Tight Bounds for Distributed Streaming

Size: px
Start display at page:

Download "Tight Bounds for Distributed Streaming"

Transcription

1 Tight Bounds for Distributed Streaming (a.k.a., Distributed Functional Monitoring) David Woodruff IBM Research Almaden Qin Zhang MADALGO, Aarhus Univ. STOC 12 May 22,

2 The distributed streaming model sites coordinator C S 1 S 2 S 3 S k The coordinator needs to maintain some function defined on the union of k streams at any time 2-1

3 The distributed streaming model sites coordinator C S 1 S 2 S 3 S k The coordinator needs to maintain some function defined on the union of k streams at any time Goal: minimize total bits of communication 2-2

4 The distributed streaming model sites Q: What s the total # items? coordinator C S 1 S 2 S 3 S k The coordinator needs to maintain some function defined on the union of k streams at any time e.g., total # items Goal: minimize total bits of communication 2-3

5 The distributed streaming model sites Q: What s the total # items? coordinator C S 1 S 2 S 3 S k The coordinator needs to maintain some function defined on the union of k streams at any time e.g., total # items Almost always allow approximation. Goal: minimize total bits of communication 2-4

6 Applied motivation: Distributed monitoring Sensor networks Sites: sensors Streams: e.g., environmental data Concerns: energy Abstraction/ Simplification coordinator sites C S 1 S 2 S 3 S k 3-1

7 Applied motivation: Distributed monitoring Sensor networks Network routers Data in the cloud Sites: sensors Streams: e.g., environmental data Concerns: energy Sites: routers Streams: e.g., IP addresses. Concerns: bandwidth Sites: machines Streams: e.g., queries/updates. Concerns: bandwidth Abstraction/ Simplification coordinator sites C S 1 S 2 S 3 S k 3-2

8 Problems coordinator sites C S 1 S 2 S 3 S k Frequency moments F p = i f p i f i : freq. of element i In particular: F 0 : #distinct elements F 2 : size of self-join Heavy hitters The Distributed Streaming Model Quantile Entropy... Well-studied problems in the data stream literature 4-1

9 Results k: # sites; n: input size; ε: approximation ratio Problems Upper Bound Lower Bound F p (p > 1) F 0 Heavy-hitter/ Quantile Entropy Õ(k 2p+1 n 1 2/p /poly(ε)) [CMY, SODA 08] Õ(k p 1 /poly(ε)) [This paper] Õ(k/ε 2 ) [CMY, SODA 08] Õ(min{ k/ε, 1/ε 2 }) [HYZ, PODS 12] Õ(k/ε 3 ) [ABC, ICALP 09] Ω(k) [CMY, SODA 08] Ω(k p 1 /ε 2 ) [This paper] Ω(k) [CMY, SODA 08] Ω(k/ε 2 ) [This paper] Ω(max{ k/ε, 1/ε 2 }) [HYZ, PODS 12]; [This paper] static case Ω(1/ ε) [ABC, ICALP 09] Ω(k/ε 2 ) [This paper] Improve LBs for all problems, and the UB for F p (p > 1). 5-1

10 Results k: # sites; n: input size; ε: approximation ratio Problems Upper Bound Lower Bound F p (p > 1) F 0 Heavy-hitter/ Quantile Entropy Õ(k 2p+1 n 1 2/p /poly(ε)) [CMY, SODA 08] Õ(k p 1 /poly(ε)) [This paper] Õ(k/ε 2 ) [CMY, SODA 08] Õ(min{ k/ε, 1/ε 2 }) [HYZ, PODS 12] Õ(k/ε 3 ) [ABC, ICALP 09] Ω(k) [CMY, SODA 08] Ω(k p 1 /ε 2 ) [This paper] Ω(k) [CMY, SODA 08] Ω(k/ε 2 ) [This paper] Ω(max{ k/ε, 1/ε 2 }) [HYZ, PODS 12]; [This paper] static case Ω(1/ ε) [ABC, ICALP 09] Ω(k/ε 2 ) [This paper] Improve LBs for all problems, and the UB for F p (p > 1). Our LBs even hold in the static case. Static LBs (almost) match continuous UBs. 5-2

11 By-products Implications for problems in the data stream model First lower bound for F 0 without Gap-Hamming Improve Ω(n 1 2/p /ε 2/p t) bound for estimating F p (p 2) in a stream using t passes to Ω(n 1 2/p /ε 4/p t). First LB that agrees with the UB for F 2 (p = 2), for any constant t. 6-1

12 The multiparty NIH communication model A model for (static) lower bounds x 1 = x 2 = x 3 = x k = They want to jointly compute f(x 1, x 2,..., x k ) Goal: minimize total bits of communication 7-1

13 The multiparty NIH communication model A model for (static) lower bounds x 1 = x 2 = Blackboard: One speaks, everyone else hears. Message passing: If x 1 talks to x 2, others cannot hear. x 3 = x k = They want to jointly compute f(x 1, x 2,..., x k ) Goal: minimize total bits of communication 7-2

14 The multiparty NIH communication model A model for (static) lower bounds x 1 = x 2 = Blackboard: One speaks, everyone else hears. Message passing: If x 1 talks to x 2, others cannot hear. x 3 = x k = = static version of C They want to jointly compute f(x 1, x 2,..., x k ) S 1 S 2 S 3 S k Goal: minimize total bits of communication 7-3

15 Previously, for multiparty NIH comm. model Well studied? 8-1

16 Previously, for multiparty NIH comm. model Well studied? YES and NO. Several papers in blackboard model. [Alon, Matias, Szegedy 96] [Bar-Yossef, Jayram, Kumar, Sivakumar 04]

17 Previously, for multiparty NIH comm. model Well studied? YES and NO. Several papers in blackboard model. [Alon, Matias, Szegedy 96] [Bar-Yossef, Jayram, Kumar, Sivakumar 04]... Almost nothing in message-passing model. 8-3

18 Previously, for multiparty NIH comm. model Well studied? YES and NO. Several papers in blackboard model. [Alon, Matias, Szegedy 96] [Bar-Yossef, Jayram, Kumar, Sivakumar 04]... Almost nothing in message-passing model. A technique called symmetrization is proposed [Phillips, Verbin, Zhang 12 ] which works for both variants. However, this technique cannot be applied to our problems, due to several inherent limitations. 8-4

19 Now our new technique: Composition 9-1

20 Now our new technique: Composition A Lower bound for F 0 (distinct elements) Will cheat constantly, see our paper for the real proof 9-2

