]T are interchanged. Similarly the two numbers in [0,1]T are interchanged as well. The effect of exchanging the two columns of T is the same as replacing T by . On the other hand, the holographic transformation amounts exchanging input values 0 and 1 for functions in , and this operation keeps invariant.
-
2.
If we multiply on the right side of T, then [y 0,y 1,y 2]≜[1,0,1]T ⊗2 becomes [y 0,−y 1,y 2]. This operation also preserves both the set of binary and the set of unary signatures, respectively, listed for , up to a scalar factor. On the other hand, the effect of the holographic transformation is to transform an original function f to \(f \cdot (-1)^{\sum_{i} x_{i}}\), and thus it is in iff the original .
Similarly, we can multiply on the right side of T. Of course the invariance under implies that of .
What has been shown is that Condition (2) is invariant under the right action on by the group generated by and . By , we may consider only those T’s such that [1,0,1]T ⊗2∈{[1,0,1],[1,0,i],[1,i,1],[0,1,0]}, up to a scalar factor. If we further normalize by the reversal action we may consider only those T’s such that [1,0]T∈{[1,±1],[1,i],[1,0]}, up to a scalar factor. However this reversal action is only partially closed for {[1,0,1],[1,0,i],[1,i,1],[0,1,0]}, with the exception [1,0,i] which is changed to [1,0,−i]. Thus we may have two extra cases to consider: [1,0,1]T ⊗2=[1,0,i] and, [1,0]T=[0,1] or [1,−i]. But for these two cases if we apply first , followed by , we obtain [1,0,1]T ⊗2=[1,0,i] and, [1,0]T=[1,0] or [1,1] respectively. Hence we can eliminate these two cases.
To summarize, to enumerate all T satisfying Condition (2) we only need to consider
up to a scalar factor. In the following, we denote by \(\alpha=(1+i)/\sqrt{2}=\sqrt{i}\).
If [1,0,1]T ⊗2=γ[1,0,1], [1,0]T=λ[1,1], we have
If [1,0,1]T ⊗2=γ[1,0,1], [1,0]T=λ[1,−1], we have
For [1,0,1]T ⊗2=γ[1,0,1], [1,0]T=λ[1,i], there is no solution.
If [1,0,1]T ⊗2=γ[1,0,1], [1,0]T=λ[1,0], we have
If [1,0,1]T ⊗2=γ[1,0,i], [1,0]T=λ[1,1], we have
If [1,0,1]T ⊗2=γ[1,0,i], [1,0]T=λ[1,−1], we have
If [1,0,1]T ⊗2=γ[1,0,i], [1,0]T=λ[1,i], we have
If [1,0,1]T ⊗2=γ[1,0,i], [1,0]T=λ[1,0], we have
If [1,0,1]T ⊗2=γ[1,i,1], [1,0]T=λ[1,1], we have
If [1,0,1]T ⊗2=γ[1,i,1], [1,0]T=λ[1,−1], we have
If [1,0,1]T ⊗2=γ[1,i,1], [1,0]T=λ[1,i], we have
If [1,0,1]T ⊗2=γ[1,i,1], [1,0]T=λ[1,0], we have
If [1,0,1]T ⊗2=γ[0,1,0], [1,0]T=λ[1,1], we have
If [1,0,1]T ⊗2=γ[0,1,0], [1,0]T=λ[1,−1], we have
If [1,0,1]T ⊗2=γ[0,1,0], [1,0]T=λ[1,i], we have
For [1,0,1]T ⊗2=γ[0,1,0], [1,0]T=λ[1,0], there is no solution.
Appendix D: An Orthogonal Transformation
In this section we give the detail of an orthogonal holographic transformation used in the proof of Lemma 1.
We are given x k =Akα k−1+Bα k, where \(A \not = 0\), and α≠±i. Let
then the signature [x 0,x 1,x 2,x 3] can be expressed as
This identity can be verified by observing that
and we apply S ⊗3 using properties of tensor product, , etc.
Let , then T=T T=T −1∈O 2(ℂ) is orthogonal, and is upper triangular, where \(u = \sqrt{1 + \alpha^{2}}\). As \(\det R = \det T \det S = (-1) A \not = 0\), we have \(uv \not = 0\). It follows that
This can be written as a symmetric signature form [u 3+3u 2 w,u 2 v,0,0]. Note that the entry \(u^{2}v \not = 0\), which we can normalize to 1, after a scalar multiplication. This gives us the form [z,1,0,0] for some z∈ℂ.
Rights and permissions
About this article
Cite this article
Cai, JY., Huang, S. & Lu, P. From Holant to #CSP and Back: Dichotomy for Holantc Problems. Algorithmica 64, 511–533 (2012). https://doi.org/10.1007/s00453-012-9626-6
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s00453-012-9626-6