2,918 research outputs found
Superpolynomial lower bounds for general homogeneous depth 4 arithmetic circuits
In this paper, we prove superpolynomial lower bounds for the class of
homogeneous depth 4 arithmetic circuits. We give an explicit polynomial in VNP
of degree in variables such that any homogeneous depth 4 arithmetic
circuit computing it must have size .
Our results extend the works of Nisan-Wigderson [NW95] (which showed
superpolynomial lower bounds for homogeneous depth 3 circuits),
Gupta-Kamath-Kayal-Saptharishi and Kayal-Saha-Saptharishi [GKKS13, KSS13]
(which showed superpolynomial lower bounds for homogeneous depth 4 circuits
with bounded bottom fan-in), Kumar-Saraf [KS13a] (which showed superpolynomial
lower bounds for homogeneous depth 4 circuits with bounded top fan-in) and
Raz-Yehudayoff and Fournier-Limaye-Malod-Srinivasan [RY08, FLMS13] (which
showed superpolynomial lower bounds for multilinear depth 4 circuits). Several
of these results in fact showed exponential lower bounds.
The main ingredient in our proof is a new complexity measure of {\it bounded
support} shifted partial derivatives. This measure allows us to prove
exponential lower bounds for homogeneous depth 4 circuits where all the
monomials computed at the bottom layer have {\it bounded support} (but possibly
unbounded degree/fan-in), strengthening the results of Gupta et al and Kayal et
al [GKKS13, KSS13]. This new lower bound combined with a careful "random
restriction" procedure (that transforms general depth 4 homogeneous circuits to
depth 4 circuits with bounded support) gives us our final result
Simple extractors via constructions of cryptographic pseudo-random generators
Trevisan has shown that constructions of pseudo-random generators from hard
functions (the Nisan-Wigderson approach) also produce extractors. We show that
constructions of pseudo-random generators from one-way permutations (the
Blum-Micali-Yao approach) can be used for building extractors as well. Using
this new technique we build extractors that do not use designs and
polynomial-based error-correcting codes and that are very simple and efficient.
For example, one extractor produces each output bit separately in
time. These extractors work for weak sources with min entropy , for
arbitrary constant , have seed length , and their
output length is .Comment: 21 pages, an extended abstract will appear in Proc. ICALP 2005; small
corrections, some comments and references adde
Implementation of higher-order absorbing boundary conditions for the Einstein equations
We present an implementation of absorbing boundary conditions for the
Einstein equations based on the recent work of Buchman and Sarbach. In this
paper, we assume that spacetime may be linearized about Minkowski space close
to the outer boundary, which is taken to be a coordinate sphere. We reformulate
the boundary conditions as conditions on the gauge-invariant
Regge-Wheeler-Zerilli scalars. Higher-order radial derivatives are eliminated
by rewriting the boundary conditions as a system of ODEs for a set of auxiliary
variables intrinsic to the boundary. From these we construct boundary data for
a set of well-posed constraint-preserving boundary conditions for the Einstein
equations in a first-order generalized harmonic formulation. This construction
has direct applications to outer boundary conditions in simulations of isolated
systems (e.g., binary black holes) as well as to the problem of
Cauchy-perturbative matching. As a test problem for our numerical
implementation, we consider linearized multipolar gravitational waves in TT
gauge, with angular momentum numbers l=2 (Teukolsky waves), 3 and 4. We
demonstrate that the perfectly absorbing boundary condition B_L of order L=l
yields no spurious reflections to linear order in perturbation theory. This is
in contrast to the lower-order absorbing boundary conditions B_L with L<l,
which include the widely used freezing-Psi_0 boundary condition that imposes
the vanishing of the Newman-Penrose scalar Psi_0.Comment: 25 pages, 9 figures. Minor clarifications. Final version to appear in
Class. Quantum Grav
Counting dependent and independent strings
The paper gives estimations for the sizes of the the following sets: (1) the
set of strings that have a given dependency with a fixed string, (2) the set of
strings that are pairwise \alpha independent, (3) the set of strings that are
mutually \alpha independent. The relevant definitions are as follows: C(x) is
the Kolmogorov complexity of the string x. A string y has \alpha -dependency
with a string x if C(y) - C(y|x) \geq \alpha. A set of strings {x_1, \ldots,
x_t} is pairwise \alpha-independent if for all i different from j, C(x_i) -
C(x_i | x_j) \leq \alpha. A tuple of strings (x_1, \ldots, x_t) is mutually
\alpha-independent if C(x_{\pi(1)} \ldots x_{\pi(t)}) \geq C(x_1) + \ldots +
C(x_t) - \alpha, for every permutation \pi of [t]
New Approximability Results for the Robust k-Median Problem
We consider a robust variant of the classical -median problem, introduced
by Anthony et al. \cite{AnthonyGGN10}. In the \emph{Robust -Median problem},
we are given an -vertex metric space and client sets . The objective is to open a set of
facilities such that the worst case connection cost over all client sets is
minimized; in other words, minimize . Anthony
et al.\ showed an approximation algorithm for any metric and
APX-hardness even in the case of uniform metric. In this paper, we show that
their algorithm is nearly tight by providing
approximation hardness, unless . This hardness result holds even for uniform and line
metrics. To our knowledge, this is one of the rare cases in which a problem on
a line metric is hard to approximate to within logarithmic factor. We
complement the hardness result by an experimental evaluation of different
heuristics that shows that very simple heuristics achieve good approximations
for realistic classes of instances.Comment: 19 page
OtherâSacrificing Options
I argue that you can be permitted to discount the interests of your adversaries even though doing so would be impartially suboptimal. This means that, in addition to the kinds of moral options that the literature traditionally recognises, there exist what I call other-sacrificing options. I explore the idea that you cannot discount the interests of your adversaries as much as you can favour the interests of your intimates; if this is correct, then there is an asymmetry between negative partiality toward your adversaries and positive partiality toward your intimates
Long-range entanglement generation via frequent measurements
A method is introduced whereby two non-interacting quantum subsystems, that
each interact with a third subsystem, are entangled via repeated projective
measurements of the state of the third subsystem. A variety of physical
examples are presented. The method can be used to establish long range
entanglement between distant parties in one parallel measurement step, thus
obviating the need for entanglement swapping.Comment: 7 pages, incl. 2 figures. v2: added a few small clarifications and a
referenc
On the NP-Hardness of Approximating Ordering Constraint Satisfaction Problems
We show improved NP-hardness of approximating Ordering Constraint
Satisfaction Problems (OCSPs). For the two most well-studied OCSPs, Maximum
Acyclic Subgraph and Maximum Betweenness, we prove inapproximability of
and .
An OCSP is said to be approximation resistant if it is hard to approximate
better than taking a uniformly random ordering. We prove that the Maximum
Non-Betweenness Problem is approximation resistant and that there are width-
approximation-resistant OCSPs accepting only a fraction of
assignments. These results provide the first examples of
approximation-resistant OCSPs subject only to P \NP
Non inverting and non filtered wavelength converter based on an InAs/InP (100) QD ring laser at 1.55 ÎŒm
A novel wavelength conversion concept based on InAs/InP(100) quantum-dot ring- laser structure is demonstrated requiring no external laser, optical inversion or optical filtering. Demonstration at 622 Mb/s for a 2 mm ring, suggests applicability for much higher speeds
- âŠ