Graph Entropy and Quantum Sorting Problems
|
|
- Alan Norris
- 5 years ago
- Views:
Transcription
1 Graph Entropy and Quantum Sorting Problems [Extended Abstract] Andrew Chi-Chih Yao Computer Science Department Princeton University Princeton, NJ ABSTRACT Let P (X, < P ) be a partial order on a set of n elements X {x,x 2,,x n}. Define the quantum sorting problem QSORT P as: given n distinct numbers x,x 2,,x n consistent with P, sort them by a quantum decision tree using comparisons of the form x i : x j. Let Q ɛ(p ) be the minimum number of queries used by any quantum decision tree for solving QSORT P with error less than ɛ (where 0 <ɛ</0 is fixed). It was proved by Høyer, Neerbek and Shi (Algorithmica 34 (2002), ) that, when P 0 is the empty partial order, Q ɛ(p 0) Ω(n log n), i.e., the classical information lower bound holds for quantum decision trees when the input permutations are unrestricted. In this paper we show that the classical information lower bound holds, up to an additive linear term, for quantum decision trees for any partial order P. Precisely, we prove Q ɛ(p ) c log 2 e(p ) c n where c, c > 0 are constants and e(p ) is the number of linear orderings consistent with P. Our proof builds on an interesting connection between sorting and Körner s graph entropy that was first noted and developed by Kahn and Kim (JCSS 5(995), ). Categories and Subject Descriptors F. [Theory of Computation]: Computation by Abstract Devices General Terms Theory Keywords Graph entropy, information lower bound, partial order, quantum algorithms, sorting This research was supported in part by the National Science Foundation grant CCR Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. STOC 04, June 3-5, 2004, Chicago, Illinois, USA. Copyright 2004 ACM /04/ $ INTRODUCTION How much can a computation be helped by the use of quantum algorithms has often been studied in the blackbox model, which is also called the oracle model, or the quantum decision tree model. To determine the value of a function f(x,x 2,,x N ), queries of the form x i? are successively asked and the quantum state gets updated by this information. After a predetermined number of steps, the quantum state is measured to produce the output. This standard model has been extensively studied in recent years, and several lower bound techniques have been developed and applied. For detailed descriptions of the model, we refer the readers to recent literature on this subject (see e.g., [, 2, 3, 4, 5, 0, 9]). Exactly when and how much speed-up can be achieved is still unresolved for many problems in the quantum decision tree model. In this paper we focus on a specific issue which relates to the information lower bound for classical decision trees. To identify an unknown item taken from a pool of M possibilities, it takes at least log 2 M tests in the classical framework if the information obtained from one test is only bit. However, this is no longer true in general when quantum states can be used to collect and process information. Two of the fundamental search problems in which information bounds play a part are the ordered table search, and the sorting problem. In both cases, there is a natural information bound in the classical decision tree model, with a matching upper bound. In the quantum setting, the ordered table search problem has been extensively studied (Farhi et al [8], Ambainis [2], Buhrman and de Wolf [6]), and it was demonstrated in these papers that the information bound Ω(log n) is asymptotically valid for quantum decision trees. For the sorting problem, Høyer, Neerbek and Shi [0] showed that the information lower bound also remains valid for quantum decision trees, i.e., Ω(n log n) quantumqueries are needed. In this paper, we study a class of problems known as the sorting problems for partial orders. Let P be a partial order on a set of n elements {x,x 2,,x n}. Given n input numbers consistent with P, Fredman [9] showed that there is a classical decision tree using log e(p )+2n binary comparisons x i : x j to determine the linear orderings of these numbers, where e(p ) is the number of linear orderings consistent with P. Subsequent work by Kahn and Saks [3] (see also [, 2]) showed that O(log e(p )) comparisons are sufficient. Thus, the information lower bound log 2 e(p )is asymptotically tight for classical decision trees. For quan- 2
2 tum decision trees, it is not clear whether the information lower bound is valid (except it is known to be true when P is empty as shown in [0]). This is the focus of our inquiry. Define the quantum sorting problem QSORT P as: given n distinct numbers x,x 2,,x n consistent with P, sort them by a quantum decision tree using comparisons of the form x i : x j. Let Q ɛ(p ) be the minimum number of queries used by any quantum decision tree for solving QSORT P with error less than ɛ (where 0 <ɛ</0 is fixed). Our main result is that the classical information lower bound holds, up to additive linear term, for quantum decision trees for any partial order P.Let0<ɛ</0 be any fixed constant. Theorem There exist absolute constants c, c such that Q ɛ(p ) c log e(p ) c n. Our proof relies on the general approach used in [0], and builds on an interesting connection between sorting and Körner s graph entropy in the classical decision tree setting that was first noted and developed by Kahn and Kim []. The main underlying idea in our proof is that, when adapted for partial order P, the complexity measure used in [0] turns out to be almost the same as the entropy considered in []. 