Lower Bound Techniques for Multiparty Communication Complexity
|
|
- Darcy Richards
- 5 years ago
- Views:
Transcription
1 Lower Bound Techniques for Multiparty Communication Complexity Qin Zhang Indiana University Bloomington Based on works with Jeff Phillips, Elad Verbin and David Woodruff 1-1
2 The multiparty number-in-hand (NIH) comm. A model for proving lower bounds x 1 = x 2 = x 3 = x k = They want to jointly compute f(x 1, x 2,..., x k ) Goal: minimize total bits of communication 2-1
3 The multiparty number-in-hand (NIH) comm. A model for proving lower bounds x 1 = x 2 = Blackboard (BB): One speaks, everyone hears. Message-Passing (MP): If x 1 talks to x 2, others cannot hear. x 3 = x k = They want to jointly compute f(x 1, x 2,..., x k ) Goal: minimize total bits of communication 2-2
4 The multiparty number-in-hand (NIH) comm. A model for proving lower bounds x 1 = x 2 = Blackboard (BB): One speaks, everyone hears. Message-Passing (MP): If x 1 talks to x 2, others cannot hear. x 3 = x k = Coordinator = C They want to jointly compute f(x 1, x 2,..., x k ) S 1 S 2 S 3 S k Goal: minimize total bits of communication 2-3
5 Previously, for multiparty NIH comm. model Well studied? YES and NO. 3-1
6 Previously, for multiparty NIH comm. model Well studied? YES and NO. Quite a few papers in BB model: [Alon et al. 96], [Bar-Yossef et al. 04],
7 Previously, for multiparty NIH comm. model Well studied? YES and NO. Quite a few papers in BB model: [Alon et al. 96], [Bar-Yossef et al. 04],... But, Almost nothing in MP model before
8 Previously, for multiparty NIH comm. model Well studied? YES and NO. Quite a few papers in BB model: [Alon et al. 96], [Bar-Yossef et al. 04],... But, Almost nothing in MP model before Too easy? 3-4
9 Previously, for multiparty NIH comm. model Well studied? YES and NO. Quite a few papers in BB model: [Alon et al. 96], [Bar-Yossef et al. 04],... But, Almost nothing in MP model before Too easy? Lack of motivations? 3-5
10 Too easy? Could be more difficult than BB, since in MP each player observes only a piece of protocol transcript. 4-1
11 Too easy? Could be more difficult than BB, since in MP each player observes only a piece of protocol transcript. We do not want to analyze a k-dimensional matrix directly. A 0 1 B A communication matrix of the 2-party AND function 4-2
12 Too easy? Could be more difficult than BB, since in MP each player observes only a piece of protocol transcript. We do not want to analyze a k-dimensional matrix directly. A 0 1 B A communication matrix of the 2-party AND function Even for the 2-party Gap-Hamming problem, where Alice has a n-bit vector and Bob has a n-bit vector, and they want to compute if the hamming distance of these two vectors is bigger than n/2 + n or less than n/2 n, it tooks researchers in this area about 10 years and dozens of papers (IW03, Woodruff04,..., Sherstov12) to fully understand its 2-dim communication matrix! 4-3
13 Lack of motivations? (Continous) Distributed Monitoring communication energy, bandwidth,... Sensor networks Network routers Data in the cloud 5-1
14 Lack of motivations? (cont.) Data Streams communication space Memory CPU 6-1
15 Lack of motivations? (cont.) Data Streams communication space Memory P 1 P 2 P k CPU 6-2
16 Lack of motivations? (cont.) Distributed Computation for Big Data communication bandwidth,... Input Output Map Shuffle Reduce The BSP model. E.g., Apache Giraph, Pregel. The MapReduce model. E.g., Hadoop, Google MapReduce. 7-1
17 Interesting problems Statistical problems Frequency moments F p F 0 : #distinct elements F 2 : size of self-join Heavy hitters Quantile Entropy
18 Interesting problems Statistical problems Graph problems Connectivity Frequency moments F p F 0 : #distinct elements F 2 : size of self-join Heavy hitters Quantile Entropy Bipartiteness Counting triangles Matching Minimum spanning tree
19 Interesting problems Statistical problems Graph problems Connectivity Frequency moments F p F 0 : #distinct elements F 2 : size of self-join Heavy hitters Quantile Entropy... Numerical linear algebra Bipartiteness Counting triangles Matching Minimum spanning tree... L p regression Low-rank approximation
20 Interesting problems Statistical problems Frequency moments F p F 0 : #distinct elements F 2 : size of self-join Heavy hitters Quantile Entropy... Numerical linear algebra Graph problems Connectivity Bipartiteness Counting triangles Matching Minimum spanning tree... L p regression Low-rank approximation... DB queries Conjuntive queries Distributed learning Classifiers... Geometry problems 8-4
21 This talk We will talk lower bounds. Most lower bounds match the upper bounds. Introduce two general techniques that work in both BB model and MP model for proving lower bounds, with examples. Conclude with several future directions. 9-1
22 Our new ideas and techniques Ideas 1. Reduce a k-player problem to a 2-player problem. 2. Decompose a complicated problem to several simpler problems 10-1