21 The F 0 problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute #distinct elements( k i=1 X i) up to a (1 + ε)-approx How many distinct items? 10-1

22 The F 0 problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute #distinct elements( k i=1 X i) up to a (1 + ε)-approx Current best UB: Õ(k/ε 2 ) Holds in message-passing model Previous LB: Ω(k) How many distinct items? 10-2

23 The F 0 problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute #distinct elements( k i=1 X i) up to a (1 + ε)-approx How many distinct items? Current best UB: Õ(k/ε 2 ) Holds in message-passing model Previous LB: Ω(k) And Ω(1/ε 2 ) (reduction from Gap-Hamming) 10-3

24 The F 0 problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute #distinct elements( k i=1 X i) up to a (1 + ε)-approx How many distinct items? Tight! Current best UB: Õ(k/ε 2 ) Holds in message-passing model Previous LB: Ω(k) And Ω(1/ε 2 ) (reduction from Gap-Hamming) Our LB: Ω(k/ε 2 ). Holds in message-passing model Better UB in the blackboard model 10-4

25 F 0 hard input distribution S 1 S n S k

26 F 0 hard input distribution S 1 S n S k F 0 =

27 F 0 hard input distribution Random partition S 1 S 2 S k noise part 0/1 w. equal. prob. important part 0/1 0/1 0 0/1 Each row in important part: choose a random special column put 0/1 w. equal. prob. rest all

28 F 0 hard input distribution Random partition S 1 S 2 S k noise part 0/1 w. equal. prob. important part 0/1 0/1 0 0/1 Each row in important part: choose a random special column put 0/1 w. equal. prob. rest all 0 Let Z i be the value in the special column in i-th row. F 0 (# columns of noise part) + i Z i 12-2

29 The proof framework Step 1: Find two modular problems k-gap-maj and 2-DISJ of simpler structures s.t. F 0 can be thought as a composition of them. (Different from traditional direct-sum) Step 2: Analyze the complexities of k-gap-maj and 2-DISJ. Step 3: Compose two modular problems so that: Complexity(F 0 ) = Complexity(k-GAP-MAJ) Complexity(2-DISJ). 13-1

30 k-gap-maj k sites each holds a bit Z i chosen uniform at random from {0, 1} Goal: compute k-gap-maj(z 1, Z 2,..., Z k ) = 0, if i [k] Z i k/2 k, 1, if i [k] Z i k/2 + k, don t care, otherwise, 14-1

31 k-gap-maj k sites each holds a bit Z i chosen uniform at random from {0, 1} Goal: compute k-gap-maj(z 1, Z 2,..., Z k ) = 0, if i [k] Z i k/2 k, 1, if i [k] Z i k/2 + k, don t care, otherwise, Lemma: Any protocol Π that computes k-gap-maj correctly w.p has to learn Ω(k) Z i s well, that is, H(Z i Π) H b (1/100). 14-2

32 Set disjointness (2-DISJ) x y =? x {0, 1,..., n} y {0, 1,..., n} 15-1

33 Set disjointness (2-DISJ) x y =? x {0, 1,..., n} y {0, 1,..., n} Exists a hard distribution µ, under which X Y = 1 (YES instance) w.p. 1/2 and X Y = 0 (NO instance) w.p. 1/2. Lemma: Any protocol Π that computes 2-DISJ correctly w.p under distribution µ communicates at least Ω(n) bits. [Razborov 90, BJKS 04] 15-2

34 Next step: Compose k-gap-maj with 2-DISJ coordinator C Y 2-DISJ 2-DISJ 2-DISJ sites S 1 S 2 S 3 S k X 1 X 2 X 3 X k (X i, Y ) µ for each i = 1,..., k 16-1

35 Next step: Compose k-gap-maj with 2-DISJ coordinator C Y 2-DISJ 2-DISJ 2-DISJ Z i = X i Y { 1 w.p. 1/2 0 w.p. 1/2 sites S 1 S 2 S 3 S k X 1 X 2 X 3 X k (X i, Y ) µ for each i = 1,..., k 16-2

36 Next step: Compose k-gap-maj with 2-DISJ [n] Y Y S 1 S 2 S k 0/1 w. equal. prob. 0/1 0/1 0 0/1 Z i coordinator C Y 2-DISJ 2-DISJ 2-DISJ Z i = X i Y { 1 w.p. 1/2 0 w.p. 1/2 sites S 1 S 2 S 3 S k X 1 X 2 X 3 X k (X i, Y ) µ for each i = 1,..., k 16-3

37 Next step: Compose k-gap-maj with 2-DISJ [n] Y Y S 1 S 2 S k 0/1 w. equal. prob. 0/1 0/1 0 0/1 Z i F 0 (X 1, X 2,..., X k ) [n] Y + i Z i coordinator C Y 2-DISJ 2-DISJ 2-DISJ Z i = X i Y { 1 w.p. 1/2 0 w.p. 1/2 sites S 1 S 2 S 3 S k X 1 X 2 X 3 X k (X i, Y ) µ for each i = 1,..., k 16-4

38 Next step: Compose k-gap-maj with 2-DISJ [n] Y Y S 1 S 2 S k 0/1 w. equal. prob. 0/1 0/1 0 0/1 Z i F 0 (X 1, X 2,..., X k ) [n] Y + i fixed Z i coordinator C Y Links to k-gap-maj 2-DISJ 2-DISJ 2-DISJ { 1 w.p. 1/2 Z i = X i Y 0 w.p. 1/2 sites S 1 S 2 S 3 S k X 1 X 2 X 3 X k (X i, Y ) µ for each i = 1,..., k 16-5

39 The proof coordinator 2-DISJ C Y Z i = X i Y { 1 w.p. 1/2 0 w.p. 1/2 sites S 1 S 2 S 3 S k X 1 X 2 X 3 X k F 0 (X 1, X 2,..., X k ) k-gap-maj(z 1, Z 2,..., Z k ) (Z i = X i Y ) = learn Ω(k) Z i s well = need Ω(nk) bits (observe Z i Π are independent, learning each Z i well needs Ω(n) bits, by 2-DISJ) 17-1