2. PRELIMINARIES 2. Review of Lower Bounds in Høyer et al We review the lower bound proof by Høyer, Neerbek and Shi [0] on quantum sorting. We begin with a general framework. Let f : S {0, } m,wheres {0, } N. Consider a quantum decision tree for computing f with probability error bounded by ɛ>0. Let ξ j x > be the quantum state after j oracle steps, when x S is the oracle. Then ξ 0 x > is equal to some fixed initial state (independent of x). After T steps at the end of computation, we must have <ξ T x ξ T y > ɛ if f(x) f(y), where ɛ 2(ɛ( ɛ)) /2. To prove a lower bound, a weight function ω : S S [0, ) is chosen. Define, for each 0 j T, W j x,y S w(x, y) <ξ j x ξ j y >. If one can manage to show that, independent of the quantum algorithm used, there is an upper bound δ to W j W j+, and a lower bound M to W 0 W T, then one obtains a lower bound T M/δ on the quantum complexity. Consider the sorting of n numbers x,x 2,,x n by comparisons of the form x i : x j. In this case we have a function f : S {0, } m where S {0, } N (with N n(n ) and m log 2 (n!)). The set S consists of all the oracles x (x i,j i j) thatrepresentasetofn(n ) bits consistent with some underlying linear orderings of the x i s. Thus, we can identify each oracle x σ S with a unique permutation σ of {, 2,,n}, suchthatx σ i,j ifandonlyif σ(i) <σ(j). In [0], a lower bound to sorting n elements was obtained by an ingenious choice of the weight function ω. Let σ be any permutation of {, 2,,n}. For every k n and d n k, define a new permutation σ (k,d) (k, k+,,k+d) σ. Inotherwords,let(x,x 2,,x n) (σ(),σ(2),,σ(n)) be the assignment of values to x i s corresponding to σ. Then the assignment (x,x 2,,x n) corresponding to σ (k,d) is obtained from (x,x 2,,x n)by replacing the entry i with i + for k i<k+ d, andthe entry k + d with i. Thus, the following is true for τ σ (k,d) : τ (k) if i k + d σ (i) τ (i +) ifk i<k+ d τ (i) otherwise Define the weight function ω(σ, τ ) d if τ σ(k,d) for some k and d; ω(σ, τ ) 0 otherwise. With this choice, they were able to show the bounds below, for any quantum decision tree. Lemma [0] For each 0 j<t, W j W j+ 2πn!. Lemma 2[0] W 0 n!(nh n n), W T ɛ W 0, where H n /j. It follows from Lemmas and 2 that T Ω(n log n) for the sorting problem (with n unrestricted input numbers). 2.2 Review of Polytopes and Graph Entropy We first review some concepts and results from Stanley [2]. Let P (X, < P ) be a partial order on a set X {x,x 2,,x n}. A point y (y,y 2,,y n) R n is said to be consistent with P,ify i y j whenever x i P x j. For any y consistent with P, and for each i n, let d i(y) y i if x i is a minimal element in the partial order P ;otherwise,letd i(y) be the minimum of y i y j for any j satisfying x j < P x i. The order polytope O(P )isthesetofallthepointsy (y,y 2,,y n) [0, ] n consistent with P.Thechain polytope C(P )isthesetofpointsz (z,z 2,,z n) [0, ] n satisfying z i +z i2 + +z ik ifx i < P x i2 < P < P x ik is a chain in P.Defineatransfer map φ : O(P ) C(P )by the formula φ(y) (d (y),d 2(y),,d n(y)). Let (P ) be the set of all permutations of {, 2,,n}, and recall e(p ) (P ). Foreachσ (P ), let O σ(p )be the subset of points in O(P ) consistent with the permutation σ. Lemma 3 [2] (a) For any σ (P ), φ is a linear, measurepreserving bijection when its domain is restricted to O σ(p ). (b) φ is a continuous, piecewise-linear, measure-preserving bijection from O(P )ontoc(p). We now review a special entropy in connection with partial orders, which is based on the concept graph entropy first introduced by Körner [4]. Graph entropy has an extensive literature, including applications to complexity theory (e.g. Körner [5], Newman, Ragde and Wigderson [6], Radhakhrishnan [7]). We refer the readers to Csiszár et al [7], or Simonyi s survey [20] for additional information. We restrict our discussions here to those needed for this paper. For any z (z,z 2,,z n)withz i > 0, define ψ(z) log 2 n n log 2 z i. () In connection with sorting problems (in the classical setting), Kahn and Kim [] define the following entropy notion associated with P : H(P )max{ψ(z) z C(P ) }. (2) This can be described alternatively as the graph entropy of the comparability graph of P. It is known [7] that the maximum is finite and achieved at a unique point z in the polytope. Lemma 5 [] log 2 e(p ) nh(p ) O(log 2 e(p )). 3
3 3. PROOF OF THEOREM We adopt the general approach in [0] described in the previous section. Let the set of oracles S consist of those labelled by permutations in (P ). Define the weight function ω in the same way, except of course ω is defined only on S S. Consider any quantum decision tree B for QSORT P with error bounded by ɛ. Define ɛ,w j as in the previous section. Let A P σ,τ (P ) ω(σ, τ ). Lemma 6 For each 0 j<t, W j W j+ 2πe(P ). Lemma 7 W 0 W T ( ɛ )A P. The proof of Lemma 6 is exactly the same as the proof of Lemma as given in [0]. Lemma 7 follows easily from the requirement on the initial and final quantum states produced by the quantum decision tree B. Proposition There exist absolute constants λ, λ > 0 such that e(p ) AP λ log e(p ) λ n. It follows immediately from Lemmas 6, 7 and Proposition that T ( ɛ )A P 2πe(P ) ɛ 2π (λ log e(p ) λ n), which gives Theorem. We prove Proposition in two steps. Proposition 2 e(p ) AP Ω(nE z C(P )(ψ(z))). Proposition 3 There exists an absolute constant µ>0 such that E z C(P ) (ψ(z)) H(P ) µ. Clearly, Proposition follows from Lemma 5, Propositions 2 and 3. We now prove Proposition 2. Note that each permutation σ (P ) gives rise naturally to a point (σ(),σ(2),,σ(n)) in R n, and we shall use the notation d i(σ) with this understanding. Lemma 8 For any σ (P ), log 2 d i(σ) log 2 (n +)+E y Oσ(P )(log 2 d i(y)). Proof of Lemma 8 First consider the case when x i is not a minimal element under partial order P.Letjbesuch that x j < P x i, d i(σ) σ(i) σ(j). Then the expected value of d i(y) for a random y O σ(p ) is the expected difference between the σ(i)-th and the σ(j)-th smallest elements among n randomly chosen real numbers in the interval [0, ]. By standard results from order statistics, we have E y Oσ(P )(d i(y)) di(σ). (3) n + It is easy to verify that the above formula is valid in the other case (when x i is a minimal element under P ). Now using the convexity of logarithm and Equation (3), we obtain E y Oσ(P )(log 2 d i(y)) log 2 (E y Oσ(P )(d i(y)) log 2 ( n + di(σ)). This proves Lemma 8. Q.E.D. It follows from Lemma 8 that log e(p ) 2 d i(σ) σ (P ) log 2 n + E y Oσ(P )(log e(p ) 2 d i(y)) σ (P ) log 2 n + E y O(P ) (log 2 d i(y)). (4) From the definition of A P and ω, wehave A P ( d i(σ) ) σ (P ) σ (P ) Ω(log 2 d i(σ)). (5) It