Tutorial on the adversary method for quantum and classical lower bounds. Sophie Laplante LRI, Université Paris-Sud Orsay
|
|
- Prosper Bridges
- 5 years ago
- Views:
Transcription
1 Tutorial on the adversary method for quantum and classical lower bounds Sophie Laplante LRI, Université Paris-Sud Orsay
2 Adversary method lower bounds Exact complexity Strong lower bound Semidefinite Programming [BSS03] Kolmogorov method [LM04] Quantum query complexity Polynomial method [BBCMW01] Spectral method [BSS03] Weighted adversary [A03] Weak lower bound Adversary method [A02] 2
3 Summary of this talk Deterministic method - General statement - Combinatorial bound DT (f) R max i R i max{ m l, m l } Quantum method - General statement - Combinatorial bound [A02] Q ε (f) Weighted method [A03, LM04] Q ε (f) c ε 2 min x,y,i Spectral method [BSS03] Q ε (f) c ε 2 c ε R i P rogress t(i) c ε mm 2 ll p(x)p(y)p x,i (y)p y,i (x) q(x, y) Γ max i Γ i 3
4 Classical decision tree model To compute a boolean function f : {0,1} n {0,1}, x 1 = 0 x 1 =? x 1 = 1 Model : decision tree Cost : Number of queries to input Query complexity of f : depth of shallowest decision tree for f x 2 =? x 3 =? x 2 = 0 x 2 = 1 x 3 = 0 x 3 = 1 x 3 =? x 3 = 0 x 5 =? x 3 = 1 x 5 =? x 5 = 0 x 5 = 0 x 5 = 1 x 5 = 1 ACC REJ REJ ACC 4
5 Quantum query model ancilla Computation U 0 Query O x Computation U 1 Query: Unitary transformation maps i, b to i, b x i Computation : ψ T = U T O x O x U 0 0 O x that Query O x Query O x Computation U T Output: Measure 1st qubit of Error probability at most 1/3 ψ T Same model with stochastic matrices for randomized query complexity output 5
6 Estimating number of pieces by their size 6
7 Adversary method, deterministic setting Goal: separate {x : f(x)=1} from {y : f(y)=0} with minimum queries to input bits Subrelation Ri : pairs for which query i is useful Queries number of Ri needed to cover R. R {x : f(x)=1} {y : f(y)=0} y x xi yi DT (f) R max i R i Ri 7
8 Deterministic lower bound left degree of R m right degree m left degree of all Ri l right degree l R m X, m Y Ri l X, l Y DT (f) R max i R i max{ m l, m l } R {x : f(x)=1} {y : f(y)=0} y x Ri xi yi 8
9 Progress on x, y, i after a query At time t, progress towards distinguishing (x,y) Ri by making one query : Deterministic case DProgresst x,y (i) = Randomized case RProgresst x,y (i) = 2 min{p x t (i), p y t (i)} Quantum case? (next slide) Progresst x,y (i) { 1 if query(x,t) = i 0 otherwise 9
10 Quantum progress State of the system after query t, on input x is written ψt x Fix (x,y) R. At beginning, At each time step, ψ x t ψ y t ψ x t+1 ψ y t+1 2 ψ x 0 ψ y 0 = 1 Amplitude 2 of i in query t, input x p x t (i)p y t (i) ψ x 0 ψ y 0 At the end, i:x i y i ψ x T ψ y T 2 ε(1 ε) T 2 p x t (i)p y t (i) 1 2 ε(1 ε) i Progress t x,y(i) c ε 10
11 Quantum progress on x, y, i after a query At time t, progress towards distinguishing (x,y) Ri by making one query : Deterministic case DProgresst x,y (i) = Randomized case RProgresst x,y (i) = Quantum case QProgresst x,y (i) = 2 p x t (i)p y t (i) Progresst x,y (i) { 1 if query(x, t) = i 0 otherwise 2 min{p x t (i), p y t (i)} 11
12 Ambainis unweighted method Claim: Proof: P rogress t (i) 2 l X l Y i P rogress t (i) i = x,y,i = 2 x,y,i P rogress x,y t (i) p x t (i)p y t (i) 2 x i y p x t (i) y p y t (i) i x Cauchy Schwarz X terms p x t (i) = 1 i l terms 2 l X l Y 13
13 Ambainis unweighted method Claim: P rogress t (i) 2 l X l Y i Corollary: Q ε (f) c ε R i P rogress t(i) m X m Y c ε 2 lx l Y Q ε (f) c ε mm 2 ll R max{m X, m Y } m X m Y 13
