SlideShare a Scribd company logo
1 of 17
Download to read offline
Feasible Proofs of Matrix Identities
with Csanky’s Algorithm
CSL’05
Michael Soltys
McMaster University, Canada
1
What is the complexity of the concepts needed to prove theorems
of matrix algebra?
For example:
• AB = I ⊃ BA = I
• The Cayley-Hamilton Theorem
(If pA(x) = det(xI − A), then pA(A) = 0)
• det(AB) = det(A) det(B)
• Linear Independence
(n + 1 vectors in Fn
must be linearly dependent)
2
Using Gaussian Elimination we can prove these principles in
PolyTime:
S1
2, V1
, PV, . . .
with the elements of the underlying field F properly encoded.
∗ ∗ ∗
Aside: if V1
∃Y α(X, Y ), then f(X) = Y is a polytime function,
and if f is polytime, then there exists an α(X, Y ) such that
N2
α(X, f(X)), and V1
∃!Y α(X, Y ).
3
NC2
algorithms for computing the characteristic polynomial:
1. Berkowitz’s algorithm
2. “Newton’s Symmetric Polynomials” (Csanky’s) algorithm
3. Chistov’s algorithm
Can we use them to give NC2
proofs of matrix properties?
4
Berkowitz’s algorithm is based on Samuelson’s identity:
A =







a R
S M







p(x) = (x − a)q(x) − R · adj(xI − M) · S
p and q are the char polys of A and M, respectively, and
p = C1q
5
For example, if A is a 4 × 4 matrix, then p = C1q is given by by:










p4
p3
p2
p1
p0










=










1 0 0 0
−a 1 0 0
−RS −a 1 0
−RMS −RS −a 1
−RM2
S −RMS −RS −a

















q3
q2
q1
q0







Berkowitz’s algorithm consists in repeating this for q, etc., and
obtaining p as a product of matrices:
p = C1C2 · · · Cn
BerkA(x) = pnxn
+ pn−1xn−1
+ · · · + p0.
6
Csanky’s algorithm works as follows:
s0 = 1, and for 1 ≤ k ≤ n,
sk =
1
k
k
i=1
(−1)i−1
sk−itr(Ai
)
So,
s0 = 1
s1 = tr(A)
s2 =
1
2
(s1tr(A) − s0tr(A2
))
s3 =
1
3
(s2tr(A) − s1tr(A2
) + s0tr(A3
))
CsankyA(x) = s0xn
− s1xn−1
+ s2xn−2
− · · · ± snx0
.
7
LA
• Equality axioms
x = x, x = y ⊃ y = x, . . .
• Axioms for indices
i + 1 = 0, i ∗ (j + 1) = (i ∗ j) + 1, . . .
• Field axioms
a + (−a) = 0, a ∗ b = b ∗ a, . . .
• Axioms for
– λij m, n, t operator for constructing matrices
e.g., A + B := λij n, n, e(A, i, j) + e(A, i, j)
– ΣA = sum of entries in A = a + ΣR + ΣS + ΣM
• Rules for logical consequence, induction on open formulas (only
bounded index quantification), equality rules.
8
LA proves ring properties of matrices (e.g., associativity of matrix
multiplication), and can state, but apparently not prove:
• AB = I ⊃ BA = I
• [AB = I ∧ AC = I] ⊃ B = C
• AB = I ⊃ [AC = 0 ⊃ C = 0]
• AB = I ⊃ At
Bt
= I
• If a column of A is zero, then for any B, AB = I
However, LA can prove them equivalent.
Open Problem: Show independence of any of the above from LA.
9
LAP
Add matrix powering function P to LA with the axioms
P(0, A) = I and P(n + 1, A) = P(n, A) ∗ A
Berk, Csanky can be expressed as terms of LAP.
Open Problem: Can LAP prove the correctness of these
algorithms?
10
QLA
Formulas with matrix quantifiers, and the axioms are all the
theorems of LA.
Shows the equivalences of:
1. The Cayley-Hamilton Theorem
(CsankyA(A) = 0)
2. (∃B = 0)[AB = I ∨ AB = 0]
3. Linear Independence
(n + 1 vectors in Fn
must be linearly dependent)
4. Weak Linear Independence
(nk
vectors (n, k > 1) in Fn
must be linearly dependent)
5. Every matrix has an annihilating polynomial
11
Matrix powering can be expressed in QLA with POW(A, n):
∃B[B = B0 = I, B1, . . . , Bn ∧ (∀i ≤ n)(i < n ⊃ Bi+1 = Bi ∗ A)]
And
QLA (∃B = 0)[CB = I ∨ CB = 0] ⊃ POW(A, n)
But
QLA POW(A, n)
Therefore QLA cannot prove (∃B = 0)[CB = I ∨ CB = 0], and so
it cannot prove linear independence.
12
QLA (∃B = 0)[CB = I ∨ CB = 0] ⊃ POW(A, n)
Use the reduction of matrix powering to matrix inversea
.
Let N be an n2
× n2
matrix consisting of n × n blocks which are all
zero except for n − 1 copies of A above the diagonal of zero blocks.
Then, Nn
= 0, and so (I − N)−1
= I + N + N2
+ · · · + Nn−1
=