follows from (4) and (5) that e(p ) AP Ω(n log 2 n + E y O(P ) (log 2 d i(y))) Ω(n log 2 n + E y O(P ) ( log 2 d i(y))). By Lemma 3, φ P is a - onto measure-preserving mapping from O(P )toc(p). This leads to e(p ) AP Ω(n log 2 n + E z(z,,z n) C(P )( log 2 z i)) Ω(nE z C(P ) (ψ(z))). This proves Proposition 2. To finish the proof of Proposition, we now prove Proposition 3. First we derive two lemmas. Let Q n be the set of all y (y,,y n) R n such that y i 0and yi. Lemma 9 Let µ 00. Take a random y (y,y 2,,y n) uniformly chosen from Q n. Then, Pr{ log 2 n log y 2 n + µn} e µn/4. i Proof of Lemma 9 The proof is technical, and will be delayed to the Appendix. Let F n R n be the set of all w (w,w 2,,w n)such that w i 0 for all i and wi n. For any w (w,w 2,,w n) F n, let Y denote the function on F n defined by Y (w) n log 2 w i. Lemma 0 Let µ 200,andletD F n be a polytope of volume no less than. Then E w D(Y ) µ, for all sufficiently large n. Proof of Lemma 0 We assume that n is sufficiently large for all asymptotic inequalities (such as n 2 e n <e n/6 ) valid. Let Fn be the set of all w F n satisfying Y (w) µ/2. Let Q n be the set of all y Q n satisfying k n log 2 y k n log 2 n + µn/2. Note that F n is Q n scaled up by a factor of n on all sides, and Fn is Q n scaled up by a factor of n. The probability of a random w F n falling into Fn is exactly equal to the probability for a random y Q n falling into Q n. By Lemma 9, we conclude that Vol(Fn ) e µn/8 Vol(F n) e µn/8 n n n! e µn/9. (6) 4
4 Let J n be the set of all w (w,w 2,,w n) F n with 0 w 2 µn. With the help of equation (6) we obtain log 2 w dw log 2 w dw + log 2 w dw J n Fn J n n n (n )! 2 µn 0 log 2 w dw + Vol(Fn ) log 2 (2 µn ) e n (µn +)2 µn + e µn/9 µn e µn/0. This implies Y (w) dw Fn n log 2 w dw log 2 w i dw e µn/0. (7) Using (7) we obtain Y (w)dw Y (w)dw + D D Fn Vol(D Fn )µ/2 As Vol(D), this leads to D Vol(D)µ/2 e µn/0. E w D(Y ) D Y (w)dw Vol(D) µ 2 e µn/0 Vol(D) µ. Y (w)dw Y (w) dw This completes the proof of Lemma 0. Q.E.D. We now use Lemma 0 to prove Proposition 3. By the definition of H(P ), Proposition 3 can be written as E z C(P ) (ψ(z)) ψ(a) µ, where a is the unique point z C(P ) for ψ(z) to achieve its maximum. As seen in [7, ], C(P ) is contained in the positive quadrant (all z i 0) of R n bounded by z i a i n. Make the change of variables z i a iw i for i n. Then z w gives a one-to-one linear mapping of C(P )in the z i space onto a polytope C (P )inthew i space, with the transformation dz ( ai)dw between the infinitesimal volume elements. Note that C (P ) (which includes all points in [0, ] n ) is a polytope of volume in the positive quadrant of R n bounded by wi n, i.e., C (P ) F n. By Lemma 0, we have E w C (P )(Y ) µ. (8) Now note that ψ(z) log 2 n + log n 2 (a iw i) log 2 n + log n 2 (a i)+ log n 2 (w i) ψ(a)+y (w). Thus, E z C(P ) (ψ(z)) ψ(a)+e w C (P )(Y ). (9) It follows from (8) and (9) that E z C(P ) (ψ(z)) ψ(a) µ. This proves Proposition DISCUSSIONS We suggest several open problems for future investigations. Firstly, can one strengthen Theorem to Q ɛ(p ) Ω(log e(p ))? We conjecture that in fact the quantity A P in Lemma 7 provides such a lower bound, even though the estimation techniques used in the present paper are not strong enough to prove it. Secondly, to what extent do various classical sorting lower bounds remain valid? For example, suppose we allow any ternary polynomial tests p(x,x 2,,x n) : 0, what is the number of quantum queries needed to sort n numbers? Lastly, there are other information lower bounds whose validity in quantum case is non-obvious. For example, see Shi [8]. It would be very interesting to study systematically all the classical information lower bounds for decision trees. 5. REFERENCES [] S. Aaronson. Quantum lower bounds for the collision problem. In Proc. 34th Annual ACM Symposium on Theory of Computing, pages ACM, [2] A. Ambainis. A better lower bound for quantum algorithms searching an ordered list. In Proc. 40th Annual IEEE Symposium on Foundations of Computer Science, pages IEEE, 999. [3] A. Ambainis. Quantum lower bounds by quantum arguments. In Proc. 32nd Annual ACM Symposium on Theory of Computing, pages ACM, [4] R. Beals, H. Buhrman, R. Cleve, M. Mosca, and R. de Wolf. Quantum lower bounds by polynomials. In Proc. 39th Annual IEEE Symposium on Foundations of Computer Science, pages IEEE, 998. [5] C. Bennett, E. Bernstein, G. Brassard, and U. Vazirani. Strengths and weaknesses of quantum computation. SIAM J. on Computing, 26:50 523, 997. [6] H. Buhrman and R. de Wolf. A lower bound for quantum search of an ordered list. Information Processing Letters, 70: , 999. [7] C. Csiszár, J. Körner, L. Lovász, K. Marton, and G. Simonyi. Entropy splitting for antiblocking corners and perfect graphs. Combinatorica, 0:27 40, 990. [8] E. Farhi, J. Goldstone, S. Gutmann, and M. Sipser. A limit on the speed of quantum computation for insertion into an ordered list. arxiv.org e-print archive, quant-ph/982057,
5 [9] M. Fredman. How good is the information bound in sorting. Theoretical Computer Science, :355 36, 976. [0] P. Høyer, J. Neerbek, and Y. Shi. Quantum complexities of ordered searching, sorting, and element distinctness. Algorithmica, 34: , [] J. Kahn and J. Kim. Entropy and sorting. Journal of Computer and System Sciences, 5: , 995. [2] J. Kahn and N. Linial. Balancing poset extensions via Brunn-Minkowski. Combinatorica, : , 99. [3] J. Kahn and M. Saks. Balancing poset extensions. Order, :3 26, 984. [4] J. Körner. Coding of an information source having ambiguous alphabet and the entropy of graphs. In Transactions of 6th Prague Conference on Information Theory, etc., pages Academia, Prague, 973. [5] J. Körner. Fredman-Komlós bounds and information theory. SIAM Journal on Alg. Disc. Meth., 7: , 986. [6] I. Newman, P. Ragde, and A. Wigderson. Perfect hashing, graph entropy and circuit complexity. In Proc. 5th Annual IEEE Symposium on Structure in Complexity Theory, pages IEEE, 990. [7] J. Radhakhrishnan. Better bounds for threshold formulas. In Proc. 32nd Annual IEEE Symposium on Foundations