23 Our new ideas and techniques Ideas 1. Reduce a k-player problem to a 2-player problem. 2. Decompose a complicated problem to several simpler problems In fact, we are exploring the underlying patterns of communication matrices 10-2
24 Our new ideas and techniques Ideas 1. Reduce a k-player problem to a 2-player problem. 2. Decompose a complicated problem to several simpler problems In fact, we are exploring the underlying patterns of communication matrices Concrete techniques Symmetrization With Phillips and Verbin, 2012 Composition With Woodruff,
25 Our new ideas and techniques Ideas 1. Reduce a k-player problem to a 2-player problem. 2. Decompose a complicated problem to several simpler problems In fact, we are exploring the underlying patterns of communication matrices Concrete techniques 1. Symmetrization Example: Graph Connecitivy With Phillips and Verbin, Composition With Woodruff, 2012 Example: Distinct Elements 10-4
26 Communication complexity I choose not to introduce formal definitions/concepts of communication complexity. Just want to mention Yao s lemma: We will prove lower bounds for randomized protocols. To do that we will usually pick some input distribution, and then prove lower bounds for any deterministic protocol that succeeds w.pr 0.99 under that input distribution. 11-1
27 12-1 1st Technique: Symmetrization
28 Example: graph connectivity k sites each holds a set of edges of a graph Goal: compute whether the graph is connected. A trivial UB: O(nk log n) bits. We prove that this is tight up to a log factor. 13-1
29 Set disjointness (2-DISJ) X Y =? X {1,..., n} Y {1,..., n} 14-1
30 Set disjointness (2-DISJ) X Y =? X {1,..., n} Y {1,..., n} Exists a hard distribution µ β, under which X Y = 1 (YES instance) w.p. β and X Y = 0 (NO instance) w.p. 1 β. Lemma: (Generalization of [Razborov 90, BJKS 04]) E[CC β/100 µ β (2-DISJ)] = Ω(n) 14-2
31 2-DISJ k-conn x 1 Bob x 2 Alice and Bob want to solve the 2-DISJ (X, Y ) µ β. (set β = 1/k 2 ) running a protocol for k-conn on: x 5 x 4 Alice Alice plays a random site S I with input X I = X. Bob plays other k 1 sites, and constructs inputs for them using Y : it choose X i µ β Y (i I). Note: X 1,..., X k are i.i.d. conditioned on Y. Vertices u 1,..., u k, v 1,..., v n. An edge (u i, v j ) exists iff X i,j = 1. Let ν be the distribution of the graph. x
32 2-DISJ k-conn (cont.) v j j [r]\y v j j Y v j Y +1 v j Y +2 v j Y +3 v jn v j1 v j2 v j Y X I Y =? u 1 u 2 u 3 u k (u i, v j ) exists if and only if X i,j =
33 2-DISJ k-conn x 1 Bob x 2 Alice and Bob want to solve the 2-DISJ (X, Y ) µ β. (set β = 1/k 2 ) running a protocol for k-conn on: x 5 x 4 Alice Alice plays a random site S I with input X I = X. Bob plays other k 1 sites, and constructs inputs for them using Y : it choose X i µ β Y (i I). Note: X 1,..., X k are i.i.d. conditioned on Y. Vertices u 1,..., u k, v 1,..., v n. An edge (u i, v j ) exists iff X i,j = 1. Let ν be the distribution of the graph. Correctness: Solving k-conn w.pr. 1 β 1.5 under ν also solves 2-DISJ w.pr. 1 β/100 under µ β. x
34 2-DISJ k-conn x 1 Bob x 2 E[CC β/100 µ β (2-DISJ)] = O ( ) 1 k CC β 1.5 ν (k-conn) Alice and Bob want to solve the 2-DISJ (X, Y ) µ β. (set β = 1/k 2 ) running a protocol for k-conn on: x 5 x 4 Alice Alice plays a random site S I with input X I = X. Bob plays other k 1 sites, and constructs inputs for them using Y : it choose X i µ β Y (i I). Note: X 1,..., X k are i.i.d. conditioned on Y. Vertices u 1,..., u k, v 1,..., v n. An edge (u i, v j ) exists iff X i,j = 1. Let ν be the distribution of the graph. Correctness: Solving k-conn w.pr. 1 β 1.5 under ν also solves 2-DISJ w.pr. 1 β/100 under µ β. x
35 2-DISJ k-conn x 1 Bob x 2 E[CC β/100 µ β (2-DISJ)] = O ( ) 1 k CC β 1.5 ν (k-conn) Ω(n) Alice and Bob want to solve the 2-DISJ (X, Y ) µ β. (set β = 1/k 2 ) running a protocol for k-conn on: x 5 x 4 Alice Alice plays a random site S I with input X I = X. Bob plays other k 1 sites, and constructs inputs for them using Y : it choose X i µ β Y (i I). Note: X 1,..., X k are i.i.d. conditioned on Y. Vertices u 1,..., u k, v 1,..., v n. An edge (u i, v j ) exists iff X i,j = 1. Let ν be the distribution of the graph. Correctness: Solving k-conn w.pr. 1 β 1.5 under ν also solves 2-DISJ w.pr. 1 β/100 under µ β. x
36 2-DISJ k-conn x 1 Bob x 2 E[CC β/100 µ β (2-DISJ)] = O ( ) 1 k CC β 1.5 ν (k-conn) Ω(n) Ω(nk) Alice and Bob want to solve the 2-DISJ (X, Y ) µ β. (set β = 1/k 2 ) running a protocol for k-conn on: x 5 x 4 Alice Alice plays a random site S I with input X I = X. Bob plays other k 1 sites, and constructs inputs for them using Y : it choose X i µ β Y (i I). Note: X 1,..., X k are i.i.d. conditioned on Y. Vertices u 1,..., u k, v 1,..., v n. An edge (u i, v j ) exists iff X i,j = 1. Let ν be the distribution of the graph. Correctness: Solving k-conn w.pr. 1 β 1.5 under ν also solves 2-DISJ w.pr. 1 β/100 under µ β. x
