{"@context":"https:\/\/schema.org\/","@type":"ScholarlyArticle","@id":"#article10883","name":"Nearly Optimal Separation Between Partially and Fully Retroactive Data Structures","abstract":"Since the introduction of retroactive data structures at SODA 2004, a major unsolved problem has been to bound the gap between the best partially retroactive data structure (where changes can be made to the past, but only the present can be queried) and the best fully retroactive data structure (where the past can also be queried) for any problem. It was proved in 2004 that any partially retroactive data structure with operation time T_{op}(n,m) can be transformed into a fully retroactive data structure with operation time O(sqrt{m} * T_{op}(n,m)), where n is the size of the data structure and m is the number of operations in the timeline [Demaine et al., 2004]. But it has been open for 14 years whether such a gap is necessary.\nIn this paper, we prove nearly matching upper and lower bounds on this gap for all n and m. We improve the upper bound for n << sqrt m by showing a new transformation with multiplicative overhead n log m. We then prove a lower bound of min {n log m, sqrt m}^{1-o(1)} assuming any of the following conjectures:\n- Conjecture I: Circuit SAT requires 2^{n - o(n)} time on n-input circuits of size 2^{o(n)}. This conjecture is far weaker than the well-believed SETH conjecture from complexity theory, which asserts that CNF SAT with n variables and O(n) clauses already requires 2^{n-o(n)} time.\n- Conjecture II: Online (min,+) product between an integer n x n matrix and n vectors requires n^{3 - o(1)} time. This conjecture is weaker than the APSP conjectures widely used in fine-grained complexity.\n- Conjecture III (3-SUM Conjecture): Given three sets A,B,C of integers, each of size n, deciding whether there exist a in A, b in B, c in C such that a + b + c = 0 requires n^{2 - o(1)} time. This 1995 conjecture [Anka Gajentaan and Mark H. Overmars, 1995] was the first conjecture in fine-grained complexity.\nOur lower bound construction illustrates an interesting power of fully retroactive queries: they can be used to quickly solve batched pair evaluation. We believe this technique can prove useful for other data structure lower bounds, especially dynamic ones.","keywords":["retroactive data structure","conditional lower bound"],"author":[{"@type":"Person","name":"Chen, Lijie","givenName":"Lijie","familyName":"Chen","affiliation":"Massachusetts Institute of Technology","funding":"Supported by an Akamai Fellowship."},{"@type":"Person","name":"Demaine, Erik D.","givenName":"Erik D.","familyName":"Demaine","affiliation":"Massachusetts Institute of Technology"},{"@type":"Person","name":"Gu, Yuzhou","givenName":"Yuzhou","familyName":"Gu","affiliation":"Massachusetts Institute of Technology"},{"@type":"Person","name":"Williams, Virginia Vassilevska","givenName":"Virginia Vassilevska","familyName":"Williams","affiliation":"Massachusetts Institute of Technology","funding":"Partially supported by an NSF Career Award, a Sloan Fellowship, NSF Grants CCF-1417238, CCF-1528078 and CCF-1514339, and BSF Grant BSF:2012338."},{"@type":"Person","name":"Xu, Yinzhan","givenName":"Yinzhan","familyName":"Xu","affiliation":"Massachusetts Institute of Technology"},{"@type":"Person","name":"Yu, Yuancheng","givenName":"Yuancheng","familyName":"Yu","affiliation":"Massachusetts Institute of Technology"}],"position":33,"pageStart":"33:1","pageEnd":"33:12","dateCreated":"2018-06-04","datePublished":"2018-06-04","isAccessibleForFree":true,"license":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode","copyrightHolder":[{"@type":"Person","name":"Chen, Lijie","givenName":"Lijie","familyName":"Chen","affiliation":"Massachusetts Institute of Technology","funding":"Supported by an Akamai Fellowship."},{"@type":"Person","name":"Demaine, Erik D.","givenName":"Erik D.","familyName":"Demaine","affiliation":"Massachusetts Institute of Technology"},{"@type":"Person","name":"Gu, Yuzhou","givenName":"Yuzhou","familyName":"Gu","affiliation":"Massachusetts Institute of Technology"},{"@type":"Person","name":"Williams, Virginia Vassilevska","givenName":"Virginia Vassilevska","familyName":"Williams","affiliation":"Massachusetts Institute of Technology","funding":"Partially supported by an NSF Career Award, a Sloan Fellowship, NSF Grants CCF-1417238, CCF-1528078 and CCF-1514339, and BSF Grant BSF:2012338."},{"@type":"Person","name":"Xu, Yinzhan","givenName":"Yinzhan","familyName":"Xu","affiliation":"Massachusetts Institute of Technology"},{"@type":"Person","name":"Yu, Yuancheng","givenName":"Yuancheng","familyName":"Yu","affiliation":"Massachusetts Institute of Technology"}],"copyrightYear":"2018","accessMode":"textual","accessModeSufficient":"textual","creativeWorkStatus":"Published","inLanguage":"en-US","sameAs":"https:\/\/doi.org\/10.4230\/LIPIcs.SWAT.2018.33","publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","citation":"http:\/\/arxiv.org\/abs\/1007.3415","isPartOf":{"@type":"PublicationVolume","@id":"#volume6304","volumeNumber":101,"name":"16th Scandinavian Symposium and Workshops on Algorithm Theory (SWAT 2018)","dateCreated":"2018-06-04","datePublished":"2018-06-04","editor":{"@type":"Person","name":"Eppstein, David","givenName":"David","familyName":"Eppstein"},"isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#article10883","isPartOf":{"@type":"Periodical","@id":"#series116","name":"Leibniz International Proceedings in Informatics","issn":"1868-8969","isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#volume6304"}}}