of Computer Science, pages IEEE, 99. [8] Y. Shi. Entropy lower bounds of quantum decision tree complexity. Information Processing Letters, 8():23 27, [9] Y. Shi. Quantum lower bounds for the collision and the element distinctness problems. In Proc. 43rd Annual IEEE Symposium on Foundations of Computer Science, pages IEEE, [20] G. Simonyi. Perfect graphs and graph entropy: An updated survey. Chapter 3 in Perfect Graphs, edited by J. Ramirez-Alfonsin and B. Reed, pages John Wiley and Sons, 200. [2] R. Stanley. Two poset polytopes. Discrete Computational Geometry, :9 23, 986. APPENDIX Proof of Lemma 9 Pick n random real numbers x j uniformly and independently from the interval [0, ], and sort them into ascending order x i x i2 x in.lety (y,y 2,,y n)where y x i,andy j x ij x ij,2 j n. It is easily verified that the generated y is a random point uniformly distributed over Q n. Consider the random variable Y n(x,x 2,,x n) ln y j. (0) j n To prove Lemma 9, we need to show that Pr{Y n n ln n +(µ ln 2)n} e µn/4. () Let us generate x,x 2,,x n sequentially. When we have generated k random numbers x,x 2,,x k,lety k denote the random variable defined as in equation (0) above, except with n replaced by k. Let Y 0 be the constant random variable 0. Lemma A Let k n, andletx,x 2,,x k be distinct. Then Y k (x,x 2,,x k ) Y k (x,x 2,,x k )+ln(2/δ), where δ 0 is the minimum distance between x k and any numbersintheset{0,x,x 2,,x k }. ProofofLemmaA The numbers x,x 2,,x k divide the interval [0, ] into k sub-intervals. Suppose that x k falls into a sub-interval I of length u, and splits it into two parts of length λu and ( λ)u. There are two cases. If I is not the rightmost sub-interval, then Y k (x,x 2,,x k ) Y k (x,x 2,,x k ) ln(λu) ln(( λ)u)+lnu ln( 2 δ ). If I is the rightmost interval, then Y k (x,x 2,,x k ) Y k (x,x 2,,x k ) ln(λu) ln( δ ). This proves Lemma A. Q.E.D. Let us regard Y 0 0,Y,Y 2,,Y n as a sequence of random variables where Y k depends only on x,x 2,...,x k. It follows immediately from Lemma A that, Pr{Y k Y k t} 4ke t (2) for all t 0. Consider the probability distribution ρ k over [0, ]: { 0 t ln(4k) ρ k (t) 4ke t t>ln(4k). Let A k be a real-valued random variable defined on some probability space such that ρ k is the density function for the distribution of the value of A k, i.e., Pr{A k t} t ρ k (τ)dτ. (3) It is easily verified from equations (2) and (3) that Pr{Y k Y k t} Pr{A k t}. That is, Y k Y k is stochastically dominated by A k. Now note that Y n k n (Y k Y k ). This means Pr{Y n T } Pr{A T }, (4) where A k n A k. Lemma A2 Let T n ln n +(µ ln 2)n, then Pr{A T } e µn/4. Proof Let T T ln(4 n n!). Then Pr{A T } dt ρ k (t k ) ( t(t,,tn) k t k T k n (4k)) k n e s(s,,sn) s k 0, k s k T T e v v n (n )! dv. t(t,,tn) t k ln(4k), k t k T k s k ds e k t k dt 6
6 By assumption T T ln(4 n n!) ((µ ln 2) 2)n, wehave for all v T, v n (n )! ev/2. It follows that Pr{A T } T 2e T /2. e v/2 dv This implies Pr{A T } e µn/4, andproveslemmaa2.q.e.d. Equation () follows from Lemma A2 and equation (4). This completes the proof of Lemma 9. 7
arxiv:quant-ph/ v1 29 May 2003
Quantum Lower Bounds for Collision and Element Distinctness with Small Range arxiv:quant-ph/0305179v1 29 May 2003 Andris Ambainis Abstract We give a general method for proving quantum lower bounds for
More informationA better lower bound for quantum algorithms searching an ordered list
A better lower bound for quantum algorithms searching an ordered list Andris Ambainis Computer Science Division University of California Berkeley, CA 94720, e-mail: ambainis@cs.berkeley.edu Abstract We
More informationThe Quantum Query Complexity of Algebraic Properties
The Quantum Query Complexity of Algebraic Properties Sebastian Dörn Institut für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430
More informationQuantum complexities of ordered searching, sorting, and element distinctness
Quantum complexities of ordered searching, sorting, and element distinctness Peter Høyer Jan Neerbek Yaoyun Shi September 7, 00 Abstract We consider the quantum complexities of the following three problems:
More informationSorting under partial information (without the ellipsoid algorithm)
Sorting under partial information (without the ellipsoid algorithm) Jean Cardinal ULB Samuel Fiorini ULB Gwenaël Joret ULB Raphaël Jungers UCL/MIT Ian Munro Waterloo Sorting by comparisons under partial
More informationQuantum Algorithms for Evaluating Min-Max Trees
Quantum Algorithms for Evaluating Min-Max Trees Richard Cleve 1,2,DmitryGavinsky 1, and D. L. Yonge-Mallo 1 1 David R. Cheriton School of Computer Science and Institute for Quantum Computing, University
More informationThe quantum query complexity of read-many formulas
The quantum query complexity of read-many formulas Andrew Childs Waterloo Shelby Kimmel MIT Robin Kothari Waterloo Boolean formulas ^ x 1 x 2 _ x 3 ^ x 1 x 3 A formula is read-once if every input appears
More informationarxiv: v1 [quant-ph] 6 Feb 2013
Exact quantum query complexity of EXACT and THRESHOLD arxiv:302.235v [quant-ph] 6 Feb 203 Andris Ambainis Jānis Iraids Juris Smotrovs University of Latvia, Raiņa bulvāris 9, Riga, LV-586, Latvia February
More informationQuantum Complexity of Testing Group Commutativity
Quantum Complexity of Testing Group Commutativity Frédéric Magniez 1 and Ashwin Nayak 2 1 CNRS LRI, UMR 8623 Université Paris Sud, France 2 University of Waterloo and Perimeter Institute for Theoretical
More informationQuantum Algorithms for Element Distinctness
Quantum Algorithms for Element Distinctness Harry Buhrman Christoph Dürr Mark Heiligman Peter Høyer Frédéric Magniez Miklos Santha Ronald de Wolf Abstract We present several applications of quantum amplitude
More informationLecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02]
Quantum Computation (CMU 18-859BB, Fall 015) Lecture 13: Lower Bounds using the Adversary Method October 1, 015 Lecturer: Ryan O Donnell Scribe: Kumail Jaffer 1 Introduction There are a number of known
More informationHow Low Can Approximate Degree and Quantum Query Complexity be for Total Boolean Functions?