37 A useful message We can show trivial UBs are tight for many statistical and graph problems in the MP model (e.g., #distinct elements, bipartiteness, cycle/triangle-freeness,...), when exact answers are wanted. (Woodruff, Z, 2013a) Approximation is often necessary if we want comm. efficient protocols. 18-1
38 A useful message We can show trivial UBs are tight for many statistical and graph problems in the MP model (e.g., #distinct elements, bipartiteness, cycle/triangle-freeness,...), when exact answers are wanted. (Woodruff, Z, 2013a) Approximation is often necessary if we want comm. efficient protocols. Example: Computing the diameter of a graph exactly needs Ω(kn 2 ) bits (when m = n 2 ) in the MP model. However, there is a protocol that computes the diameter up to an additive error of 2 using Õ(kn3/2 ) bits. 18-2
39 Other problems using symmetrization k-bitwise-maj k-bitwise-or/and/xor With applications in Distinct elements reporting ε-kernels (geometry) Heavy-hitters Testing bipartiteness, Testing cycle Testing triangle-freeness,
40 Other problems using symmetrization k-bitwise-maj k-bitwise-or/and/xor With applications in Distinct elements reporting ε-kernels (geometry) Heavy-hitters Testing bipartiteness, Testing cycle Testing triangle-freeness,... Key: Find the right 2-player problem for reduction 19-2
41 20-1 2nd Technique: Composition
42 Example the F 0 (distinct elements) problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute #distinct elements( k i=1 X i) up to a (1 + ε)-approx. 21-1
43 Example the F 0 (distinct elements) problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute #distinct elements( k i=1 X i) up to a (1 + ε)-approx. Current best UB: Õ(k/ε 2 ) [Cormode, Muth, Yi. 2008] Holds in MP model 21-2
44 Example the F 0 (distinct elements) problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute #distinct elements( k i=1 X i) up to a (1 + ε)-approx. Current best UB: Õ(k/ε 2 ) [Cormode, Muth, Yi. 2008] Holds in MP model Previous LB: Ω(k) And Ω(1/ε 2 ) Direct reduction from Gap-Hamming 21-3
45 Example the F 0 (distinct elements) problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute #distinct elements( k i=1 X i) up to a (1 + ε)-approx. Current best UB: Õ(k/ε 2 ) [Cormode, Muth, Yi. 2008] Holds in MP model Previous LB: Ω(k) And Ω(1/ε 2 ) Direct reduction from Gap-Hamming New LB: Ω(k/ε 2 ). [Woodruff, Z. 2012, 2013b]. Holds in MP model. Better UB in the BB model 21-4
46 The proof framework Step 1: Find two modular problems k-gap-maj and 2-DISJ of simpler structures s.t. F 0 can be thought as a composition of them. Step 2: Analyze the complexities of k-gap-maj and 2-DISJ. Step 3: Compose two modular problems so that: Complexity(F 0 ) = Complexity(k-GAP-MAJ) Complexity(2-DISJ). 22-1
47 The proof framework Step 1: Find two modular problems k-gap-maj and 2-DISJ of simpler structures s.t. F 0 can be thought as a composition of them. Step 2: Analyze the complexities of k-gap-maj and 2-DISJ. Step 3: Compose two modular problems so that: Complexity(F 0 ) = Complexity(k-GAP-MAJ) Complexity(2-DISJ). The proof presented here is for a special case when k = 2/ε
48 k-gap-maj k sites each holds a bit Z i chosen uniform at random from {0, 1} Goal: compute k-gap-maj(z 1, Z 2,..., Z k ) = 0, if i [k] Z i k/2 k, 1, if i [k] Z i k/2 + k, don t care, otherwise, 23-1
49 k-gap-maj k sites each holds a bit Z i chosen uniform at random from {0, 1} Goal: compute k-gap-maj(z 1, Z 2,..., Z k ) = 0, if i [k] Z i k/2 k, 1, if i [k] Z i k/2 + k, don t care, otherwise, Lemma: Any protocol Π that computes k-gap-maj correctly w.p has to learn Ω(k) Z i s well, that is, In other words: I(Π; Z 1,..., Z k ) = Ω(k). H(Z i Π) H b (1/100) for Ω(k) of i. 23-2
50 Set disjointness (2-DISJ) X Y =? X {1,..., n} Y {1,..., n} 24-1
51 Set disjointness (2-DISJ) X Y =? X {1,..., n} Y {1,..., n} Exists a hard distribution µ β, under which X Y = 1 (YES instance) w.p. β and X Y = 0 (NO instance) w.p. 1 β. Lemma: (Generalization of [Razborov 90, BJKS 04]) E[CC β/100 µ β (2-DISJ)] = Ω(n) 24-2
52 The proof sketch coordinator 2-DISJ C Y sites S 1 S 2 S 3 S k X 1 X 2 X 3 X k (X i, Y ) µ 1/2 (hard input dist. for DISJ) for each i [k] 25-1
53 The proof sketch coordinator 2-DISJ C Y Z i = X i Y { 1 w.p. 1/2 0 w.p. 1/2 sites S 1 S 2 S 3 S k X 1 X 2 X 3 X k (X i, Y ) µ 1/2 (hard input dist. for DISJ) for each i [k] 25-2
54 The proof sketch coordinator 2-DISJ C Y Z i = X i Y { 1 w.p. 1/2 0 w.p. 1/2 sites S 1 S 2 S 3 S k X 1 X 2 X 3 X k (X i, Y ) µ 1/2 (hard input dist. for DISJ) for each i [k] F 0 (X 1, X 2,..., X k ) k-gap-maj(z 1, Z 2,..., Z k ) (Z i = X i Y ) = learn Ω(k) Z i s well = need Ω(nk) bits (using an embedding argument) 25-3
55 The proof sketch coordinator 2-DISJ C Y Z i = X i Y { 1 w.p. 1/2 0 w.p. 1/2 sites S 1 S 2 S 3 S k Q.E.D. X 1 X 2 X 3 X k (X i, Y ) µ 1/2 (hard input dist. for DISJ) for each i [k] F 0 (X 1, X 2,..., X k ) k-gap-maj(z 1, Z 2,..., Z k ) For the reduction set universe n = Θ(1/ε 2 ) we get Ω(k/ε 2 ) LB. (Z i = X i Y ) = learn Ω(k) Z i s well = need Ω(nk) bits (using an embedding argument) 25-4
