Bounded-depth Frege complexity of Tseitin formulas for all graphs☆
Received 24 December 2020, Revised 30 June 2022, Accepted 1 July 2022, Available online 11 July 2022, Version of Record 22 July 2022.
MSC
Keywords
1. Introduction
Propositional proof complexity is motivated by the result of Cook and Reckhow [15] saying that if there is a propositional proof system in which any unsatisfiable formula F has a short proof of unsatisfiability (of size polynomial in the size of F), then . In the last 30 years the complexity of proofs was investigated for several proof systems with the aim of finding concrete evidence, and eventually a proof, that for all proof systems there is a propositional formula which is not efficiently provable, i.e. requires super-polynomial proof size. The approach followed to prove such lower bounds was essentially borrowed from circuit complexity. Lines in a proof are Boolean formulas and we can define different proof system according to the circuit complexity of such formulas. For example resolution, a well-known refutational system for CNFs, corresponds to a system where formulas are of depth 1. In circuit complexity we keep on trying to strengthen lower bounds to computationally more powerful class of circuits. In proof complexity we follow the analogous approach: to strengthen lower bounds to systems working on formulas computationally more powerful. The hope is that techniques used to prove lower bounds for classes of Boolean circuits could be lifted to work with proof systems operating with formulas in the same circuit class. At present however we are far from such ideal situation and in fact, in terms of circuit classes, lower bounds for proof systems are well below those for Boolean circuits.
The complexity of proofs in resolution is largely studied. The first lower bound for (a restriction of) resolution was given by Tseitin in [43]. To obtain his result Tseitin introduced a class of formulas (nowadays known as Tseitin formulas) encoding a generalisation of the principle that the sum of the degrees of all vertices in a graph is an even number. A Tseitin formula is defined for every undirected graph and a charging function . We introduce a propositional variable for every edge of G so that is a CNF representation of a linear system over the field such that each equation corresponds to a vertex ans states that the sum of all edges incident to v equals . Together with the unsatisfiable formulas encoding the Pigeonhole principle, Tseitin formulas are among the most commonly used examples to prove hardness results for proof systems. Haken [25], Beame and Pitassi [6] and Ben-Sasson Wigderson [10] proved exponential resolution lower bounds for the CNF formula encoding the negation of , results which were later generalized and improved in several other works [11], [16], [30], [37], [39], [40]. For unrestricted resolution it was Urquhart in [44] and later Ben-Sasson and Wigderson [10] who proved exponential lower bounds for Tseitin formulas defined over constant-degree expander graphs.
Bounded-depth Frege extends resolution since the formulas in the proof-lines are computable by -circuits, i.e. constant-depth circuits with unbounded fan-in gates. The importance of understanding the complexity of proofs in bounded-depth-Frege systems was due at least to two reasons: (1) for general Frege systems, where formulas have no restrictions, i.e. are of depth , Buss in [12] proved that the Pigeonhole principle can be proved in polynomial size, hence obtaining an exponential separation with resolution. (2) Lower bounds for -circuits were known [20], [27] and hence we could hope for applying lower bound techniques for to lower bounds to bounded-depth Frege. Studying the complexity of proofs in bounded-depth Frege is of the utmost importance since it is a frontier proof system, i.e. is one of the strongest propositional proof systems with known significant lower bounds at the moment. Any advance is then a step towards proving lower bounds for -Frege, i.e. a bounded-depth Frege admitting also formulas with parity gates, which are unknown at the moment, though we know since a long time exponential lower bounds for circuits [32], [38], [42]. In this work we contribute to the complexity of proofs in bounded-depth Frege proving new lower bounds for Tseitin formulas.
Ajtai in [1] was the first to prove a lower bound in bounded-depth Frege. He showed that a refutation of must have a super-polynomial size. His result was later followed by several results simplifying his technique [7] and improving the lower bound [33], [34] showing that any polynomial-size Frege refutation of must have depth . The proof complexity of Tseitin formulas in bounded-depth Frege was first considered by Urquhart and Fu in [45], a work where they simplified and adapted the lower bound for the to the case of Tseitin formulas over a complete graph. Ben-Sasson in [9], proved exponential lower bounds for the Tseitin formulas over constant-degree expander graphs using a new reduction from the pigeonhole principle [45]. All these lower bounds are adaptation of the technique of [33], [34], hence vanish when the depth of formulas in the proof is more than . In a very recent major breakthrough [35] showed that Tseitin formulas over a 3-expander graph on n nodes requires super-polynomial bounded-depth Frege refutations at depth . This result was later improved to depth up to by Håstad in [28] but for Tseitin formulas defined only on the 2-dimensional grid, where C is a positive constant.
Proofs of were studied in terms of the treewidth of G, , for resolution [3], [22] and for OBDD proof systems [23]. We use Håstad result to prove tight bounds on the size of refutations in bounded-depth Frege of over any graph G in terms of the treewidth of G. Our main result is the following theorem:
Theorem 1
There is a constant K such that for any connected graph G over n nodes and for all , every depth-d Frege proof of has size at least . Furthermore, for all large enough d there exist depth-d Frege proofs of of size .
1.1. Overview of the proof technique
In Theorem 18 we prove the lower bound from Theorem 1. The proof is based on the improvement of the Excluded Grid Theorem by Robertson and Seymour recently obtained by Chuzhoy [13]: an arbitrary graph G contains as a minor a grid, where and λ is a constant; the latest improvement [14] establishes the theorem for , however, it is known that λ can not be greater than 1/2. For several classes of graphs it is possible to improve the value of λ, for example, for planar graphs [24], [41]. More precisely we use the corollary of this result (see Corollary 9) stating that any graph G has a wall of size r as a topological minor (i.e. can be obtained from G by several removing of vertices, edges and suppressions, see Fig. 1 and Fig. 3). Our proof consists of two parts: at first, we show that if H is a topological minor of G, then any bounded-depth Frege proof of can be transformed to a proof of , with constant increase in depth and polynomial increase in size. And then we prove a lower bound on the size of depth-d Frege proof of based on walls. In this proof we use the lower bound for grid graphs proved by Håstad [28].
Fig. 1. Suppression of v from G.
In Theorem 19 we prove the upper bound from Theorem 1. We consider the compact representation of linear functions on variables by propositional formulas of depth d and of size . We show that for linear functions f and g if the equations and are given in our representation, then there is a derivation of of depth d and of size . We also show that if a linear equation is represented in CNF, then it is possible to infer its compact representation with depth d and size . Since a Tseitin formula is an unsatisfiable system of linear equations written in CNF, hence it is possible to refute a Tseitin formula in size and depth d, where m is the number of edges in G. However we wish to have the treewidth of G instead of m. We consider a tree-partition of a graph G, the vertices of G are split into bags and there exists a tree such that bags are nodes of this tree and if two vertices of G are connected, then they are either in one bag or in adjacent bags. It is known that there is a tree partition where the size of bags are at most [46]. Since the number of edges touching a given bag is we can use the compact representation to take care of the equations involving the parity of sum of adjacent bags with proofs growing in terms of the treewidth of G.