40 The proof coordinator 2-DISJ C Y Z i = X i Y { 1 w.p. 1/2 0 w.p. 1/2 sites S 1 S 2 S 3 S k Q.E.D. X 1 X 2 X 3 X k F 0 (X 1, X 2,..., X k ) k-gap-maj(z 1, Z 2,..., Z k ) For the reduction set n = Θ(1/ε 2 ) we get Ω(k/ε 2 ) LB. (Z i = X i Y ) = learn Ω(k) Z i s well = need Ω(nk) bits (observe Z i Π are independent, learning each Z i well needs Ω(n) bits, by 2-DISJ) 17-2

41 Our new technique: composition Step 1: Find two (or more) modular problems A, B of simpler structures s.t. the original problem can be thought as a composition of them. Step 2: Analyze the complexities of A, B. Step 3: Compose modular problems A, B so that: Complexity(original problem) = Complexity(A) Complexity(B). 18-1

42 The F 2 problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute F 2 ( k i=1 X i) up to a (1 + ε)-approximation. Previous UB: Õ(k 2 /ε + k 1.5 /ε 3 ) Our UB: Õ(k/poly(ε)), one way protocol Previous LB: Ω(k) Our LB: Ω(k/ε 2 ). Holds in blackboard model. Tight in static case. 19-1

43 The F 2 problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute F 2 ( k i=1 X i) up to a (1 + ε)-approximation. Previous UB: Õ(k 2 /ε + k 1.5 /ε 3 ) Our UB: Õ(k/poly(ε)), one way protocol Previous LB: Ω(k) Our LB: Ω(k/ε 2 ). Holds in blackboard model. Tight in static case. LB proof ideas overview: Same framework, choose two modular problems Gap-Hamming k-disj 19-2

44 The F 2 problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute F 2 ( k i=1 X i) up to a (1 + ε)-approximation. Previous UB: Õ(k 2 /ε + k 1.5 /ε 3 ) Our UB: Õ(k/poly(ε)), one way protocol Previous LB: Ω(k) Our LB: Ω(k/ε 2 ). Holds in blackboard model. Tight in static case. LB proof ideas overview: Same framework, choose two modular problems Gap-Hamming k-disj Compose in a different way to prove a LB for F 2 Heavy use of information cost 19-3

45 Two modular problems 2-party Gap-Hamming: Alice has X = {X 1, X 2,..., X 1/ε 2}, Bob has Y = {Y 1, Y 2,..., Y 1/ε 2}. They want to compute: GHD(X, Y ) = 0, 1, if i [1/ε 2 ] X i Y i 1/2ε 2 1/ε, if i [1/ε 2 ] X i Y i 1/2ε 2 + 1/ε,, otherwise, Solving it w.r.t. uniform distribution needs to reveal Ω(1/ε 2 ) bits of the input 20-1

46 Two modular problems 2-party Gap-Hamming: Alice has X = {X 1, X 2,..., X 1/ε 2}, Bob has Y = {Y 1, Y 2,..., Y 1/ε 2}. They want to compute: GHD(X, Y ) = 0, 1, if i [1/ε 2 ] X i Y i 1/2ε 2 1/ε, if i [1/ε 2 ] X i Y i 1/2ε 2 + 1/ε,, otherwise, Solving it w.r.t. uniform distribution needs to reveal Ω(1/ε 2 ) bits of the input k-disj: We have k sites S 1,..., S k. S i holds a set Z i ( Z i = k 2 ). We promise that either Z i are all disjoint, or they intersect on one element and the rest are all disjoint (sun-flower). The goal is to find out which is the case. Solving it w.r.t. certain distribution needs to reveal Ω(k) bits of the input 20-2

47 Next step: Compose Gap-Hamming with k-disj coordinator C sites S k2 +1 S 1 S k2 S k Alice Bob X 1 X 2 Gap-Hamming Y 1 Y 2 X 1/ε 2 Y 1/ε 2 We create 2/ε 2 (k/2)-disj instances, one for each input bit of Gap-Hamming. 21-1

48 Next step: Compose Gap-Hamming with k-disj sites coordinator C S 1 S k2 S k X 1 X 2 S k2 +1 Alice Bob Gap-Hamming Y 1 Y 2 X 1/ε 2 Y 1/ε 2 The proof Solve (1 + ε)-approx F 2 Solve Gap-Hamming (GHD) Learn Ω(1/ε 2 ) input bits of GHD Learning each bit of GHD needs to solve an instance of (k/2)-disj Solving each (k/2)-disj has to reveal Ω(k) bits of the inputs Reveal Ω(k/ε 2 ) bits in total We create 2/ε 2 (k/2)-disj instances, one for each input bit of Gap-Hamming. Q.E.D. 21-2

49 F p (p > 1) upper bounds, a quick glance Previous UB: Õ(k 2p+1 n 1 2/p /poly(ε)) Our UB: Õ(k p 1 /poly(ε)) 22-1

50 F p (p > 1) upper bounds, a quick glance Previous UB: Õ(k 2p+1 n 1 2/p /poly(ε)) Our UB: Õ(k p 1 /poly(ε)) Inspired by work on sub-sampling [Indyk-Woodruff 2005] New features in our protocol: No AMS sketches One-way protocol Threshold-based sampling used to communicationefficiently implement distributed k-party heavy hitters. 22-2

51 F p (p > 1) upper bounds, a quick glance Previous UB: Õ(k 2p+1 n 1 2/p /poly(ε)) Our UB: Õ(k p 1 /poly(ε)) Inspired by work on sub-sampling [Indyk-Woodruff 2005] New features in our protocol: No AMS sketches One-way protocol Threshold-based sampling used to communicationefficiently implement distributed k-party heavy hitters. We suspect it can have more applications, as IW05 did for streaming model. e.g., for distributed EMD, distributed l p - sampling, etc. 22-3

52 Conclusion and future work We obtained: (almost) tight bounds for frequency moments, heavy hitters, quantile and entropy in the distributed streaming model. 23-1

53 Conclusion and future work We obtained: (almost) tight bounds for frequency moments, heavy hitters, quantile and entropy in the distributed streaming model. Future work F 2 is not tight in terms of ε 23-2

54 Conclusion and future work We obtained: (almost) tight bounds for frequency moments, heavy hitters, quantile and entropy in the distributed streaming model. Future work F 2 is not tight in terms of ε Generalize the model: consider the network topology; items go into multiple sites,

55 Conclusion and future work We obtained: (almost) tight bounds for frequency moments, heavy hitters, quantile and entropy in the distributed streaming model. Future work F 2 is not tight in terms of ε Generalize the model: consider the network topology; items go into multiple sites,.... Beyond statistical problems Geometry problems: range-counting, extent measures,... Graph problems 23-4

56 The end T HAN K YOU Questions? 24-1

Tight Bounds for Distributed Functional Monitoring

Tight Bounds for Distributed Functional Monitoring Tight Bounds for Distributed Functional Monitoring Qin Zhang MADALGO, Aarhus University Joint with David Woodruff, IBM Almaden NII Shonan meeting, Japan Jan. 2012 1-1 The distributed streaming model (a.k.a.

