Quantum Lower Bounds for the Goldreich-Levin Problem
|
|
- Horace Ramsey
- 5 years ago
- Views:
Transcription
1 Quatum Lower Bouds for the Goldreich-Levi Problem Mark Adcock 1, Richard Cleve 1, Kazuo Iwama, Raymod Putra,4, Shigeru Yamashita 3, 1 Departmet of Computer Sciece, Uiversity of Calgary, Caada Graduate School of Iformatics, Kyoto Uiversity / QCI, ERATO, JST, Japa 3 Nara Istitute of Sciece ad Techology, Japa 4 School of Computer Sciece, McGill Uiversity, Caada Abstract At the heart of the Goldreich-Levi Theorem is the problem of determiig a -bit strig a by makig queries to two oracles, referred to as IP (ier product) ad EQ (equivalece). The IP oracle, o iput x, returs a bit that is biased towards a x (the modulo two ier product of a with x) i the followig sese. For a radom x, the probability that IP(x) =a xis at least 1 The EQ oracle, o iput x, returs a bit specifyig whether or ot x = a. It has bee show that a quatum algorithm ca solve this problem with O(1/ε) IP ad EQ queries, whereas ay classical algorithm requires Ω(/ε ) such queries. We show that the above quatum algorithm is optimal i terms of both EQ ad IP queries. Specifically, Ω(1/ε) EQ queries are ecessary, ad Ω(1/ε) IP queries are ecessary if the umber of EQ queries o( ). Keywords: computatioal complexity, quatum computig, cryptography. 1 Itroductio ad summary of results The Goldreich-Levi Theorem is a cryptographic reductio which eables a cryptographically hard predicate to be based o the computatioal difficulty of a oe-way fuctio [GL89]. It ca be abstracted as the followig problem, which we heceforth refer to as the GL problem. Leta {0,1} ad ε satisfy 0 < ε 1. Let iformatio about a be available oly from IP (ier product) ad EQ (equivalece) oracle queries. The IP oracle has the property that, for a uiformly-distributed radom x {0,1}, Pr[IP(x) =a x] 1 The EQ oracle, o iput x {0,1}, returs a bit specifyig whether or ot x = a. The task is to determie a. For a algorithm solvig the GL problem, its efficiecy correspods to the overhead i the uderlyig cryptographic reductio. The more efficiet a algorithm for the GL problem is, the tighter the correspodece is betwee the cryptographic primitives that it is applied to. Determiig the most efficiet algorithm for the GL problem is therefore a matter of iterest i complexity-theory based cryptography i both classical ad quatum frameworks (see, e.g., [AC0] for further discussio). Whe there are o errors (i.e., ε = 1), it is straightforward to show that queries are ecessary ad sufficiet for ay classical algorithm; however, with a quatum algorithm, oe query suffices [BV97, TS98]. mark.adcock@cdcgy.com cleve@cpsc.ucalgary.ca raymod@kuis.kyoto-u.ac.jp iwama@kuis.kyoto-u.ac.jp ger@is.aist-ara.ac.jp 1
2 For smaller ε, Goldreich ad Levi [GL89] show how to solve this problem classically with a umber of queries ad auxiliary operatios that is polyomial i /ε, ad this ca be refied ito a algorithm that makes O(/ε ) IP queries followed by O(1/ε ) EQ queries [Gol99]. Adcock ad Cleve [AC0] show that the classical IP query complexity for solvig the GL problem with bouded-error probability is Ω(/ε ) wheever the umber of EQ queries is at most (for a reasoable rage of values of ε). It ca also be show that Ω(1/ε ) EQ queries are ecessary classically. For quatum algorithms, Adcock ad Cleve [AC0] show that O(1/ε) IP ad O(1/ε) EQ queries are sufficiet to solve the GL problem; however, they do ot address the questio whether these costs are ecessary. We address this questio by showig the followig. Theorem 1 Ay quatum algorithm solvig the GL problem with costat success probability requires Ω(1/ε) EQ queries, wheever ε ( 1 )/. It is ot possible to lower boud the umber of IP queries idepedetly of the umber of EQ queries, because O( ) EQ queries would elimiate the eed for ay IP queries [Gro96]. The ext theorem implies that, wheever the umber of EQ queries is o( ), the umber of IP queries must be Ω(1/ε). Theorem Ay quatum algorithm solvig the GL problem with costat success probability requires either Ω( ) EQ queries or Ω(1/ε) IP queries, wheever ε ( 1 )/. For the quatum case, a query that, o iput x {0,1}, returs oe bit ca be regarded as a uitary operatio U, where the output bit is uderstood to be the last qubit of U x 0. The stochastic property of IP queries is i terms of the measured result of the output qubit (see [AC0] for further discussio about formalizig quatum IP queries). Our proof techique for the former theorem is by combiig a lower boud arisig i the list decodig of adamard codes (which we show explicitly), i cojuctio with kow lower bouds for quatum searchig [BBBV97]. The latter theorem is proved by cosiderig a special class of amplitude amplificatio problems that easily reduce to the GL problem ad ca be lower bouded by a stadard hybrid argumet. Proof of Theorem 1 For ay eve k such that 0 <k, defie f k : {0, 1} {0,1}as f k (x 1,x,...,x )=x 1 x x 3 x 4 x k 1 x k. Let ε ( 1 )/ be give, ad set k to the uique eve umber such that ( 1 )k/+1 <ε ( 1 )k/. Now fix the IP oracle to IP(x) =f k (x). Note that fixig the IP oracle makes all IP queries i the algorithm redudat. We will show that this particular settig of the IP oracle has the iterestig property that there are Ω(1/ε ) differet a {0,1} that are cosistet with it i the sese that Pr x [f k (x) =a x] 1 Sice there are Ω(1/ε ) cadidates for the actual solutio which must be foud usig EQ queries the well-kow lower boud for searchig [BBBV97] implies that the umber of EQ queries ecessary (for costat success probability) is Ω( 1/ε )=Ω(1/ε). We ow provide the techical details of the proof, startig with the followig simple lemma. Lemma 3 Let k be eve ad x 1,...,x k be idepedet uiformly distributed radom bits. The Pr[x 1 x x k 1 x k =0]= 1 (1 + ( 1 )k/ ). Proof. Defie Y =( 1) x 1x x k 1 x k. The E[Y]=E[( 1) x 1x ] E[( 1) x k 1x k ]=( 1 )k/,from which it follows that Pr[x 1 x x k 1 x k =0]= 1 (1 + E[Y ]) = 1 (1 + ( 1 )k/ ).