How Low Can Approximate Degree and Quantum Query Complexity be for Total Boolean Functions? Andris Ambainis Ronald de Wolf Abstract It has long been known that any Boolean function that depends on n input
More informationOptimal quantum adversary lower bounds for ordered search
Optimal quantum adversary lower bounds for ordered search Andrew M. Childs Troy Lee Abstract The goal of the ordered search problem is to find a particular item in an ordered list of n items. Using the
More informationThe Quantum Query Complexity of the Determinant
The Quantum Query Complexity of the Determinant Sebastian Dörn Inst. für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430 Aalen,
More informationLecture 6. Today we shall use graph entropy to improve the obvious lower bound on good hash functions.
CSE533: Information Theory in Computer Science September 8, 010 Lecturer: Anup Rao Lecture 6 Scribe: Lukas Svec 1 A lower bound for perfect hash functions Today we shall use graph entropy to improve the
More informationQuantum Algorithms for Element Distinctness
Quantum Algorithms for Element Distinctness Harry Buhrman Christoph Dürr Þ Mark Heiligman Ü Peter Høyer ß Frédéric Magniez Miklos Santha Ronald de Wolf ÝÝ Abstract We present several applications of quantum
More informationThe query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector
1 Query model In the quantum query model we wish to compute some function f and we access the input through queries. The complexity of f is the number of queries needed to compute f on a worst-case input
More informationRandom Permutations using Switching Networks
Random Permutations using Switching Networks Artur Czumaj Department of Computer Science Centre for Discrete Mathematics and its Applications (DIMAP) University of Warwick A.Czumaj@warwick.ac.uk ABSTRACT
More informationQuantum Property Testing
Quantum Property Testing Harry Buhrman Lance Fortnow Ilan ewman Hein Röhrig ovember 24, 2003 Abstract A language L has a property tester if there exists a probabilistic algorithm that given an input x
More informationQuantum Lower Bound for Recursive Fourier Sampling
Quantum Lower Bound for Recursive Fourier Sampling Scott Aaronson Institute for Advanced Study, Princeton aaronson@ias.edu Abstract One of the earliest quantum algorithms was discovered by Bernstein and
More informationBlock Sensitivity of Minterm-Transitive Functions
Block Sensitivity of Minterm-Transitive Functions Andrew Drucker Abstract Boolean functions with a high degree of symmetry are interesting from a complexity theory perspective: extensive research has shown
More informationCell-Probe Proofs and Nondeterministic Cell-Probe Complexity
Cell-obe oofs and Nondeterministic Cell-obe Complexity Yitong Yin Department of Computer Science, Yale University yitong.yin@yale.edu. Abstract. We study the nondeterministic cell-probe complexity of static
More informationQuantum Property Testing
Quantum Property Testing Harry Buhrman Lance Fortnow Ilan ewman Hein Röhrig March 24, 2004 Abstract A language L has a property tester if there exists a probabilistic algorithm that given an input x only
More informationBreaking the Rectangle Bound Barrier against Formula Size Lower Bounds
Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds Kenya Ueno The Young Researcher Development Center and Graduate School of Informatics, Kyoto University kenya@kuis.kyoto-u.ac.jp Abstract.
More informationOn the tightness of the Buhrman-Cleve-Wigderson simulation
On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. syzhang@cse.cuhk.edu.hk Abstract. Buhrman,
More informationarxiv: v3 [cs.ds] 21 Jan 2013
Sorting under Partial Information (without the Ellipsoid Algorithm) Jean Cardinal, Samuel Fiorini, Gwenaël Joret, Raphaël M. Jungers, J. Ian Munro arxiv:0911.0086v3 [cs.ds] 21 Jan 2013 Abstract We revisit
More informationarxiv: v3 [quant-ph] 3 Jul 2012
MIT-CTP 4242 Super-Polynomial Quantum Speed-ups for Boolean Evaluation Trees with Hidden Structure Bohua Zhan Shelby Kimmel Avinatan Hassidim November 2, 2018 arxiv:1101.0796v3 [quant-ph] 3 Jul 2012 Abstract
More informationOn the complexity of approximate multivariate integration
On the complexity of approximate multivariate integration Ioannis Koutis Computer Science Department Carnegie Mellon University Pittsburgh, PA 15213 USA ioannis.koutis@cs.cmu.edu January 11, 2005 Abstract
More informationImproved Quantum Algorithm for Triangle Finding via Combinatorial Arguments
Improved Quantum Algorithm for Triangle Finding via Combinatorial Arguments François Le Gall The University of Tokyo Technical version available at arxiv:1407.0085 [quant-ph]. Background. Triangle finding
More informationOn the query complexity of counterfeiting quantum money
On the query complexity of counterfeiting quantum money Andrew Lutomirski December 14, 2010 Abstract Quantum money is a quantum cryptographic protocol in which a mint can produce a state (called a quantum
More informationGraph Properties and Circular Functions: How Low Can Quantum Query Complexity Go?