14 Example: OR function m=1 l=1 m =n l = Deterministic queries max{m/l, m /l } = n Quantum queries = n mm ll 14
15 Unweighted lmax lower bound left degree of R m right degree m R {x : f(x)=1} {y : f(y)=0} left degree of Ri li right degree li R m X, m Y P rogress t (i) 2 max i {l i X l i Y } i Q ε (f) c ε 2 mm max i {l i l i } x Ri xi yi y 15
16 Example: Connectivity k k+1 X X k'+1 k' Deterministic queries max{m/l, m /l } = n 2 m n 2 (x) li n ( ) li 1 m n 2 li =1 li =n Quantum queries mm ll = n 3/2 16
17 Weighted method 1/8 1/8 1/8 3/16 1/8 1/16 1/8 1/8 17
18 Weight scheme for adversary method q(x,y) x q(x,y) y p(x) p' x,i (y) i i' i'' i''' p' y,i (x) p(y) x,y R q(x, y) = 1, x X p(x) = 1, y Y p x,i(y) = 1 18
19 Weighted adversary method Consider three distributions over pairs (x,y) R P (x, y) = i P (x, y) = i p(x)p x t (i)p x,i(y), p(y)p y t (i)p y,i(x), Claim: Q(x, y) = q(x, y) (x, y) R i P rogress x,y t (i) 2max i q(x, y) p(x)p x,i (y)p(y)p y,i (x) P (x, y)p (x, y) x,y P (x, y) P (x, y) x,y x,y 1 = Q(x, y) x,y Proof: x, y P (x, y)p (x, y) Q(x, y) x, y p x t (i)p y q(x, y) t (i) i min i p(x)p(y)p x,i (y)p y,i (x) 19
20 Weighted adversary method Consider three distributions over pairs (x,y) R P (x, y) = i P (x, y) = i p(x)p x t (i)p x,i(y), p(y)p y t (i)p y,i(x), Q(x, y) = q(x, y) Claim: (x, y) R i P rogress x,y t (i) 2max i q(x, y) p(x)p x,i (y)p(y)p y,i (x) Corollary: Recall that (x, y) R Q ε (f) Q ε (f) c ε 2 min x,y,i c ε i P rogressx,y t (i) p(x)p(y)p x,i (y)p y,i (x) q(x, y) 19
21 Example: Ambainis function f(x 1 x 2 x 3 x 4 ) = 1 if x 1 x 2 x 3 x 4 1 if x 1 x 2 x 3 x 4 0 otherwise q(x,y) !! 3/80 3/80 1/40 1/ p(x) = p(y) =1/8 Q ε (f) c ε 2 min x,y,i p(x)p(y)p x,i (y)p y,i (x) q(x, y) 20
22 Example: Ambainis function f(x 1 x 2 x 3 x 4 ) = 1 if x 1 x 2 x 3 x 4 1 if x 1 x 2 x 3 x 4 0 otherwise !! 0001 p' x,i (y) 3/4 1/4 p' y,i (x) 3/ !! !! q(x,y) 3/80 1/40 p x,i (y)p y,i (x) q(x, y) p(x)p(y) 1/8 1/ !! 1 1/ !! Q ε (f) c ε 2 min x,y,i 1/40 p(x)p(y)p x,i (y)p y,i (x) q(x, y) 20 1/8 = 20/8 = 5/2 20
23 Spectral method Nonnegative weights matrix Γ[x, y] x Γ[x, y] y Γ[x, y] = 0 if f(x) = f(y) { 0 if xi = y Γ i [x, y] = i Γ[x, y] otherwise Γ = max u Γv u,v u = v =1 Q ε (f) c ε 2 Idea: q(x,y) derived from p(x), p(y) derived from u, v maximizing u*tv Γ max i Γ i " p y,i(x), p x,i(y) derived from ui, vi maximizing ui*tivi 21
From Adversaries to Algorithms. Troy Lee Rutgers University
From Adversaries to Algorithms Troy Lee Rutgers University Quantum Query Complexity As in classical complexity, it is difficult to show lower bounds on the time or number of gates required to solve a problem
More informationThe quantum adversary method and classical formula size lower bounds
The quantum adversary method and classical formula size lower bounds Sophie Laplante LRI, Université Paris-Sud laplante@lri.fr Troy Lee CWI and University of Amsterdam Troy.Lee@cwi.nl Mario Szegedy Rutgers
More informationThe quantum adversary method and classical formula size lower bounds
The quantum adversary method and classical formula size lower bounds Sophie Laplante LRI, Université Paris-Sud laplante@lri.fr Troy Lee CWI and University of Amsterdam Troy.Lee@cwi.nl Mario Szegedy Rutgers
More informationThe query register and working memory together form the accessible memory, denoted H A. Thus the state of the algorithm is described by a vector
1 Query model In the quantum query model we wish to compute some function f and we access the input through queries. The complexity of f is the number of queries needed to compute f on a worst-case input
More informationReflections Reflections