3 The followig propositio provides a characterizatio of several a {0,1} that are cosistet with the IP oracle. Propositio 4 For all a {0,1} such that f k (a) =0ad a k+1 = a k+ = =a =0,ifx {0,1} is radomly chose the Pr[f k (x) =a x] 1 Proof. Pr[f k (x) =a x] = Pr[(x 1 x x k 1 x k ) (a 1 x 1 a k x k )=0] = Pr[(x 1 x a 1 x 1 a x ) (x k 1 x k a k 1 x k 1 a k x k )=0] = Pr[(x 1 a )(x a 1 ) (x k 1 a k )(x k a k 1 ) f k (a) =0] = Pr[x 1 x x k 1 x k =0] = 1 (1 + ( 1 )k/ ) (by Lemma 3) 1 The followig propositio, i cojuctio with Propositio 4, lower bouds the umber of a {0,1} that are cosistet with the IP oracle. Propositio 5 The umber of a {0,1} such that f k (a) =0ad a k+1 = a k+ = =a =0is at least 1 8 (1/ε ). Proof. Lemma 3 implies that the umber of a {0,1} k such that f k (a) =0is 1 (1 + ( 1 )k/ ) k = k 1 + k/ 1 > 1 8 k+ > 1 8 (1/ε ). 3 Proof of Theorem Let ε>( 1 )/ be give. For each a {0,1} such that a 0, defie two oracles. The first is the aforemetioed EQ oracle (that, o iput x {0,1}, returs a bit specifyig whether or ot x = a). To defie the secod type of oracle, first defie the uitary operatio A actig o qubits such that, for all y {0,1}, A y = 1 ε y +iε a y. (1) Note that a A 0 = ε. The secod type of query is a cotrolled-a operatio, deoted as cot-a, where cot-a y b =(A b y ) b, for all y {0,1} ad b {0,1}. Cosider the followig amplitude amplificatio problem. There is a ukow a {0,1} such that a 0. Iformatio about a is available by EQ, cot-a, adcot-a queries. The goal is to determie a. The well-kow amplitude amplificatio algorithm [BMT0] solves this problem usig O(1/ε) EQ,cot-A,adcot-A queries. We first show that this is optimal i the followig sese. Lemma 6 The amplitude amplificatio problem requires either Ω( ) EQ queries or Ω(1/ε) cot-a or cot-a queries, wheever ε ( 1 )/. Proof. This is straightforward to prove by modifyig the quatum lower boud for searchig that uses the hybrid method [BBBV97]. That lower boud proof shows that there is a state φ such that, if oly t EQ queries are available, the, averagig over all values of a, the fial state of the algorithm has distace oly t(/ 1) from φ (ote that, sice a 0, the size of the search space is 1). 3
4 The preset sceario is differet i that cot-a ad cot-a queries ca be iterleaved ito the computatio. This is addressed by showig that each cot-a ad cot-a query ca have a limited effect o a quatum state. The precise result is that, for ay quatum state ψ, ψ cot-a ψ ε. This iequality ca be prove by otig that the eigevalues of cot-a are all either 1 or 1 ε ± iε. Thus, each eigevalue is distace at most ε away from 1. It follows that, if there are s cot-a ad cot-a queries ad t EQ queries, the, averagig over all values of a, the fial state of the algorithm has distace oly s( ε)+t(/ 1) from φ, from which the result follows. Next, we observe that a cot-a query ca be used to simulate a IP query. The simulatio is give by the circuit i Figure 1, deoted as C, wheredeotes the adamard gate ad S is defied as S b =( i) b b,forb {0,1}. x 1 x. x A. 0 S Figure 1: Simulatig a IP query usig a cot-a query. The last qubit, whe measured, is biased towards a x. Lemma 7 If the last output qubit i the above circuit is measured the the probability that the outcome is a x is 1 Proof. It is sufficiet to show that 1+ε i( 1)a x 1 ε x, a x C x, 0 =, () for all x {0,1}, sice this implies that x, a x C x, 0 = 1 Oe way of establishig Eq. is as follows. If circuit C is executed up to the stage of the cot-a gate o state x, 0, the resultig state is 1 1 y {0,1} ( 1) x y y ( 1) x y y {0,1} ( i ) 1 ε +( 1) a x ε y 1. (3) Also, if the last stage of circuit C is executed o state x, a x, the resultig state is 1 1 ( 1) x y y ( 1) x y ( 1) a x y 1. (4) y {0,1} y {0,1} Eq. is obtaied as the ier product betwee the states i Eq. 3 ad Eq. 4. Sice Lemma 7 implies that a violatio of Theorem leads to a violatio of Lemma 6, this completes the proof. 4
