Electron. Colloquium Comput. Complex.最新文献

筛选
英文 中文
Black-box Identity Testing of Noncommutative Rational Formulas of Inversion Height Two in Deterministic Quasipolynomial-time 确定性拟多项式时间反演高度2的非交换有理公式的黑盒恒等式检验
Electron. Colloquium Comput. Complex. Pub Date : 2022-02-11 DOI: 10.4230/LIPIcs.APPROX/RANDOM.2022.23
V. Arvind, Abhranil Chatterjee, P. Mukhopadhyay
{"title":"Black-box Identity Testing of Noncommutative Rational Formulas of Inversion Height Two in Deterministic Quasipolynomial-time","authors":"V. Arvind, Abhranil Chatterjee, P. Mukhopadhyay","doi":"10.4230/LIPIcs.APPROX/RANDOM.2022.23","DOIUrl":"https://doi.org/10.4230/LIPIcs.APPROX/RANDOM.2022.23","url":null,"abstract":"Hrubev{s} and Wigderson (2015) initiated the complexity-theoretic study of noncommutative formulas with inverse gates. They introduced the Rational Identity Testing (RIT) problem which is to decide whether a noncommutative rational formula computes zero in the free skew field. In the white-box setting, deterministic polynomial-time algorithms are known for this problem following the works of Garg, Gurvits, Oliveira, and Wigderson (2016) and Ivanyos, Qiao, and Subrahmanyam (2018). A central open problem in this area is to design efficient deterministic black-box identity testing algorithm for rational formulas. In this paper, we solve this problem for the first nested inverse case. More precisely, we obtain a deterministic quasipolynomial-time black-box RIT algorithm for noncommutative rational formulas of inversion height two via a hitting set construction. Several new technical ideas are involved in the hitting set construction, including key concepts from matrix coefficient realization theory (Volv{c}iv{c}, 2018) and properties of cyclic division algebra (Lam, 2001). En route to the proof, an important step is to embed the hitting set of Forbes and Shpilka for noncommutative formulas (2013) inside a cyclic division algebra of small index.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"57 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76623603","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Towards Multi-Pass Streaming Lower Bounds for Optimal Approximation of Max-Cut 基于多通道流下限的最优逼近Max-Cut
Electron. Colloquium Comput. Complex. Pub Date : 2022-01-01 DOI: 10.1137/1.9781611977554.ch35
Lijie Chen, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena, Zhao Song, Huacheng Yu
{"title":"Towards Multi-Pass Streaming Lower Bounds for Optimal Approximation of Max-Cut","authors":"Lijie Chen, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena, Zhao Song, Huacheng Yu","doi":"10.1137/1.9781611977554.ch35","DOIUrl":"https://doi.org/10.1137/1.9781611977554.ch35","url":null,"abstract":"We consider the Max-Cut problem, asking how much space is needed by a streaming algorithm in order to estimate the value of the maximum cut in a graph. This problem has been extensively studied over the last decade, and we now have a near-optimal lower bound for one-pass streaming algorithms, showing that they require linear space to guarantee a better-than-2 approximation [KKS15, KK19]. This result relies on a lower bound for the cycle-finding problem, showing that it is hard for a one-pass streaming algorithm to find a cycle in a union of matchings. The end-goal of our research is to prove a similar lower bound for multi-pass streaming algorithms that guarantee a better-than-2 approximation for Max-Cut, a highly challenging open problem. In this paper, we take a significant step in this direction, showing that even o(log n)-pass streaming algorithms need nΩ(1) space to solve the cycle-finding problem. Our proof is quite involved, dividing the cycles in the graph into “short” and “long” cycles, and using tailor-made lower bound techniques to handle each case. ∗UC Berkeley. †Princeton University. ‡Princeton University. §Microsoft Research. ¶Adobe Research. ‖Princeton University. ISSN 1433-8092 Electronic Colloquium on Computational Complexity, Report No. 161 (2022)","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"276 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79160115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
(Nondeterministic) Hardness vs. Non-Malleability (不确定性)硬度与非延展性
Electron. Colloquium Comput. Complex. Pub Date : 2022-01-01 DOI: 10.1007/978-3-031-15802-5_6
Marshall Ball, D. Dachman-Soled, J. Loss
{"title":"(Nondeterministic) Hardness vs. Non-Malleability","authors":"Marshall Ball, D. Dachman-Soled, J. Loss","doi":"10.1007/978-3-031-15802-5_6","DOIUrl":"https://doi.org/10.1007/978-3-031-15802-5_6","url":null,"abstract":"","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"100 1","pages":"148-177"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79326813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Complexity of Average-Case Dynamic Subgraph Counting 平均情况下动态子图计数的复杂度
