Graph Entropy and Quantum Sorting Problems

Size: px
Start display at page:

Download "Graph Entropy and Quantum Sorting Problems"

Transcription

1 Graph Entropy and Quantum Sorting Problems [Extended Abstract] Andrew Chi-Chih Yao Computer Science Department Princeton University Princeton, NJ ABSTRACT Let P (X, < P ) be a partial order on a set of n elements X {x,x 2,,x n}. Define the quantum sorting problem QSORT P as: given n distinct numbers x,x 2,,x n consistent with P, sort them by a quantum decision tree using comparisons of the form x i : x j. Let Q ɛ(p ) be the minimum number of queries used by any quantum decision tree for solving QSORT P with error less than ɛ (where 0 <ɛ</0 is fixed). It was proved by Høyer, Neerbek and Shi (Algorithmica 34 (2002), ) that, when P 0 is the empty partial order, Q ɛ(p 0) Ω(n log n), i.e., the classical information lower bound holds for quantum decision trees when the input permutations are unrestricted. In this paper we show that the classical information lower bound holds, up to an additive linear term, for quantum decision trees for any partial order P. Precisely, we prove Q ɛ(p ) c log 2 e(p ) c n where c, c > 0 are constants and e(p ) is the number of linear orderings consistent with P. Our proof builds on an interesting connection between sorting and Körner s graph entropy that was first noted and developed by Kahn and Kim (JCSS 5(995), ). Categories and Subject Descriptors F. [Theory of Computation]: Computation by Abstract Devices General Terms Theory Keywords Graph entropy, information lower bound, partial order, quantum algorithms, sorting This research was supported in part by the National Science Foundation grant CCR Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. STOC 04, June 3-5, 2004, Chicago, Illinois, USA. Copyright 2004 ACM /04/ $ INTRODUCTION How much can a computation be helped by the use of quantum algorithms has often been studied in the blackbox model, which is also called the oracle model, or the quantum decision tree model. To determine the value of a function f(x,x 2,,x N ), queries of the form x i? are successively asked and the quantum state gets updated by this information. After a predetermined number of steps, the quantum state is measured to produce the output. This standard model has been extensively studied in recent years, and several lower bound techniques have been developed and applied. For detailed descriptions of the model, we refer the readers to recent literature on this subject (see e.g., [, 2, 3, 4, 5, 0, 9]). Exactly when and how much speed-up can be achieved is still unresolved for many problems in the quantum decision tree model. In this paper we focus on a specific issue which relates to the information lower bound for classical decision trees. To identify an unknown item taken from a pool of M possibilities, it takes at least log 2 M tests in the classical framework if the information obtained from one test is only bit. However, this is no longer true in general when quantum states can be used to collect and process information. Two of the fundamental search problems in which information bounds play a part are the ordered table search, and the sorting problem. In both cases, there is a natural information bound in the classical decision tree model, with a matching upper bound. In the quantum setting, the ordered table search problem has been extensively studied (Farhi et al [8], Ambainis [2], Buhrman and de Wolf [6]), and it was demonstrated in these papers that the information bound Ω(log n) is asymptotically valid for quantum decision trees. For the sorting problem, Høyer, Neerbek and Shi [0] showed that the information lower bound also remains valid for quantum decision trees, i.e., Ω(n log n) quantumqueries are needed. In this paper, we study a class of problems known as the sorting problems for partial orders. Let P be a partial order on a set of n elements {x,x 2,,x n}. Given n input numbers consistent with P, Fredman [9] showed that there is a classical decision tree using log e(p )+2n binary comparisons x i : x j to determine the linear orderings of these numbers, where e(p ) is the number of linear orderings consistent with P. Subsequent work by Kahn and Saks [3] (see also [, 2]) showed that O(log e(p )) comparisons are sufficient. Thus, the information lower bound log 2 e(p )is asymptotically tight for classical decision trees. For quan- 2

2 tum decision trees, it is not clear whether the information lower bound is valid (except it is known to be true when P is empty as shown in [0]). This is the focus of our inquiry. Define the quantum sorting problem QSORT P as: given n distinct numbers x,x 2,,x n consistent with P, sort them by a quantum decision tree using comparisons of the form x i : x j. Let Q ɛ(p ) be the minimum number of queries used by any quantum decision tree for solving QSORT P with error less than ɛ (where 0 <ɛ</0 is fixed). Our main result is that the classical information lower bound holds, up to additive linear term, for quantum decision trees for any partial order P.Let0<ɛ</0 be any fixed constant. Theorem There exist absolute constants c, c such that Q ɛ(p ) c log e(p ) c n. Our proof relies on the general approach used in [0], and builds on an interesting connection between sorting and Körner s graph entropy in the classical decision tree setting that was first noted and developed by Kahn and Kim []. The main underlying idea in our proof is that, when adapted for partial order P, the complexity measure used in [0] turns out to be almost the same as the entropy considered in []. 2. PRELIMINARIES 2. Review of Lower Bounds in Høyer et al We review the lower bound proof by Høyer, Neerbek and Shi [0] on quantum sorting. We begin with a general framework. Let f : S {0, } m,wheres {0, } N. Consider a quantum decision tree for computing f with probability error bounded by ɛ>0. Let ξ j x > be the quantum state after j oracle steps, when x S is the oracle. Then ξ 0 x > is equal to some fixed initial state (independent of x). After T steps at the end of computation, we must have <ξ T x ξ T y > ɛ if f(x) f(y), where ɛ 2(ɛ( ɛ)) /2. To prove a lower bound, a weight function ω : S S [0, ) is chosen. Define, for each 0 j T, W j x,y S w(x, y) <ξ j x ξ j y >. If one can manage to show that, independent of the quantum algorithm used, there is an upper bound δ to W j W j+, and a lower bound M to W 0 W T, then one obtains a lower bound T M/δ on the quantum complexity. Consider the sorting of n numbers x,x 2,,x n by comparisons of the form x i : x j. In this case we have a function f : S {0, } m where S {0, } N (with N n(n ) and m log 2 (n!)). The set S consists of all the oracles x (x i,j i j) thatrepresentasetofn(n ) bits consistent with some underlying linear orderings of the x i s. Thus, we can identify each oracle x σ S with a unique permutation σ of {, 2,,n}, suchthatx σ i,j ifandonlyif σ(i) <σ(j). In [0], a lower bound to sorting n elements was obtained by an ingenious choice of the weight function ω. Let σ be any permutation of {, 2,,n}. For every k n and d n k, define a new permutation σ (k,d) (k, k+,,k+d) σ. Inotherwords,let(x,x 2,,x n) (σ(),σ(2),,σ(n)) be the assignment of values to x i s corresponding to σ. Then the assignment (x,x 2,,x n) corresponding to σ (k,d) is obtained from (x,x 2,,x n)by replacing the entry i with i + for k i<k+ d, andthe entry k + d with i. Thus, the following is true for τ σ (k,d) : τ (k) if i k + d σ (i) τ (i +) ifk i<k+ d τ (i) otherwise Define the weight function ω(σ, τ ) d if τ σ(k,d) for some k and d; ω(σ, τ ) 0 otherwise. With this choice, they were able to show the bounds below, for any quantum decision tree. Lemma [0] For each 0 j<t, W j W j+ 2πn!. Lemma 2[0] W 0 n!(nh n n), W T ɛ W 0, where H n /j. It follows from Lemmas and 2 that T Ω(n log n) for the sorting problem (with n unrestricted input numbers). 2.2 Review of Polytopes and Graph Entropy We first review some concepts and results from Stanley [2]. Let P (X, < P ) be a partial order on a set X {x,x 2,,x n}. A point y (y,y 2,,y n) R n is said to be consistent with P,ify i y j whenever x i P x j. For any y consistent with P, and for each i n, let d i(y) y i if x i is a minimal element in the partial order P ;otherwise,letd i(y) be the minimum of y i y j for any j satisfying x j < P x i. The order polytope O(P )isthesetofallthepointsy (y,y 2,,y n) [0, ] n consistent with P.Thechain polytope C(P )isthesetofpointsz (z,z 2,,z n) [0, ] n satisfying z i +z i2 + +z ik ifx i < P x i2 < P < P x ik is a chain in P.Defineatransfer map φ : O(P ) C(P )by the formula φ(y) (d (y),d 2(y),,d n(y)). Let (P ) be the set of all permutations of {, 2,,n}, and recall e(p ) (P ). Foreachσ (P ), let O σ(p )be the subset of points in O(P ) consistent with the permutation σ. Lemma 3 [2] (a) For any σ (P ), φ is a linear, measurepreserving bijection when its domain is restricted to O σ(p ). (b) φ is a continuous, piecewise-linear, measure-preserving bijection from O(P )ontoc(p). We now review a special entropy in connection with partial orders, which is based on the concept graph entropy first introduced by Körner [4]. Graph entropy has an extensive literature, including applications to complexity theory (e.g. Körner [5], Newman, Ragde and Wigderson [6], Radhakhrishnan [7]). We refer the readers to Csiszár et al [7], or Simonyi s survey [20] for additional information. We restrict our discussions here to those needed for this paper. For any z (z,z 2,,z n)withz i > 0, define ψ(z) log 2 n n log 2 z i. () In connection with sorting problems (in the classical setting), Kahn and Kim [] define the following entropy notion associated with P : H(P )max{ψ(z) z C(P ) }. (2) This can be described alternatively as the graph entropy of the comparability graph of P. It is known [7] that the maximum is finite and achieved at a unique point z in the polytope. Lemma 5 [] log 2 e(p ) nh(p ) O(log 2 e(p )). 3