5 Ackowledgmets We are grateful to Vekatesa Guruswami ad Roald de Wolf for valuable commets. R.C. is partially supported by Caada s NSERC, MITACS, ad CIAR. Refereces [AC0] M. Adcock ad R. Cleve. A quatum Goldreich-Levi theorem with cryptographic applicatios. I elmut Alt ad Alfoso Ferreira, editors, Proc. 19th It. Symp. o Theoretical Aspects of Computer Sciece (STACS 00), volume 85 of Lecture Notes i Computer Sciece, pages Spriger-Verlag, 00. [BBBV97] C. Beett, E. Berstei, G. Brassard, ad U. Vazirai. Stregths ad weakesses of quatum computig. SIAM Joural of Computig, 6(5): , [BMT0] G. Brassard, P. øyer, M. Mosca, ad A. Tapp. Quatum amplitude amplificatio ad estimatio. Quatum Computatio ad Quatum Iformatio: A Milleium Volume, AMS Cotemporary Mathematics Series, 305, 00. [BV97] [GL89] E. Berstei ad U. Vazirai. Quatum complexity theory. SIAM Joural o Computig, 6(5): , O. Goldreich ad L. Levi. ard-core predicates for ay oe-way fuctio. I Proc. 1th A. ACM Symp. o Theory of Computig (STOC 1989), pages 5 3, [Gol99] O. Goldreich. Moder Cryptography, Probabilistic Proofs ad Pseudoradomess. Spriger, [Gro96] L. K. Grover. A fast quatum mechaical algorithm for database search. I Proc. 8th A. ACM Symp. o Theory of Computig (STOC 1996), pages 1 19, [TS98] B. Terhal ad J. Smoli. Sigle quatum queryig of a database. Phys. Rev. A, 58(3):18 186,
Last time, we talked about how Equation (1) can simulate Equation (2). We asserted that Equation (2) can also simulate Equation (1).
6896 Quatum Complexity Theory Sept 23, 2008 Lecturer: Scott Aaroso Lecture 6 Last Time: Quatum Error-Correctio Quatum Query Model Deutsch-Jozsa Algorithm (Computes x y i oe query) Today: Berstei-Vazirii
More informationQuantum Computing Lecture 7. Quantum Factoring
Quatum Computig Lecture 7 Quatum Factorig Maris Ozols Quatum factorig A polyomial time quatum algorithm for factorig umbers was published by Peter Shor i 1994. Polyomial time meas that the umber of gates
More informationLecture 11: Pseudorandom functions
COM S 6830 Cryptography Oct 1, 2009 Istructor: Rafael Pass 1 Recap Lecture 11: Pseudoradom fuctios Scribe: Stefao Ermo Defiitio 1 (Ge, Ec, Dec) is a sigle message secure ecryptio scheme if for all uppt
More informationBasics of Probability Theory (for Theory of Computation courses)
Basics of Probability Theory (for Theory of Computatio courses) Oded Goldreich Departmet of Computer Sciece Weizma Istitute of Sciece Rehovot, Israel. oded.goldreich@weizma.ac.il November 24, 2008 Preface.
More informationAverage case quantum lower bounds for computing the boolean mean
Average case quatum lower bouds for computig the boolea mea A. Papageorgiou Departmet of Computer Sciece Columbia Uiversity New York, NY 1007 Jue 003 Abstract We study the average case approximatio of
More informationAn Introduction to Randomized Algorithms
A Itroductio to Radomized Algorithms The focus of this lecture is to study a radomized algorithm for quick sort, aalyze it usig probabilistic recurrece relatios, ad also provide more geeral tools for aalysis
More informationLecture 11: Hash Functions and Random Oracle Model
CS 7810 Foudatios of Cryptography October 16, 017 Lecture 11: Hash Fuctios ad Radom Oracle Model Lecturer: Daiel Wichs Scribe: Akshar Varma 1 Topic Covered Defiitio of Hash Fuctios Merkle-Damgaård Theorem
More informationProblem Set 2 Solutions
CS271 Radomess & Computatio, Sprig 2018 Problem Set 2 Solutios Poit totals are i the margi; the maximum total umber of poits was 52. 1. Probabilistic method for domiatig sets 6pts Pick a radom subset S
More informationRandomized Algorithms I, Spring 2018, Department of Computer Science, University of Helsinki Homework 1: Solutions (Discussed January 25, 2018)
Radomized Algorithms I, Sprig 08, Departmet of Computer Sciece, Uiversity of Helsiki Homework : Solutios Discussed Jauary 5, 08). Exercise.: Cosider the followig balls-ad-bi game. We start with oe black
More informationQuantum Information & Quantum Computation
CS9A, Sprig 5: Quatum Iformatio & Quatum Computatio Wim va Dam Egieerig, Room 59 vadam@cs http://www.cs.ucsb.edu/~vadam/teachig/cs9/ Admiistrivia Do the exercises. Aswers will be posted at the ed of the
More informationConvergence of random variables. (telegram style notes) P.J.C. Spreij
Covergece of radom variables (telegram style otes).j.c. Spreij this versio: September 6, 2005 Itroductio As we kow, radom variables are by defiitio measurable fuctios o some uderlyig measurable space
More informationOptimally Sparse SVMs
A. Proof of Lemma 3. We here prove a lower boud o the umber of support vectors to achieve geeralizatio bouds of the form which we cosider. Importatly, this result holds ot oly for liear classifiers, but
More informationThe random version of Dvoretzky s theorem in l n
The radom versio of Dvoretzky s theorem i l Gideo Schechtma Abstract We show that with high probability a sectio of the l ball of dimesio k cε log c > 0 a uiversal costat) is ε close to a multiple of the
More informationA statistical method to determine sample size to estimate characteristic value of soil parameters
A statistical method to determie sample size to estimate characteristic value of soil parameters Y. Hojo, B. Setiawa 2 ad M. Suzuki 3 Abstract Sample size is a importat factor to be cosidered i determiig