Reflections Reflections for quantum query algorithms Ben Reichardt University of Waterloo Reflections Reflections for quantum query algorithms Ben Reichardt University of Waterloo Reflections for quantum
More informationLower Bounds on Quantum Query Complexity
Lower Bounds on Quantum Query Complexity Peter Høyer hoyer@cpsc.ucalgary.ca Robert Špalek sr@cwi.nl arxiv:quant-ph/0509153v1 21 Sep 2005 September 2005 Abstract Shor s and Grover s famous quantum algorithms
More informationLecture 3: Constructing a Quantum Model
CS 880: Quantum Information Processing 9/9/010 Lecture 3: Constructing a Quantum Model Instructor: Dieter van Melkebeek Scribe: Brian Nixon This lecture focuses on quantum computation by contrasting it
More informationPolynomials, quantum query complexity, and Grothendieck s inequality
Polynomials, quantum query complexity, and Grothendieck s inequality Scott Aaronson 1, Andris Ambainis 2, Jānis Iraids 2, Martins Kokainis 2, Juris Smotrovs 2 1 Computer Science and Artificial Intelligence
More informationLecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02]
Quantum Computation (CMU 18-859BB, Fall 015) Lecture 13: Lower Bounds using the Adversary Method October 1, 015 Lecturer: Ryan O Donnell Scribe: Kumail Jaffer 1 Introduction There are a number of known
More informationarxiv:quant-ph/ v1 27 Nov 2003
Lower bounds for randomized and quantum query complexity using Kolmogorov arguments Sophie Laplante Frédéric Magniez arxiv:quant-ph/0389v 27 Nov 2003 Abstract We prove a very general lower bound technique
More informationQuantum Query Complexity of Boolean Functions with Small On-Sets
Quantum Query Complexity of Boolean Functions with Small On-Sets Seiichiro Tani TT/JST ERATO-SORST. Joint work with Andris Ambainis Univ. of Latvia Kazuo Iwama Kyoto Univ. Masaki akanishi AIST. Harumichi
More informationCS286.2 Lecture 15: Tsirelson s characterization of XOR games
CS86. Lecture 5: Tsirelson s characterization of XOR games Scribe: Zeyu Guo We first recall the notion of quantum multi-player games: a quantum k-player game involves a verifier V and k players P,...,
More informationChebyshev Polynomials, Approximate Degree, and Their Applications
Chebyshev Polynomials, Approximate Degree, and Their Applications Justin Thaler 1 Georgetown University Boolean Functions Boolean function f : { 1, 1} n { 1, 1} AND n (x) = { 1 (TRUE) if x = ( 1) n 1 (FALSE)
More informationQuantum algorithms. Andrew Childs. Institute for Quantum Computing University of Waterloo
Quantum algorithms Andrew Childs Institute for Quantum Computing University of Waterloo 11th Canadian Summer School on Quantum Information 8 9 June 2011 Based in part on slides prepared with Pawel Wocjan
More informationQuantum Query Algorithm Constructions for Computing AND, OR and MAJORITY Boolean Functions
LATVIJAS UNIVERSITĀTES RAKSTI. 008, 733. sēj.: DATORZINĀTNE UN INFORMĀCIJAS TEHNOLOĢIJAS 15. 38. lpp. Quantum Query Algorithm Constructions for Computing AND, OR and MAJORITY Boolean Functions Alina Vasiljeva
More informationCS Foundations of Communication Complexity
CS 49 - Foundations of Communication Complexity Lecturer: Toniann Pitassi 1 The Discrepancy Method Cont d In the previous lecture we ve outlined the discrepancy method, which is a method for getting lower
More informationThe Quantum Query Complexity of the Determinant
The Quantum Query Complexity of the Determinant Sebastian Dörn Inst. für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430 Aalen,
More informationC/CS/Phys 191 Quantum Gates and Universality 9/22/05 Fall 2005 Lecture 8. a b b d. w. Therefore, U preserves norms and angles (up to sign).