1.2. The complexity of Tseitin formulas in resolution
A recent line of research [3], [22], [31] investigates the exact relation between the treewidth of G and the proof complexity of in resolution and its refinements. Since resolution is a special case of bounded-depth Frege, Theorem 1 is directly applicable to resolution. In Section 5 we contribute this line of research partially answering to some questions left open before. First we improve Theorem 1 for resolution. In Theorem 34 we show lower bounds for resolution refutations of , where λ is the constant from the grid-minor theorem in [13]. A stronger lower bound was recently proved for regular resolution in [31] and it is open whether this holds for unrestricted resolution as well.
A conjecture of Urquhart asserts that the shortest resolution refutations of are in fact regular. A consequence of our results, stated in Corollary 40, shows that the size of refutations of in proof systems between tree-like resolution and bounded-depth Frege are quasi-polynomially correlated, i.e. if has a refutation of size S in bounded-depth Frege, then it has a refutation of size at most in treelike resolution and vice versa. Since regular resolution is in between treelike resolution and bounded-depth Frege, this provides evidence (showing it for a quasi-polynomial size) to the conjecture of Urquhart.
Finally we consider the question posed in [3] of (quasi)-automatization of formulas in resolution, i.e. whether there exists a deterministic algorithm that returns a resolution refutation of in time which is (quasi-)polynomial in , where is the size of the shortest refutation of in resolution. From [3] it is known that are (quasi)-automatizable in resolution only when G has a specific covering property known as bounded cyclicity. In Corollary 39 we extend their result proving the quasi-automatization of for any graph G.
Organization. The paper is divided into four sections. After the Preliminary section, we have Section 3 for the lower bound (Theorem 18), and Section 4 for the upper bound (Theorem 19). Section 5 is devoted to the results on the proof complexity of in resolution.
2. Preliminaries
Formulas and restrictions. We consider propositional formulas over binary ∨ and ∧, unary ¬ and Boolean constants . We represent formulas as rooted trees such that internal vertices are labelled with connectives and leaves are labelled with propositional variables or Boolean constants. The depth of a formula is the maximal number of alternations of types of connectives over all the paths from the root to a leaf plus one.
We assume that disjunctions with unbounded fanin are represented via binary disjunctions. By default, we mean that is right-associative; i.e. it denotes ; we also assume the same for ⋀.
We denote by the set of variables of a formula F. A partial assignment α for a formula F is mapping from , where if x is unassigned. We denote by the set of variables in F which α assigns a Boolean value.
Pudlák-Buss games. We use the game interpretation of Frege proofs introduced by Pudlák and Buss [36]. Let us define a game with two players Pavel and Sam. The game starts with initial conditions of the form , where are propositional formulas and such that is identically false. Sam claims that he knows an assignment of variables that satisfies , the goal of Pavel is to convict Sam. On each Pavel's turn he asks Sam the value of a propositional formula and Sam gives an answer. The game stops when Pavel convicts Sam, namely Pavel finds an immediate contradiction among initial conditions and Sam's answers. An immediate contradiction with a Boolean connective ∘ of arity t is a set of formulas and with claimed values and b such that . In particular, 0 with claimed value 1 is an immediate contradiction.
A strategy of Pavel is a function that maps initial conditions and the history of a game to a propositional formula (request). A winning strategy is a strategy that allows Pavel to convict Sam for any behaviour of Sam. A winning strategy of Pavel can be represented as a binary tree whose nodes are labelled with Pavel's requests and edges correspond to Sam's answers. A leaf of the tree corresponds to an immediate contradiction among initial conditions and the equalities corresponding to the path from the root to this leaf.
A Pudlák-Buss game derivation of a formula ψ from formulas is a tree of a Pavel's winning strategy in a game with initial conditions . In that follows by derivations we always mean Pudlák-Buss game derivations. We are interested in the two complexity parameters of derivations: 1) the size of a derivation S that equals the total size of formula ψ and all formulas that are used as labels of nodes; 2) the depth of a derivation d is the maximum depth of ψ and formulas that are used as labels of nodes. We use the notation for a derivation of ψ from of depth at most d. A derivation of φ is a derivation of φ from the empty set of formulas.
Lemma 2
Assume that there is a derivation of size and also there is a derivation of size , then there is a derivation of size .
Proof
Let us create the new tree with the root labelled with such that edge form the root labelled with 0 goes to the root of the first derivation and edge labelled with 1 goes to the root of the second derivation. □
Lemma 3
1. If a formula φ has a Frege derivation of size S and depth d, then φ has a Pudlák-Buss game derivation of size and depth d. 2. If φ has a Pudlák-Buss game derivation of size S and depth d, then φ has a Frege derivation of size and depth .
Proof
For proof see Appendix A. □
Lemma 4
Let and be two formulas of depth at most d such that and semantically implies . Then there exists a derivation of size at most .
Proof
Consider a game with initial conditions .
Let . In the first k rounds of the game Pavel asks Sam . There are possible combinations of Sam's answers. For each combination Pavel asks Sam all subformulas of (the value of is 1 from initial conditions) starting with the deeper ones and then asks all subformulas of starting with the deeper ones (the value of is 0 from initial conditions). Since all variables are known, one of possible answers to each of these questions yields an immediate contradiction. The total size of all subformulas of and is at most . Consider the branch of the game tree, where we still no get an immediate contradiction. In that case Sam and are consistent with the values of , but it is impossible since semantically implies . Hence, there should be an immediate contradiction. □
Corollary 5
let and be two formulas of depth such that and is semantically implied by . Let be formulas of depth . Let for be the formula obtained by substitution instead of the variables of . Then there exists a derivationof size at most
Proof
Use Lemma 4 for and and then substitute instead of the variables . □
A shortcut contradiction for the disjunction is a situation where Pavel asks Sam formulas and for and gets the answers 0 and 1 respectively. Similarly a shortcut contradiction for the conjunction is a situation where Pavel asks Sam formulas and for and gets the answers 1 and 0. We may consider shortcut games (and shortcut derivations) that has one difference from the already defined games: Pavel can convict Sam using shortcut contradictions instead of immediate contradictions. An ordinary derivation is a derivation which does not use shortcut contradictions.
Lemma 6
Consider a shortcut derivation of size S and of depth d. Then there is an ordinary derivation of size at most and of depth d.
Proof
We transform a tree with shortcut contradictions to a tree without them. Let us consider a leaf with a shortcut contradiction for the disjunction (case of conjunction is similar), which means that on the path from root to that leaf Pavel has asked Sam formulas and for and got the answers 0 and 1 respectively. is represented as for some index q, where ∨ is binary disjunction. Pavel asks Sam formulas and .
- 1.
If one of Sam's answers is 1, we get an immediate contradiction.
- 2.
If both Sam's answers are 0, then if , we continue this process with formula otherwise with formula .
