68,300 research outputs found

    All Classical Adversary Methods are Equivalent for Total Functions

    Get PDF
    We show that all known classical adversary lower bounds on randomized query complexity are equivalent for total functions, and are equal to the fractional block sensitivity fbs(f). That includes the Kolmogorov complexity bound of Laplante and Magniez and the earlier relational adversary bound of Aaronson. For partial functions, we show unbounded separations between fbs(f) and other adversary bounds, as well as between the relational and Kolmogorov complexity bounds. We also show that, for partial functions, fractional block sensitivity cannot give lower bounds larger than sqrt(n * bs(f)), where n is the number of variables and bs(f) is the block sensitivity. Then we exhibit a partial function f that matches this upper bound, fbs(f) = Omega(sqrt(n * bs(f)))

    Low-Sensitivity Functions from Unambiguous Certificates

    Get PDF
    We provide new query complexity separations against sensitivity for total Boolean functions: a power 33 separation between deterministic (and even randomized or quantum) query complexity and sensitivity, and a power 2.222.22 separation between certificate complexity and sensitivity. We get these separations by using a new connection between sensitivity and a seemingly unrelated measure called one-sided unambiguous certificate complexity (UCminUC_{min}). We also show that UCminUC_{min} is lower-bounded by fractional block sensitivity, which means we cannot use these techniques to get a super-quadratic separation between bs(f)bs(f) and s(f)s(f). We also provide a quadratic separation between the tree-sensitivity and decision tree complexity of Boolean functions, disproving a conjecture of Gopalan, Servedio, Tal, and Wigderson (CCC 2016). Along the way, we give a power 1.221.22 separation between certificate complexity and one-sided unambiguous certificate complexity, improving the power 1.1281.128 separation due to G\"o\"os (FOCS 2015). As a consequence, we obtain an improved Ω(log1.22n)\Omega(\log^{1.22} n) lower-bound on the co-nondeterministic communication complexity of the Clique vs. Independent Set problem.Comment: 25 pages. This version expands the results and adds Pooya Hatami and Avishay Tal as author

    Certificate games

    Get PDF
    We introduce and study Certificate Game complexity, a measure of complexity based on the probability of winning a game where two players are given inputs with different function values and are asked to output ii such that xiyix_i\neq y_i (zero-communication setting). We give upper and lower bounds for private coin, public coin, shared entanglement and non-signaling strategies, and give some separations. We show that complexity in the public coin model is upper bounded by Randomized query and Certificate complexity. On the other hand, it is lower bounded by fractional and randomized certificate complexity, making it a good candidate to prove strong lower bounds on randomized query complexity. Complexity in the private coin model is bounded from below by zero-error randomized query complexity. The quantum measure highlights an interesting and surprising difference between classical and quantum query models. Whereas the public coin certificate game complexity is bounded from above by randomized query complexity, the quantum certificate game complexity can be quadratically larger than quantum query complexity. We use non-signaling, a notion from quantum information, to give a lower bound of nn on the quantum certificate game complexity of the OROR function, whose quantum query complexity is Θ(n)\Theta(\sqrt{n}), then go on to show that this ``non-signaling bottleneck'' applies to all functions with high sensitivity, block sensitivity or fractional block sensitivity. We consider the single-bit version of certificate games (inputs of the two players have Hamming distance 11). We prove that the single-bit version of certificate game complexity with shared randomness is equal to sensitivity up to constant factors, giving a new characterization of sensitivity. The single-bit version with private randomness is equal to λ2\lambda^2, where λ\lambda is the spectral sensitivity.Comment: 43 pages, 1 figure, ITCS202

    Current mode fractional order filters using VDTAs with Grounded capacitors

    Get PDF
    In this work, the design of current mode Fractional order filter using VDTAs (Voltage differencing trans-conductance amplifier) as an active element with grounded capacitors has been proposed. The approximate transfer functions of low and high pass filters of fractional order on the basis of the integer order transfer has been shown and the form of those functions of filters is also implemented using VDTA as an active building block. In this work, filters of the different sequence have been realized. The frequency domain simulation results of the proposed filters are obtained on Matlab and PSPICE with TSMC CMOS 180 nm technology parameters. Stability and sensitivity is also verifie