3 3. PROOF OF THEOREM We adopt the general approach in [0] described in the previous section. Let the set of oracles S consist of those labelled by permutations in (P ). Define the weight function ω in the same way, except of course ω is defined only on S S. Consider any quantum decision tree B for QSORT P with error bounded by ɛ. Define ɛ,w j as in the previous section. Let A P σ,τ (P ) ω(σ, τ ). Lemma 6 For each 0 j<t, W j W j+ 2πe(P ). Lemma 7 W 0 W T ( ɛ )A P. The proof of Lemma 6 is exactly the same as the proof of Lemma as given in [0]. Lemma 7 follows easily from the requirement on the initial and final quantum states produced by the quantum decision tree B. Proposition There exist absolute constants λ, λ > 0 such that e(p ) AP λ log e(p ) λ n. It follows immediately from Lemmas 6, 7 and Proposition that T ( ɛ )A P 2πe(P ) ɛ 2π (λ log e(p ) λ n), which gives Theorem. We prove Proposition in two steps. Proposition 2 e(p ) AP Ω(nE z C(P )(ψ(z))). Proposition 3 There exists an absolute constant µ>0 such that E z C(P ) (ψ(z)) H(P ) µ. Clearly, Proposition follows from Lemma 5, Propositions 2 and 3. We now prove Proposition 2. Note that each permutation σ (P ) gives rise naturally to a point (σ(),σ(2),,σ(n)) in R n, and we shall use the notation d i(σ) with this understanding. Lemma 8 For any σ (P ), log 2 d i(σ) log 2 (n +)+E y Oσ(P )(log 2 d i(y)). Proof of Lemma 8 First consider the case when x i is not a minimal element under partial order P.Letjbesuch that x j < P x i, d i(σ) σ(i) σ(j). Then the expected value of d i(y) for a random y O σ(p ) is the expected difference between the σ(i)-th and the σ(j)-th smallest elements among n randomly chosen real numbers in the interval [0, ]. By standard results from order statistics, we have E y Oσ(P )(d i(y)) di(σ). (3) n + It is easy to verify that the above formula is valid in the other case (when x i is a minimal element under P ). Now using the convexity of logarithm and Equation (3), we obtain E y Oσ(P )(log 2 d i(y)) log 2 (E y Oσ(P )(d i(y)) log 2 ( n + di(σ)). This proves Lemma 8. Q.E.D. It follows from Lemma 8 that log e(p ) 2 d i(σ) σ (P ) log 2 n + E y Oσ(P )(log e(p ) 2 d i(y)) σ (P ) log 2 n + E y O(P ) (log 2 d i(y)). (4) From the definition of A P and ω, wehave A P ( d i(σ) ) σ (P ) σ (P ) Ω(log 2 d i(σ)). (5) It follows from (4) and (5) that e(p ) AP Ω(n log 2 n + E y O(P ) (log 2 d i(y))) Ω(n log 2 n + E y O(P ) ( log 2 d i(y))). By Lemma 3, φ P is a - onto measure-preserving mapping from O(P )toc(p). This leads to e(p ) AP Ω(n log 2 n + E z(z,,z n) C(P )( log 2 z i)) Ω(nE z C(P ) (ψ(z))). This proves Proposition 2. To finish the proof of Proposition, we now prove Proposition 3. First we derive two lemmas. Let Q n be the set of all y (y,,y n) R n such that y i 0and yi. Lemma 9 Let µ 00. Take a random y (y,y 2,,y n) uniformly chosen from Q n. Then, Pr{ log 2 n log y 2 n + µn} e µn/4. i Proof of Lemma 9 The proof is technical, and will be delayed to the Appendix. Let F n R n be the set of all w (w,w 2,,w n)such that w i 0 for all i and wi n. For any w (w,w 2,,w n) F n, let Y denote the function on F n defined by Y (w) n log 2 w i. Lemma 0 Let µ 200,andletD F n be a polytope of volume no less than. Then E w D(Y ) µ, for all sufficiently large n. Proof of Lemma 0 We assume that n is sufficiently large for all asymptotic inequalities (such as n 2 e n <e n/6 ) valid. Let Fn be the set of all w F n satisfying Y (w) µ/2. Let Q n be the set of all y Q n satisfying k n log 2 y k n log 2 n + µn/2. Note that F n is Q n scaled up by a factor of n on all sides, and Fn is Q n scaled up by a factor of n. The probability of a random w F n falling into Fn is exactly equal to the probability for a random y Q n falling into Q n. By Lemma 9, we conclude that Vol(Fn ) e µn/8 Vol(F n) e µn/8 n n n! e µn/9. (6) 4