56 Other problems using composition Frequency moments F p (p > 1) Entropy l p Heavy-hitters Quantile 26-1
57 Other problems using composition Frequency moments F p (p > 1) Entropy l p Heavy-hitters Quantile Key: Find the right modular problems 26-2
58 27-1 Furture directions
59 Future directions Problem space The current understandings statistics graph linear algebra DB queries Exact computation well medium limited Approximation well limited limited limited 28-1
60 Future directions Problem space The current understandings statistics graph linear algebra DB queries Exact computation well medium limited Approximation well limited limited limited Concretely, e.g., What is the CC of computing a const approx of the size of the matching? 28-2
61 Future directions Problem space (cont.) Communication complexity of distributed property testing. Communication complexity of distributed property testing can also be used for proving LBs for traditional property testing, by extending a framework by Blais et al
62 Future directions Problem space (cont.) Communication complexity of distributed property testing. Communication complexity of distributed property testing can also be used for proving LBs for traditional property testing, by extending a framework by Blais et al Communication complexity of relations (instead of functions, useful for database queries) 29-2
63 Future directions Problem space (cont.) Communication complexity of distributed property testing. Communication complexity of distributed property testing can also be used for proving LBs for traditional property testing, by extending a framework by Blais et al Communication complexity of relations (instead of functions, useful for database queries) Need to understand more primitive problems (building blocks), e.g., breadth-first search (BFS), pointer-chasing, etc. So far building blocks are quite limited: mainly 2-DISJ, 2- GAP-HAMMING, k-gap-maj, k-or and their variants. 29-3
64 Future directions Model/Technique space Can we relax or generalize the symmetrization technique? E.g., do not require totally symmetric distributions 30-1
65 Future directions Model/Technique space Can we relax or generalize the symmetrization technique? E.g., do not require totally symmetric distributions Consider round complexity (practical needs). Consider players with limited space (practical needs). 30-2
66 The end T HAN K YOU Questions? 31-1
Tight Bounds for Distributed Streaming
Tight Bounds for Distributed Streaming (a.k.a., Distributed Functional Monitoring) David Woodruff IBM Research Almaden Qin Zhang MADALGO, Aarhus Univ. STOC 12 May 22, 2012 1-1 The distributed streaming
More informationTight Bounds for Distributed Functional Monitoring
Tight Bounds for Distributed Functional Monitoring Qin Zhang MADALGO, Aarhus University Joint with David Woodruff, IBM Almaden NII Shonan meeting, Japan Jan. 2012 1-1 The distributed streaming model (a.k.a.
More informationLower Bounds for Number-in-Hand Multiparty Communication Complexity, Made Easy
Lower Bounds for Number-in-Hand Multiparty Communication Complexity, Made Easy Jeff M. Phillips School of Computing University of Utah jeffp@cs.utah.edu Elad Verbin Dept. of Computer Science Aarhus University,
More informationDistributed Statistical Estimation of Matrix Products with Applications
Distributed Statistical Estimation of Matrix Products with Applications David Woodruff CMU Qin Zhang IUB PODS 2018 June, 2018 1-1 The Distributed Computation Model p-norms, heavy-hitters,... A {0, 1} m
More informationc 2016 Jeff M. Phillips, Elad Verbin, and Qin Zhang
SIAM J. COMPUT. Vol. 45, No. 1, pp. 174 196 c 2016 Jeff M. Phillips, Elad Verbin, and Qin Zhang LOWER BOUNDS FOR NUMBER-IN-HAND MULTIPARTY COMMUNICATION COMPLEXITY, MADE EASY JEFF M. PHILLIPS, ELAD VERBIN,
More informationLecture 16: Communication Complexity
CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity
More informationLecture Lecture 9 October 1, 2015
CS 229r: Algorithms for Big Data Fall 2015 Lecture Lecture 9 October 1, 2015 Prof. Jelani Nelson Scribe: Rachit Singh 1 Overview In the last lecture we covered the distance to monotonicity (DTM) and longest
More informationLinear Sketches A Useful Tool in Streaming and Compressive Sensing
Linear Sketches A Useful Tool in Streaming and Compressive Sensing Qin Zhang 1-1 Linear sketch Random linear projection M : R n R k that preserves properties of any v R n with high prob. where k n. M =
More informationCS Foundations of Communication Complexity
CS 2429 - Foundations of Communication Complexity Lecturer: Sergey Gorbunov 1 Introduction In this lecture we will see how to use methods of (conditional) information complexity to prove lower bounds for
More informationCommunication-Efficient Computation on Distributed Noisy Datasets. Qin Zhang Indiana University Bloomington
Communication-Efficient Computation on Distributed Noisy Datasets Qin Zhang Indiana University Bloomington SPAA 15 June 15, 2015 1-1 Model of computation The coordinator model: k sites and 1 coordinator.
More informationCMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms
CMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms Instructor: Mohammad T. Hajiaghayi Scribe: Huijing Gong November 11, 2014 1 Overview In the
More informationAlgorithms for Querying Noisy Distributed/Streaming Datasets
Algorithms for Querying Noisy Distributed/Streaming Datasets Qin Zhang Indiana University Bloomington Sublinear Algo Workshop @ JHU Jan 9, 2016 1-1 The big data models The streaming model (Alon, Matias
More informationInformation Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017
Information Complexity and Applications Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Coding vs complexity: a tale of two theories Coding Goal: data transmission Different channels
More informationAn Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems
An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems Arnab Bhattacharyya, Palash Dey, and David P. Woodruff Indian Institute of Science, Bangalore {arnabb,palash}@csa.iisc.ernet.in
More informationarxiv: v6 [cs.dc] 16 Sep 2015
Distributed Computation of Large-scale Graph Problems Hartmut Klauck Danupon Nanongkai Gopal Pandurangan Peter Robinson arxiv:1311.6209v6 [cs.dc] 16 Sep 2015 Abstract Motivated by the increasing need for
More informationLecture 10. Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1
Lecture 10 Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1 Recap Sublinear time algorithms Deterministic + exact: binary search Deterministic + inexact: estimating diameter in a
More informationOn the tightness of the Buhrman-Cleve-Wigderson simulation
On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. syzhang@cse.cuhk.edu.hk Abstract. Buhrman,
More informationTopology Matters in Communication
Electronic Colloquium on Computational Complexity, Report No. 74 204 Topology Matters in Communication Arkadev Chattopadhyay Jaikumar Radhakrishnan Atri Rudra May 4, 204 Abstract We provide the first communication
More informationStreaming and communication complexity of Hamming distance
Streaming and communication complexity of Hamming distance Tatiana Starikovskaya IRIF, Université Paris-Diderot (Joint work with Raphaël Clifford, ICALP 16) Approximate pattern matching Problem Pattern
More information25.2 Last Time: Matrix Multiplication in Streaming Model
EE 381V: Large Scale Learning Fall 01 Lecture 5 April 18 Lecturer: Caramanis & Sanghavi Scribe: Kai-Yang Chiang 5.1 Review of Streaming Model Streaming model is a new model for presenting massive data.
More informationCommunication Lower Bounds for Statistical Estimation Problems via a Distributed Data Processing Inequality
Communication Lower Bounds for Statistical Estimation Problems via a Distributed Data Processing Inequality Mark Braverman Ankit Garg Tengyu Ma Huy Nguyen David Woodruff DIMACS Workshop on Big Data through
More informationNondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity
University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic
More informationApproximation norms and duality for communication complexity lower bounds
Approximation norms and duality for communication complexity lower bounds Troy Lee Columbia University Adi Shraibman Weizmann Institute From min to max The cost of a best algorithm is naturally phrased
More informationStream Computation and Arthur- Merlin Communication
Stream Computation and Arthur- Merlin Communication Justin Thaler, Yahoo! Labs Joint Work with: Amit Chakrabarti, Dartmouth Graham Cormode, University of Warwick Andrew McGregor, Umass Amherst Suresh Venkatasubramanian,
More informationCommunication Lower Bounds via Critical Block Sensitivity
Communication Lower Bounds via Critical Block Sensitivity Mika Göös & Toniann Pitassi University of Toronto Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January 2014 1 / 18 Communication
More informationAlgebraic Problems in Computational Complexity
Algebraic Problems in Computational Complexity Pranab Sen School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai 400005, India pranab@tcs.tifr.res.in Guide: Prof. R.
More informationLinear sketching for Functions over Boolean Hypercube
Linear sketching for Functions over Boolean Hypercube Grigory Yaroslavtsev (Indiana University, Bloomington) http://grigory.us with Sampath Kannan (U. Pennsylvania), Elchanan Mossel (MIT) and Swagato Sanyal
More informationSketching and Streaming for Distributions
Sketching and Streaming for Distributions Piotr Indyk Andrew McGregor Massachusetts Institute of Technology University of California, San Diego Main Material: Stable distributions, pseudo-random generators,
More informationB669 Sublinear Algorithms for Big Data
B669 Sublinear Algorithms for Big Data Qin Zhang 1-1 2-1 Part 1: Sublinear in Space The model and challenge The data stream model (Alon, Matias and Szegedy 1996) a n a 2 a 1 RAM CPU Why hard? Cannot store
More informationQuantum Communication Complexity
Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,
More informationKernelization Lower Bounds: A Brief History
Kernelization Lower Bounds: A Brief History G Philip Max Planck Institute for Informatics, Saarbrücken, Germany New Developments in Exact Algorithms and Lower Bounds. Pre-FSTTCS 2014 Workshop, IIT Delhi
More informationComputing the Entropy of a Stream
Computing the Entropy of a Stream To appear in SODA 2007 Graham Cormode graham@research.att.com Amit Chakrabarti Dartmouth College Andrew McGregor U. Penn / UCSD Outline Introduction Entropy Upper Bound
More informationGrothendieck Inequalities, XOR games, and Communication Complexity