Graph Properties and Circular Functions: How Low Can Quantum Query Complexity Go? Xiaoming Sun Computer Science Department, Tsinghua University, Beijing, 100084, P. R. China. sun xm97@mails.tsinghua.edu.cn
More informationLecture 12: Lower Bounds for Element-Distinctness and Collision
Quantum Computation (CMU 18-859BB, Fall 015) Lecture 1: Lower Bounds for Element-Distinctness and Collision October 19, 015 Lecturer: John Wright Scribe: Titouan Rigoudy 1 Outline In this lecture, we will:
More informationFréchet embeddings of negative type metrics
Fréchet embeddings of negative type metrics Sanjeev Arora James R Lee Assaf Naor Abstract We show that every n-point metric of negative type (in particular, every n-point subset of L 1 ) admits a Fréchet
More informationApproximating sparse binary matrices in the cut-norm
Approximating sparse binary matrices in the cut-norm Noga Alon Abstract The cut-norm A C of a real matrix A = (a ij ) i R,j S is the maximum, over all I R, J S of the quantity i I,j J a ij. We show that
More informationAsymptotic redundancy and prolixity
Asymptotic redundancy and prolixity Yuval Dagan, Yuval Filmus, and Shay Moran April 6, 2017 Abstract Gallager (1978) considered the worst-case redundancy of Huffman codes as the maximum probability tends
More informationInteger Least Squares: Sphere Decoding and the LLL Algorithm
Integer Least Squares: Sphere Decoding and the LLL Algorithm Sanzheng Qiao Department of Computing and Software McMaster University 28 Main St. West Hamilton Ontario L8S 4L7 Canada. ABSTRACT This paper
More informationarxiv: v2 [math.co] 3 Dec 2014
POSET ENTROPY VERSUS NUMBER OF LINEAR EXTENSIONS: THE WIDTH-2 CASE SAMUEL FIORINI AND SELIM REXHEP arxiv:402.5024v2 [math.co] 3 Dec 204 Abstract. Kahn and Kim (J. Comput. Sci., 995) have shown that for
More informationQUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University
QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING Alexander Vasiliev Kazan Federal University Abstract: In this paper we consider an application of the recently proposed quantum hashing technique for computing
More informationDiscrete quantum random walks
Quantum Information and Computation: Report Edin Husić edin.husic@ens-lyon.fr Discrete quantum random walks Abstract In this report, we present the ideas behind the notion of quantum random walks. We further
More informationQuantum Algorithms for Graph Traversals and Related Problems
Quantum Algorithms for Graph Traversals and Related Problems Sebastian Dörn Institut für Theoretische Informatik, Universität Ulm, 89069 Ulm, Germany sebastian.doern@uni-ulm.de Abstract. We study the complexity
More informationReflections Reflections
Reflections Reflections for quantum query algorithms Ben Reichardt University of Waterloo Reflections Reflections for quantum query algorithms Ben Reichardt University of Waterloo Reflections for quantum
More informationarxiv:quant-ph/ v1 15 Apr 2005
Quantum walks on directed graphs Ashley Montanaro arxiv:quant-ph/0504116v1 15 Apr 2005 February 1, 2008 Abstract We consider the definition of quantum walks on directed graphs. Call a directed graph reversible
More informationCS Foundations of Communication Complexity
CS 49 - Foundations of Communication Complexity Lecturer: Toniann Pitassi 1 The Discrepancy Method Cont d In the previous lecture we ve outlined the discrepancy method, which is a method for getting lower
More informationNotes for Lecture 25
U.C. Berkeley CS278: Computational Complexity Handout N25 ofessor Luca Trevisan 12/1/2004 Notes for Lecture 25 Circuit Lower Bounds for Parity Using Polynomials In this lecture we prove a lower bound on
More informationNotes on Logarithmic Lower Bounds in the Cell Probe Model
Notes on Logarithmic Lower Bounds in the Cell Probe Model Kevin Zatloukal November 10, 2010 1 Overview Paper is by Mihai Pâtraşcu and Erik Demaine. Both were at MIT at the time. (Mihai is now at AT&T Labs.)
More informationThe concentration of the chromatic number of random graphs
The concentration of the chromatic number of random graphs Noga Alon Michael Krivelevich Abstract We prove that for every constant δ > 0 the chromatic number of the random graph G(n, p) with p = n 1/2
More informationLOWER BOUNDS ON BALANCING SETS AND DEPTH-2 THRESHOLD CIRCUITS
LOWER BOUNDS ON BALANCING SETS AND DEPTH-2 THRESHOLD CIRCUITS PAVEL HRUBEŠ, SIVARAMAKRISHNAN NATARAJAN RAMAMOORTHY, ANUP RAO, AND AMIR YEHUDAYOFF Abstract. There are various notions of balancing set families
More informationQuantum and Classical Query Complexities of Local Search are Polynomially Related
Quantum and Classical Query Complexities of Local Search are Polynomially Related Miklos Santha Mario Szegedy Abstract Let f be an integer valued function on a finite set V. We call an undirected graph
More informationarxiv: v1 [cs.cc] 16 Mar 2017
A Nearly Optimal Lower Bound on the Approximate Degree of AC 0 Mark Bun mbun@cs.princeton.edu Justin Thaler justin.thaler@georgetown.edu arxiv:1703.05784v1 [cs.cc] 16 Mar 2017 Abstract The approximate
More informationHow Powerful is Adiabatic Quantum Computation?
How Powerful is Adiabatic Quantum Computation? Wim van Dam Michele Mosca Umesh Vazirani Abstract We analyze the computational power limitations of the recently proposed quantum adiabatic evolution algorithm
More informationQuantum Queries for Testing Distributions
Quantum Queries for Testing Distributions Sourav Chakraborty Eldar Fischer Arie Matsliah Ronald de Wolf Abstract We consider probability distributions given in the form of an oracle f : [n] [m] that we
More informationComplexity-Theoretic Foundations of Quantum Supremacy Experiments
Complexity-Theoretic Foundations of Quantum Supremacy Experiments Scott Aaronson, Lijie Chen UT Austin, Tsinghua University MIT July 7, 2017 Scott Aaronson, Lijie Chen (UT Austin, Tsinghua University Complexity-Theoretic
More informationStochastic Realization of Binary Exchangeable Processes
Stochastic Realization of Binary Exchangeable Processes Lorenzo Finesso and Cecilia Prosdocimi Abstract A discrete time stochastic process is called exchangeable if its n-dimensional distributions are,
More informationCS5314 Randomized Algorithms. Lecture 15: Balls, Bins, Random Graphs (Hashing)
CS5314 Randomized Algorithms Lecture 15: Balls, Bins, Random Graphs (Hashing) 1 Objectives Study various hashing schemes Apply balls-and-bins model to analyze their performances 2 Chain Hashing Suppose
More informationImproving Quantum Query Complexity of Boolean Matrix Multiplication Using Graph Collision
Improving Quantum Query Complexity of Boolean Matrix Multiplication Using Graph Collision Stacey Jeffery 1,2, Robin Kothari 1,2, and Frédéric Magniez 3 1 David R. Cheriton School of Computer Science, University
More informationBalanced Allocation Through Random Walk
Balanced Allocation Through Random Walk Alan Frieze Samantha Petti November 25, 2017 Abstract We consider the allocation problem in which m (1 ε)dn items are to be allocated to n bins with capacity d.