I A A2
. . . An−1
0 I A . . . An−2
...
I








aStephen Cook, “A taxonomy of problems with fast parallel algorithms,”
Information and Computation, Vol. 64, 1985.
13
Set C = I − N.
Show that if CB = 0, then B = 0.
(By induction on the rows of B, starting at the bottom.)
Using (∃B = 0)[CB = I ∨ CB = 0] , conclude that there is a B
such that CB = I.
It remains to show that B = I + N + N2
+ · · · + Nn−1
.
(Again, by induction on the rows of B, starting at the bottom.)
B contains I, A, A2
, . . . , An−1
in its top rows.
POW(A, n) follows.
14
On the other hand, QLA does not prove POW(A, n).
Over the field Z2, LA translates into AC0
[2].
So, the “B” in POW(A, n) could be witnessed with an AC0
[2]
function, if QLA POW(A, n).
But that would mean that DET(Z2) ⊆ AC0
[2] — contradiction.
(Because, “bit counting” is not in AC0
[2]a
, while it is in
L ⊆ SL ⊆ DET(Z2)b
.)
aMod(3) is AC0
reducible to MAJORITY, and by the result of
Razborov-Smolensky AC0
[2] does not contain Mod(3), so it follows that
MAJORITY is not in AC0
[2].
bE. Gr¨adel, “Capturing Complexity Classes by Fragments of Second Order
Logic,” Theoretical Computer Science, vol. 101, 1992.
15
∃LA
Allows induction over formulas with bounded existential matrix
quantifiers.
P is definable in ∃LA
∃LA is a PolyTime theory
∃LA can prove all the principles stated thus far.
Something better: let ∃PLA be the theory where induction is
allowed only over formulas with
bounded existential permutation quantifiers
Then, ∃PLA still proves all these principles.
16
Conclusion
The Principle of Linear Independence is “all there is” to
textbook Linear Algebra — proof complexity confirms this
conceptual intuition.
LI cannot be shown trivially, i.e., in a simple theory such as QLA.
A host of principles of Linear Algebra are QLA-equivalent to LI.
LI can be shown with a PolyTime theory such as ∃LA.
Open Question: Can LI be shown with an NC2
theory, for
example LAP?
17

More Related Content

What's hot

Apoyo guía-12-2°-medio-ppt.-parábola
Apoyo guía-12-2°-medio-ppt.-parábolaApoyo guía-12-2°-medio-ppt.-parábola
Apoyo guía-12-2°-medio-ppt.-parábolaliceo
 
Vector space - subspace By Jatin Dhola
Vector space - subspace By Jatin DholaVector space - subspace By Jatin Dhola
Vector space - subspace By Jatin DholaJatin Dhola
 