Grothendieck Inequalities, XOR games, and Communication Complexity Troy Lee Rutgers University Joint work with: Jop Briët, Harry Buhrman, and Thomas Vidick Overview Introduce XOR games, Grothendieck s
More informationStreaming Communication Protocols
Streaming Communication Protocols Lucas Boczkowski, Iordanis Kerenidis, and Frédéric Magniez CNRS, IRIF, Univ Paris Diderot, Paris, France. Abstract We define the Streaming Communication model that combines
More informationA Tight Lower Bound for Dynamic Membership in the External Memory Model
A Tight Lower Bound for Dynamic Membership in the External Memory Model Elad Verbin ITCS, Tsinghua University Qin Zhang Hong Kong University of Science & Technology April 2010 1-1 The computational model
More information6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory
6895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 3: Coding Theory Lecturer: Dana Moshkovitz Scribe: Michael Forbes and Dana Moshkovitz 1 Motivation In the course we will make heavy use of
More informationThe space complexity of approximating the frequency moments
The space complexity of approximating the frequency moments Felix Biermeier November 24, 2015 1 Overview Introduction Approximations of frequency moments lower bounds 2 Frequency moments Problem Estimate
More informationSublinear Algorithms for Big Data
Sublinear Algorithms for Big Data Qin Zhang 1-1 2-1 Part 2: Sublinear in Communication Sublinear in communication The model x 1 = 010011 x 2 = 111011 x 3 = 111111 x k = 100011 Applicaitons They want to
More informationNetworks Cannot Compute Their Diameter in Sublinear Time
Networks Cannot Compute Their Diameter in Sublinear Time Preliminary version, please check for updates Silvio Frischknecht Stephan Holzer Roger Wattenhofer {fsilvio, stholzer, wattenhofer}@ethzch Computer
More informationPROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY
PROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY Eric Blais, Joshua Brody, and Kevin Matulef February 1, 01 Abstract. We develop a new technique for proving lower bounds in property testing,
More informationCombinatorial Auctions Do Need Modest Interaction
Combinatorial Auctions Do Need Modest Interaction SEPEHR ASSADI, University of Pennsylvania We study the necessity of interaction for obtaining efficient allocations in combinatorial auctions with subadditive
More informationChebyshev Polynomials, Approximate Degree, and Their Applications
Chebyshev Polynomials, Approximate Degree, and Their Applications Justin Thaler 1 Georgetown University Boolean Functions Boolean function f : { 1, 1} n { 1, 1} AND n (x) = { 1 (TRUE) if x = ( 1) n 1 (FALSE)
More informationMulti-join Query Evaluation on Big Data Lecture 2
Multi-join Query Evaluation on Big Data Lecture 2 Dan Suciu March, 2015 Dan Suciu Multi-Joins Lecture 2 March, 2015 1 / 34 Multi-join Query Evaluation Outline Part 1 Optimal Sequential Algorithms. Thursday
More informationCS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015
CS 2401 - Introduction to Complexity Theory Lecture #11: Dec 8th, 2015 Lecturer: Toniann Pitassi Scribe Notes by: Xu Zhao 1 Communication Complexity Applications Communication Complexity (CC) has many
More informationCS Communication Complexity: Applications and New Directions
CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the
More informationto be more efficient on enormous scale, in a stream, or in distributed settings.
16 Matrix Sketching The singular value decomposition (SVD) can be interpreted as finding the most dominant directions in an (n d) matrix A (or n points in R d ). Typically n > d. It is typically easy to
More informationMulti-Dimensional Online Tracking
Multi-Dimensional Online Tracking Ke Yi and Qin Zhang Hong Kong University of Science & Technology SODA 2009 January 4-6, 2009 1-1 A natural problem Bob: tracker f(t) g(t) Alice: observer (t, g(t)) t 2-1
More informationLecture th January 2009 Fall 2008 Scribes: D. Widder, E. Widder Today s lecture topics
0368.4162: Introduction to Cryptography Ran Canetti Lecture 11 12th January 2009 Fall 2008 Scribes: D. Widder, E. Widder Today s lecture topics Introduction to cryptographic protocols Commitments 1 Cryptographic
More information15-251: Great Theoretical Ideas In Computer Science Recitation 9 : Randomized Algorithms and Communication Complexity Solutions
15-251: Great Theoretical Ideas In Computer Science Recitation 9 : Randomized Algorithms and Communication Complexity Solutions Definitions We say a (deterministic) protocol P computes f if (x, y) {0,
More informationClique vs. Independent Set
Lower Bounds for Clique vs. Independent Set Mika Göös University of Toronto Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4 On page 6... Mika Göös (Univ. of Toronto) Clique vs.
More informationCommunication Complexity
Communication Complexity Jaikumar Radhakrishnan School of Technology and Computer Science Tata Institute of Fundamental Research Mumbai 31 May 2012 J 31 May 2012 1 / 13 Plan 1 Examples, the model, the
More informationNear-Optimal Lower Bounds on the Multi-Party Communication Complexity of Set Disjointness
Near-Optimal Lower Bounds on the Multi-Party Communication Complexity of Set Disjointness Amit Chakrabarti School of Mathematics Institute for Advanced Study Princeton, NJ 08540 amitc@ias.edu Subhash Khot
More informationAsymmetric Communication Complexity and Data Structure Lower Bounds
Asymmetric Communication Complexity and Data Structure Lower Bounds Yuanhao Wei 11 November 2014 1 Introduction This lecture will be mostly based off of Miltersen s paper Cell Probe Complexity - a Survey
More informationCSCI-B609: A Theorist s Toolkit, Fall 2016 Oct 4. Theorem 1. A non-zero, univariate polynomial with degree d has at most d roots.
