50 research outputs found

    (The) political career of Elisha Cooke, Jr., 1715-1737.

    Full text link
    Typewritten sheets in cover. Thesis (M.A.)--Boston University This item was digitized by the Internet Archive

    Pseudodistributions That Beat All Pseudorandom Generators (Extended Abstract)

    Get PDF

    Pseudorandom Linear Codes are List Decodable to Capacity

    Full text link
    We introduce a novel family of expander-based error correcting codes. These codes can be sampled with randomness linear in the block-length, and achieve list-decoding capacity (among other local properties). Our expander-based codes can be made starting from any family of sufficiently low-bias codes, and as a consequence, we give the first construction of a family of algebraic codes that can be sampled with linear randomness and achieve list-decoding capacity. We achieve this by introducing the notion of a pseudorandom puncturing of a code, where we select nn indices of a base code CFqmC\subset \mathbb{F}_q^m via an expander random walk on a graph on [m][m]. Concretely, whereas a random linear code (i.e. a truly random puncturing of the Hadamard code) requires O(n2)O(n^2) random bits to sample, we sample a pseudorandom linear code with O(n)O(n) random bits. We show that pseudorandom puncturings satisfy several desirable properties exhibited by truly random puncturings. In particular, we extend a result of (Guruswami Mosheiff FOCS 2022) and show that a pseudorandom puncturing of a small-bias code satisfies the same local properties as a random linear code with high probability. As a further application of our techniques, we also show that pseudorandom puncturings of Reed Solomon codes are list-recoverable beyond the Johnson bound, extending a result of (Lund Potukuchi RANDOM 2020). We do this by instead analyzing properties of codes with large distance, and show that pseudorandom puncturings still work well in this regime.Comment: Fixed author nam

    Certified Hardness vs. Randomness for Log-Space

    Full text link
    Let L\mathcal{L} be a language that can be decided in linear space and let ϵ>0\epsilon >0 be any constant. Let A\mathcal{A} be the exponential hardness assumption that for every nn, membership in L\mathcal{L} for inputs of length~nn cannot be decided by circuits of size smaller than 2ϵn2^{\epsilon n}. We prove that for every function f:{0,1}{0,1}f :\{0,1\}^* \rightarrow \{0,1\}, computable by a randomized logspace algorithm RR, there exists a deterministic logspace algorithm DD (attempting to compute ff), such that on every input xx of length nn, the algorithm DD outputs one of the following: 1: The correct value f(x)f(x). 2: The string: ``I am unable to compute f(x)f(x) because the hardness assumption A\mathcal{A} is false'', followed by a (provenly correct) circuit of size smaller than 2ϵn2^{\epsilon n'} for membership in L\mathcal{L} for inputs of length~nn', for some n=Θ(logn)n' = \Theta (\log n); that is, a circuit that refutes A\mathcal{A}. Our next result is a universal derandomizer for BPLBPL: We give a deterministic algorithm UU that takes as an input a randomized logspace algorithm RR and an input xx and simulates the computation of RR on xx, deteriministically. Under the widely believed assumption BPL=LBPL=L, the space used by UU is at most CRlognC_R \cdot \log n (where CRC_R is a constant depending on~RR). Moreover, for every constant c1c \geq 1, if BPLSPACE[(log(n))c]BPL\subseteq SPACE[(\log(n))^{c}] then the space used by UU is at most CR(log(n))cC_R \cdot (\log(n))^{c}. Finally, we prove that if optimal hitting sets for ordered branching programs exist then there is a deterministic logspace algorithm that, given a black-box access to an ordered branching program BB of size nn, estimates the probability that BB accepts on a uniformly random input. This extends the result of (Cheng and Hoza CCC 2020), who proved that an optimal hitting set implies a white-box two-sided derandomization.Comment: Abstract shortened to fit arXiv requirement

    Local Access to Random Walks

    Get PDF
    For a graph G on n vertices, naively sampling the position of a random walk of at time t requires work ?(t). We desire local access algorithms supporting position_G(t) queries, which return the position of a random walk from some fixed start vertex s at time t, where the joint distribution of returned positions is 1/poly(n) close to those of a uniformly random walk in ?? distance. We first give an algorithm for local access to random walks on a given undirected d-regular graph with O?(1/(1-?)?n) runtime per query, where ? is the second-largest eigenvalue of the random walk matrix of the graph in absolute value. Since random d-regular graphs G(n,d) are expanders with high probability, this gives an O?(?n) algorithm for a graph drawn from G(n,d) whp, which improves on the naive method for small numbers of queries. We then prove that no algorithm with subconstant error given probe access to an input d-regular graph can have runtime better than ?(?n/log(n)) per query in expectation when the input graph is drawn from G(n,d), obtaining a nearly matching lower bound. We further show an ?(n^{1/4}) runtime per query lower bound even with an oblivious adversary (i.e. when the query sequence is fixed in advance). We then show that for families of graphs with additional group theoretic structure, dramatically better results can be achieved. We give local access to walks on small-degree abelian Cayley graphs, including cycles and hypercubes, with runtime polylog(n) per query. This also allows for efficient local access to walks on polylog degree expanders. We show that our techniques apply to graphs with high degree by extending or results to graphs constructed using the tensor product (giving fast local access to walks on degree n^? graphs for any ? ? (0,1]) and Cartesian product