Null space, Rank and nullity theorem
Null space, Rank and nullity theoremNull space, Rank and nullity theorem
Null space, Rank and nullity theoremRonak Machhi
 
Fractional Calculus A Commutative Method on Real Analytic Functions
Fractional Calculus A Commutative Method on Real Analytic FunctionsFractional Calculus A Commutative Method on Real Analytic Functions
Fractional Calculus A Commutative Method on Real Analytic FunctionsMatt Parker
 
Lesson 2: A Catalog of Essential Functions
Lesson 2: A Catalog of Essential FunctionsLesson 2: A Catalog of Essential Functions
Lesson 2: A Catalog of Essential FunctionsMatthew Leingang
 
Vectors and Matrices: basis and dimension
Vectors and Matrices: basis and dimensionVectors and Matrices: basis and dimension
Vectors and Matrices: basis and dimensionMarry Chriselle Rañola
 
X2 t03 05 rectangular hyperbola (2013)
X2 t03 05 rectangular hyperbola (2013)X2 t03 05 rectangular hyperbola (2013)
X2 t03 05 rectangular hyperbola (2013)Nigel Simmons
 
Mesh Processing Course : Active Contours
Mesh Processing Course : Active ContoursMesh Processing Course : Active Contours
Mesh Processing Course : Active ContoursGabriel Peyré
 
Seismic data processing introductory lecture
Seismic data processing introductory lectureSeismic data processing introductory lecture
Seismic data processing introductory lectureAmin khalil
 
Eigenvalue problems .ppt
Eigenvalue problems .pptEigenvalue problems .ppt
Eigenvalue problems .pptSelf-employed
 
GTU LAVC Line Integral,Green Theorem in the Plane, Surface And Volume Integra...
GTU LAVC Line Integral,Green Theorem in the Plane, Surface And Volume Integra...GTU LAVC Line Integral,Green Theorem in the Plane, Surface And Volume Integra...
GTU LAVC Line Integral,Green Theorem in the Plane, Surface And Volume Integra...Panchal Anand
 
Deflection 2
Deflection 2Deflection 2
Deflection 2anashalim
 
Eigen values and eigen vectors engineering
Eigen values and eigen vectors engineeringEigen values and eigen vectors engineering
Eigen values and eigen vectors engineeringshubham211
 
An Efficient Convex Hull Algorithm for a Planer Set of Points
An Efficient Convex Hull Algorithm for a Planer Set of PointsAn Efficient Convex Hull Algorithm for a Planer Set of Points
An Efficient Convex Hull Algorithm for a Planer Set of PointsKasun Ranga Wijeweera
 
Pydata Katya Vasilaky
Pydata Katya VasilakyPydata Katya Vasilaky
Pydata Katya Vasilakyknv4
 
B.tech ii unit-1 material curve tracing
B.tech ii unit-1 material curve tracingB.tech ii unit-1 material curve tracing
B.tech ii unit-1 material curve tracingRai University
 

What's hot (20)

Apoyo guía-12-2°-medio-ppt.-parábola
Apoyo guía-12-2°-medio-ppt.-parábolaApoyo guía-12-2°-medio-ppt.-parábola
Apoyo guía-12-2°-medio-ppt.-parábola
 
Vector space - subspace By Jatin Dhola
Vector space - subspace By Jatin DholaVector space - subspace By Jatin Dhola
Vector space - subspace By Jatin Dhola
 
2. la recta
2. la recta2. la recta
2. la recta
 
1. ejercicios
1. ejercicios1. ejercicios
1. ejercicios
 
Null space, Rank and nullity theorem
Null space, Rank and nullity theoremNull space, Rank and nullity theorem
Null space, Rank and nullity theorem
 
Fractional Calculus A Commutative Method on Real Analytic Functions
Fractional Calculus A Commutative Method on Real Analytic FunctionsFractional Calculus A Commutative Method on Real Analytic Functions
Fractional Calculus A Commutative Method on Real Analytic Functions
 