More informationSRC Technical Note June 17, Tight Thresholds for The Pure Literal Rule. Michael Mitzenmacher. d i g i t a l
SRC Techical Note 1997-011 Jue 17, 1997 Tight Thresholds for The Pure Literal Rule Michael Mitzemacher d i g i t a l Systems Research Ceter 130 Lytto Aveue Palo Alto, Califoria 94301 http://www.research.digital.com/src/
More informationLecture 9: Hierarchy Theorems
IAS/PCMI Summer Sessio 2000 Clay Mathematics Udergraduate Program Basic Course o Computatioal Complexity Lecture 9: Hierarchy Theorems David Mix Barrigto ad Alexis Maciel July 27, 2000 Most of this lecture
More informationLecture 7: October 18, 2017
Iformatio ad Codig Theory Autum 207 Lecturer: Madhur Tulsiai Lecture 7: October 8, 207 Biary hypothesis testig I this lecture, we apply the tools developed i the past few lectures to uderstad the problem
More informationC/CS/Phys C191 Deutsch and Deutsch-Josza algorithms 10/20/07 Fall 2007 Lecture 17
C/CS/Phs C9 Deutsch ad Deutsch-Josza algorithms 0/0/07 Fall 007 Lecture 7 Readigs Beeti et al., Ch. 3.9-3.9. Stolze ad Suter, Quatum Computig, Ch. 8. - 8..5) Nielse ad Chuag, Quatum Computatio ad Quatum
More informationLecture 4: April 10, 2013
TTIC/CMSC 1150 Mathematical Toolkit Sprig 01 Madhur Tulsiai Lecture 4: April 10, 01 Scribe: Haris Agelidakis 1 Chebyshev s Iequality recap I the previous lecture, we used Chebyshev s iequality to get a
More informationn outcome is (+1,+1, 1,..., 1). Let the r.v. X denote our position (relative to our starting point 0) after n moves. Thus X = X 1 + X 2 + +X n,
CS 70 Discrete Mathematics for CS Sprig 2008 David Wager Note 9 Variace Questio: At each time step, I flip a fair coi. If it comes up Heads, I walk oe step to the right; if it comes up Tails, I walk oe
More informationStructural Functionality as a Fundamental Property of Boolean Algebra and Base for Its Real-Valued Realizations
Structural Fuctioality as a Fudametal Property of Boolea Algebra ad Base for Its Real-Valued Realizatios Draga G. Radojević Uiversity of Belgrade, Istitute Mihajlo Pupi, Belgrade draga.radojevic@pupi.rs
More informationDesign and Analysis of Algorithms
Desig ad Aalysis of Algorithms Probabilistic aalysis ad Radomized algorithms Referece: CLRS Chapter 5 Topics: Hirig problem Idicatio radom variables Radomized algorithms Huo Hogwei 1 The hirig problem
More informationLecture 16: Monotone Formula Lower Bounds via Graph Entropy. 2 Monotone Formula Lower Bounds via Graph Entropy
15-859: Iformatio Theory ad Applicatios i TCS CMU: Sprig 2013 Lecture 16: Mootoe Formula Lower Bouds via Graph Etropy March 26, 2013 Lecturer: Mahdi Cheraghchi Scribe: Shashak Sigh 1 Recap Graph Etropy:
More informationDefinition 4.2. (a) A sequence {x n } in a Banach space X is a basis for X if. unique scalars a n (x) such that x = n. a n (x) x n. (4.
4. BASES I BAACH SPACES 39 4. BASES I BAACH SPACES Sice a Baach space X is a vector space, it must possess a Hamel, or vector space, basis, i.e., a subset {x γ } γ Γ whose fiite liear spa is all of X ad
More informationOn Random Line Segments in the Unit Square
O Radom Lie Segmets i the Uit Square Thomas A. Courtade Departmet of Electrical Egieerig Uiversity of Califoria Los Ageles, Califoria 90095 Email: tacourta@ee.ucla.edu I. INTRODUCTION Let Q = [0, 1] [0,
More informationRandom Walks on Discrete and Continuous Circles. by Jeffrey S. Rosenthal School of Mathematics, University of Minnesota, Minneapolis, MN, U.S.A.
Radom Walks o Discrete ad Cotiuous Circles by Jeffrey S. Rosethal School of Mathematics, Uiversity of Miesota, Mieapolis, MN, U.S.A. 55455 (Appeared i Joural of Applied Probability 30 (1993), 780 789.)
More informationNICK DUFRESNE. 1 1 p(x). To determine some formulas for the generating function of the Schröder numbers, r(x) = a(x) =
AN INTRODUCTION TO SCHRÖDER AND UNKNOWN NUMBERS NICK DUFRESNE Abstract. I this article we will itroduce two types of lattice paths, Schröder paths ad Ukow paths. We will examie differet properties of each,
More informationDisjoint Systems. Abstract
Disjoit Systems Noga Alo ad Bey Sudaov Departmet of Mathematics Raymod ad Beverly Sacler Faculty of Exact Scieces Tel Aviv Uiversity, Tel Aviv, Israel Abstract A disjoit system of type (,,, ) is a collectio
More informationLecture 12: September 27
36-705: Itermediate Statistics Fall 207 Lecturer: Siva Balakrisha Lecture 2: September 27 Today we will discuss sufficiecy i more detail ad the begi to discuss some geeral strategies for costructig estimators.
