29,467 research outputs found
Unbounded-Error Classical and Quantum Communication Complexity
Since the seminal work of Paturi and Simon \cite[FOCS'84 & JCSS'86]{PS86},
the unbounded-error classical communication complexity of a Boolean function
has been studied based on the arrangement of points and hyperplanes. Recently,
\cite[ICALP'07]{INRY07} found that the unbounded-error {\em quantum}
communication complexity in the {\em one-way communication} model can also be
investigated using the arrangement, and showed that it is exactly (without a
difference of even one qubit) half of the classical one-way communication
complexity. In this paper, we extend the arrangement argument to the {\em
two-way} and {\em simultaneous message passing} (SMP) models. As a result, we
show similarly tight bounds of the unbounded-error two-way/one-way/SMP
quantum/classical communication complexities for {\em any} partial/total
Boolean function, implying that all of them are equivalent up to a
multiplicative constant of four. Moreover, the arrangement argument is also
used to show that the gap between {\em weakly} unbounded-error quantum and
classical communication complexities is at most a factor of three.Comment: 11 pages. To appear at Proc. ISAAC 200
Quantum Communication Cannot Simulate a Public Coin
We study the simultaneous message passing model of communication complexity.
Building on the quantum fingerprinting protocol of Buhrman et al., Yao recently
showed that a large class of efficient classical public-coin protocols can be
turned into efficient quantum protocols without public coin. This raises the
question whether this can be done always, i.e. whether quantum communication
can always replace a public coin in the SMP model. We answer this question in
the negative, exhibiting a communication problem where classical communication
with public coin is exponentially more efficient than quantum communication.
Together with a separation in the other direction due to Bar-Yossef et al.,
this shows that the quantum SMP model is incomparable with the classical
public-coin SMP model.
In addition we give a characterization of the power of quantum fingerprinting
by means of a connection to geometrical tools from machine learning, a
quadratic improvement of Yao's simulation, and a nearly tight analysis of the
Hamming distance problem from Yao's paper.Comment: 12 pages LaTe
Strengths and Weaknesses of Quantum Fingerprinting
We study the power of quantum fingerprints in the simultaneous message
passing (SMP) setting of communication complexity. Yao recently showed how to
simulate, with exponential overhead, classical shared-randomness SMP protocols
by means of quantum SMP protocols without shared randomness
(-protocols). Our first result is to extend Yao's simulation to
the strongest possible model: every many-round quantum protocol with unlimited
shared entanglement can be simulated, with exponential overhead, by
-protocols. We apply our technique to obtain an efficient
-protocol for a function which cannot be efficiently solved
through more restricted simulations. Second, we tightly characterize the power
of the quantum fingerprinting technique by making a connection to arrangements
of homogeneous halfspaces with maximal margin. These arrangements have been
well studied in computational learning theory, and we use some strong results
obtained in this area to exhibit weaknesses of quantum fingerprinting. In
particular, this implies that for almost all functions, quantum fingerprinting
protocols are exponentially worse than classical deterministic SMP protocols.Comment: 13 pages, no figures, to appear in CCC'0
Sign rank versus VC dimension
This work studies the maximum possible sign rank of sign
matrices with a given VC dimension . For , this maximum is {three}. For
, this maximum is . For , similar but
slightly less accurate statements hold. {The lower bounds improve over previous
ones by Ben-David et al., and the upper bounds are novel.}
The lower bounds are obtained by probabilistic constructions, using a theorem
of Warren in real algebraic topology. The upper bounds are obtained using a
result of Welzl about spanning trees with low stabbing number, and using the
moment curve.
The upper bound technique is also used to: (i) provide estimates on the
number of classes of a given VC dimension, and the number of maximum classes of
a given VC dimension -- answering a question of Frankl from '89, and (ii)
design an efficient algorithm that provides an multiplicative
approximation for the sign rank.
We also observe a general connection between sign rank and spectral gaps
which is based on Forster's argument. Consider the adjacency
matrix of a regular graph with a second eigenvalue of absolute value
and . We show that the sign rank of the signed
version of this matrix is at least . We use this connection to
prove the existence of a maximum class with VC
dimension and sign rank . This answers a question
of Ben-David et al.~regarding the sign rank of large VC classes. We also
describe limitations of this approach, in the spirit of the Alon-Boppana
theorem.
We further describe connections to communication complexity, geometry,
learning theory, and combinatorics.Comment: 33 pages. This is a revised version of the paper "Sign rank versus VC
dimension". Additional results in this version: (i) Estimates on the number
of maximum VC classes (answering a question of Frankl from '89). (ii)
Estimates on the sign rank of large VC classes (answering a question of
Ben-David et al. from '03). (iii) A discussion on the computational
complexity of computing the sign-ran
Unbounded-error One-way Classical and Quantum Communication Complexity
This paper studies the gap between quantum one-way communication complexity
and its classical counterpart , under the {\em unbounded-error}
setting, i.e., it is enough that the success probability is strictly greater
than 1/2. It is proved that for {\em any} (total or partial) Boolean function
, , i.e., the former is always exactly one half
as large as the latter. The result has an application to obtaining (again an
exact) bound for the existence of -QRAC which is the -qubit random
access coding that can recover any one of original bits with success
probability . We can prove that -QRAC exists if and only if
. Previously, only the construction of QRAC using one qubit,
the existence of -RAC, and the non-existence of
-QRAC were known.Comment: 9 pages. To appear in Proc. ICALP 200
A universal space-time architecture for multiple-antenna aided systems
In this tutorial, we first review the family of conventional multiple-antenna techniques, and then we provide a general overview of the recent concept of the powerful Multiple-Input Multiple-Output (MIMO) family based on a universal Space-Time Shift Keying (STSK) philosophy. When appropriately configured, the proposed STSK scheme has the potential of outperforming conventional MIMO arrangements
Endogenous space in the Net era
Libre Software communities are among the most interesting and advanced socio-economic laboratories on the Net. In terms of directions of Regional Science research, this paper addresses a simple question: “Is the socio-economics of digital nets out of scope for Regional Science, or might the latter expand to a cybergeography of digitally enhanced territories ?” As for most simple questions, answers are neither so obvious nor easy. The authors start drafting one in a positive sense, focussing upon a file rouge running across the paper: endogenous spaces woven by socio-economic processes. The drafted answer declines on an Evolutionary Location Theory formulation, together with two computational modelling views. Keywords: Complex networks, Computational modelling, Economics of Internet, Endogenous spaces, Evolutionary location theory, Free or Libre Software, Path dependence, Positionality.
A commentary on "The now-or-never bottleneck: a fundamental constraint on language", by Christiansen and Chater (2016)
In a recent article, Christiansen and Chater (2016) present a fundamental
constraint on language, i.e. a now-or-never bottleneck that arises from our
fleeting memory, and explore its implications, e.g., chunk-and-pass processing,
outlining a framework that promises to unify different areas of research. Here
we explore additional support for this constraint and suggest further
connections from quantitative linguistics and information theory
Probabilistic communication complexity over the reals
Deterministic and probabilistic communication protocols are introduced in
which parties can exchange the values of polynomials (rather than bits in the
usual setting). It is established a sharp lower bound on the communication
complexity of recognizing the -dimensional orthant, on the other hand the
probabilistic communication complexity of its recognizing does not exceed 4. A
polyhedron and a union of hyperplanes are constructed in \RR^{2n} for which a
lower bound on the probabilistic communication complexity of recognizing
each is proved. As a consequence this bound holds also for the EMPTINESS and
the KNAPSACK problems
- …