Lesson 2: A Catalog of Essential Functions
Lesson 2: A Catalog of Essential FunctionsLesson 2: A Catalog of Essential Functions
Lesson 2: A Catalog of Essential Functions
 
Vectors and Matrices: basis and dimension
Vectors and Matrices: basis and dimensionVectors and Matrices: basis and dimension
Vectors and Matrices: basis and dimension
 
X2 t03 05 rectangular hyperbola (2013)
X2 t03 05 rectangular hyperbola (2013)X2 t03 05 rectangular hyperbola (2013)
X2 t03 05 rectangular hyperbola (2013)
 
Mesh Processing Course : Active Contours
Mesh Processing Course : Active ContoursMesh Processing Course : Active Contours
Mesh Processing Course : Active Contours
 
Seismic data processing introductory lecture
Seismic data processing introductory lectureSeismic data processing introductory lecture
Seismic data processing introductory lecture
 
Eigenvalue problems .ppt
Eigenvalue problems .pptEigenvalue problems .ppt
Eigenvalue problems .ppt
 
1619 quantum computing
1619 quantum computing1619 quantum computing
1619 quantum computing
 
GTU LAVC Line Integral,Green Theorem in the Plane, Surface And Volume Integra...
GTU LAVC Line Integral,Green Theorem in the Plane, Surface And Volume Integra...GTU LAVC Line Integral,Green Theorem in the Plane, Surface And Volume Integra...
GTU LAVC Line Integral,Green Theorem in the Plane, Surface And Volume Integra...
 
Deflection 2
Deflection 2Deflection 2
Deflection 2
 
Eigen values and eigen vectors engineering
Eigen values and eigen vectors engineeringEigen values and eigen vectors engineering
Eigen values and eigen vectors engineering
 
An Efficient Convex Hull Algorithm for a Planer Set of Points
An Efficient Convex Hull Algorithm for a Planer Set of PointsAn Efficient Convex Hull Algorithm for a Planer Set of Points
An Efficient Convex Hull Algorithm for a Planer Set of Points
 
Pydata Katya Vasilaky
Pydata Katya VasilakyPydata Katya Vasilaky
Pydata Katya Vasilaky
 
B.tech ii unit-1 material curve tracing
B.tech ii unit-1 material curve tracingB.tech ii unit-1 material curve tracing
B.tech ii unit-1 material curve tracing
 
SSA slides
SSA slidesSSA slides
SSA slides
 

Viewers also liked

A formal framework for Stringology
A formal framework for StringologyA formal framework for Stringology
A formal framework for StringologyMichael Soltys
 
Games on Posets - CiE 2008
Games on Posets - CiE 2008Games on Posets - CiE 2008
Games on Posets - CiE 2008Michael Soltys
 
The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002Michael Soltys
 
Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013Michael Soltys
 
La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004Michael Soltys
 
Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009Michael Soltys
 
Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System - Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System - Michael Soltys
 
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006Michael Soltys
 
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006Michael Soltys
 
Fair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysisFair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysisMichael Soltys
 
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Michael Soltys
 
Feasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentationFeasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentationMichael Soltys
 
Forced repetitions over alphabet lists
Forced repetitions over alphabet listsForced repetitions over alphabet lists
Forced repetitions over alphabet listsMichael Soltys
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?Michael Soltys
 
Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013Michael Soltys
 
An algorithmic view of Computer Science
An algorithmic view of Computer ScienceAn algorithmic view of Computer Science
An algorithmic view of Computer ScienceMichael Soltys
 
Comp1900 Tahseen
Comp1900 TahseenComp1900 Tahseen
Comp1900 Tahseentahseen ali
 
공동구매의 진화
공동구매의 진화공동구매의 진화
공동구매의 진화wngusqo
 

Viewers also liked (20)