A vertex-charging for is a mapping . We say that f is an odd-charging of G if . The Tseitin formulas defined on G using variables are the formulas: , where is the canonical CNF representation of .
Lemma 7
[44]
is unsatisfiable if and only if there is a connected component U of G such that the restriction of f on U is an odd-charging.
Grids, Walls, Minors, Topological Minors and Treewidth. We consider 4 structural operations on undirected graphs possibly with parallel edges, but without loops. We follow [8], [19].
- •
edge removal of . It produces the graph ).
- •
vertex removal of . It produces the graph ), where is the set of edges in E incident with .
- •
edge contraction of . Is the replacement of u and v with a single vertex such that edges incident to the new vertex are the edges other than e that were incident with u or v. The resulting graph has one edge less than G.
- •
vertex suppression of a vertex v in G of degree 2. Let u and w be v's neighbours in G. The suppression of v is obtained by deleting v along with two edges and and adding a new edge (possibly parallel to an existing one). The resulting graph has one vertex less than G. See Fig. 1.
A graph H is a minor of G if H can be obtained from G by a sequences of edge and vertex removals and edge contractions. A graph H is a topological minor of G if H can be obtained from G by a sequence of edge removals, vertex removals and by vertex suppressions [8], [19].
The grid is the graph of the cellular rectangle ; it has vertices and edges, among them horizontal and vertical edges. See Fig. 2.
Fig. 2. The grid .
The wall is a subgraph of that is obtained by the removing of several vertical edges. Vertical edges of are in n rows and we enumerate them in every row from the left to the right. In the odd rows we remove all vertical edges with even numbers and in even rows we remove all vertical edges with odd numbers. See Fig. 3.
Fig. 3. The wall .
A tree decomposition of an undirected graph is a tree such that every vertex corresponds to a set and it satisfies the following properties: 1. The union of for equals V. 2. For every edge there exists such that . 3. If a vertex is in the sets and for some , then it is also in for all w on the path between u and v in T.
The width of a tree decomposition is the maximum for minus one. A treewidth of a graph G is the minimal value of the width among all tree decompositions of the graph G.
Recall the following Theorem proved in [13].
Theorem 8
[14]
If G has a treewidth t, then it has the grid as a minor, where and is a constant.
The following Corollary was mentioned in [8].
Corollary 9
If G has a treewidth t, then it has the wall as a topological minor, where and λ is the constant from Theorem 8.
Proof
Since is a minor of , is a minor of G. Consider a transformation T from G to made by (1) edge removals, (2) vertex removals and (3) edge contractions that has the minimal number of edge contractions. Since operations (1), (2) and (3) commute, we may assume that in T no removal follows an edge contraction (i.e. we remove everything at first, and then contract edges). Now it is easy to understand that all edge contractions should be actually suppressions. Indeed, assume that we contract and both u and v has degrees at least 3, then we will get a vertex with degree at least 4 and this is a contradiction since does have degrees at most 3 and edge contractions can decrease degree only in one case when we contract and v has degree 1, but in this case we may just remove v and it decreases the number of edge contractions. □
3. The lower bound
3.1. Topological minors and Tseitin formulas
Le φ be a formula and let α be a partial assignment to variables of φ. Define to be the formula obtained from φ substituting each variable x in the domain of α, with the constant assigned to x by α. Notice that φ and have the same size and depth.
Lemma 10
Let and for be propositional formulas of depth at most d such that . Assume that for all , is semantically equivalent to . Then of size at most , where .
Proof
At first Pavel asks . The answer 1 leads to an immediate contradiction. Then Pavel proceeds to ask for each . If all the answers are 1, Pavel asks all subformulas of the big conjunction starting with the deeper ones and at each step one of Sam's answers leads to an immediate contradiction.
If Sam claim that for some , we use Lemma 4 to construct a derivation of size at most . If , then is identically true, thus, by Lemma 4, there is a derivation of size at most , using it we get an immediate contradiction.
If , then Pavel asks . If Sam's answer is 0, we get a shortcut contradiction with and proceed with Lemma 6, otherwise we get an immediate contradiction with the initial condition . □
Lemma 11
[23]
Let be a connected graph and be a connected subgraph of G with that is obtained from G by the deletion of some vertices and edges. For every unsatisfiable Tseitin formula there exists a partial assignment α to variables for such that α does not falsify any clause of .
Lemma 12
Let be a connected graph and be a connected subgraph of G. Assume that there is a derivation of size S. Then for some there is a derivation of size .
Proof
Let T be the game tree of . Let α be given by Lemma 11 that is defined on all variables for and does not falsify any clause of . be the tree obtained form T applying the substitution α to all the queried formulas. Size and depth do not change, hence defines a derivation of size S. has the form , where is a parity condition of the vertex v. Hence, is of the form . If , then α assigns values to all variables from , since α does not falsify , α satisfies , hence is identically true. If , then is a parity statement depending on variables , where is incident to v. Hence, for , is semantically equivalent to a parity condition of a Tseitin formula for some charging . Let Δ be the maximal degree of G. Then every parity condition of or depends on at most Δ variables. Notice that since we represent parities in CNF, . By Lemma 10, there is a derivation of size . The claim follows using the size S, depth d derivation of together with Lemma 2. □
A 1-substitution for a formula φ is a partial function mapping variables of φ into literals of φ. After applying a 1-substitution σ to φ, the depth of the new formula can increase by one. However 1-substitutions are closed under composition: if maps and maps , then is the 1-substitution . We use 1-substitutions to handle in the operation of vertex suppression on the graph G. Let be a graph and be a node and let be a Tseitin formula on G. Let v be a degree-2 vertex v in G with neighbours u and w. Consider the following 1-substitution and the charge function for :
Let be a graph and be a charging. Let A be a finite set. We say that a formula Ψ is a pseudo Tseitin formula based on G and f with fake vertices in A, and we write Ψ is , if Ψ has the form , where
- 1.
for all , is a propositional formula depending on variables for all edges e incident to v. And is semantically equivalent to the parity condition of .
- 2.
for all , is a tautology.
Lemma 13
Let be a connected constant-degree graph over n vertices. Let be the graph obtained after the suppression of a degree-2 vertex v in G. If Ψ is , then is .
Proof
Assume that v is linked to two vertices w and u in G. Let A be the set of fake vertices of Ψ so Ψ has the form , hence is . For , is a tautology, hence is also a tautology. By the definition of , is a tautology. It is not hard to verify that for , is equivalent to parity condition of . Hence, is □
Lemma 14
Let be a graph and and be degree 2 nodes in V suppressed in that order from G and be the resulting graph. Let be the corresponding 1-substitutions and let . Then there is a charging of G such that if Ψ is , then is .
Proof
By induction on and using Lemma 13 we prove that is , for given by repeated applications of Lemma 13.
Since the composition of 1-substitutions removes double negations, then the only difference between and can be only in the number of negations in front of the same occurrence of a variable, though the parity of the number of negations is preserved. Hence for all the semantical equivalence of the 's in and is preserved. Then too is . □
Lemma 15
Let G be a connected graph on n vertices and with the maximal degree at most 3. Let H be obtained from G by several suppressions. Assume that there is a derivation of of size S and depth d. Then for some charging there is a derivation of of size and depth .