C/CS/Phys 191 Quantum Gates and Universality 9//05 Fall 005 Lecture 8 1 Readings Benenti, Casati, and Strini: Classical circuits and computation Ch.1.,.6 Quantum Gates Ch. 3.-3.4 Universality Ch. 3.5-3.6
More informationFunctional Analysis Exercise Class
Functional Analysis Exercise Class Week 9 November 13 November Deadline to hand in the homeworks: your exercise class on week 16 November 20 November Exercises (1) Show that if T B(X, Y ) and S B(Y, Z)
More informationCompute the Fourier transform on the first register to get x {0,1} n x 0.
CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary
More informationQuantum walk algorithms
Quantum walk algorithms Andrew Childs Institute for Quantum Computing University of Waterloo 28 September 2011 Randomized algorithms Randomness is an important tool in computer science Black-box problems
More informationQuantum algorithms based on span programs
Quantum algorithms based on span programs Ben Reichardt IQC, U Waterloo [arxiv:0904.2759] Model: Complexity measure: Quantum algorithms Black-box query complexity Span programs Witness size [KW 93] [RŠ
More informationDeutsch s Algorithm. Dimitrios I. Myrisiotis. MPLA CoReLab. April 26, / 70
Deutsch s Algorithm Dimitrios I. Myrisiotis MPLA CoReLab April 6, 017 1 / 70 Contents Introduction Preliminaries The Algorithm Misc. / 70 Introduction 3 / 70 Introduction Figure : David Deutsch (1953 ).
More informationLecture 2: From Classical to Quantum Model of Computation
CS 880: Quantum Information Processing 9/7/10 Lecture : From Classical to Quantum Model of Computation Instructor: Dieter van Melkebeek Scribe: Tyson Williams Last class we introduced two models for deterministic
More informationThe Quantum Query Complexity of Algebraic Properties
The Quantum Query Complexity of Algebraic Properties Sebastian Dörn Institut für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430
More informationComplexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler
Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard
More informationOutline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.
Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität
More informationCS540 ANSWER SHEET
CS540 ANSWER SHEET Name Email 1. 2. 3. 4. 5. 6. 7. 8. 9. 10. 11. 12. 13. 14. 15. 16. 17. 18. 19. 20. 1 2 Final Examination CS540-1: Introduction to Artificial Intelligence Fall 2016 20 questions, 5 points
More informationQuantum Algorithms for Computing the Boolean Function AND and Verifying Repetition Code
Scientific Papers, University of Latvia, 2010 Vol 756 Computer Science and Information echnologies 227 247 P Quantum Algorithms for Computing the Boolean Function AND and Verifying Repetition Code Alina
More informationSemidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 2
Semidefinite and Second Order Cone Programming Seminar Fall 2001 Lecture 2 Instructor: Farid Alizadeh Scribe: Xuan Li 9/17/2001 1 Overview We survey the basic notions of cones and cone-lp and give several
More informationComplex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where
Chapter 0 Quantum algorithms Complex numbers: a quick review / 4 / 4 Definition: C = { a + b i : a, b R } where i = Polar form of z = a + b i is z = re iθ, where r = z = a + b and θ = tan y x Alternatively,
More informationarxiv: v1 [quant-ph] 6 Feb 2013
Exact quantum query complexity of EXACT and THRESHOLD arxiv:302.235v [quant-ph] 6 Feb 203 Andris Ambainis Jānis Iraids Juris Smotrovs University of Latvia, Raiņa bulvāris 9, Riga, LV-586, Latvia February
More informationQUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2
School of Mathematics Spring 017 QUANTUM COMPUTATION Exercise sheet 1 Ashley Montanaro, University of Bristol ashley.montanaro@bristol.ac.uk 1. The quantum circuit model. (a) Consider the following quantum
More informationQuantum algorithms (CO 781/CS 867/QIC 823, Winter 2013) Andrew Childs, University of Waterloo LECTURE 13: Query complexity and the polynomial method
Quantum algorithms (CO 781/CS 867/QIC 823, Winter 2013) Andrew Childs, University of Waterloo LECTURE 13: Query complexity and the polynomial method So far, we have discussed several different kinds of
More informationSimulating classical circuits with quantum circuits. The complexity class Reversible-P. Universal gate set for reversible circuits P = Reversible-P