More information

Lower Bound Techniques for Multiparty Communication Complexity

Lower Bound Techniques for Multiparty Communication Complexity Lower Bound Techniques for Multiparty Communication Complexity Qin Zhang Indiana University Bloomington Based on works with Jeff Phillips, Elad Verbin and David Woodruff 1-1 The multiparty number-in-hand

More information

Distributed Statistical Estimation of Matrix Products with Applications

Distributed Statistical Estimation of Matrix Products with Applications Distributed Statistical Estimation of Matrix Products with Applications David Woodruff CMU Qin Zhang IUB PODS 2018 June, 2018 1-1 The Distributed Computation Model p-norms, heavy-hitters,... A {0, 1} m

More information

Lower Bounds for Number-in-Hand Multiparty Communication Complexity, Made Easy

Lower Bounds for Number-in-Hand Multiparty Communication Complexity, Made Easy Lower Bounds for Number-in-Hand Multiparty Communication Complexity, Made Easy Jeff M. Phillips School of Computing University of Utah jeffp@cs.utah.edu Elad Verbin Dept. of Computer Science Aarhus University,

More information

Lecture Lecture 9 October 1, 2015

Lecture Lecture 9 October 1, 2015 CS 229r: Algorithms for Big Data Fall 2015 Lecture Lecture 9 October 1, 2015 Prof. Jelani Nelson Scribe: Rachit Singh 1 Overview In the last lecture we covered the distance to monotonicity (DTM) and longest

More information

c 2016 Jeff M. Phillips, Elad Verbin, and Qin Zhang

c 2016 Jeff M. Phillips, Elad Verbin, and Qin Zhang SIAM J. COMPUT. Vol. 45, No. 1, pp. 174 196 c 2016 Jeff M. Phillips, Elad Verbin, and Qin Zhang LOWER BOUNDS FOR NUMBER-IN-HAND MULTIPARTY COMMUNICATION COMPLEXITY, MADE EASY JEFF M. PHILLIPS, ELAD VERBIN,

More information

CMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms

CMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms CMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms Instructor: Mohammad T. Hajiaghayi Scribe: Huijing Gong November 11, 2014 1 Overview In the

More information

Near-Optimal Lower Bounds on the Multi-Party Communication Complexity of Set Disjointness

Near-Optimal Lower Bounds on the Multi-Party Communication Complexity of Set Disjointness Near-Optimal Lower Bounds on the Multi-Party Communication Complexity of Set Disjointness Amit Chakrabarti School of Mathematics Institute for Advanced Study Princeton, NJ 08540 amitc@ias.edu Subhash Khot

More information

Linear Sketches A Useful Tool in Streaming and Compressive Sensing

Linear Sketches A Useful Tool in Streaming and Compressive Sensing Linear Sketches A Useful Tool in Streaming and Compressive Sensing Qin Zhang 1-1 Linear sketch Random linear projection M : R n R k that preserves properties of any v R n with high prob. where k n. M =

More information

Streaming and communication complexity of Hamming distance

Streaming and communication complexity of Hamming distance Streaming and communication complexity of Hamming distance Tatiana Starikovskaya IRIF, Université Paris-Diderot (Joint work with Raphaël Clifford, ICALP 16) Approximate pattern matching Problem Pattern

More information

An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems

An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems Arnab Bhattacharyya, Palash Dey, and David P. Woodruff Indian Institute of Science, Bangalore {arnabb,palash}@csa.iisc.ernet.in

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 2429 - Foundations of Communication Complexity Lecturer: Sergey Gorbunov 1 Introduction In this lecture we will see how to use methods of (conditional) information complexity to prove lower bounds for

More information

Communication-Efficient Computation on Distributed Noisy Datasets. Qin Zhang Indiana University Bloomington

Communication-Efficient Computation on Distributed Noisy Datasets. Qin Zhang Indiana University Bloomington Communication-Efficient Computation on Distributed Noisy Datasets Qin Zhang Indiana University Bloomington SPAA 15 June 15, 2015 1-1 Model of computation The coordinator model: k sites and 1 coordinator.

More information

Algorithms for Querying Noisy Distributed/Streaming Datasets

Algorithms for Querying Noisy Distributed/Streaming Datasets Algorithms for Querying Noisy Distributed/Streaming Datasets Qin Zhang Indiana University Bloomington Sublinear Algo Workshop @ JHU Jan 9, 2016 1-1 The big data models The streaming model (Alon, Matias

More information

Space- Efficient Es.ma.on of Sta.s.cs over Sub- Sampled Streams

Space- Efficient Es.ma.on of Sta.s.cs over Sub- Sampled Streams Space- Efficient Es.ma.on of Sta.s.cs over Sub- Sampled Streams Andrew McGregor University of Massachuse7s mcgregor@cs.umass.edu A. Pavan Iowa State University pavan@cs.iastate.edu Srikanta Tirthapura

More information

On the tightness of the Buhrman-Cleve-Wigderson simulation

On the tightness of the Buhrman-Cleve-Wigderson simulation On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. syzhang@cse.cuhk.edu.hk Abstract. Buhrman,

More information

Computing the Entropy of a Stream

Computing the Entropy of a Stream Computing the Entropy of a Stream To appear in SODA 2007 Graham Cormode graham@research.att.com Amit Chakrabarti Dartmouth College Andrew McGregor U. Penn / UCSD Outline Introduction Entropy Upper Bound

More information

A Near-Optimal Algorithm for Computing the Entropy of a Stream

A Near-Optimal Algorithm for Computing the Entropy of a Stream A Near-Optimal Algorithm for Computing the Entropy of a Stream Amit Chakrabarti ac@cs.dartmouth.edu Graham Cormode graham@research.att.com Andrew McGregor andrewm@seas.upenn.edu Abstract We describe a

More information

Lecture 10. Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1

Lecture 10. Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1 Lecture 10 Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1 Recap Sublinear time algorithms Deterministic + exact: binary search Deterministic + inexact: estimating diameter in a