4 Let J n be the set of all w (w,w 2,,w n) F n with 0 w 2 µn. With the help of equation (6) we obtain log 2 w dw log 2 w dw + log 2 w dw J n Fn J n n n (n )! 2 µn 0 log 2 w dw + Vol(Fn ) log 2 (2 µn ) e n (µn +)2 µn + e µn/9 µn e µn/0. This implies Y (w) dw Fn n log 2 w dw log 2 w i dw e µn/0. (7) Using (7) we obtain Y (w)dw Y (w)dw + D D Fn Vol(D Fn )µ/2 As Vol(D), this leads to D Vol(D)µ/2 e µn/0. E w D(Y ) D Y (w)dw Vol(D) µ 2 e µn/0 Vol(D) µ. Y (w)dw Y (w) dw This completes the proof of Lemma 0. Q.E.D. We now use Lemma 0 to prove Proposition 3. By the definition of H(P ), Proposition 3 can be written as E z C(P ) (ψ(z)) ψ(a) µ, where a is the unique point z C(P ) for ψ(z) to achieve its maximum. As seen in [7, ], C(P ) is contained in the positive quadrant (all z i 0) of R n bounded by z i a i n. Make the change of variables z i a iw i for i n. Then z w gives a one-to-one linear mapping of C(P )in the z i space onto a polytope C (P )inthew i space, with the transformation dz ( ai)dw between the infinitesimal volume elements. Note that C (P ) (which includes all points in [0, ] n ) is a polytope of volume in the positive quadrant of R n bounded by wi n, i.e., C (P ) F n. By Lemma 0, we have E w C (P )(Y ) µ. (8) Now note that ψ(z) log 2 n + log n 2 (a iw i) log 2 n + log n 2 (a i)+ log n 2 (w i) ψ(a)+y (w). Thus, E z C(P ) (ψ(z)) ψ(a)+e w C (P )(Y ). (9) It follows from (8) and (9) that E z C(P ) (ψ(z)) ψ(a) µ. This proves Proposition DISCUSSIONS We suggest several open problems for future investigations. Firstly, can one strengthen Theorem to Q ɛ(p ) Ω(log e(p ))? We conjecture that in fact the quantity A P in Lemma 7 provides such a lower bound, even though the estimation techniques used in the present paper are not strong enough to prove it. Secondly, to what extent do various classical sorting lower bounds remain valid? For example, suppose we allow any ternary polynomial tests p(x,x 2,,x n) : 0, what is the number of quantum queries needed to sort n numbers? Lastly, there are other information lower bounds whose validity in quantum case is non-obvious. For example, see Shi [8]. It would be very interesting to study systematically all the classical information lower bounds for decision trees. 5. REFERENCES [] S. Aaronson. Quantum lower bounds for the collision problem. In Proc. 34th Annual ACM Symposium on Theory of Computing, pages ACM, [2] A. Ambainis. A better lower bound for quantum algorithms searching an ordered list. In Proc. 40th Annual IEEE Symposium on Foundations of Computer Science, pages IEEE, 999. [3] A. Ambainis. Quantum lower bounds by quantum arguments. In Proc. 32nd Annual ACM Symposium on Theory of Computing, pages ACM, [4] R. Beals, H. Buhrman, R. Cleve, M. Mosca, and R. de Wolf. Quantum lower bounds by polynomials. In Proc. 39th Annual IEEE Symposium on Foundations of Computer Science, pages IEEE, 998. [5] C. Bennett, E. Bernstein, G. Brassard, and U. Vazirani. Strengths and weaknesses of quantum computation. SIAM J. on Computing, 26:50 523, 997. [6] H. Buhrman and R. de Wolf. A lower bound for quantum search of an ordered list. Information Processing Letters, 70: , 999. [7] C. Csiszár, J. Körner, L. Lovász, K. Marton, and G. Simonyi. Entropy splitting for antiblocking corners and perfect graphs. Combinatorica, 0:27 40, 990. [8] E. Farhi, J. Goldstone, S. Gutmann, and M. Sipser. A limit on the speed of quantum computation for insertion into an ordered list. arxiv.org e-print archive, quant-ph/982057,