A formal framework for Stringology
A formal framework for StringologyA formal framework for Stringology
A formal framework for Stringology
 
Games on Posets - CiE 2008
Games on Posets - CiE 2008Games on Posets - CiE 2008
Games on Posets - CiE 2008
 
The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002The Proof Complexity of Linear Algebra - LICS 2002
The Proof Complexity of Linear Algebra - LICS 2002
 
Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013Feasible Combinatorial Matrix Theory - MFCS2013
Feasible Combinatorial Matrix Theory - MFCS2013
 
La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004La, permutations, and the hajós calculus - ICALP 2004
La, permutations, and the hajós calculus - ICALP 2004
 
Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009Unambiguous functions in logarithmic space - CiE 2009
Unambiguous functions in logarithmic space - CiE 2009
 
Algorithms on Strings
Algorithms on StringsAlgorithms on Strings
Algorithms on Strings
 
Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System - Boolean Programs and Quantified Propositional Proof System -
Boolean Programs and Quantified Propositional Proof System -
 
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
The proof theoretic strength of the Steinitz exchange theorem - EACA 2006
 
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
The proof complexity of matrix algebra - Newton Institute, Cambridge 2006
 
Fair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysisFair ranking in competitive bidding procurement: a case analysis
Fair ranking in competitive bidding procurement: a case analysis
 
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012Perceptions of Foundational Knowledge by CS students - WCCCE 2012
Perceptions of Foundational Knowledge by CS students - WCCCE 2012
 
Feasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentationFeasible Combinatorial Matrix Theory - LICS2013 presentation
Feasible Combinatorial Matrix Theory - LICS2013 presentation
 
Intro to Cryptography
Intro to CryptographyIntro to Cryptography
Intro to Cryptography
 
Forced repetitions over alphabet lists
Forced repetitions over alphabet listsForced repetitions over alphabet lists
Forced repetitions over alphabet lists
 
How Safe is your Data?
How Safe is your Data?How Safe is your Data?
How Safe is your Data?
 
Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013Circuit Complexity of Shuffle - IWOCA 2013
Circuit Complexity of Shuffle - IWOCA 2013
 
An algorithmic view of Computer Science
An algorithmic view of Computer ScienceAn algorithmic view of Computer Science
An algorithmic view of Computer Science
 
Comp1900 Tahseen
Comp1900 TahseenComp1900 Tahseen
Comp1900 Tahseen
 
공동구매의 진화
공동구매의 진화공동구매의 진화
공동구매의 진화
 

Similar to Feasible Proofs of Matrix Identities with Csanky’s Algorithm

Notes on eigenvalues
Notes on eigenvaluesNotes on eigenvalues
Notes on eigenvaluesAmanSaeed11
 
Linear Algebra Gauss Jordan elimination.pptx
Linear Algebra Gauss Jordan elimination.pptxLinear Algebra Gauss Jordan elimination.pptx
Linear Algebra Gauss Jordan elimination.pptxMaths Assignment Help
 
Unlock Your Mathematical Potential with MathAssignmentHelp.com! 🧮✨
Unlock Your Mathematical Potential with MathAssignmentHelp.com! 🧮✨Unlock Your Mathematical Potential with MathAssignmentHelp.com! 🧮✨
Unlock Your Mathematical Potential with MathAssignmentHelp.com! 🧮✨Maths Assignment Help
 
Mid semexam | Theory of Computation | Akash Anand | MTH 401A | IIT Kanpur
Mid semexam | Theory of Computation | Akash Anand | MTH 401A | IIT KanpurMid semexam | Theory of Computation | Akash Anand | MTH 401A | IIT Kanpur
Mid semexam | Theory of Computation | Akash Anand | MTH 401A | IIT KanpurVivekananda Samiti
 
Partial midterm set7 soln linear algebra
Partial midterm set7 soln linear algebraPartial midterm set7 soln linear algebra
Partial midterm set7 soln linear algebrameezanchand
 
chap01987654etghujh76687976jgtfhhhgve.ppt
chap01987654etghujh76687976jgtfhhhgve.pptchap01987654etghujh76687976jgtfhhhgve.ppt
chap01987654etghujh76687976jgtfhhhgve.pptadonyasdd
 