More informationAlgebraic Problems in Computational Complexity
Algebraic Problems in Computational Complexity Pranab Sen School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai 400005, India pranab@tcs.tifr.res.in Guide: Prof. R.
More informationOn the correlation of parity and small-depth circuits
Electronic Colloquium on Computational Complexity, Report No. 137 (2012) On the correlation of parity and small-depth circuits Johan Håstad KTH - Royal Institute of Technology November 1, 2012 Abstract
More informationLast time, we described a pseudorandom generator that stretched its truly random input by one. If f is ( 1 2
CMPT 881: Pseudorandomness Prof. Valentine Kabanets Lecture 20: N W Pseudorandom Generator November 25, 2004 Scribe: Ladan A. Mahabadi 1 Introduction In this last lecture of the course, we ll discuss the
More informationQuantum algorithms based on span programs
Quantum algorithms based on span programs Ben Reichardt IQC, U Waterloo [arxiv:0904.2759] Model: Complexity measure: Quantum algorithms Black-box query complexity Span programs Witness size [KW 93] [RŠ
More informationTesting Expansion in Bounded-Degree Graphs
Testing Expansion in Bounded-Degree Graphs Artur Czumaj Department of Computer Science University of Warwick Coventry CV4 7AL, UK czumaj@dcs.warwick.ac.uk Christian Sohler Department of Computer Science
More informationQuantum Communication Complexity
Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,
More informationA Non-Linear Lower Bound for Constant Depth Arithmetical Circuits via the Discrete Uncertainty Principle
A Non-Linear Lower Bound for Constant Depth Arithmetical Circuits via the Discrete Uncertainty Principle Maurice J. Jansen Kenneth W.Regan November 10, 2006 Abstract We prove a non-linear lower bound on
More informationLecture 22: Counting
CS 710: Complexity Theory 4/8/2010 Lecture 22: Counting Instructor: Dieter van Melkebeek Scribe: Phil Rydzewski & Chi Man Liu Last time we introduced extractors and discussed two methods to construct them.
More informationOn the Impact of Objective Function Transformations on Evolutionary and Black-Box Algorithms
On the Impact of Objective Function Transformations on Evolutionary and Black-Box Algorithms [Extended Abstract] Tobias Storch Department of Computer Science 2, University of Dortmund, 44221 Dortmund,
More informationOn a hypergraph matching problem
On a hypergraph matching problem Noga Alon Raphael Yuster Abstract Let H = (V, E) be an r-uniform hypergraph and let F 2 V. A matching M of H is (α, F)- perfect if for each F F, at least α F vertices of
More informationNondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity
University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic
More informationResolution and the Weak Pigeonhole Principle
Resolution and the Weak Pigeonhole Principle Sam Buss 1 and Toniann Pitassi 2 1 Departments of Mathematics and Computer Science University of California, San Diego, La Jolla, CA 92093-0112. 2 Department
More informationMinimum Moment Steiner Trees
Minimum Moment Steiner Trees Wangqi Qiu Weiping Shi Abstract For a rectilinear Steiner tree T with a root, define its k-th moment M k (T ) = (d T (u)) k du, T where the integration is over all edges of
More informationTotal Ordering on Subgroups and Cosets
Total Ordering on Subgroups and Cosets Alexander Hulpke Department of Mathematics Colorado State University 1874 Campus Delivery Fort Collins, CO 80523-1874 hulpke@math.colostate.edu Steve Linton Centre
More information(each row defines a probability distribution). Given n-strings x X n, y Y n we can use the absence of memory in the channel to compute
ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6 (draft; 9/6/03. Error exponents for Discrete Memoryless Channels http://www.enee.umd.edu/ abarg/enee739c/course.html
More informationBounds for Error Reduction with Few Quantum Queries
Bounds for Error Reduction with Few Quantum Queries Sourav Chakraborty, Jaikumar Radhakrishnan 2,3, and andakumar Raghunathan Department of Computer Science, University of Chicago, Chicago, IL 60637, USA
More informationAvoiding Approximate Squares
Avoiding Approximate Squares Narad Rampersad School of Computer Science University of Waterloo 13 June 2007 (Joint work with Dalia Krieger, Pascal Ochem, and Jeffrey Shallit) Narad Rampersad (University
More informationIndependence numbers of locally sparse graphs and a Ramsey type problem
Independence numbers of locally sparse graphs and a Ramsey type problem Noga Alon Abstract Let G = (V, E) be a graph on n vertices with average degree t 1 in which for every vertex v V the induced subgraph
More informationPCPs and Inapproximability Gap-producing and Gap-Preserving Reductions. My T. Thai
PCPs and Inapproximability Gap-producing and Gap-Preserving Reductions My T. Thai 1 1 Hardness of Approximation Consider a maximization problem Π such as MAX-E3SAT. To show that it is NP-hard to approximation
More informationMulti-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size
Multi-Linear Formulas for Permanent and Determinant are of Super-Polynomial Size Ran Raz Weizmann Institute ranraz@wisdom.weizmann.ac.il Abstract An arithmetic formula is multi-linear if the polynomial
More informationarxiv: v1 [cs.ds] 15 Feb 2012
Linear-Space Substring Range Counting over Polylogarithmic Alphabets Travis Gagie 1 and Pawe l Gawrychowski 2 1 Aalto University, Finland travis.gagie@aalto.fi 2 Max Planck Institute, Germany gawry@cs.uni.wroc.pl
More informationNew Results on Quantum Property Testing
New Results on Quantum Property Testing Sourav Chakraborty 1, Eldar Fischer 2, Arie Matsliah 3, and Ronald de Wolf 3 1 Chennai Mathematical Institute, Chennai, India. sourav@cmi.ac.in 2 Computer Science
More informationarxiv: v1 [cs.cc] 31 May 2014
Size of Sets with Small Sensitivity: a Generalization of Simon s Lemma Andris Ambainis and Jevgēnijs Vihrovs arxiv:1406.0073v1 [cs.cc] 31 May 2014 Faculty of Computing, University of Latvia, Raiņa bulv.