5 [9] M. Fredman. How good is the information bound in sorting. Theoretical Computer Science, :355 36, 976. [0] P. Høyer, J. Neerbek, and Y. Shi. Quantum complexities of ordered searching, sorting, and element distinctness. Algorithmica, 34: , [] J. Kahn and J. Kim. Entropy and sorting. Journal of Computer and System Sciences, 5: , 995. [2] J. Kahn and N. Linial. Balancing poset extensions via Brunn-Minkowski. Combinatorica, : , 99. [3] J. Kahn and M. Saks. Balancing poset extensions. Order, :3 26, 984. [4] J. Körner. Coding of an information source having ambiguous alphabet and the entropy of graphs. In Transactions of 6th Prague Conference on Information Theory, etc., pages Academia, Prague, 973. [5] J. Körner. Fredman-Komlós bounds and information theory. SIAM Journal on Alg. Disc. Meth., 7: , 986. [6] I. Newman, P. Ragde, and A. Wigderson. Perfect hashing, graph entropy and circuit complexity. In Proc. 5th Annual IEEE Symposium on Structure in Complexity Theory, pages IEEE, 990. [7] J. Radhakhrishnan. Better bounds for threshold formulas. In Proc. 32nd Annual IEEE Symposium on Foundations of Computer Science, pages IEEE, 99. [8] Y. Shi. Entropy lower bounds of quantum decision tree complexity. Information Processing Letters, 8():23 27, [9] Y. Shi. Quantum lower bounds for the collision and the element distinctness problems. In Proc. 43rd Annual IEEE Symposium on Foundations of Computer Science, pages IEEE, [20] G. Simonyi. Perfect graphs and graph entropy: An updated survey. Chapter 3 in Perfect Graphs, edited by J. Ramirez-Alfonsin and B. Reed, pages John Wiley and Sons, 200. [2] R. Stanley. Two poset polytopes. Discrete Computational Geometry, :9 23, 986. APPENDIX Proof of Lemma 9 Pick n random real numbers x j uniformly and independently from the interval [0, ], and sort them into ascending order x i x i2 x in.lety (y,y 2,,y n)where y x i,andy j x ij x ij,2 j n. It is easily verified that the generated y is a random point uniformly distributed over Q n. Consider the random variable Y n(x,x 2,,x n) ln y j. (0) j n To prove Lemma 9, we need to show that Pr{Y n n ln n +(µ ln 2)n} e µn/4. () Let us generate x,x 2,,x n sequentially. When we have generated k random numbers x,x 2,,x k,lety k denote the random variable defined as in equation (0) above, except with n replaced by k. Let Y 0 be the constant random variable 0. Lemma A Let k n, andletx,x 2,,x k be distinct. Then Y k (x,x 2,,x k ) Y k (x,x 2,,x k )+ln(2/δ), where δ 0 is the minimum distance between x k and any numbersintheset{0,x,x 2,,x k }. ProofofLemmaA The numbers x,x 2,,x k divide the interval [0, ] into k sub-intervals. Suppose that x k falls into a sub-interval I of length u, and splits it into two parts of length λu and ( λ)u. There are two cases. If I is not the rightmost sub-interval, then Y k (x,x 2,,x k ) Y k (x,x 2,,x k ) ln(λu) ln(( λ)u)+lnu ln( 2 δ ). If I is the rightmost interval, then Y k (x,x 2,,x k ) Y k (x,x 2,,x k ) ln(λu) ln( δ ). This proves Lemma A. Q.E.D. Let us regard Y 0 0,Y,Y 2,,Y n as a sequence of random variables where Y k depends only on x,x 2,...,x k. It follows immediately from Lemma A that, Pr{Y k Y k t} 4ke t (2) for all t 0. Consider the probability distribution ρ k over [0, ]: { 0 t ln(4k) ρ k (t) 4ke t t>ln(4k). Let A k be a real-valued random variable defined on some probability space such that ρ k is the density function for the distribution of the value of A k, i.e., Pr{A k t} t ρ k (τ)dτ. (3) It is easily verified from equations (2) and (3) that Pr{Y k Y k t} Pr{A k t}. That is, Y k Y k is stochastically dominated by A k. Now note that Y n k n (Y k Y k ). This means Pr{Y n T } Pr{A T }, (4) where A k n A k. Lemma A2 Let T n ln n +(µ ln 2)n, then Pr{A T } e µn/4. Proof Let T T ln(4 n n!). Then Pr{A T } dt ρ k (t k ) ( t(t,,tn) k t k T k n (4k)) k n e s(s,,sn) s k 0, k s k T T e v v n (n )! dv. t(t,,tn) t k ln(4k), k t k T k s k ds e k t k dt 6

6 By assumption T T ln(4 n n!) ((µ ln 2) 2)n, wehave for all v T, v n (n )! ev/2. It follows that Pr{A T } T 2e T /2. e v/2 dv This implies Pr{A T } e µn/4, andproveslemmaa2.q.e.d. Equation () follows from Lemma A2 and equation (4). This completes the proof of Lemma 9. 7

arxiv:quant-ph/ v1 29 May 2003

arxiv:quant-ph/ v1 29 May 2003 Quantum Lower Bounds for Collision and Element Distinctness with Small Range arxiv:quant-ph/0305179v1 29 May 2003 Andris Ambainis Abstract We give a general method for proving quantum lower bounds for

More information

A better lower bound for quantum algorithms searching an ordered list

A better lower bound for quantum algorithms searching an ordered list A better lower bound for quantum algorithms searching an ordered list Andris Ambainis Computer Science Division University of California Berkeley, CA 94720, e-mail: ambainis@cs.berkeley.edu Abstract We

More information

The Quantum Query Complexity of Algebraic Properties

The Quantum Query Complexity of Algebraic Properties The Quantum Query Complexity of Algebraic Properties Sebastian Dörn Institut für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430

More information

Quantum complexities of ordered searching, sorting, and element distinctness

Quantum complexities of ordered searching, sorting, and element distinctness Quantum complexities of ordered searching, sorting, and element distinctness Peter Høyer Jan Neerbek Yaoyun Shi September 7, 00 Abstract We consider the quantum complexities of the following three problems:

More information

Sorting under partial information (without the ellipsoid algorithm)

Sorting under partial information (without the ellipsoid algorithm) Sorting under partial information (without the ellipsoid algorithm) Jean Cardinal ULB Samuel Fiorini ULB Gwenaël Joret ULB Raphaël Jungers UCL/MIT Ian Munro Waterloo Sorting by comparisons under partial

More information

Quantum Algorithms for Evaluating Min-Max Trees

Quantum Algorithms for Evaluating Min-Max Trees Quantum Algorithms for Evaluating Min-Max Trees Richard Cleve 1,2,DmitryGavinsky 1, and D. L. Yonge-Mallo 1 1 David R. Cheriton School of Computer Science and Institute for Quantum Computing, University

More information

The quantum query complexity of read-many formulas

The quantum query complexity of read-many formulas The quantum query complexity of read-many formulas Andrew Childs Waterloo Shelby Kimmel MIT Robin Kothari Waterloo Boolean formulas ^ x 1 x 2 _ x 3 ^ x 1 x 3 A formula is read-once if every input appears

More information

arxiv: v1 [quant-ph] 6 Feb 2013

arxiv: v1 [quant-ph] 6 Feb 2013 Exact quantum query complexity of EXACT and THRESHOLD arxiv:302.235v [quant-ph] 6 Feb 203 Andris Ambainis Jānis Iraids Juris Smotrovs University of Latvia, Raiņa bulvāris 9, Riga, LV-586, Latvia February

More information

Quantum Complexity of Testing Group Commutativity

Quantum Complexity of Testing Group Commutativity Quantum Complexity of Testing Group Commutativity Frédéric Magniez 1 and Ashwin Nayak 2 1 CNRS LRI, UMR 8623 Université Paris Sud, France 2 University of Waterloo and Perimeter Institute for Theoretical

More information

Quantum Algorithms for Element Distinctness

Quantum Algorithms for Element Distinctness Quantum Algorithms for Element Distinctness Harry Buhrman Christoph Dürr Mark Heiligman Peter Høyer Frédéric Magniez Miklos Santha Ronald de Wolf Abstract We present several applications of quantum amplitude

More information

Lecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02]

Lecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02] Quantum Computation (CMU 18-859BB, Fall 015) Lecture 13: Lower Bounds using the Adversary Method October 1, 015 Lecturer: Ryan O Donnell Scribe: Kumail Jaffer 1 Introduction There are a number of known

More information

How Low Can Approximate Degree and Quantum Query Complexity be for Total Boolean Functions?