Proof
Assume that, in order, to get H from G we have to apply suppressions for vertices . Let be the 1-substitutions corresponding to the suppression of , and let . is . Let be the charging given by Lemma 14 applied to and . Then is . We apply the 1-substitution σ to the given derivation of and we get a derivation of of size and depth at most . By Lemma 10, applied on and , there is a derivation of size . Combining the two derivations together by Lemma 2 we obtain a derivation of size . □
3.2. From walls to grids
Lemma 16
If there exists a derivation of size S, then there exists a derivation of size , where is a connected constant-degree graph that contains as a subgraph.
Proof
Consider a set I of all the horizontal edges of that belong to odd columns (on Fig. 4, Fig. 5 edges from I are wavy). I is a matching, i.e. no two edges from I are incident to the same vertex. If we contract all edges from I, we get the graph that for odd n coincides with and for even n coincides with a graph that is obtained from by the removal of several edges from the last vertical (see Fig. 4, Fig. 5). For every we denote its left vertex by and the right vertex by . Let be the set of edges of incident to except e. Let denote a CNF formula encoding .
Fig. 4. is contracted to M6.
Fig. 5. is contracted to M5.
Consider a game tree T for the derivation of the Tseitin tautology of size S and depth d. To every formula used in this tree we apply the substitution that replaces every occurrence of with . We denote the resulting tree by .
Notice that is a correct game tree of a derivation , where F is obtained from by the same substitution. The depth of this derivation is increased by at most a constant since in several leaves we hang a formula of constant depth; here we also use that I is a matching and thus we do not add new occurrences of variables corresponding edges from I. The size of is , hence any formula from the derivation is increased in at most a constant factor, thus the size of the derivation defined by the tree is .
We define a function on vertices of as follows. If a vertex w of the graph is obtained by merging the vertices of the graph , then . If the vertex w of is obtained from the vertex w of , then .
Now we show how to derive from ¬F. is a Tseitin formula and it has the following structure: , where V is the set of vertices of and is a CNF formula encoding a parity condition for the vertex v. F differs from only in conditions corresponding to vertices that are incident to an edge from I (if n is even, then there are vertices in that are not incident to any edge from I). Notice that F has the form where is obtained by substitution from . Let for some , then the formula is identically true. If , then the condition is equivalent to the parity condition of the merged vertex in the Tseitin formula , but is not written in canonical form.
Since all degrees in are at most 4, then by Lemma 10 there exists a derivation of size . The claim follows by Lemma 2. □
3.3. Putting it all together
We use Håstad's Theorem from [28].
Theorem 17
[28]
There is a constant such that for any depth d derivation of has size at least .
Theorem 18
There exist constants and such that for every connected graph G of treewidth t and every , any depth d derivation of has size at least .
Proof
Suppose that have a derivation of size S and depth d. By Corollary 9 we know that G contains the wall as a topological minor, where . Consider a sequence of operations (edge/vertex removals and suppressions) that transform G to . Assume that removals do not follow suppressions. And let be a subgraph of G that is obtained from G by application of all removals (hence, can be obtained from by application of several suppressions).
By Lemma 12, for some there is a derivation of of size and depth . Since can be obtained from by application of several suppressions, is connected. Suppressions can not increase the degrees, hence all degrees in are at most 3. By Lemma 15, for some there is a derivation of of size and depth . By Lemma 16, for some there is a derivation of of size and depth , where is connected constant-degree graph containing as a subgraph. And finally by Lemma 12, for some there is a Frege derivation of of size and depth . Notice that S is the size of a derivation of , hence . Thus, for some constants C and c there is a derivation of of size and depth .
By Theorem 17, there is a constant K such that if , then . Hence and, thus, . □
4. The upper bound
In this section we prove the following Theorem:
Theorem 19
Let be a connected undirected graph and be an unsatisfiable Tseitin formula. Then for all large enough d the formula has a derivation of depth d and size .
Let us give the outline of the proof:
- 1.
First, we define the compact representation of Parity. The main idea behind this is using associativity of the operation: we split the input on chunks of suitable size and construct the formula recursively. The first part of the section describes the technical lemmas concerning the compact representation.
- 2.
The next part of the section describes how to emulate summation of linear equations modulo 2 using the compact representation of Parity.
- 3.
In the last part of the section, we use the notion of tree-partition width of the graph. Using the small cuts of tree-partition, we construct a proof which tries to detect local contradictions of a number of variables, proportional to tree-partition width.
4.1. A compact representation of parity
Let be natural numbers, where d is a non-negative integer. Let be partitions of a finite set F; it is possible that some elements of for are empty. We say that a list of partitions is a -refinement of F if the following conditions hold:
- 1.
consists of the only element .
- 2.
For every i, is a subpartition of such that every element of is split into parts. Hence, split F into parts: , where .
- 3.
All elements of have cardinality at most 1.
Let U be a -refinement of a set F and let be one of the blocks of this refinement. Then U induces on each of the blocks a -refinement which is obtained by restricting to the set . is called a sub-refinement of in U.
Lemma 20
Let F be a set of size n and be an integer. Let be integers such that . Then there exists a -refinement U of F.
Proof
We define as n singletons each containing one element of F and empty sets. For each we construct from as follows. We split the blocks of the partition into groups of size and define as the union of the elements of the first group, as the union of the elements of the second group and etc. □
For and natural number n we define a Boolean function such that iff for all .
Lemma 21
Let n and d be positive integers and U be a -refinement of . Then there exists a formula representing of depth at most and of size .
Proof
Let us construct a formula of the needed size and depth for each of the chunks in the refinement, starting from the smallest ones. More formally, we do that by backward induction on i from d to 0. We prove that for every , there is a formula representing of depth and of size .
If , then , hence is either 0 or a variable and thus has size 1 and depth 0.
Assume that . Let be such that . Let for , be a representation of of size and depth that exists by the induction hypothesis. Consider a CNF-representation of : . After the substitution of the representations of we obtain a formula of size at most and of depth .
Therefore we have constructed a representation of of the needed size and depth. The representation of could be constructed as ¬φ where φ is the obtained representation of . □
We call the representation of obtained by Lemma 21 the compact representation of with respect to a -refinement U.
Let us define for and for , . We define a compact representation of with respect to a -refinement U as the result of substitutions for all to the compact representation of with respect to U. We denote the compact representation of w.r.t. U by .
Lemma 22
Let U be a -refinement of and be a sub-refinement of in U. Then for every there exists a derivation of size at most .
Proof
Let and be the formula obtained from by replacement of all subformulas with x. Clearly and are semantically equivalent. Then let us apply Corollary 5 to , , and . Then there exists a derivation of of size . □
4.2. Summation of linear equations
Let be the symmetric difference of sets S and T i.e. .
Proposition 23
Let U be a -refinement of . For any there exists a derivation of size at most .