More information2 Markov Chain Monte Carlo Sampling
22 Part I. Markov Chais ad Stochastic Samplig Figure 10: Hard-core colourig of a lattice. 2 Markov Chai Mote Carlo Samplig We ow itroduce Markov chai Mote Carlo (MCMC) samplig, which is a extremely importat
More informationThe Random Walk For Dummies
The Radom Walk For Dummies Richard A Mote Abstract We look at the priciples goverig the oe-dimesioal discrete radom walk First we review five basic cocepts of probability theory The we cosider the Beroulli
More informationDisjoint set (Union-Find)
CS124 Lecture 7 Fall 2018 Disjoit set (Uio-Fid) For Kruskal s algorithm for the miimum spaig tree problem, we foud that we eeded a data structure for maitaiig a collectio of disjoit sets. That is, we eed
More information6.895 Essential Coding Theory October 20, Lecture 11. This lecture is focused in comparisons of the following properties/parameters of a code:
6.895 Essetial Codig Theory October 0, 004 Lecture 11 Lecturer: Madhu Suda Scribe: Aastasios Sidiropoulos 1 Overview This lecture is focused i comparisos of the followig properties/parameters of a code:
More informationTopic 9: Sampling Distributions of Estimators
Topic 9: Samplig Distributios of Estimators Course 003, 2018 Page 0 Samplig distributios of estimators Sice our estimators are statistics (particular fuctios of radom variables), their distributio ca be
More informationNotes on the Combinatorial Nullstellensatz
Notes o the Combiatorial Nullstellesatz Costructive ad Nocostructive Methods i Combiatorics ad TCS U. Chicago, Sprig 2018 Istructor: Adrew Drucker Scribe: Roberto Ferádez For the followig theorems ad examples
More informationLecture 9: Expanders Part 2, Extractors
Lecture 9: Expaders Part, Extractors Topics i Complexity Theory ad Pseudoradomess Sprig 013 Rutgers Uiversity Swastik Kopparty Scribes: Jaso Perry, Joh Kim I this lecture, we will discuss further the pseudoradomess
More informationSUPPLEMENTARY INFORMATION
DOI: 10.1038/NPHYS309 O the reality of the quatum state Matthew F. Pusey, 1, Joatha Barrett, ad Terry Rudolph 1 1 Departmet of Physics, Imperial College Lodo, Price Cosort Road, Lodo SW7 AZ, Uited Kigdom
More informationOblivious Transfer using Elliptic Curves
Oblivious Trasfer usig Elliptic Curves bhishek Parakh Louisiaa State Uiversity, ato Rouge, L May 4, 006 bstract: This paper proposes a algorithm for oblivious trasfer usig elliptic curves lso, we preset
More informationCSE 1400 Applied Discrete Mathematics Number Theory and Proofs
CSE 1400 Applied Discrete Mathematics Number Theory ad Proofs Departmet of Computer Scieces College of Egieerig Florida Tech Sprig 01 Problems for Number Theory Backgroud Number theory is the brach of
More informationProblem Set # 5 Solutions
MIT./8.4/6.898/8.435 Quatum Iformatio Sciece I Fall, 00 Sam Ocko October 5, 00 Problem Set # 5 Solutios. Most uitar trasforms are hard to approimate. (a) We are dealig with boolea fuctios that take bits
More information[412] A TEST FOR HOMOGENEITY OF THE MARGINAL DISTRIBUTIONS IN A TWO-WAY CLASSIFICATION
[412] A TEST FOR HOMOGENEITY OF THE MARGINAL DISTRIBUTIONS IN A TWO-WAY CLASSIFICATION BY ALAN STUART Divisio of Research Techiques, Lodo School of Ecoomics 1. INTRODUCTION There are several circumstaces
More informationRecursive Algorithm for Generating Partitions of an Integer. 1 Preliminary
Recursive Algorithm for Geeratig Partitios of a Iteger Sug-Hyuk Cha Computer Sciece Departmet, Pace Uiversity 1 Pace Plaza, New York, NY 10038 USA scha@pace.edu Abstract. This article first reviews the
More informationA RANK STATISTIC FOR NON-PARAMETRIC K-SAMPLE AND CHANGE POINT PROBLEMS
J. Japa Statist. Soc. Vol. 41 No. 1 2011 67 73 A RANK STATISTIC FOR NON-PARAMETRIC K-SAMPLE AND CHANGE POINT PROBLEMS Yoichi Nishiyama* We cosider k-sample ad chage poit problems for idepedet data i a
More informationExpected Norms of Zero-One Polynomials
DRAFT: Caad. Math. Bull. July 4, 08 :5 File: borwei80 pp. Page Sheet of Caad. Math. Bull. Vol. XX (Y, ZZZZ pp. 0 0 Expected Norms of Zero-Oe Polyomials Peter Borwei, Kwok-Kwog Stephe Choi, ad Idris Mercer
More informationThe Growth of Functions. Theoretical Supplement
The Growth of Fuctios Theoretical Supplemet The Triagle Iequality The triagle iequality is a algebraic tool that is ofte useful i maipulatig absolute values of fuctios. The triagle iequality says that
More informationPAijpam.eu ON TENSOR PRODUCT DECOMPOSITION
Iteratioal Joural of Pure ad Applied Mathematics Volume 103 No 3 2015, 537-545 ISSN: 1311-8080 (prited versio); ISSN: 1314-3395 (o-lie versio) url: http://wwwijpameu doi: http://dxdoiorg/1012732/ijpamv103i314
More informationThe picture in figure 1.1 helps us to see that the area represents the distance traveled. Figure 1: Area represents distance travelled
1 Lecture : Area Area ad distace traveled Approximatig area by rectagles Summatio The area uder a parabola 1.1 Area ad distace Suppose we have the followig iformatio about the velocity of a particle, how
More informationGeneralized Semi- Markov Processes (GSMP)
Geeralized Semi- Markov Processes (GSMP) Summary Some Defiitios Markov ad Semi-Markov Processes The Poisso Process Properties of the Poisso Process Iterarrival times Memoryless property ad the residual
More informationAnalysis of Deutsch-Jozsa Quantum Algorithm
Aalysis of Deutsch-Jozsa Quatum Algorithm Zhegju Cao Jeffrey Uhlma Lihua Liu 3 Abstract. Deutsch-Jozsa quatum algorithm is of great importace to quatum computatio. It directly ispired Shor s factorig algorithm.
