152,179 research outputs found
Pseudorandom Generators for Width-3 Branching Programs
We construct pseudorandom generators of seed length that -fool ordered read-once branching programs
(ROBPs) of width and length . For unordered ROBPs, we construct
pseudorandom generators with seed length . This is the first improvement for pseudorandom
generators fooling width ROBPs since the work of Nisan [Combinatorica,
1992].
Our constructions are based on the `iterated milder restrictions' approach of
Gopalan et al. [FOCS, 2012] (which further extends the Ajtai-Wigderson
framework [FOCS, 1985]), combined with the INW-generator [STOC, 1994] at the
last step (as analyzed by Braverman et al. [SICOMP, 2014]). For the unordered
case, we combine iterated milder restrictions with the generator of
Chattopadhyay et al. [CCC, 2018].
Two conceptual ideas that play an important role in our analysis are: (1) A
relabeling technique allowing us to analyze a relabeled version of the given
branching program, which turns out to be much easier. (2) Treating the number
of colliding layers in a branching program as a progress measure and showing
that it reduces significantly under pseudorandom restrictions.
In addition, we achieve nearly optimal seed-length
for the classes of: (1) read-once polynomials on
variables, (2) locally-monotone ROBPs of length and width
(generalizing read-once CNFs and DNFs), and (3) constant-width ROBPs of length
having a layer of width in every consecutive
layers.Comment: 51 page
Grassmann variables on quantum spaces
Attention is focused on antisymmetrized versions of quantum spaces that are
of particular importance in physics, i.e. two-dimensional quantum plane,
q-deformed Euclidean space in three or four dimensions as well as q-deformed
Minkowski space. For each case standard techniques for dealing with q-deformed
Grassmann variables are developed. Formulae for multiplying supernumbers are
given. The actions of symmetry generators and fermionic derivatives upon
antisymmetrized quantum spaces are calculated. The complete Hopf structure for
all types of quantum space generators is written down. From the formulae for
the coproduct a realization of the L-matrices in terms of symmetry generators
can be read off. The L-matrices together with the action of symmetry generators
determine how quantum spaces of different type have to be fused together.Comment: 42 pages, Latex, crossing symmetries for representations have been
simplified, section with general information has been added, typos correcte
Better Pseudorandom Generators from Milder Pseudorandom Restrictions
We present an iterative approach to constructing pseudorandom generators,
based on the repeated application of mild pseudorandom restrictions. We use
this template to construct pseudorandom generators for combinatorial rectangles
and read-once CNFs and a hitting set generator for width-3 branching programs,
all of which achieve near-optimal seed-length even in the low-error regime: We
get seed-length O(log (n/epsilon)) for error epsilon. Previously, only
constructions with seed-length O(\log^{3/2} n) or O(\log^2 n) were known for
these classes with polynomially small error.
The (pseudo)random restrictions we use are milder than those typically used
for proving circuit lower bounds in that we only set a constant fraction of the
bits at a time. While such restrictions do not simplify the functions
drastically, we show that they can be derandomized using small-bias spaces.Comment: To appear in FOCS 201
Jacobian hits circuits: Hitting-sets, lower bounds for depth-D occur-k formulas & depth-3 transcendence degree-k circuits
We present a single, common tool to strictly subsume all known cases of
polynomial time blackbox polynomial identity testing (PIT) that have been
hitherto solved using diverse tools and techniques. In particular, we show that
polynomial time hitting-set generators for identity testing of the two
seemingly different and well studied models - depth-3 circuits with bounded top
fanin, and constant-depth constant-read multilinear formulas - can be
constructed using one common algebraic-geometry theme: Jacobian captures
algebraic independence. By exploiting the Jacobian, we design the first
efficient hitting-set generators for broad generalizations of the
above-mentioned models, namely:
(1) depth-3 (Sigma-Pi-Sigma) circuits with constant transcendence degree of
the polynomials computed by the product gates (no bounded top fanin
restriction), and (2) constant-depth constant-occur formulas (no multilinear
restriction).
Constant-occur of a variable, as we define it, is a much more general concept
than constant-read. Also, earlier work on the latter model assumed that the
formula is multilinear. Thus, our work goes further beyond the results obtained
by Saxena & Seshadhri (STOC 2011), Saraf & Volkovich (STOC 2011), Anderson et
al. (CCC 2011), Beecken et al. (ICALP 2011) and Grenet et al. (FSTTCS 2011),
and brings them under one unifying technique.
In addition, using the same Jacobian based approach, we prove exponential
lower bounds for the immanant (which includes permanent and determinant) on the
same depth-3 and depth-4 models for which we give efficient PIT algorithms. Our
results reinforce the intimate connection between identity testing and lower
bounds by exhibiting a concrete mathematical tool - the Jacobian - that is
equally effective in solving both the problems on certain interesting and
previously well-investigated (but not well understood) models of computation
Hidden Conformal Symmetry of Extremal Black Holes
We study the hidden conformal symmetry of the extremal black holes. We
introduce a new set of conformal coordinates to write the generators.
We find that the Laplacian of the scalar field in many extremal black holes
could be written in terms of the quadratic Casimir. This suggests
that there exist dual CFT descriptions of these black holes. From the conformal
coordinates, the temperatures of the dual CFTs could be read directly. For the
extremal black hole, the Hawking temperature is vanishing. Correspondingly,
only the left (right) temperature of the dual CFT is non-vanishing and the
excitations of the other sector are suppressed. In the probe limit, we compute
the scattering amplitudes of the scalar off the extremal black holes and find
perfect agreement with the CFT prediction.Comment: 16 pages; Published versio
- …