3,352 research outputs found
Average case lower bounds for monotone switching networks.
Abstract-An approximate computation of a Boolean function by a circuit or switching network is a computation in which the function is computed correctly on the majority of the inputs (rather than on all inputs). Besides being interesting in their own right, lower bounds for approximate computation have proved useful in many subareas of complexity theory, such as cryptography and derandomization. Lower bounds for approximate computation are also known as correlation bounds or average case hardness. In this paper, we obtain the first average case monotone depth lower bounds for a function in monotone P. We tolerate errors that are asymptotically the best possible for monotone circuits. Specifically, we prove average case exponential lower bounds on the size of monotone switching networks for the GEN function. As a corollary, we separate the monotone NC hierarchy in the case of errors -a result which was previously only known for exact computations. Our proof extends and simplifies the Fourier analytic technique due to Potechin [21], and further developed by Chan and Potechi
Average Case Lower Bounds for Monotone Switching Networks
An approximate computation of a function f : {0, 1} n → {0, 1} by a computaional model M is a computation in which M computes f correctly on the majority of the inputs (rather than on all inputs). Lower bounds for approximate computations are also known as average case hardness results. We obtain the first average case monotone depth lower bounds for a function in monotone P, tolerating errors that are asymptotically the best possible for monotone circuits. Specifically, we prove average case exponential lower bounds on the size of monotone switching networks for the GEN function. As a corollary, we establish that for every i, there are functions computed with no error in monotone NC i+1 , but that cannot be computed without large error by monotone circuits in NC i
Bounds on monotone switching networks for directed connectivity
We separate monotone analogues of L and NL by proving that any monotone
switching network solving directed connectivity on vertices must have size
at least .Comment: 49 pages, 12 figure
Shaping Pulses to Control Bistable Biological Systems
In this paper we study how to shape temporal pulses to switch a bistable
system between its stable steady states. Our motivation for pulse-based control
comes from applications in synthetic biology, where it is generally difficult
to implement real-time feedback control systems due to technical limitations in
sensors and actuators. We show that for monotone bistable systems, the
estimation of the set of all pulses that switch the system reduces to the
computation of one non-increasing curve. We provide an efficient algorithm to
compute this curve and illustrate the results with a genetic bistable system
commonly used in synthetic biology. We also extend these results to models with
parametric uncertainty and provide a number of examples and counterexamples
that demonstrate the power and limitations of the current theory. In order to
show the full potential of the framework, we consider the problem of inducing
oscillations in a monotone biochemical system using a combination of temporal
pulses and event-based control. Our results provide an insight into the
dynamics of bistable systems under external inputs and open up numerous
directions for future investigation.Comment: 14 pages, contains material from the paper in Proc Amer Control Conf
2015, (pp. 3138-3143) and "Shaping pulses to control bistable systems
analysis, computation and counterexamples", which is due to appear in
Automatic
Lower Bounds for (Non-Monotone) Comparator Circuits
Comparator circuits are a natural circuit model for studying the concept of bounded fan-out computations, which intuitively corresponds to whether or not a computational model can make "copies" of intermediate computational steps. Comparator circuits are believed to be weaker than general Boolean circuits, but they can simulate Branching Programs and Boolean formulas. In this paper we prove the first superlinear lower bounds in the general (non-monotone) version of this model for an explicitly defined function. More precisely, we prove that the n-bit Element Distinctness function requires ?((n/ log n)^(3/2)) size comparator circuits
Formulas vs. Circuits for Small Distance Connectivity
We give the first super-polynomial separation in the power of bounded-depth
boolean formulas vs. circuits. Specifically, we consider the problem Distance
Connectivity, which asks whether two specified nodes in a graph of size
are connected by a path of length at most . This problem is solvable
(by the recursive doubling technique) on {\bf circuits} of depth
and size . In contrast, we show that solving this problem on {\bf
formulas} of depth requires size for all . As corollaries:
(i) It follows that polynomial-size circuits for Distance Connectivity
require depth for all . This matches the
upper bound from recursive doubling and improves a previous lower bound of Beame, Pitassi and Impagliazzo [BIP98].
(ii) We get a tight lower bound of on the size required to
simulate size- depth- circuits by depth- formulas for all and . No lower bound better than
was previously known for any .
Our proof technique is centered on a new notion of pathset complexity, which
roughly speaking measures the minimum cost of constructing a set of (partial)
paths in a universe of size via the operations of union and relational
join, subject to certain density constraints. Half of our proof shows that
bounded-depth formulas solving Distance Connectivity imply upper bounds
on pathset complexity. The other half is a combinatorial lower bound on pathset
complexity
Large deviations sum-queue optimality of a radial sum-rate monotone opportunistic scheduler
A centralized wireless system is considered that is serving a fixed set of
users with time varying channel capacities. An opportunistic scheduling rule in
this context selects a user (or users) to serve based on the current channel
state and user queues. Unless the user traffic is symmetric and/or the
underlying capacity region a polymatroid, little is known concerning how
performance optimal schedulers should tradeoff "maximizing current service
rate" (being opportunistic) versus "balancing unequal queues" (enhancing
user-diversity to enable future high service rate opportunities). By contrast
with currently proposed opportunistic schedulers, e.g., MaxWeight and Exp Rule,
a radial sum-rate monotone (RSM) scheduler de-emphasizes queue-balancing in
favor of greedily maximizing the system service rate as the queue-lengths are
scaled up linearly. In this paper it is shown that an RSM opportunistic
scheduler, p-Log Rule, is not only throughput-optimal, but also maximizes the
asymptotic exponential decay rate of the sum-queue distribution for a two-queue
system. The result complements existing optimality results for opportunistic
scheduling and point to RSM schedulers as a good design choice given the need
for robustness in wireless systems with both heterogeneity and high degree of
uncertainty.Comment: Revised version. Major changes include addition of
details/intermediate steps in various proofs, a summary of technical steps in
Table 1, and correction of typos
- …