Quantum Circuits Based on notes by John Watrous and also Sco8 Aaronson: www.sco8aaronson.com/democritus/ John Preskill: www.theory.caltech.edu/people/preskill/ph229 Outline Simulating classical circuits
More informationQuantum Complexity of Testing Group Commutativity
Quantum Complexity of Testing Group Commutativity Frédéric Magniez 1 and Ashwin Nayak 2 1 CNRS LRI, UMR 8623 Université Paris Sud, France 2 University of Waterloo and Perimeter Institute for Theoretical
More informationA better lower bound for quantum algorithms searching an ordered list
A better lower bound for quantum algorithms searching an ordered list Andris Ambainis Computer Science Division University of California Berkeley, CA 94720, e-mail: ambainis@cs.berkeley.edu Abstract We
More informationQuantum Complexity Theory and Adiabatic Computation
Chapter 9 Quantum Complexity Theory and Adiabatic Computation 9.1 Defining Quantum Complexity We are familiar with complexity theory in classical computer science: how quickly can a computer (or Turing
More informationCS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games
CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games Scribe: Zeyu Guo In the first lecture, we saw three equivalent variants of the classical PCP theorems in terms of CSP, proof checking,
More informationImprovements of the Giaccardi and the Petrović inequality and related Stolarsky type means
Annals of the University of Craiova, Mathematics and Computer Science Series Volume 391, 01, Pages 65 75 ISSN: 13-6934 Improvements of the Giaccardi and the Petrović inequality and related Stolarsky type
More informationLecture 4: Elementary Quantum Algorithms
CS 880: Quantum Information Processing 9/13/010 Lecture 4: Elementary Quantum Algorithms Instructor: Dieter van Melkebeek Scribe: Kenneth Rudinger This lecture introduces several simple quantum algorithms.
More informationIntroduction to Quantum Information Processing
Introduction to Quantum Information Processing Lecture 6 Richard Cleve Overview of Lecture 6 Continuation of teleportation Computation and some basic complexity classes Simple quantum algorithms in the
More information6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch
6.045: Automata, Computability, and Complexity (GITCS) Class 17 Nancy Lynch Today Probabilistic Turing Machines and Probabilistic Time Complexity Classes Now add a new capability to standard TMs: random
More informationOn the distinguishability of random quantum states
1 1 Department of Computer Science University of Bristol Bristol, UK quant-ph/0607011 Distinguishing quantum states Distinguishing quantum states This talk Question Consider a known ensemble E of n quantum
More informationChapter 10. Quantum algorithms
Chapter 10. Quantum algorithms Complex numbers: a quick review Definition: C = { a + b i : a, b R } where i = 1. Polar form of z = a + b i is z = re iθ, where r = z = a 2 + b 2 and θ = tan 1 y x Alternatively,
More informationLecture 4: Postulates of quantum mechanics
Lecture 4: Postulates of quantum mechanics Rajat Mittal IIT Kanpur The postulates of quantum mechanics provide us the mathematical formalism over which the physical theory is developed. For people studying
More informationDirect product theorem for discrepancy
Direct product theorem for discrepancy Troy Lee Rutgers University Joint work with: Robert Špalek Direct product theorems Knowing how to compute f, how can you compute f f f? Obvious upper bounds: If can
More informationIntroduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm
Part I: Quantum Gates and Simon s Algorithm Martin Rötteler NEC Laboratories America, Inc. 4 Independence Way, Suite 00 Princeton, NJ 08540, U.S.A. International Summer School on Quantum Information, Max-Planck-Institut
More informationQuantum Computing. Winter Quarter, 2011 and Spring Quarter, 2013
Quantum Computing Instructor: Alexander Razborov, University of Chicago. razborov@cs.uchicago.edu Course Homepage: http://people.cs.uchicago.edu/~razborov/teaching/winter11.html Winter Quarter, 2011 and
More information4.6. Linear Operators on Hilbert Spaces
4.6. Linear Operators on Hilbert Spaces 1 4.6. Linear Operators on Hilbert Spaces Note. This section explores a number of different kinds of bounded linear transformations (or, equivalently, operators
More informationSymmetric Norm Inequalities And Positive Semi-Definite Block-Matrices