Electron. Colloquium Comput. Complex. Pub Date : 2022-01-01 DOI: 10.1137/1.9781611977073.23
M. Henzinger, Andrea Lincoln, B. Saha
{"title":"The Complexity of Average-Case Dynamic Subgraph Counting","authors":"M. Henzinger, Andrea Lincoln, B. Saha","doi":"10.1137/1.9781611977073.23","DOIUrl":"https://doi.org/10.1137/1.9781611977073.23","url":null,"abstract":"Statistics of small subgraph counts such as triangles, four-cycles, and s - t paths of short lengths reveal important structural properties of the underlying graph. These problems have been widely studied in social network analysis. In most relevant applications, the graphs are not only massive but also change dynamically over time. Most of these problems become hard in the dynamic setting when considering the worst case. In this paper, we ask whether the question of small subgraph counting over dynamic graphs is hard also in the average case. We consider the simplest possible average case model where the updates follow an Erd˝os-R´enyi graph: each update selects a pair of vertices ( u , v ) uniformly at random and flips the existence of the edge ( u , v ) . We develop new lower bounds and matching algorithms in this model for counting four-cycles, counting triangles through a specified point s , or a random queried point, and st paths of length 3, 4 and 5. Our results indicate while computing st paths of length 3, and 4 are easy in the average case with O ( 1 ) update time (note that they are hard in the worst case), it becomes hard when considering st paths of length 5. We introduce new techniques which allow us to get average-case hardness for these graph problems from the worst-case hardness of the Online Matrix vector problem (OMv). Our techniques rely on recent advances in fine-grained average-case complexity. Our techniques advance this literature, giving the ability to prove new lower bounds on average-case dynamic algorithms.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"67 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76789411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Noisy Radio Network Lower Bounds via Noiseless Beeping Lower Bounds 基于无噪声蜂鸣声的噪声无线网络下界
Electron. Colloquium Comput. Complex. Pub Date : 2022-01-01 DOI: 10.4230/LIPIcs.ITCS.2023.46
K. Efremenko, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena
{"title":"Noisy Radio Network Lower Bounds via Noiseless Beeping Lower Bounds","authors":"K. Efremenko, Gillat Kol, Dmitry Paramonov, Raghuvansh R. Saxena","doi":"10.4230/LIPIcs.ITCS.2023.46","DOIUrl":"https://doi.org/10.4230/LIPIcs.ITCS.2023.46","url":null,"abstract":"Much of today’s communication is carried out over large wireless systems with different input-output behaviors. In this work, we compare the power of central abstractions of wireless communication through the general notion of boolean symmetric f -channels : In every round of the f -channel, each of its n parties decides to either broadcast or not, and the channel outputs f ( m ), where m is the number of broadcasting parties. Our first result is that the well studied beeping channel , where f is the threshold-1 function, is not stronger than any other f -channel. To this end, we design a protocol over the f -channel and prove that any protocol that simulates it over the beeping channel blows up the round complexity by a factor of Ω(log n ). Our lower bound technique may be of independent interest, as it essentially generalizes the popular fooling set technique by exploiting a “local” relaxation of combinatorial rectangles. Curiously, while this result shows the limitations of a noiseless channel, namely, the beeping channel, we are able to use it to show the limitations of the noisy version of many other channels. This includes the extensively studied single-hop radio network model with collisions-as-silence (CAS), which is equivalent to the f -channel with f ( m ) = 1 iff m = 1. In particular, our second and main result, obtained from the first, shows that converting CAS protocols to noise resilient ones may incur a large performance overhead, i.e., no constant rate interactive code exists. To this end, we design a CAS protocol and prove that any protocol that simulates it over the noisy CAS model with correlated stochastic noise, blows up the round complexity by a factor of Ω(log n ). We mention that the Ω(log n ) overhead in both our results is tight.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"59 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89187776","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Non-Adaptive Proper Learning Polynomials 非自适应适当学习多项式