Proof
If then the premise equals the conclusion, so an empty derivation is sufficient. If we need to remove double negation so Pavel asks . If the answer is 1 then it is an immediate contradiction with the premise and if the answer is 0 it is an immediate contradiction with the conclusion. □
Lemma 24
Let U be a -refinement of . Then there exist a constant c and a derivationof size at most . We write ∅ here to stress that the size of does not depend on S.
Proof
Let us prove this Lemma by induction on d. The base case: . Since is the last layer of refinement, it contains only singletons. On the other hand by the definition , thus, and and all depend on one variable . Thus by Lemma 4, there exists a derivation of constant size. Clearly is derivable from by a derivation of constant depth and size.
If , let be the sub-refinements of in U respectively where . Recall that by definitionWe view this representation as CNF in variables for . Recall that by definition .
Let us describe a strategy of Pavel in the game with initial conditions , and .
Pavel asks Sam the values of the following formulas: , , for . There are possible combinations of Sam's answers. The total size of the formulas is at most . Let us show how Pavel wins in each of them. Let denote Sam's answers to , , respectively for .
If , then we can get a contradiction with . Indeed consider a formula and let L be the size of ψ if we consider it as a formula in variables . Clearly . By Corollary 5, there is a derivation of 0 from ψ of size at most . Pavel asks Sam the value of ψ and in both cases gets a contradiction. If the answer is 0 then it is a contradiction with the conjuncts so Pavel proceeds to ask all subformulas of ψ starting with the deeper ones until he gets an immediate contradiction. If the answer is 1 we get a contradiction by Corollary 5. The total size of all such derivation for all possible combinations of Sam's answers is at most . Adding the size of the preliminary questions we get . The cases when or are similar.
Let us consider the case where , and . In this case there exists such that . We derive a contradiction using Sam's answers , and . By Proposition 23 we may assume that Sam's answers are , and . By the induction hypothesis there exists a derivationof size at most so we get an immediate contradiction with . The total size of the derivation is at most
Since , for a large enough c the size of derivation does not exceed . □
Lemma 25
Let U be a -refinement of . Let and . Then there exists a constant c such that:
- 1.
There exists a derivation of size at most .
- 2.
If is unsatisfiable then there exists a derivation
of size at most .
Proof
The proof of (1) is simply consecutive applications of Lemma 24 using Lemma 2. The proof of (2) is based on a well-known fact: a system of linear equations is unsatisfiable if and only if the contradiction can be obtained as a linear combination of the equations. In our case it means that there is a set such that and .
. is identically false, hence by Lemma 4 there is a derivation of size at most .
Let us construct Pavel's strategy in the game with initial conditions and . Pavel asks Sam the value of . If Sam answers 0 Pavel uses the strategy corresponding to from (1). If Sam answers 1 Pavel uses the strategy corresponding to the derivation . □
4.3. Tree-partition-width
Let be an undirected graph and be a partition of V. is a tree-partition of G if there exists a tree such that every edge e of G connects either two vertices from the same part or connects a vertex from and a vertex from , where i and j are adjacent in T, i.e. . A width of a tree-partition is the size of the largest set for . A tree-partition width of a graph G is the smallest width among all tree-partitions of G. We denote the tree-partition width of G by .
If we add a new vertex in the middle of every edge of the tree T and put the set on it, we will get a tree decomposition of G, hence .
The following theorem shows an inequality in the other direction.
Theorem 26
[46]
If , then , where is the maximum degree of G.
So, and coincide up to a multiplicative constants for constant degree graphs.
Theorem 27
Let be a connected graph and let a Tseitin formula be unsatisfiable. Then there exists a derivation of size at most , where is the maximum degree of G.
Proof
Let be a tree-partition of G with width and let be the corresponding tree. Without loss of generality we assume that T is a rooted tree with the root m; for all , denotes its parent and for all , denotes the set of direct successors of i. Without loss of generality we assume that for all .
Since is unsatisfiable and G is connected, . We consider the sum . Since each occurs in the sum exactly twice, the sum (modulo 2) is 0 for all values of . Then for each assignment to there exists such that . The first part of Pavel's strategy is to find such .
Pavel will request parity of the sum of all edges between and for all . In order to represent these formulas in a compact way we now define m different -refinements ; for every i, is a refinement of the set of all edges connecting a vertex from with a vertex from . We construct appropriate refinements later.
Pavel asks Sam the values of represented as for in the increasing order until he finds such that .
At the moment when Sam has answered the value of the values of for each j such that are all determined, thus, the value of is determined. If Pavel proceeds to the next part of his strategy. Otherwise he continues to ask Sam similar questions corresponding to the vertices with larger indices.
Now we describe the strategy of Pavel in case if he finds . We are going to describe this case in terms of derivation using Lemma 2 multiple times. Consider a linear system that consists of the equation and all parity conditions of of the vertices from . This linear system is unsatisfiable. We are going to use Lemma 25. In order to do it we need to derive the representations of these linear equations w.r.t. some refinement Q of a superset of .
Let for , be a -refinement of the set of all edges connecting two vertices from (we construct these refinements in the end of the proof together with the refinements ). Let us define a -refinement Q as a union of -refinements and such that and for every , is the union of and .
Let be Sam's answer to the question for each j that is a neighbour of in T, hence we may assume that for and are already derived. By Lemma 22, we derive from for and from , where are Sam's answers to the corresponding questions.
By the first part of Lemma 25 we derive from the set of formulas . We assume that the parity conditions of the vertices of G in represented as CNF are asked at the beginning of the game i.e. for each we know that the CNF representation of is true (if any clause of is false Pavel queries all subformulas of except subformulas of the clauses and gets an immediate contradiction, if any of the parity conditions is false it yields an immediate contradiction with the corresponding subset of clauses). Thus, by Lemma 4 we derive the representations of parity conditions of the vertices from w.r.t. Q. Since the corresponding linear system is unsatisfiable, using the second part of Lemma 25 we get a contradiction.
Claim 28
The size of the described game tree is at most .
Proof
The game tree consists of m subtrees corresponding to each possible value of , nodes corresponding to the questions for and nodes corresponding to the initial questions about parity conditions of the vertices of G in CNF. The total size of formulas in these nodes is . Each of the formulas corresponding to the questions has size . Let us estimate the size of each of the m subtrees. It is the sum of the following values:
- •
The derivation of the formulas for . By Lemma 22 the size of each of these derivations is .
- •
The derivation of the representations of parity conditions with respect to Q. By Lemma 4 the size of each of these derivations is
- •
The derivation of . By the first part of Lemma 25 the size of this derivation is .
- •
The derivation of contradiction by the second part of Lemma 25 has size .
Let us choose for all . Since , . Hence, the condition holds and, thus, for all the refinements exist by Lemma 20. If we substitute choosen values in the bound from Clam 28, we get the upper bound . □
Now we are ready to prove Theorem 19.