Symmetric Norm Inequalities And Positive Semi-Definite lock-matrices Antoine Mhanna To cite this version: Antoine Mhanna Symmetric Norm Inequalities And Positive Semi-Definite lock-matrices 15
More informationCS/Ph120 Homework 4 Solutions
CS/Ph10 Homework 4 Solutions November 3, 016 Problem 1: Robustness of GHZ and W states, part Solution: Due to Bolton Bailey a For the GHZ state, we have T r N GHZ N GHZ N = 1 0 N 1 0 N 1 + 1 N 1 1 N 1
More information4.4 Noetherian Rings
4.4 Noetherian Rings Recall that a ring A is Noetherian if it satisfies the following three equivalent conditions: (1) Every nonempty set of ideals of A has a maximal element (the maximal condition); (2)
More informationAn Approximation Algorithm for Approximation Rank
An Approximation Algorithm for Approximation Rank Troy Lee Columbia University Adi Shraibman Weizmann Institute Conventions Identify a communication function f : X Y { 1, +1} with the associated X-by-Y
More informationELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications
ELE539A: Optimization of Communication Systems Lecture 15: Semidefinite Programming, Detection and Estimation Applications Professor M. Chiang Electrical Engineering Department, Princeton University March
More informationSymmetric Matrices and Eigendecomposition
Symmetric Matrices and Eigendecomposition Robert M. Freund January, 2014 c 2014 Massachusetts Institute of Technology. All rights reserved. 1 2 1 Symmetric Matrices and Convexity of Quadratic Functions
More informationLINEAR ALGEBRA BOOT CAMP WEEK 4: THE SPECTRAL THEOREM
LINEAR ALGEBRA BOOT CAMP WEEK 4: THE SPECTRAL THEOREM Unless otherwise stated, all vector spaces in this worksheet are finite dimensional and the scalar field F is R or C. Definition 1. A linear operator
More informationA semi-definite program for quantum query complexity
A semi-definite program for quantum query complexity Ben Reichardt University of Waterloo [These slides and notes are for a 30-minute talk given at the second Barriers in Computational Complexity Workshop,
More informationA Strong Parallel Repetition Theorem for Projection Games on Expanders
Electronic Colloquium on Computational Complexity, Report No. 142 (2010) A Strong Parallel Repetition Theorem for Projection Games on Expanders Ran Raz Ricky Rosen Abstract The parallel repetition theorem
More informationFactorization in Polynomial Rings
Factorization in Polynomial Rings These notes are a summary of some of the important points on divisibility in polynomial rings from 17 and 18. PIDs Definition 1 A principal ideal domain (PID) is an integral
More informationQuantum Computing: Foundations to Frontier Fall Lecture 3
Quantum Computing: Foundations to Frontier Fall 018 Lecturer: Henry Yuen Lecture 3 Scribes: Seyed Sajjad Nezhadi, Angad Kalra Nora Hahn, David Wandler 1 Overview In Lecture 3, we started off talking about
More informationClassical and Quantum Complexity of the Sturm-Liouville Eigenvalue Problem
Classical and Quantum Complexity of the Sturm-Liouville Eigenvalue Problem A. Papageorgiou 1 and H. Woźniakowski 1, Department of Computer Science, Columbia University, New York, USA Institute of Applied
More informationMP 472 Quantum Information and Computation
MP 472 Quantum Information and Computation http://www.thphys.may.ie/staff/jvala/mp472.htm Outline Open quantum systems The density operator ensemble of quantum states general properties the reduced density
More informationAn Introduction to Quantum Information and Applications
An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded
More informationConvex sets, conic matrix factorizations and conic rank lower bounds
Convex sets, conic matrix factorizations and conic rank lower bounds Pablo A. Parrilo Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Massachusetts Institute
More informationConstruction of latin squares of prime order
Construction of latin squares of prime order Theorem. If p is prime, then there exist p 1 MOLS of order p. Construction: The elements in the latin square will be the elements of Z p, the integers modulo
More informationCommunication is bounded by root of rank
Electronic Colloquium on Computational Complexity, Report No. 84 (2013) Communication is bounded by root of rank Shachar Lovett June 7, 2013 Abstract We prove that any total boolean function of rank r