How Low Can Approximate Degree and Quantum Query Complexity be for Total Boolean Functions? How Low Can Approximate Degree and Quantum Query Complexity be for Total Boolean Functions? Andris Ambainis Ronald de Wolf Abstract It has long been known that any Boolean function that depends on n input

More information

Optimal quantum adversary lower bounds for ordered search

Optimal quantum adversary lower bounds for ordered search Optimal quantum adversary lower bounds for ordered search Andrew M. Childs Troy Lee Abstract The goal of the ordered search problem is to find a particular item in an ordered list of n items. Using the

More information

The Quantum Query Complexity of the Determinant

The Quantum Query Complexity of the Determinant The Quantum Query Complexity of the Determinant Sebastian Dörn Inst. für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430 Aalen,

More information

Lecture 6. Today we shall use graph entropy to improve the obvious lower bound on good hash functions.

Lecture 6. Today we shall use graph entropy to improve the obvious lower bound on good hash functions. CSE533: Information Theory in Computer Science September 8, 010 Lecturer: Anup Rao Lecture 6 Scribe: Lukas Svec 1 A lower bound for perfect hash functions Today we shall use graph entropy to improve the

More information

Quantum Algorithms for Element Distinctness

Quantum Algorithms for Element Distinctness Quantum Algorithms for Element Distinctness Harry Buhrman Christoph Dürr Þ Mark Heiligman Ü Peter Høyer ß Frédéric Magniez Miklos Santha Ronald de Wolf ÝÝ Abstract We present several applications of quantum

More information

The query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector

The query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector 1 Query model In the quantum query model we wish to compute some function f and we access the input through queries. The complexity of f is the number of queries needed to compute f on a worst-case input

More information

Random Permutations using Switching Networks

Random Permutations using Switching Networks Random Permutations using Switching Networks Artur Czumaj Department of Computer Science Centre for Discrete Mathematics and its Applications (DIMAP) University of Warwick A.Czumaj@warwick.ac.uk ABSTRACT

More information

Quantum Property Testing

Quantum Property Testing Quantum Property Testing Harry Buhrman Lance Fortnow Ilan ewman Hein Röhrig ovember 24, 2003 Abstract A language L has a property tester if there exists a probabilistic algorithm that given an input x

More information

Quantum Lower Bound for Recursive Fourier Sampling

Quantum Lower Bound for Recursive Fourier Sampling Quantum Lower Bound for Recursive Fourier Sampling Scott Aaronson Institute for Advanced Study, Princeton aaronson@ias.edu Abstract One of the earliest quantum algorithms was discovered by Bernstein and

More information

Block Sensitivity of Minterm-Transitive Functions

Block Sensitivity of Minterm-Transitive Functions Block Sensitivity of Minterm-Transitive Functions Andrew Drucker Abstract Boolean functions with a high degree of symmetry are interesting from a complexity theory perspective: extensive research has shown

More information

Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity

Cell-Probe Proofs and Nondeterministic Cell-Probe Complexity Cell-obe oofs and Nondeterministic Cell-obe Complexity Yitong Yin Department of Computer Science, Yale University yitong.yin@yale.edu. Abstract. We study the nondeterministic cell-probe complexity of static

More information

Quantum Property Testing

Quantum Property Testing Quantum Property Testing Harry Buhrman Lance Fortnow Ilan ewman Hein Röhrig March 24, 2004 Abstract A language L has a property tester if there exists a probabilistic algorithm that given an input x only

More information

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Kenya Ueno The Young Researcher Development Center and Graduate School of Informatics, Kyoto University kenya@kuis.kyoto-u.ac.jp Abstract.

More information

On the tightness of the Buhrman-Cleve-Wigderson simulation

On the tightness of the Buhrman-Cleve-Wigderson simulation On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. syzhang@cse.cuhk.edu.hk Abstract. Buhrman,

More information

arxiv: v3 [cs.ds] 21 Jan 2013

arxiv: v3 [cs.ds] 21 Jan 2013 Sorting under Partial Information (without the Ellipsoid Algorithm) Jean Cardinal, Samuel Fiorini, Gwenaël Joret, Raphaël M. Jungers, J. Ian Munro arxiv:0911.0086v3 [cs.ds] 21 Jan 2013 Abstract We revisit

More information

arxiv: v3 [quant-ph] 3 Jul 2012

arxiv: v3 [quant-ph] 3 Jul 2012 MIT-CTP 4242 Super-Polynomial Quantum Speed-ups for Boolean Evaluation Trees with Hidden Structure Bohua Zhan Shelby Kimmel Avinatan Hassidim November 2, 2018 arxiv:1101.0796v3 [quant-ph] 3 Jul 2012 Abstract

More information

On the complexity of approximate multivariate integration

On the complexity of approximate multivariate integration On the complexity of approximate multivariate integration Ioannis Koutis Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 USA ioannis.koutis@cs.cmu.edu January 11, 2005 Abstract

More information

Improved Quantum Algorithm for Triangle Finding via Combinatorial Arguments

Improved Quantum Algorithm for Triangle Finding via Combinatorial Arguments Improved Quantum Algorithm for Triangle Finding via Combinatorial Arguments François Le Gall The University of Tokyo Technical version available at arxiv:1407.0085 [quant-ph]. Background. Triangle finding

More information

On the query complexity of counterfeiting quantum money

On the query complexity of counterfeiting quantum money On the query complexity of counterfeiting quantum money Andrew Lutomirski December 14, 2010 Abstract Quantum money is a quantum cryptographic protocol in which a mint can produce a state (called a quantum

More information

Graph Properties and Circular Functions: How Low Can Quantum Query Complexity Go?

Graph Properties and Circular Functions: How Low Can Quantum Query Complexity Go? Graph Properties and Circular Functions: How Low Can Quantum Query Complexity Go? Xiaoming Sun Computer Science Department, Tsinghua University, Beijing, 100084, P. R. China. sun xm97@mails.tsinghua.edu.cn

More information

Lecture 12: Lower Bounds for Element-Distinctness and Collision

Lecture 12: Lower Bounds for Element-Distinctness and Collision Quantum Computation (CMU 18-859BB, Fall 015) Lecture 1: Lower Bounds for Element-Distinctness and Collision October 19, 015 Lecturer: John Wright Scribe: Titouan Rigoudy 1 Outline In this lecture, we will:

More information

Fréchet embeddings of negative type metrics

Fréchet embeddings of negative type metrics Fréchet embeddings of negative type metrics Sanjeev Arora James R Lee Assaf Naor Abstract We show that every n-point metric of negative type (in particular, every n-point subset of L 1 ) admits a Fréchet

More information

Approximating sparse binary matrices in the cut-norm

Approximating sparse binary matrices in the cut-norm Approximating sparse binary matrices in the cut-norm Noga Alon Abstract The cut-norm A C of a real matrix A = (a ij ) i R,j S is the maximum, over all I R, J S of the quantity i I,j J a ij. We show that

