29,467 research outputs found

    Unbounded-Error Classical and Quantum Communication Complexity

    Full text link
    Since the seminal work of Paturi and Simon \cite[FOCS'84 & JCSS'86]{PS86}, the unbounded-error classical communication complexity of a Boolean function has been studied based on the arrangement of points and hyperplanes. Recently, \cite[ICALP'07]{INRY07} found that the unbounded-error {\em quantum} communication complexity in the {\em one-way communication} model can also be investigated using the arrangement, and showed that it is exactly (without a difference of even one qubit) half of the classical one-way communication complexity. In this paper, we extend the arrangement argument to the {\em two-way} and {\em simultaneous message passing} (SMP) models. As a result, we show similarly tight bounds of the unbounded-error two-way/one-way/SMP quantum/classical communication complexities for {\em any} partial/total Boolean function, implying that all of them are equivalent up to a multiplicative constant of four. Moreover, the arrangement argument is also used to show that the gap between {\em weakly} unbounded-error quantum and classical communication complexities is at most a factor of three.Comment: 11 pages. To appear at Proc. ISAAC 200

    Quantum Communication Cannot Simulate a Public Coin

    Full text link
    We study the simultaneous message passing model of communication complexity. Building on the quantum fingerprinting protocol of Buhrman et al., Yao recently showed that a large class of efficient classical public-coin protocols can be turned into efficient quantum protocols without public coin. This raises the question whether this can be done always, i.e. whether quantum communication can always replace a public coin in the SMP model. We answer this question in the negative, exhibiting a communication problem where classical communication with public coin is exponentially more efficient than quantum communication. Together with a separation in the other direction due to Bar-Yossef et al., this shows that the quantum SMP model is incomparable with the classical public-coin SMP model. In addition we give a characterization of the power of quantum fingerprinting by means of a connection to geometrical tools from machine learning, a quadratic improvement of Yao's simulation, and a nearly tight analysis of the Hamming distance problem from Yao's paper.Comment: 12 pages LaTe

    Strengths and Weaknesses of Quantum Fingerprinting

    Full text link
    We study the power of quantum fingerprints in the simultaneous message passing (SMP) setting of communication complexity. Yao recently showed how to simulate, with exponential overhead, classical shared-randomness SMP protocols by means of quantum SMP protocols without shared randomness (QQ^\parallel-protocols). Our first result is to extend Yao's simulation to the strongest possible model: every many-round quantum protocol with unlimited shared entanglement can be simulated, with exponential overhead, by QQ^\parallel-protocols. We apply our technique to obtain an efficient QQ^\parallel-protocol for a function which cannot be efficiently solved through more restricted simulations. Second, we tightly characterize the power of the quantum fingerprinting technique by making a connection to arrangements of homogeneous halfspaces with maximal margin. These arrangements have been well studied in computational learning theory, and we use some strong results obtained in this area to exhibit weaknesses of quantum fingerprinting. In particular, this implies that for almost all functions, quantum fingerprinting protocols are exponentially worse than classical deterministic SMP protocols.Comment: 13 pages, no figures, to appear in CCC'0

    Sign rank versus VC dimension

    Full text link
    This work studies the maximum possible sign rank of N×NN \times N sign matrices with a given VC dimension dd. For d=1d=1, this maximum is {three}. For d=2d=2, this maximum is Θ~(N1/2)\tilde{\Theta}(N^{1/2}). For d>2d >2, similar but slightly less accurate statements hold. {The lower bounds improve over previous ones by Ben-David et al., and the upper bounds are novel.} The lower bounds are obtained by probabilistic constructions, using a theorem of Warren in real algebraic topology. The upper bounds are obtained using a result of Welzl about spanning trees with low stabbing number, and using the moment curve. The upper bound technique is also used to: (i) provide estimates on the number of classes of a given VC dimension, and the number of maximum classes of a given VC dimension -- answering a question of Frankl from '89, and (ii) design an efficient algorithm that provides an O(N/log(N))O(N/\log(N)) multiplicative approximation for the sign rank. We also observe a general connection between sign rank and spectral gaps which is based on Forster's argument. Consider the N×NN \times N adjacency matrix of a Δ\Delta regular graph with a second eigenvalue of absolute value λ\lambda and ΔN/2\Delta \leq N/2. We show that the sign rank of the signed version of this matrix is at least Δ/λ\Delta/\lambda. We use this connection to prove the existence of a maximum class C{±1}NC\subseteq\{\pm 1\}^N with VC dimension 22 and sign rank Θ~(N1/2)\tilde{\Theta}(N^{1/2}). This answers a question of Ben-David et al.~regarding the sign rank of large VC classes. We also describe limitations of this approach, in the spirit of the Alon-Boppana theorem. We further describe connections to communication complexity, geometry, learning theory, and combinatorics.Comment: 33 pages. This is a revised version of the paper "Sign rank versus VC dimension". Additional results in this version: (i) Estimates on the number of maximum VC classes (answering a question of Frankl from '89). (ii) Estimates on the sign rank of large VC classes (answering a question of Ben-David et al. from '03). (iii) A discussion on the computational complexity of computing the sign-ran

