2,972 research outputs found
New Bounds for the Garden-Hose Model
We show new results about the garden-hose model. Our main results include
improved lower bounds based on non-deterministic communication complexity
(leading to the previously unknown bounds for Inner Product mod 2
and Disjointness), as well as an upper bound for the
Distributed Majority function (previously conjectured to have quadratic
complexity). We show an efficient simulation of formulae made of AND, OR, XOR
gates in the garden-hose model, which implies that lower bounds on the
garden-hose complexity of the order will be
hard to obtain for explicit functions. Furthermore we study a time-bounded
variant of the model, in which even modest savings in time can lead to
exponential lower bounds on the size of garden-hose protocols.Comment: In FSTTCS 201
Welfare Maximization with Limited Interaction
We continue the study of welfare maximization in unit-demand (matching)
markets, in a distributed information model where agent's valuations are
unknown to the central planner, and therefore communication is required to
determine an efficient allocation. Dobzinski, Nisan and Oren (STOC'14) showed
that if the market size is , then rounds of interaction (with
logarithmic bandwidth) suffice to obtain an -approximation to the
optimal social welfare. In particular, this implies that such markets converge
to a stable state (constant approximation) in time logarithmic in the market
size.
We obtain the first multi-round lower bound for this setup. We show that even
if the allowable per-round bandwidth of each agent is , the
approximation ratio of any -round (randomized) protocol is no better than
, implying an lower bound on the
rate of convergence of the market to equilibrium.
Our construction and technique may be of interest to round-communication
tradeoffs in the more general setting of combinatorial auctions, for which the
only known lower bound is for simultaneous () protocols [DNO14]
Strengths and Weaknesses of Quantum Fingerprinting
We study the power of quantum fingerprints in the simultaneous message
passing (SMP) setting of communication complexity. Yao recently showed how to
simulate, with exponential overhead, classical shared-randomness SMP protocols
by means of quantum SMP protocols without shared randomness
(-protocols). Our first result is to extend Yao's simulation to
the strongest possible model: every many-round quantum protocol with unlimited
shared entanglement can be simulated, with exponential overhead, by
-protocols. We apply our technique to obtain an efficient
-protocol for a function which cannot be efficiently solved
through more restricted simulations. Second, we tightly characterize the power
of the quantum fingerprinting technique by making a connection to arrangements
of homogeneous halfspaces with maximal margin. These arrangements have been
well studied in computational learning theory, and we use some strong results
obtained in this area to exhibit weaknesses of quantum fingerprinting. In
particular, this implies that for almost all functions, quantum fingerprinting
protocols are exponentially worse than classical deterministic SMP protocols.Comment: 13 pages, no figures, to appear in CCC'0
Finding the Median (Obliviously) with Bounded Space
We prove that any oblivious algorithm using space to find the median of a
list of integers from requires time . This bound also applies to the problem of determining whether the median
is odd or even. It is nearly optimal since Chan, following Munro and Raman, has
shown that there is a (randomized) selection algorithm using only
registers, each of which can store an input value or -bit counter,
that makes only passes over the input. The bound also implies
a size lower bound for read-once branching programs computing the low order bit
of the median and implies the analog of for length oblivious branching programs
Sums of products of polynomials in few variables : lower bounds and polynomial identity testing
We study the complexity of representing polynomials as a sum of products of
polynomials in few variables. More precisely, we study representations of the
form such that each is
an arbitrary polynomial that depends on at most variables. We prove the
following results.
1. Over fields of characteristic zero, for every constant such that , we give an explicit family of polynomials , where
is of degree in variables, such that any
representation of the above type for with requires . This strengthens a recent result of Kayal and Saha
[KS14a] which showed similar lower bounds for the model of sums of products of
linear forms in few variables. It is known that any asymptotic improvement in
the exponent of the lower bounds (even for ) would separate VP
and VNP[KS14a].
2. We obtain a deterministic subexponential time blackbox polynomial identity
testing (PIT) algorithm for circuits computed by the above model when and
the individual degree of each variable in are at most and
for any constant . We get quasipolynomial running
time when . The PIT algorithm is obtained by combining our
lower bounds with the hardness-randomness tradeoffs developed in [DSY09, KI04].
To the best of our knowledge, this is the first nontrivial PIT algorithm for
this model (even for the case ), and the first nontrivial PIT algorithm
obtained from lower bounds for small depth circuits
A Lower Bound for Sampling Disjoint Sets
Suppose Alice and Bob each start with private randomness and no other input, and they wish to engage in a protocol in which Alice ends up with a set x subseteq[n] and Bob ends up with a set y subseteq[n], such that (x,y) is uniformly distributed over all pairs of disjoint sets. We prove that for some constant beta0 of the uniform distribution over all pairs of disjoint sets of size sqrt{n}
Tensor Norms and the Classical Communication Complexity of Nonlocal Quantum Measurement
We initiate the study of quantifying nonlocalness of a bipartite measurement
by the minimum amount of classical communication required to simulate the
measurement. We derive general upper bounds, which are expressed in terms of
certain tensor norms of the measurement operator. As applications, we show that
(a) If the amount of communication is constant, quantum and classical
communication protocols with unlimited amount of shared entanglement or shared
randomness compute the same set of functions; (b) A local hidden variable model
needs only a constant amount of communication to create, within an arbitrarily
small statistical distance, a distribution resulted from local measurements of
an entangled quantum state, as long as the number of measurement outcomes is
constant.Comment: A preliminary version of this paper appears as part of an article in
Proceedings of the the 37th ACM Symposium on Theory of Computing (STOC 2005),
460--467, 200
- …