More information

Sketching and Streaming for Distributions

Sketching and Streaming for Distributions Sketching and Streaming for Distributions Piotr Indyk Andrew McGregor Massachusetts Institute of Technology University of California, San Diego Main Material: Stable distributions, pseudo-random generators,

More information

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Information Complexity and Applications Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Coding vs complexity: a tale of two theories Coding Goal: data transmission Different channels

More information

A Tight Lower Bound for High Frequency Moment Estimation with Small Error

A Tight Lower Bound for High Frequency Moment Estimation with Small Error A Tight Lower Bound for High Frequency Moment Estimation with Small Error Yi Li Department of EECS University of Michigan, Ann Arbor leeyi@umich.edu David P. Woodruff IBM Research, Almaden dpwoodru@us.ibm.com

More information

Lecture 16: Communication Complexity

Lecture 16: Communication Complexity CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity

More information

Quantum Communication Complexity

Quantum Communication Complexity Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,

More information

Communication Lower Bounds via Critical Block Sensitivity

Communication Lower Bounds via Critical Block Sensitivity Communication Lower Bounds via Critical Block Sensitivity Mika Göös & Toniann Pitassi University of Toronto Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January 2014 1 / 18 Communication

More information

A Composition Theorem for Conical Juntas

A Composition Theorem for Conical Juntas A Composition Theorem for Conical Juntas Mika Göös T.S. Jayram University of Toronto IBM Almaden Göös and Jayram A composition theorem for conical juntas 29th May 2016 1 / 12 Motivation Randomised communication

More information

B669 Sublinear Algorithms for Big Data

B669 Sublinear Algorithms for Big Data B669 Sublinear Algorithms for Big Data Qin Zhang 1-1 2-1 Part 1: Sublinear in Space The model and challenge The data stream model (Alon, Matias and Szegedy 1996) a n a 2 a 1 RAM CPU Why hard? Cannot store

More information

Range-efficient computation of F 0 over massive data streams

Range-efficient computation of F 0 over massive data streams Range-efficient computation of F 0 over massive data streams A. Pavan Dept. of Computer Science Iowa State University pavan@cs.iastate.edu Srikanta Tirthapura Dept. of Elec. and Computer Engg. Iowa State

More information

Kernelization Lower Bounds: A Brief History

Kernelization Lower Bounds: A Brief History Kernelization Lower Bounds: A Brief History G Philip Max Planck Institute for Informatics, Saarbrücken, Germany New Developments in Exact Algorithms and Lower Bounds. Pre-FSTTCS 2014 Workshop, IIT Delhi

More information

Fourier analysis of boolean functions in quantum computation

Fourier analysis of boolean functions in quantum computation Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge

More information

Topology Matters in Communication

Topology Matters in Communication Electronic Colloquium on Computational Complexity, Report No. 74 204 Topology Matters in Communication Arkadev Chattopadhyay Jaikumar Radhakrishnan Atri Rudra May 4, 204 Abstract We provide the first communication

More information

Lower bounds for Edit Distance and Product Metrics via Poincaré-Type Inequalities

Lower bounds for Edit Distance and Product Metrics via Poincaré-Type Inequalities Lower bounds for Edit Distance and Product Metrics via Poincaré-Type Inequalities Alexandr Andoni Princeton U./CCI andoni@mit.edu T.S. Jayram IBM Almaden jayram@almaden.ibm.com Mihai Pǎtraşcu AT&T Labs

More information

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic

More information

Lecture 3 Frequency Moments, Heavy Hitters

Lecture 3 Frequency Moments, Heavy Hitters COMS E6998-9: Algorithmic Techniques for Massive Data Sep 15, 2015 Lecture 3 Frequency Moments, Heavy Hitters Instructor: Alex Andoni Scribes: Daniel Alabi, Wangda Zhang 1 Introduction This lecture is

More information

Functional Monitoring without Monotonicity

Functional Monitoring without Monotonicity Functional Monitoring without Monotonicity Chrisil Arackaparambil, Joshua Brody, and Amit Chakrabarti Department of Computer Science, Dartmouth College, Hanover, NH 03755, USA Abstract. The notion of distributed

More information

Linear sketching for Functions over Boolean Hypercube

Linear sketching for Functions over Boolean Hypercube Linear sketching for Functions over Boolean Hypercube Grigory Yaroslavtsev (Indiana University, Bloomington) http://grigory.us with Sampath Kannan (U. Pennsylvania), Elchanan Mossel (MIT) and Swagato Sanyal

More information

The one-way communication complexity of the Boolean Hidden Matching Problem

The one-way communication complexity of the Boolean Hidden Matching Problem The one-way communication complexity of the Boolean Hidden Matching Problem Iordanis Kerenidis CRS - LRI Université Paris-Sud jkeren@lri.fr Ran Raz Faculty of Mathematics Weizmann Institute ran.raz@weizmann.ac.il

More information

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015 CS 2401 - Introduction to Complexity Theory Lecture #11: Dec 8th, 2015 Lecturer: Toniann Pitassi Scribe Notes by: Xu Zhao 1 Communication Complexity Applications Communication Complexity (CC) has many

More information

An exponential separation between quantum and classical one-way communication complexity

An exponential separation between quantum and classical one-way communication complexity An exponential separation between quantum and classical one-way communication complexity Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical

More information

On Quantum vs. Classical Communication Complexity

On Quantum vs. Classical Communication Complexity On Quantum vs. Classical Communication Complexity Dmitry Gavinsky Institute of Mathematics, Praha Czech Academy of Sciences Introduction Introduction The setting of communication complexity is one of the

More information

An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems

An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems Arnab Bhattacharyya Indian Institute of Science, Bangalore arnabb@csa.iisc.ernet.in Palash Dey Indian Institute of

More information

Lecture 16 Oct 21, 2014

Lecture 16 Oct 21, 2014 CS 395T: Sublinear Algorithms Fall 24 Prof. Eric Price Lecture 6 Oct 2, 24 Scribe: Chi-Kit Lam Overview In this lecture we will talk about information and compression, which the Huffman coding can achieve

More information

Settling the Query Complexity of Non-Adaptive Junta Testing

Settling the Query Complexity of Non-Adaptive Junta Testing Settling the Query Complexity of Non-Adaptive Junta Testing Erik Waingarten, Columbia University Based on joint work with Xi Chen (Columbia University) Rocco Servedio (Columbia University) Li-Yang Tan