More informationNotes for Lecture 5. 1 Grover Search. 1.1 The Setting. 1.2 Motivation. Lecture 5 (September 26, 2018)
COS 597A: Quatum Cryptography Lecture 5 (September 6, 08) Lecturer: Mark Zhadry Priceto Uiversity Scribe: Fermi Ma Notes for Lecture 5 Today we ll move o from the slightly cotrived applicatios of quatum
More informationA Note on the Symmetric Powers of the Standard Representation of S n
A Note o the Symmetric Powers of the Stadard Represetatio of S David Savitt 1 Departmet of Mathematics, Harvard Uiversity Cambridge, MA 0138, USA dsavitt@mathharvardedu Richard P Staley Departmet of Mathematics,
More information1 Introduction to reducing variance in Monte Carlo simulations
Copyright c 010 by Karl Sigma 1 Itroductio to reducig variace i Mote Carlo simulatios 11 Review of cofidece itervals for estimatig a mea I statistics, we estimate a ukow mea µ = E(X) of a distributio by
More informationElement sampling: Part 2
Chapter 4 Elemet samplig: Part 2 4.1 Itroductio We ow cosider uequal probability samplig desigs which is very popular i practice. I the uequal probability samplig, we ca improve the efficiecy of the resultig
More informationA constructive analysis of convex-valued demand correspondence for weakly uniformly rotund and monotonic preference
MPRA Muich Persoal RePEc Archive A costructive aalysis of covex-valued demad correspodece for weakly uiformly rotud ad mootoic preferece Yasuhito Taaka ad Atsuhiro Satoh. May 04 Olie at http://mpra.ub.ui-mueche.de/55889/
More informationA Note on Matrix Rigidity
A Note o Matrix Rigidity Joel Friedma Departmet of Computer Sciece Priceto Uiversity Priceto, NJ 08544 Jue 25, 1990 Revised October 25, 1991 Abstract I this paper we give a explicit costructio of matrices
More informationSome Properties of the Exact and Score Methods for Binomial Proportion and Sample Size Calculation
Some Properties of the Exact ad Score Methods for Biomial Proportio ad Sample Size Calculatio K. KRISHNAMOORTHY AND JIE PENG Departmet of Mathematics, Uiversity of Louisiaa at Lafayette Lafayette, LA 70504-1010,
More informationThe standard deviation of the mean
Physics 6C Fall 20 The stadard deviatio of the mea These otes provide some clarificatio o the distictio betwee the stadard deviatio ad the stadard deviatio of the mea.. The sample mea ad variace Cosider
More informationCSI 2101 Discrete Structures Winter Homework Assignment #4 (100 points, weight 5%) Due: Thursday, April 5, at 1:00pm (in lecture)
CSI 101 Discrete Structures Witer 01 Prof. Lucia Moura Uiversity of Ottawa Homework Assigmet #4 (100 poits, weight %) Due: Thursday, April, at 1:00pm (i lecture) Program verificatio, Recurrece Relatios
More informationLecture 4: Unique-SAT, Parity-SAT, and Approximate Counting
Advaced Complexity Theory Sprig 206 Lecture 4: Uique-SAT, Parity-SAT, ad Approximate Coutig Prof. Daa Moshkovitz Scribe: Aoymous Studet Scribe Date: Fall 202 Overview I this lecture we begi talkig about
More informationTopic 9: Sampling Distributions of Estimators
Topic 9: Samplig Distributios of Estimators Course 003, 2018 Page 0 Samplig distributios of estimators Sice our estimators are statistics (particular fuctios of radom variables), their distributio ca be
More informationRecursive Algorithms. Recurrences. Recursive Algorithms Analysis
Recursive Algorithms Recurreces Computer Sciece & Egieerig 35: Discrete Mathematics Christopher M Bourke cbourke@cseuledu A recursive algorithm is oe i which objects are defied i terms of other objects
More informationA Simple Proof of the Shallow Packing Lemma
A Simple Proof of the Shallow Packig Lemma Nabil Mustafa To cite this versio: Nabil Mustafa. A Simple Proof of the Shallow Packig Lemma. Discrete ad Computatioal Geometry, Spriger Verlag, 06, 55 (3), pp.739-743.