Proof of Theorem 19
Theorem 27 and Theorem 26 imply that there exists a constant c and a derivation of size at most . If then we can rewrite our upper bound on the size as . If then it is . If then it is simply . Otherwise if we can rewrite the upper bound as if . Thus, for the upper bound is . Therefore, for the both cases we have the needed upper bound. □
5. The complexity of Tseitin formulas in resolution
Resolution is a sound and complete propositional proof system suited for refuting unsatisfiable formulas in conjunctive normal form [17], [18]. A resolution refutation of a unsatisfiable CNF is a sequence of clauses such that is the empty clause □ and each clause in the sequence is either a clause of F or is obtained by the resolution rule applied to clauses and preceding in the sequence. The resolution rule is the following rule, where x is the resolved variable.
The size of a resolution refutation is the number of clauses in the sequence. With we denote the minimal size to refute F in resolution. The width of a clause is the number of literals in it; the width of a resolution refutation is the maximal width of a clause appearing in it. With we denote the minimal width to refute F in resolution.
Resolution refutations can be arranged as directed acyclic graphs with leaves corresponding to clauses of F and a root corresponding to the empty clause. An important refinement of resolution is the system known as regular (or read-once) resolution. In this system refutations are constrained in such a way that in the refutation-graph in each path from the empty clause to a leaf the sequence of resolved variables is read-once, i.e. each variable appears at most once. Tree-like resolution is the restriction obtained by imposing that the refutation-graph must be a tree.
Since their introduction [43] Tseitin formulas play an important role in understanding the complexity of refutations in resolution and its restrictions [10], [44]. Since resolution is a special case of bounded-depth Frege, Theorem 18 is applicable to it as well. The lower bound that can be obtained from this theorem is with , where λ is the constant from the grid minor theorem, and comes from Håstad's lower bound (Theorem 17).
Recently in [31] Itsykson et al. proved that regular resolution refutation of has size at least for every connected graph G and left open whether a similar result can be proved for unrestricted resolution. Theorem 34 improves the lower bound for general resolution comparing to the direct corollary from Theorem 18. In particular, Theorem 34 implies a lower bound for planar graphs.
5.1. Resolution lower bounds for in terms of treewidth
Lemma 29
[31] Let and be two unsatisfiable Tseitin formulas based on a connected graph G. Then the sizes of the shortest resolution refutations of this formulas coincide.
Let φ be a CNF and α be a partial assignment to the variables of φ. Let be a CNF which is obtained from by removing all satisfied clauses and removing the satisfied literals from the rest of the clauses.
Lemma 30
Let and be connected graphs, and let is a topological minor of G, then for two unsatisfiable formulas and , .
Proof
can be obtained from G by a sequence of vertex and edge deletions and edge suppressions. It is easy to see that these operations commute, so we may assume that we first delete edges and vertices and then suppress edges. Let be the graph that is obtained from G by all edge and vertex deletions. Observe that is connected since is obtained from it by vertex suppressions which do not affect connectivity. By Lemma 11 there is a partial assignment α with support that does not falsify any clause of .
Let us show that where . Indeed, where is the parity condition of the vertex v encoded in CNF. Observe that for is identically true and for it encodes in CNF the parity condition of v in .
Consider a resolution refutation of . Observe that since α does not falsify axioms of , can be transformed into a resolution refutation of of size at most k. Thus .
Now we need to show that for a graph and for some that is obtained from by a sequence of vertex suppressions, . By induction it is sufficient to show this for just one suppression.
Assume that is the result of suppression of a vertex v neighbouring the vertices u and w, i.e. . Consider a vertex-charging of the set of vertices of ,is an odd-charging since it has the same parity as , which is an odd-charging since is unsatisfiable and is connected.
Consider the following procedure of obtaining from . First substitute if and if . Such substitution satisfies the clauses of in . Observe that application of the same substitution to each clause of the resolution refutation of results in a resolution refutation of of the same or smaller length. By Lemma 29 there exists a refutation of of the same size, which completes the proof. □
The cyclicity of a graph G is the minimal ℓ for which the set of edges of G can be covered by cycles of length at most ℓ such that every edge is covered at most ℓ times.
Lemma 31
Let be the result of removal all degree-1 vertices from . Then has cyclicity at most 6.
Proof
We can cover all the edges by cycles corresponding to “bricks” of the wall (i.e. two cells of the grid with the edge between them removed). The length of each such cycle is 6 and since the graph is planar, each edge is covered by at most two cycles. □
Theorem 32
[3] where is the cyclicity of G.
Theorem 33
[22] For a constant-degree graph , .
Theorem 34
where λ is a constant from the grid-minor theorem.
Proof
Since grid is a minor of , . Then by Lemma 31 and Theorem 32, . By Corollary 9 is a topological minor of G where . By Lemma 30 which yields the desired result. □
5.2. Searching for resolution refutations of
A key concept in the field of automatic generation of proofs is that of automatizability of a proof system. Resolution is automatizable if there is an algorithm that, given a unsatisfiable CNF formula F of size n as input, it outputs a resolution refutation of F in time polynomial in , where is the length of a shortest refutation of F in resolution.
Given the importance of resolution in applied fields, investigation on automatizability of resolution received particular attention. Improving a result of Alekhnovich and Razborov in [2], automatizating resolution was recently found to be NP-hard [4]. These hardness results motivate the search of algorithms to generate resolution refutations for specific family of formulas like .
Consider the next definitions from [3].
Definition 35
A class of unsatisfiable CNF formulas is (quasi-)automatizable with respect to a proof system Π if there exists a deterministic automatizing algorithm that, given an unsatisfiable formula , returns its refutation in the proof system S in time which is (quasi-)polynomial in , where denotes the size of the shortest Π-refutation of F.
Definition 36
A class of unsatisfiable CNF formulas is smooth (respectively quasi-smoooth) if for all , (resp. there is a constant C such that ).
Definition 37
A class of unsatisfiable CNFs is width-automatizable if there exists a deterministic algorithm that, given , returns its resolution refutation of width in time which is polynomial in
Smoothness and quasi-smoothness are important properties for a class of formulas since, together with width-automatizability imply automatizability (quasi-automatizabilty) in resolution of that class of formulas.
Theorem 38
(Fact 2.7 [3]) If a class of unsatisfiable CNFs is both width-automatizable and (quasi-)smooth, then it is (quasi-)automatizable with respect to resolution.
The question whether Tseitin formulas are (quasi-)automatizable with respect to resolution using previous theorem was investigated in [3]. There they proved that are width-automatizable but obtained quasi-smoothess of only for a restricted class of graphs G, namely those with constant cyclicity.
As a consequence of Theorem 1, we show that for all graphs the class of Tseitin formulas is quasi-smooth, hence quasi-automatizable with respect to resolution answering to a question left in [3].
Corollary 39
For any graph G, are quasi-smoooth, i.e. there is a constant C such that . Hence the class of Tseitin formulas is quasi-automatizable.
