10,900 research outputs found

    Three Puzzles on Mathematics, Computation, and Games

    Full text link
    In this lecture I will talk about three mathematical puzzles involving mathematics and computation that have preoccupied me over the years. The first puzzle is to understand the amazing success of the simplex algorithm for linear programming. The second puzzle is about errors made when votes are counted during elections. The third puzzle is: are quantum computers possible?Comment: ICM 2018 plenary lecture, Rio de Janeiro, 36 pages, 7 Figure

    Noise Sensitivity of Boolean Functions and Applications to Percolation

    Get PDF
    It is shown that a large class of events in a product probability space are highly sensitive to noise, in the sense that with high probability, the configuration with an arbitrary small percent of random errors gives almost no prediction whether the event occurs. On the other hand, weighted majority functions are shown to be noise-stable. Several necessary and sufficient conditions for noise sensitivity and stability are given. Consider, for example, bond percolation on an n+1n+1 by nn grid. A configuration is a function that assigns to every edge the value 0 or 1. Let ω\omega be a random configuration, selected according to the uniform measure. A crossing is a path that joins the left and right sides of the rectangle, and consists entirely of edges ee with ω(e)=1\omega(e)=1. By duality, the probability for having a crossing is 1/2. Fix an ϵ(0,1)\epsilon\in(0,1). For each edge ee, let ω(e)=ω(e)\omega'(e)=\omega(e) with probability 1ϵ1-\epsilon, and ω(e)=1ω(e)\omega'(e)=1-\omega(e) with probability ϵ\epsilon, independently of the other edges. Let p(τ)p(\tau) be the probability for having a crossing in ω\omega, conditioned on ω=τ\omega'=\tau. Then for all nn sufficiently large, P{τ:p(τ)1/2>ϵ}<ϵP\{\tau : |p(\tau)-1/2|>\epsilon\}<\epsilon.Comment: To appear in Inst. Hautes Etudes Sci. Publ. Mat

    On (not) computing the Mobius function using bounded depth circuits

    Full text link
    Any function F : {0,...,N-1} -> {-1,1} such that F(x) can be computed from the binary digits of x using a bounded depth circuit is orthogonal to the Mobius function mu in the sense that E_{0 <= x <= N-1} mu(x)F(x) = o(1). The proof combines a result of Linial, Mansour and Nisan with techniques of Katai and Harman-Katai, used in their work on finding primes with specified digits.Comment: 10 pages, to appear in Combinatorics, Probability and Computing. A few further small correction

    DNF Sparsification and a Faster Deterministic Counting Algorithm

    Full text link
    Given a DNF formula on n variables, the two natural size measures are the number of terms or size s(f), and the maximum width of a term w(f). It is folklore that short DNF formulas can be made narrow. We prove a converse, showing that narrow formulas can be sparsified. More precisely, any width w DNF irrespective of its size can be ϵ\epsilon-approximated by a width ww DNF with at most (wlog(1/ϵ))O(w)(w\log(1/\epsilon))^{O(w)} terms. We combine our sparsification result with the work of Luby and Velikovic to give a faster deterministic algorithm for approximately counting the number of satisfying solutions to a DNF. Given a formula on n variables with poly(n) terms, we give a deterministic nO~(loglog(n))n^{\tilde{O}(\log \log(n))} time algorithm that computes an additive ϵ\epsilon approximation to the fraction of satisfying assignments of f for \epsilon = 1/\poly(\log n). The previous best result due to Luby and Velickovic from nearly two decades ago had a run-time of nexp(O(loglogn))n^{\exp(O(\sqrt{\log \log n}))}.Comment: To appear in the IEEE Conference on Computational Complexity, 201
    corecore