Electron. Colloquium Comput. Complex. Pub Date : 2022-01-01 DOI: 10.4230/LIPIcs.STACS.2023.16
N. Bshouty
{"title":"Non-Adaptive Proper Learning Polynomials","authors":"N. Bshouty","doi":"10.4230/LIPIcs.STACS.2023.16","DOIUrl":"https://doi.org/10.4230/LIPIcs.STACS.2023.16","url":null,"abstract":"We give the first polynomial-time non-adaptive proper learning algorithm of Boolean sparse multivariate polynomial under the uniform distribution. Our algorithm, for s -sparse polynomial over n variables, makes q = ( s/ϵ ) γ ( s,ϵ ) log n queries where 2 . 66 ≤ γ ( s, ϵ ) ≤ 6 . 922 and runs in ˜ O ( n ) · poly ( s, 1 /ϵ ) time. We also show that for any ϵ = 1 /s O (1) any non-adaptive learning algorithm must make at least ( s/ϵ ) Ω(1) log n queries. Therefore, the query complexity of our algorithm is also polynomial in the optimal query complexity and optimal in n .","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"14 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"90624721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Solving Sparse Polynomial Factorization Related Problems 稀疏多项式分解相关问题的求解
Electron. Colloquium Comput. Complex. Pub Date : 2022-01-01 DOI: 10.4230/LIPIcs.FSTTCS.2022.10
Pranav Bisht, Ilya Volkovich
{"title":"On Solving Sparse Polynomial Factorization Related Problems","authors":"Pranav Bisht, Ilya Volkovich","doi":"10.4230/LIPIcs.FSTTCS.2022.10","DOIUrl":"https://doi.org/10.4230/LIPIcs.FSTTCS.2022.10","url":null,"abstract":"In a recent result of Bhargava, Saraf and Volkovich [FOCS’18; JACM’20], the first factor sparsity bound for constant individual degree polynomials was shown. In particular, it was shown that any factor of a polynomial with at most s terms and individual degree bounded by d can itself have at most s O ( d 2 log n ) terms. It is conjectured, though, that the “true” sparsity bound should be polynomial (i.e. s poly( d ) ). In this paper we provide supporting evidence for this conjecture by presenting polynomial-time algorithms for several problems that would be implied by a polynomial-size sparsity bound. In particular, we give efficient (deterministic) algorithms for identity testing of Σ [2] ΠΣΠ [ ind - deg d ] circuits and testing if a sparse polynomial is an exact power. Hence, our algorithms rely on different techniques.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"PC-20 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84835735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
On Interactive Proofs of Proximity with Proof-Oblivious Queries 基于无关证明查询的邻近性交互证明
Electron. Colloquium Comput. Complex. Pub Date : 2022-01-01 DOI: 10.4230/LIPIcs.ITCS.2023.59
O. Goldreich, G. Rothblum, Tal Skverer
{"title":"On Interactive Proofs of Proximity with Proof-Oblivious Queries","authors":"O. Goldreich, G. Rothblum, Tal Skverer","doi":"10.4230/LIPIcs.ITCS.2023.59","DOIUrl":"https://doi.org/10.4230/LIPIcs.ITCS.2023.59","url":null,"abstract":"Interactive proofs of proximity (IPPs) offer ultra-fast approximate verification of assertions regarding their input, where ultra-fast means that only a small portion of the input is read and approximate verification is analogous to the notion of approximate decision that underlies property testing. Specifically, in an IPP, the prover can make the verifier accept each input in the property, but cannot fool the verifier into accepting an input that is far from the property (except for with small probability). The verifier in an IPP system engages in two very different types of activities: interacting with an untrusted prover, and querying its input. The definition allows for arbitrary coordination between these two activities, but keeping them separate is both conceptually interesting and necessary for important applications such as addressing temporal considerations (i.e., at what time is each of the services available) and facilitating the construction of zero-knowledge schemes. In this work we embark on a systematic study of IPPs with proof-oblivious queries, where the queries should not be affected by the interaction with the prover. We assign the query and interaction activities to separate modules, and consider different limitations on their coordination. The most strict limitation requires these activities to be totally isolated from one another; they just feed their views to a separate deciding module. We show that such systems can be efficiently emulated by standard testers. Going to the other extreme, we only disallow information to flow from the interacting module to the querying module, but allow free information flow in the other direction. We show that extremely efficient one-round (i.e., two-message) systems of such type can be used to verify properties that are extremely hard to test (without the help of a prover). That is, the complexity of verifying can be polylogarithmic in the complexity of testing. This stands in contrast the MAPs (viewed as 1 / 2-round systems) in which proof-oblivious queries are as limited as our isolated model. Our focus is on an intermediate model that allows shared randomness between the querying and interacting modules but no information flow between them. In this case we show that 1-round systems are efficiently emulated by standard testers but 3 / 2-round systems of extremely low complexity exist for properties that are extremely hard to test. One additional result about this model is that it can efficiently emulate any IPP for any property of low-degree polynomials.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"20 1","pages":"59:1-59:16"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84076491","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Spectral Expanding Expanders 光谱膨胀器
Electron. Colloquium Comput. Complex. Pub Date : 2022-01-01 DOI: 10.4230/LIPIcs.CCC.2023.8
Gil Cohen, Itay Cohen
{"title":"Spectral Expanding Expanders","authors":"Gil Cohen, Itay Cohen","doi":"10.4230/LIPIcs.CCC.2023.8","DOIUrl":"https://doi.org/10.4230/LIPIcs.CCC.2023.8","url":null,"abstract":"Dinitz, Schapira, and Valadarsky [DSV17] introduced the intriguing notion of expanding expanders – a family of expander graphs with the property that every two consecutive graphs in the family differ only on a small number of edges. Such a family allows one to add and remove vertices with only few edge updates, making them useful in dynamic settings such as for datacenter network topologies and for the design of distributed algorithms for self-healing expanders. [DSV17] constructed explicit expanding-expanders based on the Bilu-Linial construction of spectral expanders [BL06]. The construction of expanding expanders, however, ends up being of edge expanders, thus, an open problem raised by [DSV17] is to construct spectral expanding expanders (SEE). In this work, we resolve this question by constructing SEE with spectral expansion which, like [BL06], is optimal up to a poly-logarithmic factor, and the number of edge updates is optimal up to a constant. We further give a simple proof for the existence of SEE that are close to Ramanujan up to a small additive term. As in [DSV17], our construction is based on interpolating between a graph and its lift. However, to establish spectral expansion, we carefully weigh the interpolated graphs, dubbed partial lifts, in a way that enables us to conduct a delicate analysis of their spectrum. In particular, at a crucial point in the analysis, we consider the eigenvectors structure of the partial lifts.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"38 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"77639209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved local testing for multiplicity codes 改进了多重代码的本地测试
Electron. Colloquium Comput. Complex. Pub Date : 2022-01-01 DOI: 10.4230/LIPIcs.APPROX/RANDOM.2022.11
Dan Karliner, A. Ta-Shma
{"title":"Improved local testing for multiplicity codes","authors":"Dan Karliner, A. Ta-Shma","doi":"10.4230/LIPIcs.APPROX/RANDOM.2022.11","DOIUrl":"https://doi.org/10.4230/LIPIcs.APPROX/RANDOM.2022.11","url":null,"abstract":"Multiplicity codes are a generalization of Reed-Muller codes which include derivatives as well as the values of low degree polynomials, evaluated in every point in F mp . Similarly to Reed-Muller codes, multiplicity codes have a local nature that allows for local correction and local testing. Recently, [6] showed that the plane test , which tests the degree of the codeword on a random plane, is a good local tester for small enough degrees . In this work we simplify and extend the analysis of local testing for multiplicity codes, giving a more general and tight analysis. In particular, we show that multiplicity codes MRM p ( m, d, s ) over prime fields with arbitrary d are locally testable by an appropriate k -flat test , which tests the degree of the codeword on a random k -dimensional affine subspace. The relationship between the degree parameter d and the required dimension k is shown to be nearly optimal, and improves on [6] in the case of planes. Our analysis relies on a generalization of the technique of canonincal monomials introduced in [5]. Generalizing canonical monomials to the multiplicity case requires substantially different proofs which exploit the algebraic structure of multiplicity codes.","PeriodicalId":11639,"journal":{"name":"Electron. Colloquium Comput. Complex.","volume":"39 1","pages":"11:1-11:19"},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86901229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信