More informationFastest mixing Markov chain on a path
Fastest mixig Markov chai o a path Stephe Boyd Persi Diacois Ju Su Li Xiao Revised July 2004 Abstract We ider the problem of assigig trasitio probabilities to the edges of a path, so the resultig Markov
More informationGeneralization of Samuelson s inequality and location of eigenvalues
Proc. Idia Acad. Sci. Math. Sci.) Vol. 5, No., February 05, pp. 03. c Idia Academy of Scieces Geeralizatio of Samuelso s iequality ad locatio of eigevalues R SHARMA ad R SAINI Departmet of Mathematics,
More informationThe bosonic birthday paradox
msp Geometry & Topology Moographs 18 (2012) 1 7 The bosoic birthday paradox ALEX ARKHIPOV GREG KUPERBERG We motivate ad prove a versio of the birthday paradox for k idetical bosos i possible modes. If
More information6.867 Machine learning, lecture 7 (Jaakkola) 1
6.867 Machie learig, lecture 7 (Jaakkola) 1 Lecture topics: Kerel form of liear regressio Kerels, examples, costructio, properties Liear regressio ad kerels Cosider a slightly simpler model where we omit
More informationCentral limit theorem and almost sure central limit theorem for the product of some partial sums
Proc. Idia Acad. Sci. Math. Sci. Vol. 8, No. 2, May 2008, pp. 289 294. Prited i Idia Cetral it theorem ad almost sure cetral it theorem for the product of some partial sums YU MIAO College of Mathematics
More informationLecture 8: Convergence of transformations and law of large numbers
Lecture 8: Covergece of trasformatios ad law of large umbers Trasformatio ad covergece Trasformatio is a importat tool i statistics. If X coverges to X i some sese, we ofte eed to check whether g(x ) coverges
More information6 Integers Modulo n. integer k can be written as k = qn + r, with q,r, 0 r b. So any integer.
6 Itegers Modulo I Example 2.3(e), we have defied the cogruece of two itegers a,b with respect to a modulus. Let us recall that a b (mod ) meas a b. We have proved that cogruece is a equivalece relatio
More informationDiscrete Mathematics for CS Spring 2008 David Wagner Note 22
CS 70 Discrete Mathematics for CS Sprig 2008 David Wager Note 22 I.I.D. Radom Variables Estimatig the bias of a coi Questio: We wat to estimate the proportio p of Democrats i the US populatio, by takig
More informationLaw of the sum of Bernoulli random variables
Law of the sum of Beroulli radom variables Nicolas Chevallier Uiversité de Haute Alsace, 4, rue des frères Lumière 68093 Mulhouse icolas.chevallier@uha.fr December 006 Abstract Let be the set of all possible
More informationReliability and Queueing
Copyright 999 Uiversity of Califoria Reliability ad Queueig by David G. Messerschmitt Supplemetary sectio for Uderstadig Networked Applicatios: A First Course, Morga Kaufma, 999. Copyright otice: Permissio
More informationLecture 5: April 17, 2013
TTIC/CMSC 350 Mathematical Toolkit Sprig 203 Madhur Tulsiai Lecture 5: April 7, 203 Scribe: Somaye Hashemifar Cheroff bouds recap We recall the Cheroff/Hoeffdig bouds we derived i the last lecture idepedet
More informationOFF-DIAGONAL MULTILINEAR INTERPOLATION BETWEEN ADJOINT OPERATORS
OFF-DIAGONAL MULTILINEAR INTERPOLATION BETWEEN ADJOINT OPERATORS LOUKAS GRAFAKOS AND RICHARD G. LYNCH 2 Abstract. We exted a theorem by Grafakos ad Tao [5] o multiliear iterpolatio betwee adjoit operators
More informationThe Rand and block distances of pairs of set partitions
The Rad ad block distaces of pairs of set partitios Frak Ruskey 1 ad Jeifer Woodcock 1 Dept. of Computer Sciece, Uiversity of Victoria, CANADA Abstract. The Rad distaces of two set partitios is the umber
More informationSPECTRUM OF THE DIRECT SUM OF OPERATORS
Electroic Joural of Differetial Equatios, Vol. 202 (202), No. 20, pp. 8. ISSN: 072-669. URL: http://ejde.math.txstate.edu or http://ejde.math.ut.edu ftp ejde.math.txstate.edu SPECTRUM OF THE DIRECT SUM
More informationSimple Polygons of Maximum Perimeter Contained in a Unit Disk
Discrete Comput Geom (009) 1: 08 15 DOI 10.1007/s005-008-9093-7 Simple Polygos of Maximum Perimeter Cotaied i a Uit Disk Charles Audet Pierre Hase Frédéric Messie Received: 18 September 007 / Revised:
More informationStability Analysis of the Euler Discretization for SIR Epidemic Model
Stability Aalysis of the Euler Discretizatio for SIR Epidemic Model Agus Suryato Departmet of Mathematics, Faculty of Scieces, Brawijaya Uiversity, Jl Vetera Malag 6545 Idoesia Abstract I this paper we
More informationSeunghee Ye Ma 8: Week 5 Oct 28
Week 5 Summary I Sectio, we go over the Mea Value Theorem ad its applicatios. I Sectio 2, we will recap what we have covered so far this term. Topics Page Mea Value Theorem. Applicatios of the Mea Value
More informationA Risk Comparison of Ordinary Least Squares vs Ridge Regression
Joural of Machie Learig Research 14 (2013) 1505-1511 Submitted 5/12; Revised 3/13; Published 6/13 A Risk Compariso of Ordiary Least Squares vs Ridge Regressio Paramveer S. Dhillo Departmet of Computer
More informationIndependence number of graphs with a prescribed number of cliques
Idepedece umber of graphs with a prescribed umber of cliques Tom Bohma Dhruv Mubayi Abstract We cosider the followig problem posed by Erdős i 1962. Suppose that G is a -vertex graph where the umber of