Assignments for class XII
Assignments for class XIIAssignments for class XII
Assignments for class XIIindu thakur
 
5.vector geometry Further Mathematics Zimbabwe Zimsec Cambridge
5.vector geometry   Further Mathematics Zimbabwe Zimsec Cambridge5.vector geometry   Further Mathematics Zimbabwe Zimsec Cambridge
5.vector geometry Further Mathematics Zimbabwe Zimsec Cambridgealproelearning
 
Linear Algebra and Matrix
Linear Algebra and MatrixLinear Algebra and Matrix
Linear Algebra and Matrixitutor
 
Digital logic circuits important question and answers for 5 units
Digital logic circuits important question and answers for 5 unitsDigital logic circuits important question and answers for 5 units
Digital logic circuits important question and answers for 5 unitsLekashri Subramanian
 

Similar to Feasible Proofs of Matrix Identities with Csanky’s Algorithm (20)

Notes on eigenvalues
Notes on eigenvaluesNotes on eigenvalues
Notes on eigenvalues
 
Linear Algebra Assignment help
Linear Algebra Assignment helpLinear Algebra Assignment help
Linear Algebra Assignment help
 
Linear Algebra Gauss Jordan elimination.pptx
Linear Algebra Gauss Jordan elimination.pptxLinear Algebra Gauss Jordan elimination.pptx
Linear Algebra Gauss Jordan elimination.pptx
 
Linear Algebra.pptx
Linear Algebra.pptxLinear Algebra.pptx
Linear Algebra.pptx
 
Unlock Your Mathematical Potential with MathAssignmentHelp.com! 🧮✨
Unlock Your Mathematical Potential with MathAssignmentHelp.com! 🧮✨Unlock Your Mathematical Potential with MathAssignmentHelp.com! 🧮✨
Unlock Your Mathematical Potential with MathAssignmentHelp.com! 🧮✨
 
Mid semexam | Theory of Computation | Akash Anand | MTH 401A | IIT Kanpur
Mid semexam | Theory of Computation | Akash Anand | MTH 401A | IIT KanpurMid semexam | Theory of Computation | Akash Anand | MTH 401A | IIT Kanpur
Mid semexam | Theory of Computation | Akash Anand | MTH 401A | IIT Kanpur
 
3.-Matrix.pdf
3.-Matrix.pdf3.-Matrix.pdf
3.-Matrix.pdf
 
Partial midterm set7 soln linear algebra
Partial midterm set7 soln linear algebraPartial midterm set7 soln linear algebra
Partial midterm set7 soln linear algebra
 
PutzerPaper
PutzerPaperPutzerPaper
PutzerPaper
 
chap01987654etghujh76687976jgtfhhhgve.ppt
chap01987654etghujh76687976jgtfhhhgve.pptchap01987654etghujh76687976jgtfhhhgve.ppt
chap01987654etghujh76687976jgtfhhhgve.ppt
 
Notes
NotesNotes
Notes
 
EE8351 DLC
EE8351 DLCEE8351 DLC
EE8351 DLC
 
On Uq(sl2)-actions on the quantum plane
On Uq(sl2)-actions on the quantum planeOn Uq(sl2)-actions on the quantum plane
On Uq(sl2)-actions on the quantum plane
 
Assignments for class XII
Assignments for class XIIAssignments for class XII
Assignments for class XII
 
5.vector geometry Further Mathematics Zimbabwe Zimsec Cambridge
5.vector geometry   Further Mathematics Zimbabwe Zimsec Cambridge5.vector geometry   Further Mathematics Zimbabwe Zimsec Cambridge
5.vector geometry Further Mathematics Zimbabwe Zimsec Cambridge
 