    Unbounded-error One-way Classical and Quantum Communication Complexity

    Full text link
    This paper studies the gap between quantum one-way communication complexity Q(f)Q(f) and its classical counterpart C(f)C(f), under the {\em unbounded-error} setting, i.e., it is enough that the success probability is strictly greater than 1/2. It is proved that for {\em any} (total or partial) Boolean function ff, Q(f)=C(f)/2Q(f)=\lceil C(f)/2 \rceil, i.e., the former is always exactly one half as large as the latter. The result has an application to obtaining (again an exact) bound for the existence of (m,n,p)(m,n,p)-QRAC which is the nn-qubit random access coding that can recover any one of mm original bits with success probability p\geq p. We can prove that (m,n,>1/2)(m,n,>1/2)-QRAC exists if and only if m22n1m\leq 2^{2n}-1. Previously, only the construction of QRAC using one qubit, the existence of (O(n),n,>1/2)(O(n),n,>1/2)-RAC, and the non-existence of (22n,n,>1/2)(2^{2n},n,>1/2)-QRAC were known.Comment: 9 pages. To appear in Proc. ICALP 200

    A universal space-time architecture for multiple-antenna aided systems

    No full text
    In this tutorial, we first review the family of conventional multiple-antenna techniques, and then we provide a general overview of the recent concept of the powerful Multiple-Input Multiple-Output (MIMO) family based on a universal Space-Time Shift Keying (STSK) philosophy. When appropriately configured, the proposed STSK scheme has the potential of outperforming conventional MIMO arrangements

    Endogenous space in the Net era

    Get PDF
    Libre Software communities are among the most interesting and advanced socio-economic laboratories on the Net. In terms of directions of Regional Science research, this paper addresses a simple question: “Is the socio-economics of digital nets out of scope for Regional Science, or might the latter expand to a cybergeography of digitally enhanced territories ?” As for most simple questions, answers are neither so obvious nor easy. The authors start drafting one in a positive sense, focussing upon a file rouge running across the paper: endogenous spaces woven by socio-economic processes. The drafted answer declines on an Evolutionary Location Theory formulation, together with two computational modelling views. Keywords: Complex networks, Computational modelling, Economics of Internet, Endogenous spaces, Evolutionary location theory, Free or Libre Software, Path dependence, Positionality.

    A commentary on "The now-or-never bottleneck: a fundamental constraint on language", by Christiansen and Chater (2016)

    Get PDF
    In a recent article, Christiansen and Chater (2016) present a fundamental constraint on language, i.e. a now-or-never bottleneck that arises from our fleeting memory, and explore its implications, e.g., chunk-and-pass processing, outlining a framework that promises to unify different areas of research. Here we explore additional support for this constraint and suggest further connections from quantitative linguistics and information theory

    Probabilistic communication complexity over the reals

    Full text link
    Deterministic and probabilistic communication protocols are introduced in which parties can exchange the values of polynomials (rather than bits in the usual setting). It is established a sharp lower bound 2n2n on the communication complexity of recognizing the 2n2n-dimensional orthant, on the other hand the probabilistic communication complexity of its recognizing does not exceed 4. A polyhedron and a union of hyperplanes are constructed in \RR^{2n} for which a lower bound n/2n/2 on the probabilistic communication complexity of recognizing each is proved. As a consequence this bound holds also for the EMPTINESS and the KNAPSACK problems
    corecore