More informationLecture 9: Pseudo-random generators against space bounded computation,
Lecture 9: Pseudo-radom geerators agaist space bouded computatio, Primality Testig Topics i Pseudoradomess ad Complexity (Sprig 2018) Rutgers Uiversity Swastik Kopparty Scribes: Harsha Tirumala, Jiyu Zhag
More informationPolynomials with Rational Roots that Differ by a Non-zero Constant. Generalities
Polyomials with Ratioal Roots that Differ by a No-zero Costat Philip Gibbs The problem of fidig two polyomials P(x) ad Q(x) of a give degree i a sigle variable x that have all ratioal roots ad differ by
More informationInformation-based Feature Selection
Iformatio-based Feature Selectio Farza Faria, Abbas Kazeroui, Afshi Babveyh Email: {faria,abbask,afshib}@staford.edu 1 Itroductio Feature selectio is a topic of great iterest i applicatios dealig with
More informationA collocation method for singular integral equations with cosecant kernel via Semi-trigonometric interpolation
Iteratioal Joural of Mathematics Research. ISSN 0976-5840 Volume 9 Number 1 (017) pp. 45-51 Iteratioal Research Publicatio House http://www.irphouse.com A collocatio method for sigular itegral equatios
More informationEigenvalues of Ikeda Lifts
Eigevalues of Ikeda Lifts Rodey Keato Abstract I this paper we compute explicit formulas for the Hecke eigevalues of Ikeda lifts These formulas, though complicated, are obtaied by purely elemetary techiques
More informationLecture 19. sup y 1,..., yn B d n
STAT 06A: Polyomials of adom Variables Lecture date: Nov Lecture 19 Grothedieck s Iequality Scribe: Be Hough The scribes are based o a guest lecture by ya O Doell. I this lecture we prove Grothedieck s
More informationUsing the IML Procedure to Examine the Efficacy of a New Control Charting Technique
Paper 2894-2018 Usig the IML Procedure to Examie the Efficacy of a New Cotrol Chartig Techique Austi Brow, M.S., Uiversity of Norther Colorado; Bryce Whitehead, M.S., Uiversity of Norther Colorado ABSTRACT
More information1 Hash tables. 1.1 Implementation
Lecture 8 Hash Tables, Uiversal Hash Fuctios, Balls ad Bis Scribes: Luke Johsto, Moses Charikar, G. Valiat Date: Oct 18, 2017 Adapted From Virgiia Williams lecture otes 1 Hash tables A hash table is a
More informationarxiv: v1 [math.pr] 4 Dec 2013
Squared-Norm Empirical Process i Baach Space arxiv:32005v [mathpr] 4 Dec 203 Vicet Q Vu Departmet of Statistics The Ohio State Uiversity Columbus, OH vqv@statosuedu Abstract Jig Lei Departmet of Statistics
More informationsin(n) + 2 cos(2n) n 3/2 3 sin(n) 2cos(2n) n 3/2 a n =
60. Ratio ad root tests 60.1. Absolutely coverget series. Defiitio 13. (Absolute covergece) A series a is called absolutely coverget if the series of absolute values a is coverget. The absolute covergece
More informationFrequency Domain Filtering
Frequecy Domai Filterig Raga Rodrigo October 19, 2010 Outlie Cotets 1 Itroductio 1 2 Fourier Represetatio of Fiite-Duratio Sequeces: The Discrete Fourier Trasform 1 3 The 2-D Discrete Fourier Trasform
More informationTHE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS
THE ASYMPTOTIC COMPLEXITY OF MATRIX REDUCTION OVER FINITE FIELDS DEMETRES CHRISTOFIDES Abstract. Cosider a ivertible matrix over some field. The Gauss-Jorda elimiatio reduces this matrix to the idetity
More informationON SOME DIOPHANTINE EQUATIONS RELATED TO SQUARE TRIANGULAR AND BALANCING NUMBERS
Joural of Algebra, Number Theory: Advaces ad Applicatios Volume, Number, 00, Pages 7-89 ON SOME DIOPHANTINE EQUATIONS RELATED TO SQUARE TRIANGULAR AND BALANCING NUMBERS OLCAY KARAATLI ad REFİK KESKİN Departmet
More informationAsymptotic distribution of products of sums of independent random variables
Proc. Idia Acad. Sci. Math. Sci. Vol. 3, No., May 03, pp. 83 9. c Idia Academy of Scieces Asymptotic distributio of products of sums of idepedet radom variables YANLING WANG, SUXIA YAO ad HONGXIA DU ollege
More informationIP Reference guide for integer programming formulations.
IP Referece guide for iteger programmig formulatios. by James B. Orli for 15.053 ad 15.058 This documet is iteded as a compact (or relatively compact) guide to the formulatio of iteger programs. For more
More informationCHAPTER 10 INFINITE SEQUENCES AND SERIES
CHAPTER 10 INFINITE SEQUENCES AND SERIES 10.1 Sequeces 10.2 Ifiite Series 10.3 The Itegral Tests 10.4 Compariso Tests 10.5 The Ratio ad Root Tests 10.6 Alteratig Series: Absolute ad Coditioal Covergece
More informationOn the convergence rates of Gladyshev s Hurst index estimator
Noliear Aalysis: Modellig ad Cotrol, 2010, Vol 15, No 4, 445 450 O the covergece rates of Gladyshev s Hurst idex estimator K Kubilius 1, D Melichov 2 1 Istitute of Mathematics ad Iformatics, Vilius Uiversity
More informationECONOMETRIC THEORY. MODULE XIII Lecture - 34 Asymptotic Theory and Stochastic Regressors
ECONOMETRIC THEORY MODULE XIII Lecture - 34 Asymptotic Theory ad Stochastic Regressors Dr. Shalabh Departmet of Mathematics ad Statistics Idia Istitute of Techology Kapur Asymptotic theory The asymptotic
More informationON POINTWISE BINOMIAL APPROXIMATION
Iteratioal Joural of Pure ad Applied Mathematics Volume 71 No. 1 2011, 57-66 ON POINTWISE BINOMIAL APPROXIMATION BY w-functions K. Teerapabolar 1, P. Wogkasem 2 Departmet of Mathematics Faculty of Sciece
More information