More informationChapter 7 Polynomial Functions. Factoring Review. We will talk about 3 Types: ALWAYS FACTOR OUT FIRST! Ex 2: Factor x x + 64
Chapter 7 Polynomial Functions Factoring Review We will talk about 3 Types: 1. 2. 3. ALWAYS FACTOR OUT FIRST! Ex 1: Factor x 2 + 5x + 6 Ex 2: Factor x 2 + 16x + 64 Ex 3: Factor 4x 2 + 6x 18 Ex 4: Factor
More informationThe quantum query complexity of read-many formulas
The quantum query complexity of read-many formulas Andrew Childs Waterloo Shelby Kimmel MIT Robin Kothari Waterloo Boolean formulas ^ x 1 x 2 _ x 3 ^ x 1 x 3 A formula is read-once if every input appears
More information5 Flows and cuts in digraphs
5 Flows and cuts in digraphs Recall that a digraph or network is a pair G = (V, E) where V is a set and E is a multiset of ordered pairs of elements of V, which we refer to as arcs. Note that two vertices
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Petros Wallden Lecture 7: Complexity & Algorithms I 13th October 016 School of Informatics, University of Edinburgh Complexity - Computational Complexity: Classification
More information4 Linear operators and linear functionals
4 Linear operators and linear functionals The next section is devoted to studying linear operators between normed spaces. Definition 4.1. Let V and W be normed spaces over a field F. We say that T : V
More informationClasses of Boolean Functions
Classes of Boolean Functions Nader H. Bshouty Eyal Kushilevitz Abstract Here we give classes of Boolean functions that considered in COLT. Classes of Functions Here we introduce the basic classes of functions
More informationarxiv:quant-ph/ v1 18 Nov 2004
Improved Bounds on Quantum Learning Algorithms arxiv:quant-ph/0411140v1 18 Nov 2004 Alp Atıcı Department of Mathematics Columbia University New York, NY 10027 atici@math.columbia.edu March 13, 2008 Abstract
More informationQuantum algorithms based on quantum walks. Jérémie Roland (ULB - QuIC) Quantum walks Grenoble, Novembre / 39
Quantum algorithms based on quantum walks Jérémie Roland Université Libre de Bruxelles Quantum Information & Communication Jérémie Roland (ULB - QuIC) Quantum walks Grenoble, Novembre 2012 1 / 39 Outline
More informationLecture 10: Learning DNF, AC 0, Juntas. 1 Learning DNF in Almost Polynomial Time
Analysis of Boolean Functions (CMU 8-859S, Spring 2007) Lecture 0: Learning DNF, AC 0, Juntas Feb 5, 2007 Lecturer: Ryan O Donnell Scribe: Elaine Shi Learning DNF in Almost Polynomial Time From previous
More information1 Directional Derivatives and Differentiability
Wednesday, January 18, 2012 1 Directional Derivatives and Differentiability Let E R N, let f : E R and let x 0 E. Given a direction v R N, let L be the line through x 0 in the direction v, that is, L :=
More informationMath 40510, Algebraic Geometry
Math 40510, Algebraic Geometry Problem Set 1, due February 10, 2016 1. Let k = Z p, the field with p elements, where p is a prime. Find a polynomial f k[x, y] that vanishes at every point of k 2. [Hint:
More informationQuantum and Classical Query Complexities of Local Search are Polynomially Related
Quantum and Classical Query Complexities of Local Search are Polynomially Related Miklos Santha Mario Szegedy Abstract Let f be an integer valued function on a finite set V. We call an undirected graph
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 11: From random walk to quantum walk
Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 11: From random walk to quantum walk We now turn to a second major topic in quantum algorithms, the concept
More informationFourier analysis of boolean functions in quantum computation
Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge
More informationOptimal quantum adversary lower bounds for ordered search
Optimal quantum adversary lower bounds for ordered search Andrew M. Childs Troy Lee Abstract The goal of the ordered search problem is to find a particular item in an ordered list of n items. Using the
More informationQuantum Computation. Michael A. Nielsen. University of Queensland
Quantum Computation Michael A. Nielsen University of Queensland Goals: 1. To eplain the quantum circuit model of computation. 2. To eplain Deutsch s algorithm. 3. To eplain an alternate model of quantum
More informationDefinition A.1. We say a set of functions A C(X) separates points if for every x, y X, there is a function f A so f(x) f(y).