More information

Asymptotic redundancy and prolixity

Asymptotic redundancy and prolixity Asymptotic redundancy and prolixity Yuval Dagan, Yuval Filmus, and Shay Moran April 6, 2017 Abstract Gallager (1978) considered the worst-case redundancy of Huffman codes as the maximum probability tends

More information

Integer Least Squares: Sphere Decoding and the LLL Algorithm

Integer Least Squares: Sphere Decoding and the LLL Algorithm Integer Least Squares: Sphere Decoding and the LLL Algorithm Sanzheng Qiao Department of Computing and Software McMaster University 28 Main St. West Hamilton Ontario L8S 4L7 Canada. ABSTRACT This paper

More information

arxiv: v2 [math.co] 3 Dec 2014

arxiv: v2 [math.co] 3 Dec 2014 POSET ENTROPY VERSUS NUMBER OF LINEAR EXTENSIONS: THE WIDTH-2 CASE SAMUEL FIORINI AND SELIM REXHEP arxiv:402.5024v2 [math.co] 3 Dec 204 Abstract. Kahn and Kim (J. Comput. Sci., 995) have shown that for

More information

QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University

QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING Alexander Vasiliev Kazan Federal University Abstract: In this paper we consider an application of the recently proposed quantum hashing technique for computing

More information

Discrete quantum random walks

Discrete quantum random walks Quantum Information and Computation: Report Edin Husić edin.husic@ens-lyon.fr Discrete quantum random walks Abstract In this report, we present the ideas behind the notion of quantum random walks. We further

More information

Quantum Algorithms for Graph Traversals and Related Problems

Quantum Algorithms for Graph Traversals and Related Problems Quantum Algorithms for Graph Traversals and Related Problems Sebastian Dörn Institut für Theoretische Informatik, Universität Ulm, 89069 Ulm, Germany sebastian.doern@uni-ulm.de Abstract. We study the complexity

More information

Reflections Reflections

Reflections Reflections Reflections Reflections for quantum query algorithms Ben Reichardt University of Waterloo Reflections Reflections for quantum query algorithms Ben Reichardt University of Waterloo Reflections for quantum

More information

arxiv:quant-ph/ v1 15 Apr 2005

arxiv:quant-ph/ v1 15 Apr 2005 Quantum walks on directed graphs Ashley Montanaro arxiv:quant-ph/0504116v1 15 Apr 2005 February 1, 2008 Abstract We consider the definition of quantum walks on directed graphs. Call a directed graph reversible

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 49 - Foundations of Communication Complexity Lecturer: Toniann Pitassi 1 The Discrepancy Method Cont d In the previous lecture we ve outlined the discrepancy method, which is a method for getting lower

More information

Notes for Lecture 25

Notes for Lecture 25 U.C. Berkeley CS278: Computational Complexity Handout N25 ofessor Luca Trevisan 12/1/2004 Notes for Lecture 25 Circuit Lower Bounds for Parity Using Polynomials In this lecture we prove a lower bound on

More information

Notes on Logarithmic Lower Bounds in the Cell Probe Model

Notes on Logarithmic Lower Bounds in the Cell Probe Model Notes on Logarithmic Lower Bounds in the Cell Probe Model Kevin Zatloukal November 10, 2010 1 Overview Paper is by Mihai Pâtraşcu and Erik Demaine. Both were at MIT at the time. (Mihai is now at AT&T Labs.)

More information

The concentration of the chromatic number of random graphs

The concentration of the chromatic number of random graphs The concentration of the chromatic number of random graphs Noga Alon Michael Krivelevich Abstract We prove that for every constant δ > 0 the chromatic number of the random graph G(n, p) with p = n 1/2

More information

LOWER BOUNDS ON BALANCING SETS AND DEPTH-2 THRESHOLD CIRCUITS

LOWER BOUNDS ON BALANCING SETS AND DEPTH-2 THRESHOLD CIRCUITS LOWER BOUNDS ON BALANCING SETS AND DEPTH-2 THRESHOLD CIRCUITS PAVEL HRUBEŠ, SIVARAMAKRISHNAN NATARAJAN RAMAMOORTHY, ANUP RAO, AND AMIR YEHUDAYOFF Abstract. There are various notions of balancing set families

More information

Quantum and Classical Query Complexities of Local Search are Polynomially Related

Quantum and Classical Query Complexities of Local Search are Polynomially Related Quantum and Classical Query Complexities of Local Search are Polynomially Related Miklos Santha Mario Szegedy Abstract Let f be an integer valued function on a finite set V. We call an undirected graph

More information

arxiv: v1 [cs.cc] 16 Mar 2017

arxiv: v1 [cs.cc] 16 Mar 2017 A Nearly Optimal Lower Bound on the Approximate Degree of AC 0 Mark Bun mbun@cs.princeton.edu Justin Thaler justin.thaler@georgetown.edu arxiv:1703.05784v1 [cs.cc] 16 Mar 2017 Abstract The approximate

More information

How Powerful is Adiabatic Quantum Computation?

How Powerful is Adiabatic Quantum Computation? How Powerful is Adiabatic Quantum Computation? Wim van Dam Michele Mosca Umesh Vazirani Abstract We analyze the computational power limitations of the recently proposed quantum adiabatic evolution algorithm

More information

Quantum Queries for Testing Distributions

Quantum Queries for Testing Distributions Quantum Queries for Testing Distributions Sourav Chakraborty Eldar Fischer Arie Matsliah Ronald de Wolf Abstract We consider probability distributions given in the form of an oracle f : [n] [m] that we

More information

Complexity-Theoretic Foundations of Quantum Supremacy Experiments

Complexity-Theoretic Foundations of Quantum Supremacy Experiments Complexity-Theoretic Foundations of Quantum Supremacy Experiments Scott Aaronson, Lijie Chen UT Austin, Tsinghua University MIT July 7, 2017 Scott Aaronson, Lijie Chen (UT Austin, Tsinghua University Complexity-Theoretic

More information

Stochastic Realization of Binary Exchangeable Processes

Stochastic Realization of Binary Exchangeable Processes Stochastic Realization of Binary Exchangeable Processes Lorenzo Finesso and Cecilia Prosdocimi Abstract A discrete time stochastic process is called exchangeable if its n-dimensional distributions are,

More information

CS5314 Randomized Algorithms. Lecture 15: Balls, Bins, Random Graphs (Hashing)

CS5314 Randomized Algorithms. Lecture 15: Balls, Bins, Random Graphs (Hashing) CS5314 Randomized Algorithms Lecture 15: Balls, Bins, Random Graphs (Hashing) 1 Objectives Study various hashing schemes Apply balls-and-bins model to analyze their performances 2 Chain Hashing Suppose

More information

Improving Quantum Query Complexity of Boolean Matrix Multiplication Using Graph Collision

Improving Quantum Query Complexity of Boolean Matrix Multiplication Using Graph Collision Improving Quantum Query Complexity of Boolean Matrix Multiplication Using Graph Collision Stacey Jeffery 1,2, Robin Kothari 1,2, and Frédéric Magniez 3 1 David R. Cheriton School of Computer Science, University

More information

Balanced Allocation Through Random Walk

Balanced Allocation Through Random Walk Balanced Allocation Through Random Walk Alan Frieze Samantha Petti November 25, 2017 Abstract We consider the allocation problem in which m (1 ε)dn items are to be allocated to n bins with capacity d.