More information

A Tight Lower Bound for Dynamic Membership in the External Memory Model

A Tight Lower Bound for Dynamic Membership in the External Memory Model A Tight Lower Bound for Dynamic Membership in the External Memory Model Elad Verbin ITCS, Tsinghua University Qin Zhang Hong Kong University of Science & Technology April 2010 1-1 The computational model

More information

PROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY

PROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY PROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY Eric Blais, Joshua Brody, and Kevin Matulef February 1, 01 Abstract. We develop a new technique for proving lower bounds in property testing,

More information

Information Complexity: A Paradigm for Proving Lower Bounds. Amit Chakrabarti

Information Complexity: A Paradigm for Proving Lower Bounds. Amit Chakrabarti Information Complexity: A Paradigm for Proving Lower Bounds Amit Chakrabarti Dartmouth College Hanover, NH, USA STOC 2013, Palo Alto 1 History The applications came first; theory built in service of applications

More information

Secure Two-Party Distribution Testing

Secure Two-Party Distribution Testing Department of Computer Science Columbia University rax - 2012 Secure Two-Party Distribution Testing Alexandr Andoni Tal Malkin Negev Shekel Nosatzki Department of Computer Science Columbia University Privacy

More information

Graph & Geometry Problems in Data Streams

Graph & Geometry Problems in Data Streams Graph & Geometry Problems in Data Streams 2009 Barbados Workshop on Computational Complexity Andrew McGregor Introduction Models: Graph Streams: Stream of edges E = {e 1, e 2,..., e m } describe a graph

More information

Simultaneous Communication Protocols with Quantum and Classical Messages

Simultaneous Communication Protocols with Quantum and Classical Messages Simultaneous Communication Protocols with Quantum and Classical Messages Oded Regev Ronald de Wolf July 17, 2008 Abstract We study the simultaneous message passing model of communication complexity, for

More information

Communication Lower Bounds for Statistical Estimation Problems via a Distributed Data Processing Inequality

Communication Lower Bounds for Statistical Estimation Problems via a Distributed Data Processing Inequality Communication Lower Bounds for Statistical Estimation Problems via a Distributed Data Processing Inequality Mark Braverman Ankit Garg Tengyu Ma Huy Nguyen David Woodruff DIMACS Workshop on Big Data through

More information

Communication Complexity 16:198:671 2/15/2010. Lecture 6. P (x) log

Communication Complexity 16:198:671 2/15/2010. Lecture 6. P (x) log Communication Complexity 6:98:67 2/5/200 Lecture 6 Lecturer: Nikos Leonardos Scribe: Troy Lee Information theory lower bounds. Entropy basics Let Ω be a finite set and P a probability distribution on Ω.

More information

Improved Algorithms for Distributed Entropy Monitoring

Improved Algorithms for Distributed Entropy Monitoring Improved Algorithms for Distributed Entropy Monitoring Jiecao Chen Indiana University Bloomington jiecchen@umail.iu.edu Qin Zhang Indiana University Bloomington qzhangcs@indiana.edu Abstract Modern data

More information

Sketching in Adversarial Environments

Sketching in Adversarial Environments Sketching in Adversarial Environments Ilya Mironov Moni Naor Gil Segev Abstract We formalize a realistic model for computations over massive data sets. The model, referred to as the adversarial sketch

More information

Algebraic Problems in Computational Complexity

Algebraic Problems in Computational Complexity Algebraic Problems in Computational Complexity Pranab Sen School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai 400005, India pranab@tcs.tifr.res.in Guide: Prof. R.

More information

Complexity of Finding a Duplicate in a Stream: Simple Open Problems

Complexity of Finding a Duplicate in a Stream: Simple Open Problems Complexity of Finding a Duplicate in a Stream: Simple Open Problems Jun Tarui Univ of Electro-Comm, Tokyo Shonan, Jan 2012 1 Duplicate Finding Problem Given: Stream a 1,,a m a i {1,,n} Assuming m > n,

More information

Stream Computation and Arthur- Merlin Communication

Stream Computation and Arthur- Merlin Communication Stream Computation and Arthur- Merlin Communication Justin Thaler, Yahoo! Labs Joint Work with: Amit Chakrabarti, Dartmouth Graham Cormode, University of Warwick Andrew McGregor, Umass Amherst Suresh Venkatasubramanian,

More information

Arthur-Merlin Streaming Complexity

Arthur-Merlin Streaming Complexity Weizmann Institute of Science Joint work with Ran Raz Data Streams The data stream model is an abstraction commonly used for algorithms that process network traffic using sublinear space. A data stream

More information

15-451/651: Design & Analysis of Algorithms September 13, 2018 Lecture #6: Streaming Algorithms last changed: August 30, 2018

15-451/651: Design & Analysis of Algorithms September 13, 2018 Lecture #6: Streaming Algorithms last changed: August 30, 2018 15-451/651: Design & Analysis of Algorithms September 13, 2018 Lecture #6: Streaming Algorithms last changed: August 30, 2018 Today we ll talk about a topic that is both very old (as far as computer science

More information

Lecture 2 Sept. 8, 2015

Lecture 2 Sept. 8, 2015 CS 9r: Algorithms for Big Data Fall 5 Prof. Jelani Nelson Lecture Sept. 8, 5 Scribe: Jeffrey Ling Probability Recap Chebyshev: P ( X EX > λ) < V ar[x] λ Chernoff: For X,..., X n independent in [, ],

More information

New Characterizations in Turnstile Streams with Applications

New Characterizations in Turnstile Streams with Applications New Characterizations in Turnstile Streams with Applications Yuqing Ai 1, Wei Hu 1, Yi Li 2, and David P. Woodruff 3 1 The Institute for Theoretical Computer Science (ITCS), Institute for Interdisciplinary

More information

Quantum Pseudo-Telepathy

Quantum Pseudo-Telepathy Quantum Pseudo-Telepathy Michail Lampis mlambis@softlab.ntua.gr NTUA Quantum Pseudo-Telepathy p.1/24 Introduction In Multi-Party computations we are interested in measuring communication complexity. Communication

More information

Tight Lower Bounds for Multi-Pass Stream Computation via Pass Elimination

Tight Lower Bounds for Multi-Pass Stream Computation via Pass Elimination Tight Lower Bounds for Multi-Pass Stream Computation via Pass Elimination Sudipto Guha 1 and Andrew McGregor 2 1 Department of Computer and Information Science, University of Pennsylvania 2 Information

