Proceedings of the Thirty-Seventh Annual ACM Symposium on Theory of Computing 2005
DOI: 10.1145/1060590.1060647
|View full text |Cite
|
Sign up to set email alerts
|

Undirected ST-connectivity in log-space

Abstract: We present a deterministic, log-space algorithm that solves st-connectivity in undirected graphs. The previous bound on the space complexity of undirected st-connectivity was log 4/3 obtained by Armoni, Ta-Shma, Wigderson and Zhou [9]. As undirected st-connectivity is complete for the class of problems solvable by symmetric, non-deterministic, logspace computations (the class SL), this algorithm implies that SL = L (where L is the class of problems solvable by deterministic log-space computations). Independent… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
181
0
1

Year Published

2005
2005
2010
2010

Publication Types

Select...
3
3
2

Relationship

0
8

Authors

Journals

citations
Cited by 226 publications
(183 citation statements)
references
References 49 publications
1
181
0
1
Order By: Relevance
“…This has, indeed, been tried often (see [Rei05] for background). A key to the success of Reingold's approach was an ingenious application of the zig-zag product.…”
Section: Introduction As In Earlier Sections We Consider An (N D)-gmentioning
confidence: 99%
See 1 more Smart Citation
“…This has, indeed, been tried often (see [Rei05] for background). A key to the success of Reingold's approach was an ingenious application of the zig-zag product.…”
Section: Introduction As In Earlier Sections We Consider An (N D)-gmentioning
confidence: 99%
“…This requires a clever construction of an appropriate data structure. We skip the proof of this claim and refer the reader to Reingold's paper [Rei05].…”
Section: Introduction As In Earlier Sections We Consider An (N D)-gmentioning
confidence: 99%
“…It is well known that REACH is complete for NL, and REACH d and REACH u are complete for L [10,19]. A simpler way to express deterministic transitive closure is to syntactically require that the out-degree of our graph is at most one by using a function symbol: denote the child of v as f (v), with f (v) = v if v has no outgoing edges.…”
Section: Transitive Closure Operatorsmentioning
confidence: 99%
“…We do some minimal processing on this code, disambiguating names and turning function symbols into relations. The user's input for directed-graph reachability, listed in Equation (8), is translated into the input query block of lines [19][20][21][22]. Similarly, the output query is translated into lines 25-28.…”
Section: The Searching Processmentioning
confidence: 99%
“…This fact was exploited for example in [1], [5] and [13], in the study of space efficient algorithms for S − T connectivity in undirected graphs. Another well known example is the conservation of random bits in the amplification of randomized algorithms (we will elaborate on this point later on).…”
Section: Background and Definitionsmentioning
confidence: 99%