More information

Algebraic Problems in Computational Complexity

Algebraic Problems in Computational Complexity Algebraic Problems in Computational Complexity Pranab Sen School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai 400005, India pranab@tcs.tifr.res.in Guide: Prof. R.

More information

On the correlation of parity and small-depth circuits

On the correlation of parity and small-depth circuits Electronic Colloquium on Computational Complexity, Report No. 137 (2012) On the correlation of parity and small-depth circuits Johan Håstad KTH - Royal Institute of Technology November 1, 2012 Abstract

More information

Last time, we described a pseudorandom generator that stretched its truly random input by one. If f is ( 1 2

Last time, we described a pseudorandom generator that stretched its truly random input by one. If f is ( 1 2 CMPT 881: Pseudorandomness Prof. Valentine Kabanets Lecture 20: N W Pseudorandom Generator November 25, 2004 Scribe: Ladan A. Mahabadi 1 Introduction In this last lecture of the course, we ll discuss the

More information

Quantum algorithms based on span programs

Quantum algorithms based on span programs Quantum algorithms based on span programs Ben Reichardt IQC, U Waterloo [arxiv:0904.2759] Model: Complexity measure: Quantum algorithms Black-box query complexity Span programs Witness size [KW 93] [RŠ

More information

Testing Expansion in Bounded-Degree Graphs

Testing Expansion in Bounded-Degree Graphs Testing Expansion in Bounded-Degree Graphs Artur Czumaj Department of Computer Science University of Warwick Coventry CV4 7AL, UK czumaj@dcs.warwick.ac.uk Christian Sohler Department of Computer Science

More information

Quantum Communication Complexity

Quantum Communication Complexity Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,

More information

A Non-Linear Lower Bound for Constant Depth Arithmetical Circuits via the Discrete Uncertainty Principle

A Non-Linear Lower Bound for Constant Depth Arithmetical Circuits via the Discrete Uncertainty Principle A Non-Linear Lower Bound for Constant Depth Arithmetical Circuits via the Discrete Uncertainty Principle Maurice J. Jansen Kenneth W.Regan November 10, 2006 Abstract We prove a non-linear lower bound on

More information

Lecture 22: Counting

Lecture 22: Counting CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.

More information

On the Impact of Objective Function Transformations on Evolutionary and Black-Box Algorithms

On the Impact of Objective Function Transformations on Evolutionary and Black-Box Algorithms On the Impact of Objective Function Transformations on Evolutionary and Black-Box Algorithms [Extended Abstract] Tobias Storch Department of Computer Science 2, University of Dortmund, 44221 Dortmund,

More information

On a hypergraph matching problem

On a hypergraph matching problem On a hypergraph matching problem Noga Alon Raphael Yuster Abstract Let H = (V, E) be an r-uniform hypergraph and let F 2 V. A matching M of H is (α, F)- perfect if for each F F, at least α F vertices of

More information

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic

More information

Resolution and the Weak Pigeonhole Principle

Resolution and the Weak Pigeonhole Principle Resolution and the Weak Pigeonhole Principle Sam Buss 1 and Toniann Pitassi 2 1 Departments of Mathematics and Computer Science University of California, San Diego, La Jolla, CA 92093-0112. 2 Department

More information

Minimum Moment Steiner Trees

Minimum Moment Steiner Trees Minimum Moment Steiner Trees Wangqi Qiu Weiping Shi Abstract For a rectilinear Steiner tree T with a root, define its k-th moment M k (T ) = (d T (u)) k du, T where the integration is over all edges of

More information

Total Ordering on Subgroups and Cosets

Total Ordering on Subgroups and Cosets Total Ordering on Subgroups and Cosets Alexander Hulpke Department of Mathematics Colorado State University 1874 Campus Delivery Fort Collins, CO 80523-1874 hulpke@math.colostate.edu Steve Linton Centre

More information

(each row defines a probability distribution). Given n-strings x X n, y Y n we can use the absence of memory in the channel to compute

(each row defines a probability distribution). Given n-strings x X n, y Y n we can use the absence of memory in the channel to compute ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6 (draft; 9/6/03. Error exponents for Discrete Memoryless Channels http://www.enee.umd.edu/ abarg/enee739c/course.html

More information

Bounds for Error Reduction with Few Quantum Queries

Bounds for Error Reduction with Few Quantum Queries Bounds for Error Reduction with Few Quantum Queries Sourav Chakraborty, Jaikumar Radhakrishnan 2,3, and andakumar Raghunathan Department of Computer Science, University of Chicago, Chicago, IL 60637, USA

More information

Avoiding Approximate Squares

Avoiding Approximate Squares Avoiding Approximate Squares Narad Rampersad School of Computer Science University of Waterloo 13 June 2007 (Joint work with Dalia Krieger, Pascal Ochem, and Jeffrey Shallit) Narad Rampersad (University

More information

Independence numbers of locally sparse graphs and a Ramsey type problem

Independence numbers of locally sparse graphs and a Ramsey type problem Independence numbers of locally sparse graphs and a Ramsey type problem Noga Alon Abstract Let G = (V, E) be a graph on n vertices with average degree t 1 in which for every vertex v V the induced subgraph

More information

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai

PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation

More information

Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size

Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size Ran Raz Weizmann Institute ranraz@wisdom.weizmann.ac.il Abstract An arithmetic formula is multi-linear if the polynomial

More information

arxiv: v1 [cs.ds] 15 Feb 2012

arxiv: v1 [cs.ds] 15 Feb 2012 Linear-Space Substring Range Counting over Polylogarithmic Alphabets Travis Gagie 1 and Pawe l Gawrychowski 2 1 Aalto University, Finland travis.gagie@aalto.fi 2 Max Planck Institute, Germany gawry@cs.uni.wroc.pl

More information

New Results on Quantum Property Testing

New Results on Quantum Property Testing New Results on Quantum Property Testing Sourav Chakraborty 1, Eldar Fischer 2, Arie Matsliah 3, and Ronald de Wolf 3 1 Chennai Mathematical Institute, Chennai, India. sourav@cmi.ac.in 2 Computer Science

More information

arxiv: v1 [cs.cc] 31 May 2014

arxiv: v1 [cs.cc] 31 May 2014 Size of Sets with Small Sensitivity: a Generalization of Simon s Lemma Andris Ambainis and Jevgēnijs Vihrovs arxiv:1406.0073v1 [cs.cc] 31 May 2014 Faculty of Computing, University of Latvia, Raiņa bulv.