Proof
In [3], [22] it was established that , where is the line graph (graph on edges) of G. It is known that , (see, for example, [26]). By Theorem 1 and the fact that is a CNF, we have that , for some given by Theorem 1. Then . □
A conjecture of A. Urquhart asserts that the shortest resolution refutations of are in fact regular. If one believes the conjecture, then devising algorithms for automatically searching for regular resolution refutations of is important since produces the shortest resolution refutations. Alekhnovich and Razborov in [3] devised an algorithm called BWBATP which on input , when G is of bounded cyclicity, produces a regular refutation of in time , that is polylogarithmic in the length of the shortest regular refutation of .
Using Theorem 1 and other known results we can generalize Alekhnovich and Razborov result to any graph and we can provide positive evidence (i.e. showing it for quasi-polynomial size) to the Urquhart's conjecture. We prove the more general statement that the size of refutations of in all the proof systems between tree-like resolution and constant-depth Frege (hence in particular regular resolution) are quasi-polynomially correlated. i.e. if has a derivation of size S in one of them of size S then it has a refutation of size at most in the other.
Corollary 40
Let and be two proof systems such that both polynomially simulate tree-like resolution and both are polynomially simulated by constant-depth Frege. If there are derivations of size S in , then there are derivations of size at most in .
Proof
Constant-depth Frege polynomially simulates treelike resolution hence it is sufficient to show the corollary taking as constant-depth Frege and as treelike resolution. Assume that have proofs of size S in constant-depth Frege, we have to prove that there are derivations of size at most in tree-like Resolution. By Theorem 1 . Hence . By a result in [5], [29] there are tree-like resolution refutations of of size , where n is the number of edges in G. Substituting the expression for the treewidth we obtain the claim. □
Declaration of Competing Interest
The authors declare that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.
Acknowledgements
The authors thank Navid Talebanfard for discussions on the lower bound. Nicola also thanks Paul Wollan for introducing him to the tree-cutwidth. Dmitry is a Young Russian Mathematics award winner and would like to thank sponsors and jury of the contest.
The research was supported by Russian Science Foundation (project 16-11-10123).
Appendix A. Frege vs Pudlák-Buss games
A set of formulas Γ semantically implies a formula ψ if every assignment that satisfies all formulas from Γ also satisfies ψ.
Every particular Frege system is defined by a finite set of derivation rules. A derivation rule has form , where , and φ are propositional formulas. It is required that every rule is sound, i.e. semantically implies φ.
Let Γ be a list of propositional formulas. We say that φ can be derived from Γ if there exists a sequence of formulas such that and each is either an element of Γ or can be derived from the formulas with smaller numbers by a derivation rule. It is allowed to substitute propositional formulas instead of variables into a derivation rule. A formula τ is derivable if it can be derived from an empty list of formulas.
A system of derivation rules is a Frege system if it is implicationally complete: if some set of formulas Γ semantically implies a formula φ, then φ must be derivable from Γ.
A depth of a derivation is the maximum depth of a formula that occurs in the derivation. A size of a derivation is the sum of sizes of all formulas from the derivation.
Lemma 3
1. If a formula φ has a Frege derivation of size S and depth d, then φ has a Pudlák-Buss game derivation of size and depth d. 2. If φ has a Pudlák-Buss game derivation of size S and depth d, then φ has a Frege derivation of size and depth .
Proof
- 1.
Let be a Frege derivation of φ of size S. We construct a strategy for Pavel. Pavel asks Sam values of the formulas until he gets the answer 0. , so at least for the answer is 0. Assume that Sam has answered 1 for the formulas and 0 for where . is derived from using one of the rules in Frege system. Let us consider all subformulas of this rule (there is a constant number of such subformulas). Pavel asks Sam values of the formulas corresponding to such subformulas in the application of the rule where is derived. Due to correctness of the rules, we get an immediate contradiction. Number of vertices for constructed tree is . In every vertex Pavel has asked only subformulas of formulas in the Frege derivation, so size of every asked formula does not exceed S and depth does not exceed d. The total size of the game is
- 2.
Let T be a tree for Pudlák-Buss game with the initial condition . Every vertex in the tree corresponds to a sequence of questions and answers on the path from the root to this vertex. For the sequence we write a formula , where denotes ¬ψ, and denotes ψ.
We assume that Frege system includes the rule (it can be simulated with derivation of constant size and depth due to implicationally completeness of the system). With that rule, formulas corresponding to the inner vertices of the tree can be derived from the formulas corresponding to their descendants.
We also need to derive formulas in the leaves. Let h be the depth of T. We construct the derivation for a leaf using formulas, because in every leaf we have an immediate contradiction. There exist only a constant number of ways to get an immediate contradiction, so we assume that all these axioms are present in our Frege system. In order to use these axioms we need to rearrange the formulas in the big conjunction and place the formulas needed for immediate contradiction first.
For example, if the immediate contradiction is , we need to add an axiom .
If the tree T has N vertices then the constructed derivation has formulas, and every formula has size . Given that and , we get a derivation with total size □
References
- [1]The complexity of the pigeonhole principleCombinatorica, 14 (4) (1994), pp. 417-433, 10.1007/BF01302964
- [2]Resolution is not automatizable unless W[P] is tractableSIAM J. Comput., 38 (4) (2008), pp. 1347-1363, 10.1137/06066850X
- [3]Satisfiability, branch-width and Tseitin tautologiesComput. Complex., 20 (4) (2011), pp. 649-678, 10.1007/s00037-011-0033-1
- [4]Automating resolution is NP-hardJ. ACM, 67 (5) (2020), pp. 31:1-31:17, 10.1145/3409472
- [5]Time-space trade-offs in resolution: superpolynomial lower bounds for superlinear spaceSIAM J. Comput., 45 (4) (2016), pp. 1612-1645, 10.1137/130914085