    Quadratically Tight Relations for Randomized Query Complexity

    Full text link
    Let f:{0,1}n{0,1}f:\{0,1\}^n \rightarrow \{0,1\} be a Boolean function. The certificate complexity C(f)C(f) is a complexity measure that is quadratically tight for the zero-error randomized query complexity R0(f)R_0(f): C(f)R0(f)C(f)2C(f) \leq R_0(f) \leq C(f)^2. In this paper we study a new complexity measure that we call expectational certificate complexity EC(f)EC(f), which is also a quadratically tight bound on R0(f)R_0(f): EC(f)R0(f)=O(EC(f)2)EC(f) \leq R_0(f) = O(EC(f)^2). We prove that EC(f)C(f)EC(f)2EC(f) \leq C(f) \leq EC(f)^2 and show that there is a quadratic separation between the two, thus EC(f)EC(f) gives a tighter upper bound for R0(f)R_0(f). The measure is also related to the fractional certificate complexity FC(f)FC(f) as follows: FC(f)EC(f)=O(FC(f)3/2)FC(f) \leq EC(f) = O(FC(f)^{3/2}). This also connects to an open question by Aaronson whether FC(f)FC(f) is a quadratically tight bound for R0(f)R_0(f), as EC(f)EC(f) is in fact a relaxation of FC(f)FC(f). In the second part of the work, we upper bound the distributed query complexity Dϵμ(f)D^\mu_\epsilon(f) for product distributions μ\mu by the square of the query corruption bound (corrϵ(f)\mathrm{corr}_\epsilon(f)) which improves upon a result of Harsha, Jain and Radhakrishnan [2015]. A similar statement for communication complexity is open.Comment: 14 page

    Application of a Fractional Order Integral Resonant Control to increase the achievable bandwidth of a nanopositioner

    Get PDF
    The congress program will essentially include papers selected on the highest standard by the IPC, according to the IFAC guidelines www.ifac-control.org/publications/Publications-requirements-1.4.pdf, and published in open access in partnership with Elsevier in the IFAC-PapersOnline series, hosted on the ScienceDirect platform www.sciencedirect.com/science/journal/24058963. Survey papers overviewing a research topic are also most welcome. Contributed papers will have usual 6 pages length limitation. 12 pages limitation will apply to survey papers.Publisher PD

    Blocks adjustment -- reduction of bias and variance of detrended fluctuation analysis using Monte Carlo simulation

    Full text link
    The length of minimal and maximal blocks equally distant on log-log scale versus fluctuation function considerably influences bias and variance of DFA. Through a number of extensive Monte Carlo simulations and different fractional Brownian motion/fractional Gaussian noise generators, we found the pair of minimal and maximal blocks that minimizes the sum of mean-squared error of estimated Hurst exponents for the series of length N=2^p, p=7,...,15. Sensitivity of DFA to sort-range correlations was examined using ARFIMA(p,d,q) generator. Due to the bias of the estimator for anti-persistent processes, we narrowed down the range of Hurst exponent to 1/2<=H< 1.Comment: 20 pages, 14 figures, accepted for publication in Physica A: August 9, 200

    Private Graphon Estimation for Sparse Graphs

    Get PDF
    We design algorithms for fitting a high-dimensional statistical model to a large, sparse network without revealing sensitive information of individual members. Given a sparse input graph GG, our algorithms output a node-differentially-private nonparametric block model approximation. By node-differentially-private, we mean that our output hides the insertion or removal of a vertex and all its adjacent edges. If GG is an instance of the network obtained from a generative nonparametric model defined in terms of a graphon WW, our model guarantees consistency, in the sense that as the number of vertices tends to infinity, the output of our algorithm converges to WW in an appropriate version of the L2L_2 norm. In particular, this means we can estimate the sizes of all multi-way cuts in GG. Our results hold as long as WW is bounded, the average degree of GG grows at least like the log of the number of vertices, and the number of blocks goes to infinity at an appropriate rate. We give explicit error bounds in terms of the parameters of the model; in several settings, our bounds improve on or match known nonprivate results.Comment: 36 page
    corecore