CSCI-B609: A Theorist s Toolkit, Fall 2016 Oct 4 Lecture 14: Schwartz-Zippel Lemma and Intro to Coding Theory Lecturer: Yuan Zhou Scribe: Haoyu Zhang 1 Roots of polynomials Theorem 1. A non-zero, univariate
More informationRandomized Algorithms. Lecture 4. Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010
Randomized Algorithms Lecture 4 Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010 1 Pairwise independent hash functions In the previous lecture we encountered two families
More informationWith P. Berman and S. Raskhodnikova (STOC 14+). Grigory Yaroslavtsev Warren Center for Network and Data Sciences
L p -Testing With P. Berman and S. Raskhodnikova (STOC 14+). Grigory Yaroslavtsev Warren Center for Network and Data Sciences http://grigory.us Property Testing [Goldreich, Goldwasser, Ron; Rubinfeld,
More informationHardness of MST Construction
Lecture 7 Hardness of MST Construction In the previous lecture, we saw that an MST can be computed in O( n log n+ D) rounds using messages of size O(log n). Trivially, Ω(D) rounds are required, but what
More informationFourier analysis of boolean functions in quantum computation
Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge
More informationExponential Separation of Quantum and Classical Non-Interactive Multi-Party Communication Complexity
Electronic Colloquium on Computational Complexity, Report No. 74 (2007) Exponential Separation of Quantum and Classical Non-Interactive ulti-party Communication Complexity Dmitry Gavinsky Pavel Pudlák
More informationThere are no zero-hard problems in multiparty communication complexity
There are no zero-hard problems in multiparty communication complexity László Babai and Denis Pankratov University of Chicago DRAFT: 2015-04-29 7:00pm Abstract We study the feasibility of generalizing
More informationOptimal Error Rates for Interactive Coding II: Efficiency and List Decoding
Optimal Error Rates for Interactive Coding II: Efficiency and List Decoding Mohsen Ghaffari MIT ghaffari@mit.edu Bernhard Haeupler Microsoft Research haeupler@cs.cmu.edu Abstract We study coding schemes
More informationCommunication vs information complexity, relative discrepancy and other lower bounds
Communication vs information complexity, relative discrepancy and other lower bounds Iordanis Kerenidis CNRS, LIAFA- Univ Paris Diderot 7 Joint work with: L. Fontes, R. Jain, S. Laplante, M. Lauriere,
More informationRandom Sampling on Big Data: Techniques and Applications Ke Yi
: Techniques and Applications Ke Yi Hong Kong University of Science and Technology yike@ust.hk Big Data in one slide The 3 V s: Volume Velocity Variety Integers, real numbers Points in a multi-dimensional
More informationAlgorithms for Distributed Functional Monitoring
Algorithms for Distributed Functional Monitoring Graham Cormode AT&T Labs and S. Muthukrishnan Google Inc. and Ke Yi Hong Kong University of Science and Technology We study what we call functional monitoring
More informationLecture 21: Quantum communication complexity
CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 21: Quantum communication complexity April 6, 2006 In this lecture we will discuss how quantum information can allow for a
More informationcommunication complexity lower bounds yield data structure lower bounds
communication complexity lower bounds yield data structure lower bounds Implementation of a database - D: D represents a subset S of {...N} 2 3 4 Access to D via "membership queries" - Q for each i, can
More informationSketching in Adversarial Environments
Sketching in Adversarial Environments Ilya Mironov Moni Naor Gil Segev Abstract We formalize a realistic model for computations over massive data sets. The model, referred to as the adversarial sketch
More informationInformation Complexity: A Paradigm for Proving Lower Bounds. Amit Chakrabarti
Information Complexity: A Paradigm for Proving Lower Bounds Amit Chakrabarti Dartmouth College Hanover, NH, USA STOC 2013, Palo Alto 1 History The applications came first; theory built in service of applications
More informationComplexity of Finding a Duplicate in a Stream: Simple Open Problems
Complexity of Finding a Duplicate in a Stream: Simple Open Problems Jun Tarui Univ of Electro-Comm, Tokyo Shonan, Jan 2012 1 Duplicate Finding Problem Given: Stream a 1,,a m a i {1,,n} Assuming m > n,
More informationSketching as a Tool for Numerical Linear Algebra
Sketching as a Tool for Numerical Linear Algebra David P. Woodruff presented by Sepehr Assadi o(n) Big Data Reading Group University of Pennsylvania February, 2015 Sepehr Assadi (Penn) Sketching for Numerical
More information11 Heavy Hitters Streaming Majority
11 Heavy Hitters A core mining problem is to find items that occur more than one would expect. These may be called outliers, anomalies, or other terms. Statistical models can be layered on top of or underneath
More informationMatrix Rank in Communication Complexity
University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Mohan Yang Date: January 18, 2012 LECTURE 3 Matrix Rank in Communication Complexity This lecture
More informationSketching in Adversarial Environments
Sketching in Adversarial Environments Ilya Mironov Moni Naor Gil Segev Abstract We formalize a realistic model for computations over massive data sets. The model, referred to as the adversarial sketch
More informationOn the Cryptographic Complexity of the Worst Functions
On the Cryptographic Complexity of the Worst Functions Amos Beimel 1, Yuval Ishai 2, Ranjit Kumaresan 2, and Eyal Kushilevitz 2 1 Dept. of Computer Science, Ben Gurion University of the Negev, Be er Sheva,
More informationStreaming Algorithms for Set Cover. Piotr Indyk With: Sepideh Mahabadi, Ali Vakilian
Streaming Algorithms for Set Cover Piotr Indyk With: Sepideh Mahabadi, Ali Vakilian Set Cover Input: a collection S of sets S 1...S m that covers U={1...n} I.e., S 1 S 2. S m = U Output: a subset I of
More informationPartitions and Covers
University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Dong Wang Date: January 2, 2012 LECTURE 4 Partitions and Covers In previous lectures, we saw
More information14. Direct Sum (Part 1) - Introduction
Communication Complexity 14 Oct, 2011 (@ IMSc) 14. Direct Sum (Part 1) - Introduction Lecturer: Prahladh Harsha Scribe: Abhishek Dang 14.1 Introduction The Direct Sum problem asks how the difficulty in
More informationFinding Frequent Items in Probabilistic Data
Finding Frequent Items in Probabilistic Data Qin Zhang, Hong Kong University of Science & Technology Feifei Li, Florida State University Ke Yi, Hong Kong University of Science & Technology SIGMOD 2008
More informationAn exponential separation between quantum and classical one-way communication complexity
An exponential separation between quantum and classical one-way communication complexity Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical
More informationA Stable Marriage Requires Communication
A Stable Marriage Requires Communication Yannai A. Gonczarowski Noam Nisan Rafail Ostrovsky Will Rosenbaum Abstract The Gale-Shapley algorithm for the Stable Marriage Problem is known to take Θ(n 2 ) steps
More informationSettling the Query Complexity of Non-Adaptive Junta Testing
Settling the Query Complexity of Non-Adaptive Junta Testing Erik Waingarten, Columbia University Based on joint work with Xi Chen (Columbia University) Rocco Servedio (Columbia University) Li-Yang Tan
More informationLecture 3 Frequency Moments, Heavy Hitters
COMS E6998-9: Algorithmic Techniques for Massive Data Sep 15, 2015 Lecture 3 Frequency Moments, Heavy Hitters Instructor: Alex Andoni Scribes: Daniel Alabi, Wangda Zhang 1 Introduction This lecture is
More informationLower Bounds for Quantile Estimation in Random-Order and Multi-Pass Streaming
Lower Bounds for Quantile Estimation in Random-Order and Multi-Pass Streaming Sudipto Guha 1 and Andrew McGregor 2 1 University of Pennsylvania sudipto@cis.upenn.edu 2 University of California, San Diego
More informationNew Characterizations in Turnstile Streams with Applications
New Characterizations in Turnstile Streams with Applications Yuqing Ai 1, Wei Hu 1, Yi Li 2, and David P. Woodruff 3 1 The Institute for Theoretical Computer Science (ITCS), Institute for Interdisciplinary
More informationCompute the Fourier transform on the first register to get x {0,1} n x 0.
CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary
More informationCPSC 467: Cryptography and Computer Security
CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 18 November 3, 2014 CPSC 467, Lecture 18 1/43 Zero Knowledge Interactive Proofs (ZKIP) Secret cave protocol ZKIP for graph isomorphism
More informationCISC 4090: Theory of Computation Chapter 1 Regular Languages. Section 1.1: Finite Automata. What is a computer? Finite automata
CISC 4090: Theory of Computation Chapter Regular Languages Xiaolan Zhang, adapted from slides by Prof. Werschulz Section.: Finite Automata Fordham University Department of Computer and Information Sciences
More informationB490 Mining the Big Data
B490 Mining the Big Data 1 Finding Similar Items Qin Zhang 1-1 Motivations Finding similar documents/webpages/images (Approximate) mirror sites. Application: Don t want to show both when Google. 2-1 Motivations
More informationA Mergeable Summaries
A Mergeable Summaries Pankaj K. Agarwal, Graham Cormode, Zengfeng Huang, Jeff M. Phillips, Zhewei Wei, and Ke Yi We study the mergeability of data summaries. Informally speaking, mergeability requires
More informationA Tight Lower Bound for High Frequency Moment Estimation with Small Error
A Tight Lower Bound for High Frequency Moment Estimation with Small Error Yi Li Department of EECS University of Michigan, Ann Arbor leeyi@umich.edu David P. Woodruff IBM Research, Almaden dpwoodru@us.ibm.com
More informationAn Optimal Lower Bound on the Communication Complexity of GAP-HAMMING-DISTANCE
An Optimal Lower Bound on the Communication Complexity of GAP-HAMMING-DISTANCE Amit Chakrabarti Oded Regev June 29, 2012 Abstract We prove an optimal Ω(n) lower bound on the randomized communication complexity
More informationThe Communication Complexity of Correlation. Prahladh Harsha Rahul Jain David McAllester Jaikumar Radhakrishnan
The Communication Complexity of Correlation Prahladh Harsha Rahul Jain David McAllester Jaikumar Radhakrishnan Transmitting Correlated Variables (X, Y) pair of correlated random variables Transmitting
More informationDirect product theorem for discrepancy
Direct product theorem for discrepancy Troy Lee Rutgers University Joint work with: Robert Špalek Direct product theorems Knowing how to compute f, how can you compute f f f? Obvious upper bounds: If can
More informationSecure Two-Party Distribution Testing
Department of Computer Science Columbia University rax - 2012 Secure Two-Party Distribution Testing Alexandr Andoni Tal Malkin Negev Shekel Nosatzki Department of Computer Science Columbia University Privacy
More informationTight Bounds for Distributed Functional Monitoring
Tight Bounds for Distributed Functiona Monitoring David P. Woodruff IBM Amaden dpwoodru@us.ibm.com Qin Zhang IBM Amaden qinzhang@cse.ust.hk Abstract We resove severa fundamenta questions in the area of
More informationSpectral gaps and geometric representations. Amir Yehudayoff (Technion)
Spectral gaps and geometric representations Amir Yehudayoff (Technion) Noga Alon (Tel Aviv) Shay Moran (Simons) pseudorandomness random objects have properties difficult to describe hard to compute expanders
More informationCommunication Complexity 16:198:671 2/15/2010. Lecture 6. P (x) log
Communication Complexity 6:98:67 2/5/200 Lecture 6 Lecturer: Nikos Leonardos Scribe: Troy Lee Information theory lower bounds. Entropy basics Let Ω be a finite set and P a probability distribution on Ω.
More informationQuestion 1. The Chinese University of Hong Kong, Spring 2018
CSCI 5440: Cryptography The Chinese University of Hong Kong, Spring 2018 Homework 2 Solutions Question 1 Consider the following encryption algorithm based on the shortlwe assumption. The secret key is
More informationConnectedness. Proposition 2.2. The following are equivalent for a topological space (X, T ).
Connectedness 1 Motivation Connectedness is the sort of topological property that students love. Its definition is intuitive and easy to understand, and it is a powerful tool in proofs of well-known results.
More informationQuantum Oracle Classification
Quantum Oracle Classification The Case of Group Structure Mark Zhandry Princeton University Query Complexity x O(x) O:Xà Y Info about O Examples: Pre- image of given output Collision Complete description
More information