109 research outputs found

    Arithmetic Circuit Lower Bounds via MaxRank

    Full text link
    We introduce the polynomial coefficient matrix and identify maximum rank of this matrix under variable substitution as a complexity measure for multivariate polynomials. We use our techniques to prove super-polynomial lower bounds against several classes of non-multilinear arithmetic circuits. In particular, we obtain the following results : As our main result, we prove that any homogeneous depth-3 circuit for computing the product of dd matrices of dimension nΓ—nn \times n requires Ξ©(ndβˆ’1/2d)\Omega(n^{d-1}/2^d) size. This improves the lower bounds by Nisan and Wigderson(1995) when d=Ο‰(1)d=\omega(1). There is an explicit polynomial on nn variables and degree at most n2\frac{n}{2} for which any depth-3 circuit CC of product dimension at most n10\frac{n}{10} (dimension of the space of affine forms feeding into each product gate) requires size 2Ξ©(n)2^{\Omega(n)}. This generalizes the lower bounds against diagonal circuits proved by Saxena(2007). Diagonal circuits are of product dimension 1. We prove a nΞ©(log⁑n)n^{\Omega(\log n)} lower bound on the size of product-sparse formulas. By definition, any multilinear formula is a product-sparse formula. Thus, our result extends the known super-polynomial lower bounds on the size of multilinear formulas by Raz(2006). We prove a 2Ξ©(n)2^{\Omega(n)} lower bound on the size of partitioned arithmetic branching programs. This result extends the known exponential lower bound on the size of ordered arithmetic branching programs given by Jansen(2008).Comment: 22 page

    On Identity Testing of Tensors, Low-rank Recovery and Compressed Sensing

    Full text link
    We study the problem of obtaining efficient, deterministic, black-box polynomial identity testing algorithms for depth-3 set-multilinear circuits (over arbitrary fields). This class of circuits has an efficient, deterministic, white-box polynomial identity testing algorithm (due to Raz and Shpilka), but has no known such black-box algorithm. We recast this problem as a question of finding a low-dimensional subspace H, spanned by rank 1 tensors, such that any non-zero tensor in the dual space ker(H) has high rank. We obtain explicit constructions of essentially optimal-size hitting sets for tensors of degree 2 (matrices), and obtain quasi-polynomial sized hitting sets for arbitrary tensors (but this second hitting set is less explicit). We also show connections to the task of performing low-rank recovery of matrices, which is studied in the field of compressed sensing. Low-rank recovery asks (say, over the reals) to recover a matrix M from few measurements, under the promise that M is rank <=r. We also give a formal connection between low-rank recovery and the task of sparse (vector) recovery: any sparse-recovery algorithm that exactly recovers vectors of length n and sparsity 2r, using m non-adaptive measurements, yields a low-rank recovery scheme for exactly recovering nxn matrices of rank <=r, making 2nm non-adaptive measurements. Furthermore, if the sparse-recovery algorithm runs in time \tau, then the low-rank recovery algorithm runs in time O(rn^2+n\tau). We obtain this reduction using linear-algebraic techniques, and not using convex optimization, which is more commonly seen in compressed sensing algorithms. By using a dual Reed-Solomon code, we are able to (deterministically) construct low-rank recovery schemes taking 4nr measurements over the reals, such that the measurements can be all rank-1 matrices, or all sparse matrices.Comment: 55 page

    Succinct Hitting Sets and Barriers to Proving Lower Bounds for Algebraic Circuits

    Get PDF
    We formalize a framework of algebraically natural lower bounds for algebraic circuits. Just as with the natural proofs notion of Razborov and Rudich (1997) for Boolean circuit lower bounds, our notion of algebraically natural lower bounds captures nearly all lower bound techniques known. However, unlike in the Boolean setting, there has been no concrete evidence demonstrating that this is a barrier to obtaining super-polynomial lower bounds for general algebraic circuits, as there is little understanding whether algebraic circuits are expressive enough to support β€œcryptography” secure against algebraic circuits. Following a similar result of Williams (2016) in the Boolean setting, we show that the existence of an algebraic natural proofs barrier is equivalent to the existence of succinct derandomization of the polynomial identity testing problem, that is, to the existence of a hitting set for the class of poly(N)-degree poly(N)-size circuits which consists of coefficient vectors of polynomials of polylog(N) degree with polylog(N)-size circuits. Further, we give an explicit universal construction showing that if such a succinct hitting set exists, then our universal construction suffices. Further, we assess the existing literature constructing hitting sets for restricted classes of algebraic circuits and observe that none of them are succinct as given. Yet, we show how to modify some of these constructions to obtain succinct hitting sets. This constitutes the first evidence supporting the existence of an algebraic natural proofs barrier. Our framework is similar to the Geometric Complexity Theory (GCT) program of Mulmuley and Sohoni (2001), except that here we emphasize constructiveness of the proofs while the GCT program emphasizes symmetry. Nevertheless, our succinct hitting sets have relevance to the GCT program as they imply lower bounds for the complexity of the defining equations of polynomials computed by small circuits. A conference version of this paper appeared in the Proceedings of the 49th Annual ACM Symposium on Theory of Computing (STOC 2017)

    On the expressive power of read-once determinants

    Full text link
    We introduce and study the notion of read-kk projections of the determinant: a polynomial f∈F[x1,…,xn]f \in \mathbb{F}[x_1, \ldots, x_n] is called a {\it read-kk projection of determinant} if f=det(M)f=det(M), where entries of matrix MM are either field elements or variables such that each variable appears at most kk times in MM. A monomial set SS is said to be expressible as read-kk projection of determinant if there is a read-kk projection of determinant ff such that the monomial set of ff is equal to SS. We obtain basic results relating read-kk determinantal projections to the well-studied notion of determinantal complexity. We show that for sufficiently large nn, the nΓ—nn \times n permanent polynomial PermnPerm_n and the elementary symmetric polynomials of degree dd on nn variables SndS_n^d for 2≀d≀nβˆ’22 \leq d \leq n-2 are not expressible as read-once projection of determinant, whereas mon(Permn)mon(Perm_n) and mon(Snd)mon(S_n^d) are expressible as read-once projections of determinant. We also give examples of monomial sets which are not expressible as read-once projections of determinant

    Morphological analysis of triangulated models of grinding wheels working surfaces

    Get PDF
    Methods of obtaining and morphological analysis of a triangulated model of grinding wheels are described. The model is made from a set of photos of the investigated working surface of the wheels, which have a different spatial orientation of the depth field of image space while shooting

    Identity Testing and Lower Bounds for Read-k Oblivious Algebraic Branching Programs

    Get PDF
    Read-k oblivious algebraic branching programs are a natural generalization of the well-studied model of read-once oblivious algebraic branching program (ROABPs). In this work, we give an exponential lower bound of exp(n/k^{O(k)}) on the width of any read-k oblivious ABP computing some explicit multilinear polynomial f that is computed by a polynomial size depth-3 circuit. We also study the polynomial identity testing (PIT) problem for this model and obtain a white-box subexponential-time PIT algorithm. The algorithm runs in time 2^{~O(n^{1-1/2^{k-1}})} and needs white box access only to know the order in which the variables appear in the ABP

    On the Limits of Depth Reduction at Depth 3 Over Small Finite Fields

    Full text link
    Recently, Gupta et.al. [GKKS2013] proved that over Q any nO(1)n^{O(1)}-variate and nn-degree polynomial in VP can also be computed by a depth three ΣΠΣ\Sigma\Pi\Sigma circuit of size 2O(nlog⁑3/2n)2^{O(\sqrt{n}\log^{3/2}n)}. Over fixed-size finite fields, Grigoriev and Karpinski proved that any ΣΠΣ\Sigma\Pi\Sigma circuit that computes DetnDet_n (or PermnPerm_n) must be of size 2Ξ©(n)2^{\Omega(n)} [GK1998]. In this paper, we prove that over fixed-size finite fields, any ΣΠΣ\Sigma\Pi\Sigma circuit for computing the iterated matrix multiplication polynomial of nn generic matrices of size nΓ—nn\times n, must be of size 2Ξ©(nlog⁑n)2^{\Omega(n\log n)}. The importance of this result is that over fixed-size fields there is no depth reduction technique that can be used to compute all the nO(1)n^{O(1)}-variate and nn-degree polynomials in VP by depth 3 circuits of size 2o(nlog⁑n)2^{o(n\log n)}. The result [GK1998] can only rule out such a possibility for depth 3 circuits of size 2o(n)2^{o(n)}. We also give an example of an explicit polynomial (NWn,Ο΅(X)NW_{n,\epsilon}(X)) in VNP (not known to be in VP), for which any ΣΠΣ\Sigma\Pi\Sigma circuit computing it (over fixed-size fields) must be of size 2Ξ©(nlog⁑n)2^{\Omega(n\log n)}. The polynomial we consider is constructed from the combinatorial design. An interesting feature of this result is that we get the first examples of two polynomials (one in VP and one in VNP) such that they have provably stronger circuit size lower bounds than Permanent in a reasonably strong model of computation. Next, we prove that any depth 4 ΣΠ[O(n)]ΣΠ[n]\Sigma\Pi^{[O(\sqrt{n})]}\Sigma\Pi^{[\sqrt{n}]} circuit computing NWn,Ο΅(X)NW_{n,\epsilon}(X) (over any field) must be of size 2Ξ©(nlog⁑n)2^{\Omega(\sqrt{n}\log n)}. To the best of our knowledge, the polynomial NWn,Ο΅(X)NW_{n,\epsilon}(X) is the first example of an explicit polynomial in VNP such that it requires 2Ξ©(nlog⁑n)2^{\Omega(\sqrt{n}\log n)} size depth four circuits, but no known matching upper bound

    Π‘Ρ€Π°Π²Π½ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹ΠΉ Π°Π½Π°Π»ΠΈΠ· Π°Π»Π³ΠΎΡ€ΠΈΡ‚ΠΌΠΎΠ² Π°Π΄Π°ΠΏΡ‚ΠΈΠ²Π½ΠΎΠΉ ΠΎΡ†Π΅Π½ΠΊΠΈ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€ΠΎΠ² Ρ€Π°Π΄ΠΈΠΎΠΊΠ°Π½Π°Π»ΠΎΠ² связи

    Get PDF
    ΠŸΡ€ΠΎΠ²Π΅Π΄Π΅Π½ΠΎ ΠΏΠΎΡ€Ρ–Π²Π½ΡΠ»ΡŒΠ½ΠΈΠΉ Π°Π½Π°Π»Ρ–Π· пристроїв ΠΎΡ†Ρ–Π½ΡŽΠ²Π°Π½Π½Ρ ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€Ρ–Π² Ρ€Π°Π΄Ρ–ΠΎΠΊΠ°Π½Π°Π»Ρ–Π² зв’язку Π½Π° Π±Π°Π·Ρ– Π³Ρ€Π°Π΄Ρ–Ρ”Π½Ρ‚Π½ΠΎΠ³ΠΎ ΠΌΠ΅Ρ‚ΠΎΠ΄Ρƒ Ρ‚Π° ΠΊΠ°ΠΏΠΌΠ°Π½ΠΎΠ²ΡΡŒΠΊΠΎΡ— Ρ„Ρ–Π»ΡŒΡ‚Ρ€Π°Ρ†Ρ–Ρ— Π·Π° точностти характСристиками Ρ‚Π° ΠΎΠ±Ρ‡ΠΈΡΠ»ΡŽΠ²Π°Π»ΡŒΠ½ΠΈΠΌΠΈ Π²ΠΈΡ‚Ρ€Π°Ρ‚Π°ΠΌΠΈ.The comparative analysis of the estimation devices for radio communications channels is conducted on the basis of the gradient method and Caiman filtration using the precision and calculate characteristicsΠŸΡ€ΠΎΠ²Π΅Π΄Π΅Π½ ΡΡ€Π°Π²Π½ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹ΠΉ Π°Π½Π°Π»ΠΈΠ· устройств оцСнивания ΠΏΠ°Ρ€Π°ΠΌΠ΅Ρ‚Ρ€ΠΎΠ² Ρ€Π°Π΄ΠΈΠΎΠΊΠ°Π½Π°Π»ΠΎΠ² связи Π½Π° Π±Π°Π·Π΅ Π³Ρ€Π°Π΄ΠΈΠ΅Π½Ρ‚Π½ΠΎΠ³ΠΎ ΠΌΠ΅Ρ‚ΠΎΠ΄Π° ΠΈ калмановской Ρ„ΠΈΠ»ΡŒΡ‚Ρ€Π°Ρ†ΠΈΠΈ ΠΏΠΎ точности ΠΈ ΠΏΠΎ Π²Ρ‹Ρ‡ΠΈΡΠ»ΠΈΡ‚Π΅Π»ΡŒΠ½Ρ‹ΠΌ Π·Π°Ρ‚Ρ€Π°Ρ‚Π°
    • …
    corecore