More informationFinite Metric Spaces & Their Embeddings: Introduction and Basic Tools
Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools Manor Mendel, CMI, Caltech 1 Finite Metric Spaces Definition of (semi) metric. (M, ρ): M a (finite) set of points. ρ a distance function
More informationCOS597D: Information Theory in Computer Science October 5, Lecture 6
COS597D: Information Theory in Computer Science October 5, 2011 Lecture 6 Lecturer: Mark Braverman Scribe: Yonatan Naamad 1 A lower bound for perfect hash families. In the previous lecture, we saw that
More informationCoin-flipping games immune against linear-sized coalitions (Extended abstract)
Coin-flipping games immune against linear-sized coalitions (Extended abstract) Abstract Noga Alon IBM Almaden Research Center, San Jose, CA 9510 and Sackler Faculty of Exact Sciences, Tel Aviv University,
More informationTesting Booleanity and the Uncertainty Principle
Testing Booleanity and the Uncertainty Principle Tom Gur Weizmann Institute of Science tom.gur@weizmann.ac.il Omer Tamuz Weizmann Institute of Science omer.tamuz@weizmann.ac.il Abstract Let f : { 1, 1}
More informationA Noisy-Influence Regularity Lemma for Boolean Functions Chris Jones
A Noisy-Influence Regularity Lemma for Boolean Functions Chris Jones Abstract We present a regularity lemma for Boolean functions f : {, } n {, } based on noisy influence, a measure of how locally correlated
More informationON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES
ON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES JOSHUA BIDERMAN, KEVIN CUDDY, ANG LI, MIN JAE SONG Abstract. In this paper we present a graph property with sensitivity Θ( n), where n = ( v 2) is the
More informationAn exponential separation between quantum and classical one-way communication complexity
An exponential separation between quantum and classical one-way communication complexity Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical
More informationLower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine)
Lower Bounds for Dynamic Connectivity (2004; Pǎtraşcu, Demaine) Mihai Pǎtraşcu, MIT, web.mit.edu/ mip/www/ Index terms: partial-sums problem, prefix sums, dynamic lower bounds Synonyms: dynamic trees 1
More informationLecture 23: Alternation vs. Counting
CS 710: Complexity Theory 4/13/010 Lecture 3: Alternation vs. Counting Instructor: Dieter van Melkebeek Scribe: Jeff Kinne & Mushfeq Khan We introduced counting complexity classes in the previous lecture
More informationCell-Probe Lower Bounds for Prefix Sums and Matching Brackets
Cell-Probe Lower Bounds for Prefix Sums and Matching Brackets Emanuele Viola July 6, 2009 Abstract We prove that to store strings x {0, 1} n so that each prefix sum a.k.a. rank query Sumi := k i x k can
More informationStanford University CS254: Computational Complexity Handout 8 Luca Trevisan 4/21/2010
Stanford University CS254: Computational Complexity Handout 8 Luca Trevisan 4/2/200 Counting Problems Today we describe counting problems and the class #P that they define, and we show that every counting
More informationQuantum Correlations: From Bell inequalities to Tsirelson s theorem
Quantum Correlations: From Bell inequalities to Tsirelson s theorem David Avis April, 7 Abstract The cut polytope and its relatives are good models of the correlations that can be obtained between events
More informationAffine extractors over large fields with exponential error
Affine extractors over large fields with exponential error Jean Bourgain Zeev Dvir Ethan Leeman Abstract We describe a construction of explicit affine extractors over large finite fields with exponentially
More informationLearning convex bodies is hard
Learning convex bodies is hard Navin Goyal Microsoft Research India navingo@microsoft.com Luis Rademacher Georgia Tech lrademac@cc.gatech.edu Abstract We show that learning a convex body in R d, given
More informationA Robust APTAS for the Classical Bin Packing Problem
A Robust APTAS for the Classical Bin Packing Problem Leah Epstein 1 and Asaf Levin 2 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. Email: lea@math.haifa.ac.il 2 Department of Statistics,
More informationLecture 17: D-Stable Polynomials and Lee-Yang Theorems
Counting and Sampling Fall 2017 Lecture 17: D-Stable Polynomials and Lee-Yang Theorems Lecturer: Shayan Oveis Gharan November 29th Disclaimer: These notes have not been subjected to the usual scrutiny
More informationEntropy and Graphs. Seyed Saeed Changiz Rezaei
Entropy and Graphs by Seyed Saeed Changiz Rezaei A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics in Combinatorics and Optimization
More informationQuantum computers can search arbitrarily large databases by a single query
Quantum computers can search arbitrarily large databases by a single query Lov K. Grover, 3C-404A Bell Labs, 600 Mountain Avenue, Murray Hill J 07974 (lkgrover@bell-labs.com) Summary This paper shows that
More informationTesting Graph Isomorphism
Testing Graph Isomorphism Eldar Fischer Arie Matsliah Abstract Two graphs G and H on n vertices are ɛ-far from being isomorphic if at least ɛ ( n 2) edges must be added or removed from E(G) in order to
More informationCOS598D Lecture 3 Pseudorandom generators from one-way functions
COS598D Lecture 3 Pseudorandom generators from one-way functions Scribe: Moritz Hardt, Srdjan Krstic February 22, 2008 In this lecture we prove the existence of pseudorandom-generators assuming that oneway
More informationFaster quantum algorithm for evaluating game trees
Faster quantum algorithm for evaluating game trees x 7 x 8 Ben Reichardt xx1 1 x 2 x 3 x 4 x 6 OR x 9 x1 1 x 5 x 9 University of Waterloo x 5 AND OR AND AND OR AND ϕ(x) x 7 x 8 x 1 x 2 x 3 x 4 x 6 OR x
More information