The Stone-Weierstrass theorem Throughout this section, X denotes a compact Hausdorff space, for example a compact metric space. In what follows, we take C(X) to denote the algebra of real-valued continuous
More informationProblem Set: TT Quantum Information
Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C
More informationUnions of Solutions. Unions. Unions of solutions
Unions of Solutions We ll begin this chapter by discussing unions of sets. Then we ll focus our attention on unions of sets that are solutions of polynomial equations. Unions If B is a set, and if C is
More informationFaster quantum algorithm for evaluating game trees
Faster quantum algorithm for evaluating game trees x 7 x 8 Ben Reichardt xx1 1 x 2 x 3 x 4 x 6 OR x 9 x1 1 x 5 x 9 University of Waterloo x 5 AND OR AND AND OR AND ϕ(x) x 7 x 8 x 1 x 2 x 3 x 4 x 6 OR x
More informationCS120, Quantum Cryptography, Fall 2016
CS10, Quantum Cryptography, Fall 016 Homework # due: 10:9AM, October 18th, 016 Ground rules: Your homework should be submitted to the marked bins that will be by Annenberg 41. Please format your solutions
More informationthe Information Bottleneck
the Information Bottleneck Daniel Moyer December 10, 2017 Imaging Genetics Center/Information Science Institute University of Southern California Sorry, no Neuroimaging! (at least not presented) 0 Instead,
More informationComplete problems for classes in PH, The Polynomial-Time Hierarchy (PH) oracle is like a subroutine, or function in
Oracle Turing Machines Nondeterministic OTM defined in the same way (transition relation, rather than function) oracle is like a subroutine, or function in your favorite PL but each call counts as single
More information8. Limit Laws. lim(f g)(x) = lim f(x) lim g(x), (x) = lim x a f(x) g lim x a g(x)
8. Limit Laws 8.1. Basic Limit Laws. If f and g are two functions and we know the it of each of them at a given point a, then we can easily compute the it at a of their sum, difference, product, constant
More informationLecture 7. 1 Normalized Adjacency and Laplacian Matrices
ORIE 6334 Spectral Graph Theory September 3, 206 Lecturer: David P. Williamson Lecture 7 Scribe: Sam Gutekunst In this lecture, we introduce normalized adjacency and Laplacian matrices. We state and begin
More informationMath 328 Course Notes
Math 328 Course Notes Ian Robertson March 3, 2006 3 Properties of C[0, 1]: Sup-norm and Completeness In this chapter we are going to examine the vector space of all continuous functions defined on the
More informationPolynomial bounds for decoupling, with applica8ons. Ryan O Donnell, Yu Zhao Carnegie Mellon University
Polynomial bounds for decoupling, with applica8ons Ryan O Donnell, Yu Zhao Carnegie Mellon University Boolean func8ons Maj 3 (x 1,x 2,x 3 ) = 1 1 x 1 x 2 x 3 1 1 1 1 1 1-1 1 1-1 1 1 1-1 -1-1 -1 1 1 1-1
More informationCPSC 536N: Randomized Algorithms Term 2. Lecture 9
CPSC 536N: Randomized Algorithms 2011-12 Term 2 Prof. Nick Harvey Lecture 9 University of British Columbia 1 Polynomial Identity Testing In the first lecture we discussed the problem of testing equality
More informationNonlocal Quantum XOR Games for Large Number of Players
onlocal Quantum XOR Games for Large umber of Players Andris Ambainis, Dmitry Kravchenko, ikolajs ahimovs, Alexander Rivosh Faculty of Computing, University of Latvia Abstract onlocal games are used to
More informationPh 219b/CS 219b. Exercises Due: Wednesday 4 December 2013
1 Ph 219b/CS 219b Exercises Due: Wednesday 4 December 2013 4.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the
More informationThere are two things that are particularly nice about the first basis
Orthogonality and the Gram-Schmidt Process In Chapter 4, we spent a great deal of time studying the problem of finding a basis for a vector space We know that a basis for a vector space can potentially
More informationOn the efficient approximability of constraint satisfaction problems
On the efficient approximability of constraint satisfaction problems July 13, 2007 My world Max-CSP Efficient computation. P Polynomial time BPP Probabilistic Polynomial time (still efficient) NP Non-deterministic
More informationIntroduction to Adiabatic Quantum Computation
Introduction to Adiabatic Quantum Computation Vicky Choi Department of Computer Science Virginia Tech April 6, 2 Outline Motivation: Maximum Independent Set(MIS) Problem vs Ising Problem 2 Basics: Quantum
More information