More information

Principal Component Analysis and Higher Correlations for Distributed Data

Principal Component Analysis and Higher Correlations for Distributed Data Principal Component Analysis and Higher Correlations for Distributed Data Ravindran Kannan Microsoft Research India kannan@microsoft.com Santosh S. Vempala Georgia Tech vempala@gatech.edu David P. Woodruff

More information

Finding Heavy Distinct Hitters in Data Streams

Finding Heavy Distinct Hitters in Data Streams Finding Heavy Distinct Hitters in Data Streams Thomas Locher IBM Research Zurich thl@zurich.ibm.com ABSTRACT A simple indicator for an anomaly in a network is a rapid increase in the total number of distinct

More information

A Direct-sum Theorem for Read-Once Branching Programs

A Direct-sum Theorem for Read-Once Branching Programs A Direct-sum Theorem for Read-Once Branching Programs Anup Rao Makrand Sinha Computer Science and Engineering, University of Washington. {anuprao makrand}@cs.washington.edu. Abstract We study a direct-sum

More information

25.2 Last Time: Matrix Multiplication in Streaming Model

25.2 Last Time: Matrix Multiplication in Streaming Model EE 381V: Large Scale Learning Fall 01 Lecture 5 April 18 Lecturer: Caramanis & Sanghavi Scribe: Kai-Yang Chiang 5.1 Review of Streaming Model Streaming model is a new model for presenting massive data.

More information

Algorithms for Distributed Functional Monitoring

Algorithms for Distributed Functional Monitoring Algorithms for Distributed Functional Monitoring Graham Cormode AT&T Labs Florham Park, NJ graham@research.att.com S. Muthukrishnan Google Inc. New York, NY muthu@google.com Ke Yi Hong Kong U.S.T. Kowloon,

More information

1-Pass Relative-Error L p -Sampling with Applications

1-Pass Relative-Error L p -Sampling with Applications -Pass Relative-Error L p -Sampling with Applications Morteza Monemizadeh David P Woodruff Abstract For any p [0, 2], we give a -pass poly(ε log n)-space algorithm which, given a data stream of length m

More information

Cell-Probe Lower Bounds for the Partial Match Problem

Cell-Probe Lower Bounds for the Partial Match Problem Cell-Probe Lower Bounds for the Partial Match Problem T.S. Jayram Subhash Khot Ravi Kumar Yuval Rabani Abstract Given a database of n points in {0, 1} d, the partial match problem is: In response to a

More information

Sketching in Adversarial Environments

Sketching in Adversarial Environments Sketching in Adversarial Environments Ilya Mironov Moni Naor Gil Segev Abstract We formalize a realistic model for computations over massive data sets. The model, referred to as the adversarial sketch

More information

Efficient Sketches for Earth-Mover Distance, with Applications

Efficient Sketches for Earth-Mover Distance, with Applications Efficient Sketches for Earth-Mover Distance, with Applications Alexandr Andoni MIT andoni@mit.edu Khanh Do Ba MIT doba@mit.edu Piotr Indyk MIT indyk@mit.edu David Woodruff IBM Almaden dpwoodru@us.ibm.com

More information

Relative-Error CUR Matrix Decompositions

Relative-Error CUR Matrix Decompositions RandNLA Reading Group University of California, Berkeley Tuesday, April 7, 2015. Motivation study [low-rank] matrix approximations that are explicitly expressed in terms of a small numbers of columns and/or

More information

Grothendieck Inequalities, XOR games, and Communication Complexity

Grothendieck Inequalities, XOR games, and Communication Complexity Grothendieck Inequalities, XOR games, and Communication Complexity Troy Lee Rutgers University Joint work with: Jop Briët, Harry Buhrman, and Thomas Vidick Overview Introduce XOR games, Grothendieck s

More information

Interval Selection in the streaming model

Interval Selection in the streaming model Interval Selection in the streaming model Pascal Bemmann Abstract In the interval selection problem we are given a set of intervals via a stream and want to nd the maximum set of pairwise independent intervals.

More information

An Optimal Lower Bound on the Communication Complexity of GAP-HAMMING-DISTANCE

An Optimal Lower Bound on the Communication Complexity of GAP-HAMMING-DISTANCE An Optimal Lower Bound on the Communication Complexity of GAP-HAMMING-DISTANCE Amit Chakrabarti Oded Regev June 29, 2012 Abstract We prove an optimal Ω(n) lower bound on the randomized communication complexity

More information

distributed simulation and distributed inference

distributed simulation and distributed inference distributed simulation and distributed inference Algorithms, Tradeoffs, and a Conjecture Clément Canonne (Stanford University) April 13, 2018 Joint work with Jayadev Acharya (Cornell University) and Himanshu

More information

Tight Bounds for Distributed Functional Monitoring

Tight Bounds for Distributed Functional Monitoring Tight Bounds for Distributed Functiona Monitoring David P. Woodruff IBM Amaden dpwoodru@us.ibm.com Qin Zhang IBM Amaden qinzhang@cse.ust.hk Abstract We resove severa fundamenta questions in the area of

More information

Optimal Random Sampling from Distributed Streams Revisited

Optimal Random Sampling from Distributed Streams Revisited Optimal Random Sampling from Distributed Streams Revisited Srikanta Tirthapura 1 and David P. Woodruff 2 1 Dept. of ECE, Iowa State University, Ames, IA, 50011, USA. snt@iastate.edu 2 IBM Almaden Research

More information

An Optimal Algorithm for Large Frequency Moments Using O(n 1 2/k ) Bits

An Optimal Algorithm for Large Frequency Moments Using O(n 1 2/k ) Bits An Optimal Algorithm for Large Frequency Moments Using O(n 1 2/k ) Bits Vladimir Braverman 1, Jonathan Katzman 2, Charles Seidell 3, and Gregory Vorsanger 4 1 Johns Hopkins University, Department of Computer

More information

Streaming Communication Protocols

Streaming Communication Protocols Streaming Communication Protocols Lucas Boczkowski, Iordanis Kerenidis, and Frédéric Magniez CNRS, IRIF, Univ Paris Diderot, Paris, France. Abstract We define the Streaming Communication model that combines

More information

Quantum algorithms based on span programs

Quantum algorithms based on span programs Quantum algorithms based on span programs Ben Reichardt IQC, U Waterloo [arxiv:0904.2759] Model: Complexity measure: Quantum algorithms Black-box query complexity Span programs Witness size [KW 93] [RŠ

