3,715 research outputs found

    Separating the communication complexities of MOD m and MOD p circuits

    No full text
    We prove in this paper that it is much harder to evaluate depth--2, size--NN circuits with MOD mm gates than with MOD pp gates by kk--party communication protocols: we show a kk--party protocol which communicates O(1)O(1) bits to evaluate circuits with MOD pp gates, while evaluating circuits with MOD mm gates needs Ω(N)\Omega(N) bits, where pp denotes a prime, and mm a composite, non-prime power number. Let us note that using kk--party protocols with kpk\geq p is crucial here, since there are depth--2, size--NN circuits with MOD pp gates with p>kp>k, whose kk--party evaluation needs Ω(N)\Omega(N) bits. As a corollary, for all mm, we show a function, computable with a depth--2 circuit with MOD mm gates, but not with any depth--2 circuit with MOD pp gates. It is easy to see that the kk--party protocols are not weaker than the kk'--party protocols, for k>kk'>k. Our results imply that if there is a prime pp between kk and kk': k<pkk<p\leq k', then there exists a function which can be computed by a kk'--party protocol with a constant number of communicated bits, while any kk--party protocol needs linearly many bits of communication. This result gives a hierarchy theorem for multi--party protocols

    Robustly Separating the Arithmetic Monotone Hierarchy via Graph Inner-Product

    Get PDF

    Quantum Branching Programs and Space-Bounded Nonuniform Quantum Complexity

    Get PDF
    In this paper, the space complexity of nonuniform quantum computations is investigated. The model chosen for this are quantum branching programs, which provide a graphic description of sequential quantum algorithms. In the first part of the paper, simulations between quantum branching programs and nonuniform quantum Turing machines are presented which allow to transfer lower and upper bound results between the two models. In the second part of the paper, different variants of quantum OBDDs are compared with their deterministic and randomized counterparts. In the third part, quantum branching programs are considered where the performed unitary operation may depend on the result of a previous measurement. For this model a simulation of randomized OBDDs and exponential lower bounds are presented.Comment: 45 pages, 3 Postscript figures. Proofs rearranged, typos correcte

    Constant-Depth Circuits vs. Monotone Circuits

    Get PDF

    Communication Memento: Memoryless Communication Complexity

    Get PDF
    We study the communication complexity of computing functions F:{0,1}n×{0,1}n{0,1}F:\{0,1\}^n\times \{0,1\}^n \rightarrow \{0,1\} in the memoryless communication model. Here, Alice is given x{0,1}nx\in \{0,1\}^n, Bob is given y{0,1}ny\in \{0,1\}^n and their goal is to compute F(x,y) subject to the following constraint: at every round, Alice receives a message from Bob and her reply to Bob solely depends on the message received and her input x; the same applies to Bob. The cost of computing F in this model is the maximum number of bits exchanged in any round between Alice and Bob (on the worst case input x,y). In this paper, we also consider variants of our memoryless model wherein one party is allowed to have memory, the parties are allowed to communicate quantum bits, only one player is allowed to send messages. We show that our memoryless communication model capture the garden-hose model of computation by Buhrman et al. (ITCS'13), space bounded communication complexity by Brody et al. (ITCS'13) and the overlay communication complexity by Papakonstantinou et al. (CCC'14). Thus the memoryless communication complexity model provides a unified framework to study space-bounded communication models. We establish the following: (1) We show that the memoryless communication complexity of F equals the logarithm of the size of the smallest bipartite branching program computing F (up to a factor 2); (2) We show that memoryless communication complexity equals garden-hose complexity; (3) We exhibit various exponential separations between these memoryless communication models. We end with an intriguing open question: can we find an explicit function F and universal constant c>1 for which the memoryless communication complexity is at least clognc \log n? Note that c2+εc\geq 2+\varepsilon would imply a Ω(n2+ε)\Omega(n^{2+\varepsilon}) lower bound for general formula size, improving upon the best lower bound by Ne\v{c}iporuk in 1966.Comment: 30 Pages; several improvements to the presentation
    corecore