787,057 research outputs found

    Spectral Norm of Symmetric Functions

    Full text link
    The spectral norm of a Boolean function f:{0,1}n{1,1}f:\{0,1\}^n \to \{-1,1\} is the sum of the absolute values of its Fourier coefficients. This quantity provides useful upper and lower bounds on the complexity of a function in areas such as learning theory, circuit complexity, and communication complexity. In this paper, we give a combinatorial characterization for the spectral norm of symmetric functions. We show that the logarithm of the spectral norm is of the same order of magnitude as r(f)log(n/r(f))r(f)\log(n/r(f)) where r(f)=max{r0,r1}r(f) = \max\{r_0,r_1\}, and r0r_0 and r1r_1 are the smallest integers less than n/2n/2 such that f(x)f(x) or f(x)parity(x)f(x) \cdot parity(x) is constant for all xx with xi[r0,nr1]\sum x_i \in [r_0, n-r_1]. We mention some applications to the decision tree and communication complexity of symmetric functions

    Communication Complexity and Secure Function Evaluation

    Full text link
    We suggest two new methodologies for the design of efficient secure protocols, that differ with respect to their underlying computational models. In one methodology we utilize the communication complexity tree (or branching for f and transform it into a secure protocol. In other words, "any function f that can be computed using communication complexity c can be can be computed securely using communication complexity that is polynomial in c and a security parameter". The second methodology uses the circuit computing f, enhanced with look-up tables as its underlying computational model. It is possible to simulate any RAM machine in this model with polylogarithmic blowup. Hence it is possible to start with a computation of f on a RAM machine and transform it into a secure protocol. We show many applications of these new methodologies resulting in protocols efficient either in communication or in computation. In particular, we exemplify a protocol for the "millionaires problem", where two participants want to compare their values but reveal no other information. Our protocol is more efficient than previously known ones in either communication or computation

    Unreduced Dynamic Complexity: Towards the Unified Science of Intelligent Communication Networks and Software

    Get PDF
    Operation of autonomic communication networks with complicated user-oriented functions should be described as unreduced many-body interaction process. The latter gives rise to complex-dynamic behaviour including fractally structured hierarchy of chaotically changing realisations. We recall the main results of the universal science of complexity (http://cogprints.org/4471/) based on the unreduced interaction problem solution and its application to various real systems, from nanobiosystems (http://cogprints.org/4527/) and quantum devices to intelligent networks (http://cogprints.org/4114/) and emerging consciousness (http://cogprints.org/3857/). We concentrate then on applications to autonomic communication leading to fundamentally substantiated, exact science of intelligent communication and software. It aims at unification of the whole diversity of complex information system behaviour, similar to the conventional, "Newtonian" science order for sequential, regular models of system dynamics. Basic principles and first applications of the unified science of complex-dynamic communication networks and software are outlined to demonstrate its advantages and emerging practical perspectives

    Polynomial evaluation over finite fields: new algorithms and complexity bounds

    Full text link
    An efficient evaluation method is described for polynomials in finite fields. Its complexity is shown to be lower than that of standard techniques when the degree of the polynomial is large enough. Applications to the syndrome computation in the decoding of Reed-Solomon codes are highlighted.Comment: accepted for publication in Applicable Algebra in Engineering, Communication and Computing. The final publication will be available at springerlink.com. DOI: 10.1007/s00200-011-0160-
    corecore