More information

The Simultaneous Communication of Disjointness with Applications to Data Streams

The Simultaneous Communication of Disjointness with Applications to Data Streams The Simultaneous Communication of Disjointness with Applications to Data Streams Omri Weinstein David P. Woodruff Abstract We study -party set disjointness in the simultaneous message-passing model, and

More information

15-251: Great Theoretical Ideas In Computer Science Recitation 9 : Randomized Algorithms and Communication Complexity Solutions

15-251: Great Theoretical Ideas In Computer Science Recitation 9 : Randomized Algorithms and Communication Complexity Solutions 15-251: Great Theoretical Ideas In Computer Science Recitation 9 : Randomized Algorithms and Communication Complexity Solutions Definitions We say a (deterministic) protocol P computes f if (x, y) {0,

More information

Combinatorial Auctions Do Need Modest Interaction

Combinatorial Auctions Do Need Modest Interaction Combinatorial Auctions Do Need Modest Interaction SEPEHR ASSADI, University of Pennsylvania We study the necessity of interaction for obtaining efficient allocations in combinatorial auctions with subadditive

More information

Combinatorial Auctions Do Need Modest Interaction

Combinatorial Auctions Do Need Modest Interaction Combinatorial Auctions Do Need Modest Interaction Sepehr Assadi University of Pennsylvania Motivation A fundamental question: How to determine efficient allocation of resources between individuals? Motivation

More information

Estimating Dominance Norms of Multiple Data Streams Graham Cormode Joint work with S. Muthukrishnan

Estimating Dominance Norms of Multiple Data Streams Graham Cormode Joint work with S. Muthukrishnan Estimating Dominance Norms of Multiple Data Streams Graham Cormode graham@dimacs.rutgers.edu Joint work with S. Muthukrishnan Data Stream Phenomenon Data is being produced faster than our ability to process

More information

On The Hardness of Approximate and Exact (Bichromatic) Maximum Inner Product. Lijie Chen (Massachusetts Institute of Technology)

On The Hardness of Approximate and Exact (Bichromatic) Maximum Inner Product. Lijie Chen (Massachusetts Institute of Technology) On The Hardness of Approximate and Exact (Bichromatic) Maximum Inner Product Max a,b A B a b Lijie Chen (Massachusetts Institute of Technology) Max-IP and Z-Max-IP (Boolean) Max-IP: Given sets A and B

More information

Lecture 7 Limits on inapproximability

Lecture 7 Limits on inapproximability Tel Aviv University, Fall 004 Lattices in Computer Science Lecture 7 Limits on inapproximability Lecturer: Oded Regev Scribe: Michael Khanevsky Let us recall the promise problem GapCVP γ. DEFINITION 1

More information

CS Communication Complexity: Applications and New Directions

CS Communication Complexity: Applications and New Directions CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the

More information

Algorithms for Distributed Functional Monitoring

Algorithms for Distributed Functional Monitoring Algorithms for Distributed Functional Monitoring Graham Cormode AT&T Labs and S. Muthukrishnan Google Inc. and Ke Yi Hong Kong University of Science and Technology We study what we call functional monitoring

More information

Turnstile Streaming Algorithms Might as Well Be Linear Sketches

Turnstile Streaming Algorithms Might as Well Be Linear Sketches Turnstile Streaming Algorithms Might as Well Be Linear Sketches Yi Li Max-Planck Institute for Informatics yli@mpi-inf.mpg.de David P. Woodruff IBM Research, Almaden dpwoodru@us.ibm.com Huy L. Nguy ên

More information

Statistical Privacy For Privacy Preserving Information Sharing

Statistical Privacy For Privacy Preserving Information Sharing Statistical Privacy For Privacy Preserving Information Sharing Johannes Gehrke Cornell University http://www.cs.cornell.edu/johannes Joint work with: Alexandre Evfimievski, Ramakrishnan Srikant, Rakesh

More information

Approximation norms and duality for communication complexity lower bounds

Approximation norms and duality for communication complexity lower bounds Approximation norms and duality for communication complexity lower bounds Troy Lee Columbia University Adi Shraibman Weizmann Institute From min to max The cost of a best algorithm is naturally phrased

More information

Multi-Dimensional Online Tracking

Multi-Dimensional Online Tracking Multi-Dimensional Online Tracking Ke Yi and Qin Zhang Hong Kong University of Science & Technology SODA 2009 January 4-6, 2009 1-1 A natural problem Bob: tracker f(t) g(t) Alice: observer (t, g(t)) t 2-1

More information

A Deterministic Algorithm for Summarizing Asynchronous Streams over a Sliding Window

A Deterministic Algorithm for Summarizing Asynchronous Streams over a Sliding Window A Deterministic Algorithm for Summarizing Asynchronous Streams over a Sliding Window Costas Busch 1 and Srikanta Tirthapura 2 1 Department of Computer Science Rensselaer Polytechnic Institute, Troy, NY

More information

arxiv: v6 [cs.dc] 16 Sep 2015

arxiv: v6 [cs.dc] 16 Sep 2015 Distributed Computation of Large-scale Graph Problems Hartmut Klauck Danupon Nanongkai Gopal Pandurangan Peter Robinson arxiv:1311.6209v6 [cs.dc] 16 Sep 2015 Abstract Motivated by the increasing need for

More information

Majority is incompressible by AC 0 [p] circuits

Majority is incompressible by AC 0 [p] circuits Majority is incompressible by AC 0 [p] circuits Igor Carboni Oliveira Columbia University Joint work with Rahul Santhanam (Univ. Edinburgh) 1 Part 1 Background, Examples, and Motivation 2 Basic Definitions

More information

Tutorial: Locally decodable codes. UT Austin

Tutorial: Locally decodable codes. UT Austin Tutorial: Locally decodable codes Anna Gál UT Austin Locally decodable codes Error correcting codes with extra property: Recover (any) one message bit, by reading only a small number of codeword bits.

More information

Communication vs information complexity, relative discrepancy and other lower bounds

Communication vs information complexity, relative discrepancy and other lower bounds Communication vs information complexity, relative discrepancy and other lower bounds Iordanis Kerenidis CNRS, LIAFA- Univ Paris Diderot 7 Joint work with: L. Fontes, R. Jain, S. Laplante, M. Lauriere,

More information

1 Estimating Frequency Moments in Streams

1 Estimating Frequency Moments in Streams CS 598CSC: Algorithms for Big Data Lecture date: August 28, 2014 Instructor: Chandra Chekuri Scribe: Chandra Chekuri 1 Estimating Frequency Moments in Streams A significant fraction of streaming literature

More information