3,352 research outputs found

    Average case lower bounds for monotone switching networks.

    Get PDF
    Abstract-An approximate computation of a Boolean function by a circuit or switching network is a computation in which the function is computed correctly on the majority of the inputs (rather than on all inputs). Besides being interesting in their own right, lower bounds for approximate computation have proved useful in many subareas of complexity theory, such as cryptography and derandomization. Lower bounds for approximate computation are also known as correlation bounds or average case hardness. In this paper, we obtain the first average case monotone depth lower bounds for a function in monotone P. We tolerate errors that are asymptotically the best possible for monotone circuits. Specifically, we prove average case exponential lower bounds on the size of monotone switching networks for the GEN function. As a corollary, we separate the monotone NC hierarchy in the case of errors -a result which was previously only known for exact computations. Our proof extends and simplifies the Fourier analytic technique due to Potechin [21], and further developed by Chan and Potechi

    Average Case Lower Bounds for Monotone Switching Networks

    Get PDF
    An approximate computation of a function f : {0, 1} n → {0, 1} by a computaional model M is a computation in which M computes f correctly on the majority of the inputs (rather than on all inputs). Lower bounds for approximate computations are also known as average case hardness results. We obtain the first average case monotone depth lower bounds for a function in monotone P, tolerating errors that are asymptotically the best possible for monotone circuits. Specifically, we prove average case exponential lower bounds on the size of monotone switching networks for the GEN function. As a corollary, we establish that for every i, there are functions computed with no error in monotone NC i+1 , but that cannot be computed without large error by monotone circuits in NC i

    Bounds on monotone switching networks for directed connectivity

    Full text link
    We separate monotone analogues of L and NL by proving that any monotone switching network solving directed connectivity on nn vertices must have size at least n(Ω(lg(n)))n^(\Omega(\lg(n))).Comment: 49 pages, 12 figure

    Shaping Pulses to Control Bistable Biological Systems

    Get PDF
    In this paper we study how to shape temporal pulses to switch a bistable system between its stable steady states. Our motivation for pulse-based control comes from applications in synthetic biology, where it is generally difficult to implement real-time feedback control systems due to technical limitations in sensors and actuators. We show that for monotone bistable systems, the estimation of the set of all pulses that switch the system reduces to the computation of one non-increasing curve. We provide an efficient algorithm to compute this curve and illustrate the results with a genetic bistable system commonly used in synthetic biology. We also extend these results to models with parametric uncertainty and provide a number of examples and counterexamples that demonstrate the power and limitations of the current theory. In order to show the full potential of the framework, we consider the problem of inducing oscillations in a monotone biochemical system using a combination of temporal pulses and event-based control. Our results provide an insight into the dynamics of bistable systems under external inputs and open up numerous directions for future investigation.Comment: 14 pages, contains material from the paper in Proc Amer Control Conf 2015, (pp. 3138-3143) and "Shaping pulses to control bistable systems analysis, computation and counterexamples", which is due to appear in Automatic

    Lower Bounds for (Non-Monotone) Comparator Circuits

    Get PDF
    Comparator circuits are a natural circuit model for studying the concept of bounded fan-out computations, which intuitively corresponds to whether or not a computational model can make "copies" of intermediate computational steps. Comparator circuits are believed to be weaker than general Boolean circuits, but they can simulate Branching Programs and Boolean formulas. In this paper we prove the first superlinear lower bounds in the general (non-monotone) version of this model for an explicitly defined function. More precisely, we prove that the n-bit Element Distinctness function requires ?((n/ log n)^(3/2)) size comparator circuits

    Formulas vs. Circuits for Small Distance Connectivity

    Full text link
    We give the first super-polynomial separation in the power of bounded-depth boolean formulas vs. circuits. Specifically, we consider the problem Distance k(n)k(n) Connectivity, which asks whether two specified nodes in a graph of size nn are connected by a path of length at most k(n)k(n). This problem is solvable (by the recursive doubling technique) on {\bf circuits} of depth O(logk)O(\log k) and size O(kn3)O(kn^3). In contrast, we show that solving this problem on {\bf formulas} of depth logn/(loglogn)O(1)\log n/(\log\log n)^{O(1)} requires size nΩ(logk)n^{\Omega(\log k)} for all k(n)loglognk(n) \leq \log\log n. As corollaries: (i) It follows that polynomial-size circuits for Distance k(n)k(n) Connectivity require depth Ω(logk)\Omega(\log k) for all k(n)loglognk(n) \leq \log\log n. This matches the upper bound from recursive doubling and improves a previous Ω(loglogk)\Omega(\log\log k) lower bound of Beame, Pitassi and Impagliazzo [BIP98]. (ii) We get a tight lower bound of sΩ(d)s^{\Omega(d)} on the size required to simulate size-ss depth-dd circuits by depth-dd formulas for all s(n)=nO(1)s(n) = n^{O(1)} and d(n)logloglognd(n) \leq \log\log\log n. No lower bound better than sΩ(1)s^{\Omega(1)} was previously known for any d(n)O(1)d(n) \nleq O(1). Our proof technique is centered on a new notion of pathset complexity, which roughly speaking measures the minimum cost of constructing a set of (partial) paths in a universe of size nn via the operations of union and relational join, subject to certain density constraints. Half of our proof shows that bounded-depth formulas solving Distance k(n)k(n) Connectivity imply upper bounds on pathset complexity. The other half is a combinatorial lower bound on pathset complexity

    Large deviations sum-queue optimality of a radial sum-rate monotone opportunistic scheduler

    Full text link
    A centralized wireless system is considered that is serving a fixed set of users with time varying channel capacities. An opportunistic scheduling rule in this context selects a user (or users) to serve based on the current channel state and user queues. Unless the user traffic is symmetric and/or the underlying capacity region a polymatroid, little is known concerning how performance optimal schedulers should tradeoff "maximizing current service rate" (being opportunistic) versus "balancing unequal queues" (enhancing user-diversity to enable future high service rate opportunities). By contrast with currently proposed opportunistic schedulers, e.g., MaxWeight and Exp Rule, a radial sum-rate monotone (RSM) scheduler de-emphasizes queue-balancing in favor of greedily maximizing the system service rate as the queue-lengths are scaled up linearly. In this paper it is shown that an RSM opportunistic scheduler, p-Log Rule, is not only throughput-optimal, but also maximizes the asymptotic exponential decay rate of the sum-queue distribution for a two-queue system. The result complements existing optimality results for opportunistic scheduling and point to RSM schedulers as a good design choice given the need for robustness in wireless systems with both heterogeneity and high degree of uncertainty.Comment: Revised version. Major changes include addition of details/intermediate steps in various proofs, a summary of technical steps in Table 1, and correction of typos
    corecore