More information

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function

More information

COS597D: Information Theory in Computer Science October 5, Lecture 6

COS597D: Information Theory in Computer Science October 5, Lecture 6 COS597D: Information Theory in Computer Science October 5, 2011 Lecture 6 Lecturer: Mark Braverman Scribe: Yonatan Naamad 1 A lower bound for perfect hash families. In the previous lecture, we saw that

More information

Coin-flipping games immune against linear-sized coalitions (Extended abstract)

Coin-flipping games immune against linear-sized coalitions (Extended abstract) Coin-flipping games immune against linear-sized coalitions (Extended abstract) Abstract Noga Alon IBM Almaden Research Center, San Jose, CA 9510 and Sackler Faculty of Exact Sciences, Tel Aviv University,

More information

Testing Booleanity and the Uncertainty Principle

Testing Booleanity and the Uncertainty Principle Testing Booleanity and the Uncertainty Principle Tom Gur Weizmann Institute of Science tom.gur@weizmann.ac.il Omer Tamuz Weizmann Institute of Science omer.tamuz@weizmann.ac.il Abstract Let f : { 1, 1}

More information

A Noisy-Influence Regularity Lemma for Boolean Functions Chris Jones

A Noisy-Influence Regularity Lemma for Boolean Functions Chris Jones A Noisy-Influence Regularity Lemma for Boolean Functions Chris Jones Abstract We present a regularity lemma for Boolean functions f : {, } n {, } based on noisy influence, a measure of how locally correlated

More information

ON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES

ON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES ON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES JOSHUA BIDERMAN, KEVIN CUDDY, ANG LI, MIN JAE SONG Abstract. In this paper we present a graph property with sensitivity Θ( n), where n = ( v 2) is the

More information

An exponential separation between quantum and classical one-way communication complexity

An exponential separation between quantum and classical one-way communication complexity An exponential separation between quantum and classical one-way communication complexity Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical

More information

Lower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine)

Lower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine) Lower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine) Mihai Pǎtraşcu, MIT, web.mit.edu/ mip/www/ Index terms: partial-sums problem, prefix sums, dynamic lower bounds Synonyms: dynamic trees 1

More information

Lecture 23: Alternation vs. Counting

Lecture 23: Alternation vs. Counting CS 710: Complexity Theory 4/13/010 Lecture 3: Alternation vs. Counting Instructor: Dieter van Melkebeek Scribe: Jeff Kinne & Mushfeq Khan We introduced counting complexity classes in the previous lecture

More information

Cell-Probe Lower Bounds for Prefix Sums and Matching Brackets

Cell-Probe Lower Bounds for Prefix Sums and Matching Brackets Cell-Probe Lower Bounds for Prefix Sums and Matching Brackets Emanuele Viola July 6, 2009 Abstract We prove that to store strings x {0, 1} n so that each prefix sum a.k.a. rank query Sumi := k i x k can

More information

Stanford University CS254: Computational Complexity Handout 8 Luca Trevisan 4/21/2010

Stanford University CS254: Computational Complexity Handout 8 Luca Trevisan 4/21/2010 Stanford University CS254: Computational Complexity Handout 8 Luca Trevisan 4/2/200 Counting Problems Today we describe counting problems and the class #P that they define, and we show that every counting

More information

Quantum Correlations: From Bell inequalities to Tsirelson s theorem

Quantum Correlations: From Bell inequalities to Tsirelson s theorem Quantum Correlations: From Bell inequalities to Tsirelson s theorem David Avis April, 7 Abstract The cut polytope and its relatives are good models of the correlations that can be obtained between events

More information

Affine extractors over large fields with exponential error

Affine extractors over large fields with exponential error Affine extractors over large fields with exponential error Jean Bourgain Zeev Dvir Ethan Leeman Abstract We describe a construction of explicit affine extractors over large finite fields with exponentially

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex bodies is hard Navin Goyal Microsoft Research India navingo@microsoft.com Luis Rademacher Georgia Tech lrademac@cc.gatech.edu Abstract We show that learning a convex body in R d, given

More information

A Robust APTAS for the Classical Bin Packing Problem

A Robust APTAS for the Classical Bin Packing Problem A Robust APTAS for the Classical Bin Packing Problem Leah Epstein 1 and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. Email: lea@math.haifa.ac.il 2 Department of Statistics,

More information

Lecture 17: D-Stable Polynomials and Lee-Yang Theorems

Lecture 17: D-Stable Polynomials and Lee-Yang Theorems Counting and Sampling Fall 2017 Lecture 17: D-Stable Polynomials and Lee-Yang Theorems Lecturer: Shayan Oveis Gharan November 29th Disclaimer: These notes have not been subjected to the usual scrutiny

More information

Entropy and Graphs. Seyed Saeed Changiz Rezaei

Entropy and Graphs. Seyed Saeed Changiz Rezaei Entropy and Graphs by Seyed Saeed Changiz Rezaei A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics in Combinatorics and Optimization

More information

Quantum computers can search arbitrarily large databases by a single query

Quantum computers can search arbitrarily large databases by a single query Quantum computers can search arbitrarily large databases by a single query Lov K. Grover, 3C-404A Bell Labs, 600 Mountain Avenue, Murray Hill J 07974 (lkgrover@bell-labs.com) Summary This paper shows that

More information

Testing Graph Isomorphism

Testing Graph Isomorphism Testing Graph Isomorphism Eldar Fischer Arie Matsliah Abstract Two graphs G and H on n vertices are ɛ-far from being isomorphic if at least ɛ ( n 2) edges must be added or removed from E(G) in order to

More information

COS598D Lecture 3 Pseudorandom generators from one-way functions

COS598D Lecture 3 Pseudorandom generators from one-way functions COS598D Lecture 3 Pseudorandom generators from one-way functions Scribe: Moritz Hardt, Srdjan Krstic February 22, 2008 In this lecture we prove the existence of pseudorandom-generators assuming that oneway

More information

Faster quantum algorithm for evaluating game trees

Faster quantum algorithm for evaluating game trees Faster quantum algorithm for evaluating game trees x 7 x 8 Ben Reichardt xx1 1 x 2 x 3 x 4 x 6 OR x 9 x1 1 x 5 x 9 University of Waterloo x 5 AND OR AND AND OR AND ϕ(x) x 7 x 8 x 1 x 2 x 3 x 4 x 6 OR x

More information