In to el
In to elIn to el
In to el
 
ABC-Gibbs
ABC-GibbsABC-Gibbs
ABC-Gibbs
 
Linear Algebra and Matrix
Linear Algebra and MatrixLinear Algebra and Matrix
Linear Algebra and Matrix
 
Digital logic circuits important question and answers for 5 units
Digital logic circuits important question and answers for 5 unitsDigital logic circuits important question and answers for 5 units
Digital logic circuits important question and answers for 5 units
 
Vector space
Vector spaceVector space
Vector space
 

Feasible Proofs of Matrix Identities with Csanky’s Algorithm

  • 1. Feasible Proofs of Matrix Identities with Csanky’s Algorithm CSL’05 Michael Soltys McMaster University, Canada 1
  • 2. What is the complexity of the concepts needed to prove theorems of matrix algebra? For example: • AB = I ⊃ BA = I • The Cayley-Hamilton Theorem (If pA(x) = det(xI − A), then pA(A) = 0) • det(AB) = det(A) det(B) • Linear Independence (n + 1 vectors in Fn must be linearly dependent) 2
  • 3. Using Gaussian Elimination we can prove these principles in PolyTime: S1 2, V1 , PV, . . . with the elements of the underlying field F properly encoded. ∗ ∗ ∗ Aside: if V1 ∃Y α(X, Y ), then f(X) = Y is a polytime function, and if f is polytime, then there exists an α(X, Y ) such that N2 α(X, f(X)), and V1 ∃!Y α(X, Y ). 3
  • 4. NC2 algorithms for computing the characteristic polynomial: 1. Berkowitz’s algorithm 2. “Newton’s Symmetric Polynomials” (Csanky’s) algorithm 3. Chistov’s algorithm Can we use them to give NC2 proofs of matrix properties? 4
  • 5. Berkowitz’s algorithm is based on Samuelson’s identity: A =        a R S M        p(x) = (x − a)q(x) − R · adj(xI − M) · S p and q are the char polys of A and M, respectively, and p = C1q 5
  • 6. For example, if A is a 4 × 4 matrix, then p = C1q is given by by:           p4 p3 p2 p1 p0           =           1 0 0 0 −a 1 0 0 −RS −a 1 0 −RMS −RS −a 1 −RM2 S −RMS −RS −a                  q3 q2 q1 q0        Berkowitz’s algorithm consists in repeating this for q, etc., and obtaining p as a product of matrices: p = C1C2 · · · Cn BerkA(x) = pnxn + pn−1xn−1 + · · · + p0. 6
  • 7. Csanky’s algorithm works as follows: s0 = 1, and for 1 ≤ k ≤ n, sk = 1 k k i=1 (−1)i−1 sk−itr(Ai ) So, s0 = 1 s1 = tr(A) s2 = 1 2 (s1tr(A) − s0tr(A2 )) s3 = 1 3 (s2tr(A) − s1tr(A2 ) + s0tr(A3 )) CsankyA(x) = s0xn − s1xn−1 + s2xn−2 − · · · ± snx0 . 7
  • 8. LA • Equality axioms x = x, x = y ⊃ y = x, . . . • Axioms for indices i + 1 = 0, i ∗ (j + 1) = (i ∗ j) + 1, . . . • Field axioms a + (−a) = 0, a ∗ b = b ∗ a, . . . • Axioms for – λij m, n, t operator for constructing matrices e.g., A + B := λij n, n, e(A, i, j) + e(A, i, j) – ΣA = sum of entries in A = a + ΣR + ΣS + ΣM • Rules for logical consequence, induction on open formulas (only bounded index quantification), equality rules. 8
  • 9. LA proves ring properties of matrices (e.g., associativity of matrix multiplication), and can state, but apparently not prove: • AB = I ⊃ BA = I • [AB = I ∧ AC = I] ⊃ B = C • AB = I ⊃ [AC = 0 ⊃ C = 0] • AB = I ⊃ At Bt = I • If a column of A is zero, then for any B, AB = I However, LA can prove them equivalent. Open Problem: Show independence of any of the above from LA. 9