    Fourier Growth of Regular Branching Programs

    Get PDF
    We analyze the Fourier growth, i.e. the L? Fourier weight at level k (denoted L_{1,k}), of read-once regular branching programs. We prove that every read-once regular branching program B of width w ? [1,?] with s accepting states on n-bit inputs must have its L_{1,k} bounded by min{Pr[B(U_n) = 1](w-1)^k, s ? O((n log n)/k)^{(k-1)/2}}. For any constant k, our result is tight up to constant factors for the AND function on w-1 bits, and is tight up to polylogarithmic factors for unbounded width programs. In particular, for k = 1 we have L_{1,1}(B) ? s, with no dependence on the width w of the program. Our result gives new bounds on the coin problem and new pseudorandom generators (PRGs). Furthermore, we obtain an explicit generator for unordered permutation branching programs of unbounded width with a constant factor stretch, where no PRG was previously known. Applying a composition theorem of B?asiok, Ivanov, Jin, Lee, Servedio and Viola (RANDOM 2021), we extend our results to "generalized group products," a generalization of modular sums and product tests

    Pseudorandom Generators for Unbounded-Width Permutation Branching Programs

    Get PDF

    On the Power of Regular and Permutation Branching Programs

    Get PDF
    We give new upper and lower bounds on the power of several restricted classes of arbitrary-order read-once branching programs (ROBPs) and standard-order ROBPs (SOBPs) that have received significant attention in the literature on pseudorandomness for space-bounded computation. - Regular SOBPs of length n and width ?w(n+1)/2? can exactly simulate general SOBPs of length n and width w, and moreover an n/2-o(n) blow-up in width is necessary for such a simulation. Our result extends and simplifies prior average-case simulations (Reingold, Trevisan, and Vadhan (STOC 2006), Bogdanov, Hoza, Prakriya, and Pyne (CCC 2022)), in particular implying that weighted pseudorandom generators (Braverman, Cohen, and Garg (SICOMP 2020)) for regular SOBPs of width poly(n) or larger automatically extend to general SOBPs. Furthermore, our simulation also extends to general (even read-many) oblivious branching programs. - There exist natural functions computable by regular SOBPs of constant width that are average-case hard for permutation SOBPs of exponential width. Indeed, we show that Inner-Product mod 2 is average-case hard for arbitrary-order permutation ROBPs of exponential width. - There exist functions computable by constant-width arbitrary-order permutation ROBPs that are worst-case hard for exponential-width SOBPs. - Read-twice permutation branching programs of subexponential width can simulate polynomial-width arbitrary-order ROBPs

    Improved Local Computation Algorithms for Constructing Spanners

    Full text link
    A spanner of a graph is a subgraph that preserves lengths of shortest paths up to a multiplicative distortion. For every kk, a spanner with size O(n1+1/k)O(n^{1+1/k}) and stretch (2k+1)(2k+1) can be constructed by a simple centralized greedy algorithm, and this is tight assuming Erd\H{o}s girth conjecture. In this paper we study the problem of constructing spanners in a local manner, specifically in the Local Computation Model proposed by Rubinfeld et al. (ICS 2011). We provide a randomized Local Computation Agorithm (LCA) for constructing (2r1)(2r-1)-spanners with O~(n1+1/r)\tilde{O}(n^{1+1/r}) edges and probe complexity of O~(n11/r)\tilde{O}(n^{1-1/r}) for r{2,3}r \in \{2,3\}, where nn denotes the number of vertices in the input graph. Up to polylogarithmic factors, in both cases, the stretch factor is optimal (for the respective number of edges). In addition, our probe complexity for r=2r=2, i.e., for constructing a 33-spanner, is optimal up to polylogarithmic factors. Our result improves over the probe complexity of Parter et al. (ITCS 2019) that is O~(n11/2r)\tilde{O}(n^{1-1/2r}) for r{2,3}r \in \{2,3\}. Both our algorithms and the algorithms of Parter et al. use a combination of neighbor-probes and pair-probes in the above-mentioned LCAs. For general k1k\geq 1, we provide an LCA for constructing O(k2)O(k^2)-spanners with O~(n1+1/k)\tilde{O}(n^{1+1/k}) edges using O(n2/3Δ2)O(n^{2/3}\Delta^2) neighbor-probes, improving over the O~(n2/3Δ4)\tilde{O}(n^{2/3}\Delta^4) algorithm of Parter et al. By developing a new randomized LCA for graph decomposition, we further improve the probe complexity of the latter task to be O(n2/3(1.5α)/kΔ2)O(n^{2/3-(1.5-\alpha)/k}\Delta^2), for any constant α>0\alpha>0. This latter LCA may be of independent interest.Comment: RANDOM 202

    Improved Local Computation Algorithms for Constructing Spanners

    Get PDF
    corecore