- [6]Simplified and improved resolution lower bounds37th Annual Symposium on Foundations of Computer Science, FOCS'96, 14–16 October, 1996, IEEE Computer Society, Burlington, Vermont, USA (1996), pp. 274-282, 10.1109/SFCS.1996.548486
- [7]Approximation and small-depth Frege proofsSIAM J. Comput., 21 (6) (1992), pp. 1161-1179, 10.1137/0221068
- [8]The structure of -immersion-free graphsICGT 2014 (2016)
- [9]Hard examples for the bounded depth Frege proof systemComput. Complex., 11 (3–4) (2002), pp. 109-136, 10.1007/s00037-002-0172-5
- [10]Short proofs are narrow - resolution made simpleJ. ACM, 48 (2) (2001), pp. 149-169, 10.1145/375827.375835
- [11]A lower bound for the pigeonhole principle in tree-like resolution by asymmetric prover-delayer gamesInf. Process. Lett., 110 (23) (2010), pp. 1074-1077, 10.1016/j.ipl.2010.09.007
- [12]Polynomial size proofs of the propositional pigeonhole principleJ. Symb. Log., 52 (4) (1987), pp. 916-927, 10.2307/2273826
- [13]Excluded grid theorem: improved and simplifiedRocco A. Servedio, Ronitt Rubinfeld (Eds.), Proceedings of the Forty-Seventh Annual ACM on Symposium on Theory of Computing, STOC 2015, June 14–17, 2015, ACM, Portland, OR, USA (2015), pp. 645-654, 10.1145/2746539.2746551
- [14]Towards tight(er) bounds for the excluded grid theoremProceedings of the Thirtieth Annual ACM-SIAM Symposium on Discrete Algorithms, Society for Industrial and Applied Mathematics, SODA '19, Philadelphia, PA, USA (2019), pp. 1445-1464
- [15]The relative efficiency of propositional proof systemsJ. Symb. Log., 44 (1) (1979), pp. 36-50, 10.2307/2273702
- [16]Tree resolution proofs of the weak pigeon-hole principleProceedings of the 16th Annual IEEE Conference on Computational Complexity, June 18-21, 2001, IEEE Computer Society, Chicago, Illinois, USA (2001), pp. 69-75, 10.1109/CCC.2001.933873
- [17]A machine program for theorem-provingCommun. ACM, 5 (7) (1962), pp. 394-397, 10.1145/368273.368557
- [18]A computing procedure for quantification theoryJ. ACM, 7 (3) (1960), pp. 201-215, 10.1145/321033.321034
- [19]A structure theorem for strong immersionsJ. Graph Theory, 83 (2) (2016), pp. 152-163, 10.1002/jgt.21990
- [20]Parity, circuits, and the polynomial-time hierarchyMath. Syst. Theory, 17 (1) (1984), pp. 13-27, 10.1007/BF01744431
- [21]Bounded-depth frege complexity of tseitin formulas for all graphsPeter Rossmanith, Pinar Heggernes, Joost-Pieter Katoen (Eds.), 44th International Symposium on Mathematical Foundations of Computer Science, MFCS 2019, August 26-30, 2019, Aachen, Germany, LIPIcs, vol. 138, Schloss Dagstuhl - Leibniz-Zentrum für Informatik (2019), pp. 49:1-49:15, 10.4230/LIPIcs.MFCS.2019.49
- [22]Cops-robber games and the resolution of Tseitin formulasACM Trans. Comput. Theory, 12 (2) (2020), pp. 9:1-9:22, 10.1145/3378667
- [23]On Tseitin formulas, read-once branching programs and treewidthElectron. Colloq. Comput. Complex., 26 (20) (2019)
- [24]Improved bounds on the planar branchwidth with respect to the largest grid minor sizeAlgorithmica, 64 (3) (Nov 2012), pp. 416-453, 10.1007/s00453-012-9627-5
- [25]The intractability of resolutionTheor. Comput. Sci., 39 (1985), pp. 297-308, 10.1016/0304-3975(85)90144-6
- [26]The treewidth of line graphsJ. Comb. Theory, Ser. B, 132 (2018), pp. 157-179, 10.1016/j.jctb.2018.03.007
- [27]Computational Limitations of Small-Depth CircuitsMIT Press (1987)
- [28]On small-depth Frege proofs for Tseitin for gridsChris Umans (Ed.), 58th IEEE Annual Symposium on Foundations of Computer Science, FOCS 2017, October 15-17, 2017, IEEE Computer Society, Berkeley, CA, USA (2017), pp. 97-108, 10.1109/FOCS.2017.18
- [29]Graph Expansion, Tseitin Formulas and Resolution Proofs for CSPAndrei A. Bulatov, Arseny M. Shur (Eds.), Computer Science - Theory and Applications - 8th International Computer Science Symposium in Russia, CSR 2013, Ekaterinburg, Russia, June 25-29, 2013. Proceedings, Lecture Notes in Computer Science, vol. 7913, Springer (2013), pp. 162-173, 10.1007/978-3-642-38536-0_14
- [30]Tight lower bounds on the resolution complexity of perfect matching principlesFundam. Inform., 145 (3) (2016), pp. 229-242, 10.3233/FI-2016-1358
- [31]Almost tight lower bounds on regular resolution refutations of Tseitin formulas for all constant-degree graphsComput. Complex., 30 (2) (2021), p. 13, 10.1007/s00037-021-00213-2
- [32]Boolean Function Complexity: Advances and FrontiersSpringer (2012)
- [33]An exponential lower bound to the size of bounded depth Frege proofs of the pigeonhole principleRandom Struct. Algorithms, 7 (1) (1995), pp. 15-40, 10.1002/rsa.3240070103
- [34]Exponential lower bounds for the pigeonhole principleComput. Complex., 3 (1993), pp. 97-140, 10.1007/BF01200117
- [35]Poly-logarithmic Frege depth lower bounds via an expander switching lemmaDaniel Wichs, Yishay Mansour (Eds.), Proceedings of the 48th Annual ACM SIGACT Symposium on Theory of Computing, STOC 2016, June 18-21, 2016, ACM, Cambridge, MA, USA (2016), pp. 644-657, 10.1145/2897518.2897637
- [36]How to lie without being (easily) convicted and the lengths of proofs in propositional calculusLeszek Pacholski, Jerzy Tiuryn (Eds.), Computer Science Logic, Springer Berlin Heidelberg, Berlin, Heidelberg (1995), pp. 151-162
- [37]Resolution lower bounds for the weak pigeonhole principleJ. ACM, 51 (2) (2004), pp. 115-138, 10.1145/972639.972640
- [38]Lower bounds on the size of bounded depth networks over a complete basis with logical additionMat. Zametki, 41 (1987), pp. 598-607
- [39]Resolution lower bounds for the weak functional pigeonhole principleTheor. Comput. Sci., 303 (1) (2003), pp. 233-243, 10.1016/S0304-3975(02)00453-X
- [40]Resolution lower bounds for perfect matching principlesJ. Comput. Syst. Sci., 69 (1) (2004), pp. 3-27, 10.1016/j.jcss.2004.01.004
- [41]Quickly excluding a planar graphJ. Comb. Theory, Ser. B, 62 (2) (1994), pp. 323-348, 10.1006/jctb.1994.1073
- [42]Algebraic methods in the theory of lower bounds for Boolean circuit complexityAlfred V. Aho (Ed.), Proceedings of the 19th Annual ACM Symposium on Theory of Computing, 1987, New York, New York, USA, ACM, New York, New York, USA (1987), pp. 77-82, 10.1145/28395.28404
- [43]Grigory S. Tseitin, On the complexity of derivation in the propositional calculus, in: A.O. Slisenko (Ed.), Studies in Constructive Mathematics and Mathematical Logic Part II, a968.
- [44]Hard examples for resolutionJ. ACM, 34 (1) (1987), pp. 209-219, 10.1145/7531.8928
- [45]Simplified lower bounds for propositional proofsNotre Dame J. Form. Log., 37 (4) (1996), pp. 523-544, 10.1305/ndjfl/1040046140
- [46]On tree-partition-widthPart Special Issue on Metric Graph Theory, Eur. J. Comb., 30 (5) (2009), pp. 1245-1253, 10.1016/j.ejc.2008.11.010