  • 10. LAP Add matrix powering function P to LA with the axioms P(0, A) = I and P(n + 1, A) = P(n, A) ∗ A Berk, Csanky can be expressed as terms of LAP. Open Problem: Can LAP prove the correctness of these algorithms? 10
  • 11. QLA Formulas with matrix quantifiers, and the axioms are all the theorems of LA. Shows the equivalences of: 1. The Cayley-Hamilton Theorem (CsankyA(A) = 0) 2. (∃B = 0)[AB = I ∨ AB = 0] 3. Linear Independence (n + 1 vectors in Fn must be linearly dependent) 4. Weak Linear Independence (nk vectors (n, k > 1) in Fn must be linearly dependent) 5. Every matrix has an annihilating polynomial 11
  • 12. Matrix powering can be expressed in QLA with POW(A, n): ∃B[B = B0 = I, B1, . . . , Bn ∧ (∀i ≤ n)(i < n ⊃ Bi+1 = Bi ∗ A)] And QLA (∃B = 0)[CB = I ∨ CB = 0] ⊃ POW(A, n) But QLA POW(A, n) Therefore QLA cannot prove (∃B = 0)[CB = I ∨ CB = 0], and so it cannot prove linear independence. 12
  • 13. QLA (∃B = 0)[CB = I ∨ CB = 0] ⊃ POW(A, n) Use the reduction of matrix powering to matrix inversea . Let N be an n2 × n2 matrix consisting of n × n blocks which are all zero except for n − 1 copies of A above the diagonal of zero blocks. Then, Nn = 0, and so (I − N)−1 = I + N + N2 + · · · + Nn−1 =         I A A2 . . . An−1 0 I A . . . An−2 ... I         aStephen Cook, “A taxonomy of problems with fast parallel algorithms,” Information and Computation, Vol. 64, 1985. 13
  • 14. Set C = I − N. Show that if CB = 0, then B = 0. (By induction on the rows of B, starting at the bottom.) Using (∃B = 0)[CB = I ∨ CB = 0] , conclude that there is a B such that CB = I. It remains to show that B = I + N + N2 + · · · + Nn−1 . (Again, by induction on the rows of B, starting at the bottom.) B contains I, A, A2 , . . . , An−1 in its top rows. POW(A, n) follows. 14
  • 15. On the other hand, QLA does not prove POW(A, n). Over the field Z2, LA translates into AC0 [2]. So, the “B” in POW(A, n) could be witnessed with an AC0 [2] function, if QLA POW(A, n). But that would mean that DET(Z2) ⊆ AC0 [2] — contradiction. (Because, “bit counting” is not in AC0 [2]a , while it is in L ⊆ SL ⊆ DET(Z2)b .) aMod(3) is AC0 reducible to MAJORITY, and by the result of Razborov-Smolensky AC0 [2] does not contain Mod(3), so it follows that MAJORITY is not in AC0 [2]. bE. Gr¨adel, “Capturing Complexity Classes by Fragments of Second Order Logic,” Theoretical Computer Science, vol. 101, 1992. 15
  • 16. ∃LA Allows induction over formulas with bounded existential matrix quantifiers. P is definable in ∃LA ∃LA is a PolyTime theory ∃LA can prove all the principles stated thus far. Something better: let ∃PLA be the theory where induction is allowed only over formulas with bounded existential permutation quantifiers Then, ∃PLA still proves all these principles. 16
  • 17. Conclusion The Principle of Linear Independence is “all there is” to textbook Linear Algebra — proof complexity confirms this conceptual intuition. LI cannot be shown trivially, i.e., in a simple theory such as QLA. A host of principles of Linear Algebra are QLA-equivalent to LI. LI can be shown with a PolyTime theory such as ∃LA. Open Question: Can LI be shown with an NC2 theory, for example LAP? 17