skip to main content
article

Some optimal inapproximability results

Published:01 July 2001Publication History
Skip Abstract Section

Abstract

We prove optimal, up to an arbitrary ε > 0, inapproximability results for Max-E k-Sat for k ≥ 3, maximizing the number of satisfied linear equations in an over-determined system of linear equations modulo a prime p and Set Splitting. As a consequence of these results we get improved lower bounds for the efficient approximability of many optimization problems studied previously. In particular, for Max-E2-Sat, Max-Cut, Max-di-Cut, and Vertex cover.

References

  1. AMALDI, E., AND KANN, V. 1995. The complexity and approximability of finding feasible subsystems of linear relations. Theoret. Comput. Sci. 147, 181-210. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. ANDERSSON, G., ENGEBRETSEN, L., AND H~STAD, J. 1999. A new way to use semidefinite programming with applications to linear equations mod p. In Proceedings of the 10th Annual ACM-SIAM Symposium on Discrete Algorithms Baltimore, Md., Jan. 17-19. ACM New York, pp. 41-50. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. ARORA, S., LUND, C., MOTWANI, R., SUDAN, M., AND SZEGEDY, M. 1998. Proof verification and intractability of approximation problems. J. ACM 45, 3 (May), 501-555. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. ARORA, S., AND SAFRA, S. 1998. Probabilistic checking of proofs: a new characterization of NP. J. ACM 45, 1 (Jan.) 70-122. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. BABAI, L., FORTNOW, L., LEVIN, L., AND SZEGEDY, M. 1991b Checking computations in polylogarithmic time. In Proceedings of the 23rd Annual Symposium on the Theory of Computation (New Orleans, La., May 6-8). ACM, New York, pp. 21-31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. BABAI, L., FORTNOW, L., AND LUND, C. 1991a Non-deterministic exponential time has two-prover interactive protocols. Computat. Compl. 1, 3-40.Google ScholarGoogle ScholarCross RefCross Ref
  7. BAR-YEHUDA, R., AND EVEN, S. 1981. A linear time approximation algorithm for the weighted vertex cover algorithm. J. Algorithms 2, 198-210.Google ScholarGoogle ScholarCross RefCross Ref
  8. BELLARE, M., COPPERSMITH, D., H~STAD, J., KIWI, M., AND SUDAN, M. 1996. Linearity testing in characteristic two. IEEE Trans. Inf. Theory 42, 6 (Nov.), 1781-1796. Google ScholarGoogle ScholarCross RefCross Ref
  9. BELLARE, M., GOLDREICH, O., AND SUDAN, M. 1998. Free Bits, PCPs and Non-Approximability- Towards tight Results. SIAM J. Comput. 27, 804-915. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. BELLARE, M., GOLDWASSER, S., LUND, C., AND RUSSELL, A. 1993. Efficient probabilistically checkable proofs and applications to approximation. In Proceedings of the 25th Annual ACMSymposium on Theory of Computation (San Diego, Calif., May 16-18). ACM, New York, pp. 294-304. (See also Errata sheet in Proceedings of the 26th Annual ACM Symposium on Theory of Computation (Montreal, Que., Canada). ACM, New York, p. 820). Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. BELLARE, M., AND SUDAN, M. 1994. Improved non-approximability results. In Proceedings of 26th Annual ACM Symposium on Theory of Computation (Montreal, Que., Canada, May 23-25). ACM, New York, pp. 184-193. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. BEN-OR, M., GOLDWASSER, S., KILIAN, J., AND WIGDERSON, A. 1998. Multiprover interactive proofs: How to remove intractability. In Proceedings of the 20th Annual ACM Symposium on Theory of Computation (Chicago, Ill., May 2-4). ACM, New York, pp. 113-131. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. BLUM, M., LUBY, M., AND RUBINFELD, R. 1993. Self-testing/ correcting with applications to numerical problems. J. Comput. Sys. Sci. 47, 549-595. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. FEIGE, U. 1998. A threshold of ln n for approximating set cover. J. ACM, 45, 634-652. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. FEIGE, U., AND GOEMANS, M. 1995. Approximating the value of two prover proof systems, with applications to MAX 2SAT and MAX DICUT. In Proceedings of the 3rd Israeli Symposium on the theory of Computing and Systems. IEEE Computer Society, Tel Aviv, Israel, pp. 182-189. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. FEIGE, U., GOLDWASSER, S., LOVASZ L., SAFRA S., AND SZEGEDY, M. 1996. Interactive proofs and the hardness of approximating cliques. J. ACM, 43, 2 (Mar.), 268-292. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. FEIGE, U., AND KILIAN, J. 1998. Zero-knowledge and the chromatic number. J. Comput. Syst. Sci. 57,2, 187-200. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. FORTNOW, L., ROMPEL, J., AND SIPSER, M. 1994. On the power of multi-prover interactive protocols. Theoret. Comput. Sci. 134, 2, 545-557. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. GAREY,M.R.,AND JOHNSON, D. S. 1979. Computers and Intractability. W. H. Freeman and Company, New York. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. GOEMANS, M., AND WILLIAMSON, D. 1995. Improved approximation algorithms for maximum cut and satisfiability problems using semidefinite programming. J. ACM 42, 6, 1115-1145. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. GURUSWAMI, V., LEWIN, D., SUDAN, M., AND TREVISAN, L. 1998. A tight characterization of NP with 3 query PCPs. In Proceedings of 39th Annual IEEE Symposium on Foundations of Computer Science (Palo Alto, Calif.). IEEE Computer Society Press, Los Alamitos, Calif., pp. 8-17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. HASTAD, J. 1999. Clique is hard to approximate within n1Acta Math. 182, 105-142.Google ScholarGoogle Scholar
  23. HOCHBAUM, D. 1983. Efficient algorithms for the stable set, vertex cover and set packing problems. Disc. Appl. Math. 6, 243-254.Google ScholarGoogle ScholarCross RefCross Ref
  24. JOHNSON, D.S. 1974. Approximation algorithms for combinatorial problems. J. Comput. Syst. Sci 9, 256-278.Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. JUDSON, T. 1994. Abstract Algebra, Theory and Applications. PWS Publishing Company, Boston, Mass.Google ScholarGoogle Scholar
  26. KANN, V., LAGERGREN, J., AND PANCONESI, A. 1996. Approximability of maximum splitting of k-sets and some other APX-complete problems. Inf. proc. lett. 58, 105-110. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. LUND, C., FORTNOW, L., KARLOFF, H., AND NISAN, N. Algebraic methods for interactive proof systems. J. ACM 39, 2 (Apr.), 859-868. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. PAPADIMITRIOU, C., AND YANNAKAKIS, M. 1991. Optimization, approximation and complexity classes. J. Comput. Syst. Sci. 43, pp. 425-440.Google ScholarGoogle ScholarCross RefCross Ref
  29. RAZ, R. 1998. A parallel repetition theorem. SIAM J. Comput, 27, 3, 763-803. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. SHAMIR, A. 1992. IP D PSPACE. J. ACM 39, 2 (Apr.) 869-877. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. TREVISAN, L., SORKIN, G., SUDAN, M., AND WILLIAMSON, D. 2000. Gadgets, approximation and linear programming. SIAM J. Comput. 29, 2074-2097. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. ZWICK, U. 1998. Approximation algorithms for constraint satisfaction problems involving at most three variables per constraint. In Proceedings of the 9th Annual ACM-SIAM Symposium on Discrete Algorithms (San Francisco, Calif., Jan). ACM, New York, pp. 201-210. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Some optimal inapproximability results

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Journal of the ACM
      Journal of the ACM  Volume 48, Issue 4
      July 2001
      303 pages
      ISSN:0004-5411
      EISSN:1557-735X
      DOI:10.1145/502090
      Issue’s Table of Contents

      Copyright © 2001 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 July 2001
      Published in jacm Volume 48, Issue 4

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • article

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader