52 research outputs found

    Catalytic space: Non-determinism and hierarchy

    Get PDF
    Catalytic computation, defined by Buhrman, Cleve, Koucký, Loff and Speelman (STOC 2014), is a space-bounded computation where in addition to our working memory we have an exponentially larger auxiliary memory which is full; the auxiliary memory may be used throughout the computation, but it must be restored to its initial content by the end of the computation. Motivated by the surprising power of this model, we set out to study the non-deterministic version of catalytic computation. We establish that non-deterministic catalytic log-space is contained in ZPP, which is the same bound known for its deterministic counterpart, and we prove that non-deterministic catalytic space is closed under complement (under a standard derandomization assumption). Furthermore, we establish hierarchy theorems for non-deterministic and deterministic catalytic computation

    Catalytic space: Non-determinism and hierarchy

    Get PDF

    {Improved Bounds on Fourier Entropy and Min-entropy}

    Get PDF
    Given a Boolean function f:{1,1}n{1,1}f:\{-1,1\}^n\to \{-1,1\}, the Fourier distribution assigns probability f^(S)2\widehat{f}(S)^2 to S[n]S\subseteq [n]. The Fourier Entropy-Influence (FEI) conjecture of Friedgut and Kalai asks if there exist a universal constant C>0 such that H(f^2)CInf(f)H(\hat{f}^2)\leq C Inf(f), where H(f^2)H(\hat{f}^2) is the Shannon entropy of the Fourier distribution of ff and Inf(f)Inf(f) is the total influence of ff. 1) We consider the weaker Fourier Min-entropy-Influence (FMEI) conjecture. This asks if H(f^2)CInf(f)H_{\infty}(\hat{f}^2)\leq C Inf(f), where H(f^2)H_{\infty}(\hat{f}^2) is the min-entropy of the Fourier distribution. We show H(f^2)2Cmin(f)H_{\infty}(\hat{f}^2)\leq 2C_{\min}^\oplus(f), where Cmin(f)C_{\min}^\oplus(f) is the minimum parity certificate complexity of ff. We also show that for every ϵ0\epsilon\geq 0, we have H(f^2)2log(f^1,ϵ/(1ϵ))H_{\infty}(\hat{f}^2)\leq 2\log (\|\hat{f}\|_{1,\epsilon}/(1-\epsilon)), where f^1,ϵ\|\hat{f}\|_{1,\epsilon} is the approximate spectral norm of ff. As a corollary, we verify the FMEI conjecture for the class of read-kk DNFDNFs (for constant kk). 2) We show that H(f^2)2aUC(f)H(\hat{f}^2)\leq 2 aUC^\oplus(f), where aUC(f)aUC^\oplus(f) is the average unambiguous parity certificate complexity of ff. This improves upon Chakraborty et al. An important consequence of the FEI conjecture is the long-standing Mansour's conjecture. We show that a weaker version of FEI already implies Mansour's conjecture: is H(f^2)Cmin{C0(f),C1(f)}H(\hat{f}^2)\leq C \min\{C^0(f),C^1(f)\}?, where C0(f),C1(f)C^0(f), C^1(f) are the 0- and 1-certificate complexities of ff, respectively. 3) We study what FEI implies about the structure of polynomials that 1/3-approximate a Boolean function. We pose a conjecture (which is implied by FEI): no "flat" degree-dd polynomial of sparsity 2ω(d)2^{\omega(d)} can 1/3-approximate a Boolean function. We prove this conjecture unconditionally for a particular class of polynomials

    A separator theorem for hypergraphs and a CSP-SAT algorithm

    Get PDF
    We show that for every r≥2 there exists ϵr>0 such that any r-uniform hypergraph with m edges and maximum vertex degree o(m−−√) contains a set of at most (12−ϵr)m edges the removal of which breaks the hypergraph into connected components with at most m/2 edges. We use this to give an algorithm running in time d(1−ϵr)m that decides satisfiability of m-variable (d,k)-CSPs in which every variable appears in at most r constraints, where ϵr depends only on r and k∈o(m−−√). Furthermore our algorithm solves the corresponding #CSP-SAT and Max-CSP-SAT of these CSPs. We also show that CNF representations of unsatisfiable (2,k)-CSPs with variable frequency r can be refuted in tree-like resolution in size 2(1−ϵr)m. Furthermore for Tseitin formulas on graphs with degree at most k (which are (2,k)-CSPs) we give a deterministic algorithm finding such a refutation

    High Entropy Random Selection Protocols

    Get PDF
    In this paper, we construct protocols for two parties that do not trust each other, to generate random variables with high Shannon entropy. We improve known bounds for the trade off between the number of rounds, length of communication and the entropy of the outcome

    Inverting Onto Functions and Polynomial Hierarchy

    Get PDF
    In this paper we construct an oracle under which the polynomial hierarchy is infinite but there are non-invertible polynomial time computable multivalued onto functions

    Catalytic space: non-determinism and hierarchy

    Get PDF
    Catalytic computation, defined by Buhrman, Cleve, Koucký, Loff and Speelman (STOC 2014), is a space-bounded computation where in addition to our working memory we have an exponentially larger auxiliary memory which is full; the auxiliary memory may be used throughout the computation, but it must be restored to its initial content by the end of the computation. Motivated by the surprising power of this model, we set out to study the non-deterministic version of catalytic computation. We establish that non-deterministic catalytic log-space is contained in ZPP, which is the same bound known for its deterministic counterpart, and we prove that non-deterministic catalytic space is closed under complement (under a standard derandomization assumption). Furthermore, we establish hierarchy theorems for non-deterministic and deterministic catalytic computation

    Lower bounds for elimination via weak regularity

    Get PDF
    We consider the problem of elimination in communication complexity, that was first raised by Ambainis et al. [1] and later studied by Beimel et al. [4] for its connection to the famous direct sum question. In this problem, let f: {0, 1}2n → {0,1} be any boolean function. Alice and Bob get k inputs x1,⋯, xk and y1,⋯, yk respectively, with xi, yi ∈ {0, 1}n. They want to output a k-bit vector v, such that there exists one index i for which vi = f(xi,yi). We prove a general result lower bounding the randomized communication complexity of the elimination problem for f using its discrepancy. Consequently, we obtain strong lower bounds for the functions Inner-Product and Greater-Than, that work for exponentially larger values of k than the best previous bounds. To prove our result, we use a pseudo-random notion called regularity that was first used by Raz and Wigderson [19]. We show that functions with small discrepancy are regular. We also observe that a weaker notion, that we call weak-regularity, already implies hardness of elimination. Finally, we give a different proof, borrowing ideas from Viola [23], to show that Greater-Than is weakly regular
    corecore