Lower Bound Techniques for Multiparty Communication Complexity

Size: px
Start display at page:

Download "Lower Bound Techniques for Multiparty Communication Complexity"

Transcription

1 Lower Bound Techniques for Multiparty Communication Complexity Qin Zhang Indiana University Bloomington Based on works with Jeff Phillips, Elad Verbin and David Woodruff 1-1

2 The multiparty number-in-hand (NIH) comm. A model for proving lower bounds x 1 = x 2 = x 3 = x k = They want to jointly compute f(x 1, x 2,..., x k ) Goal: minimize total bits of communication 2-1

3 The multiparty number-in-hand (NIH) comm. A model for proving lower bounds x 1 = x 2 = Blackboard (BB): One speaks, everyone hears. Message-Passing (MP): If x 1 talks to x 2, others cannot hear. x 3 = x k = They want to jointly compute f(x 1, x 2,..., x k ) Goal: minimize total bits of communication 2-2

4 The multiparty number-in-hand (NIH) comm. A model for proving lower bounds x 1 = x 2 = Blackboard (BB): One speaks, everyone hears. Message-Passing (MP): If x 1 talks to x 2, others cannot hear. x 3 = x k = Coordinator = C They want to jointly compute f(x 1, x 2,..., x k ) S 1 S 2 S 3 S k Goal: minimize total bits of communication 2-3

5 Previously, for multiparty NIH comm. model Well studied? YES and NO. 3-1

6 Previously, for multiparty NIH comm. model Well studied? YES and NO. Quite a few papers in BB model: [Alon et al. 96], [Bar-Yossef et al. 04],

7 Previously, for multiparty NIH comm. model Well studied? YES and NO. Quite a few papers in BB model: [Alon et al. 96], [Bar-Yossef et al. 04],... But, Almost nothing in MP model before

8 Previously, for multiparty NIH comm. model Well studied? YES and NO. Quite a few papers in BB model: [Alon et al. 96], [Bar-Yossef et al. 04],... But, Almost nothing in MP model before Too easy? 3-4

9 Previously, for multiparty NIH comm. model Well studied? YES and NO. Quite a few papers in BB model: [Alon et al. 96], [Bar-Yossef et al. 04],... But, Almost nothing in MP model before Too easy? Lack of motivations? 3-5

10 Too easy? Could be more difficult than BB, since in MP each player observes only a piece of protocol transcript. 4-1

11 Too easy? Could be more difficult than BB, since in MP each player observes only a piece of protocol transcript. We do not want to analyze a k-dimensional matrix directly. A 0 1 B A communication matrix of the 2-party AND function 4-2

12 Too easy? Could be more difficult than BB, since in MP each player observes only a piece of protocol transcript. We do not want to analyze a k-dimensional matrix directly. A 0 1 B A communication matrix of the 2-party AND function Even for the 2-party Gap-Hamming problem, where Alice has a n-bit vector and Bob has a n-bit vector, and they want to compute if the hamming distance of these two vectors is bigger than n/2 + n or less than n/2 n, it tooks researchers in this area about 10 years and dozens of papers (IW03, Woodruff04,..., Sherstov12) to fully understand its 2-dim communication matrix! 4-3

13 Lack of motivations? (Continous) Distributed Monitoring communication energy, bandwidth,... Sensor networks Network routers Data in the cloud 5-1

14 Lack of motivations? (cont.) Data Streams communication space Memory CPU 6-1

15 Lack of motivations? (cont.) Data Streams communication space Memory P 1 P 2 P k CPU 6-2

16 Lack of motivations? (cont.) Distributed Computation for Big Data communication bandwidth,... Input Output Map Shuffle Reduce The BSP model. E.g., Apache Giraph, Pregel. The MapReduce model. E.g., Hadoop, Google MapReduce. 7-1

17 Interesting problems Statistical problems Frequency moments F p F 0 : #distinct elements F 2 : size of self-join Heavy hitters Quantile Entropy

18 Interesting problems Statistical problems Graph problems Connectivity Frequency moments F p F 0 : #distinct elements F 2 : size of self-join Heavy hitters Quantile Entropy Bipartiteness Counting triangles Matching Minimum spanning tree

19 Interesting problems Statistical problems Graph problems Connectivity Frequency moments F p F 0 : #distinct elements F 2 : size of self-join Heavy hitters Quantile Entropy... Numerical linear algebra Bipartiteness Counting triangles Matching Minimum spanning tree... L p regression Low-rank approximation

20 Interesting problems Statistical problems Frequency moments F p F 0 : #distinct elements F 2 : size of self-join Heavy hitters Quantile Entropy... Numerical linear algebra Graph problems Connectivity Bipartiteness Counting triangles Matching Minimum spanning tree... L p regression Low-rank approximation... DB queries Conjuntive queries Distributed learning Classifiers... Geometry problems 8-4

21 This talk We will talk lower bounds. Most lower bounds match the upper bounds. Introduce two general techniques that work in both BB model and MP model for proving lower bounds, with examples. Conclude with several future directions. 9-1

22 Our new ideas and techniques Ideas 1. Reduce a k-player problem to a 2-player problem. 2. Decompose a complicated problem to several simpler problems 10-1

23 Our new ideas and techniques Ideas 1. Reduce a k-player problem to a 2-player problem. 2. Decompose a complicated problem to several simpler problems In fact, we are exploring the underlying patterns of communication matrices 10-2

24 Our new ideas and techniques Ideas 1. Reduce a k-player problem to a 2-player problem. 2. Decompose a complicated problem to several simpler problems In fact, we are exploring the underlying patterns of communication matrices Concrete techniques Symmetrization With Phillips and Verbin, 2012 Composition With Woodruff,

25 Our new ideas and techniques Ideas 1. Reduce a k-player problem to a 2-player problem. 2. Decompose a complicated problem to several simpler problems In fact, we are exploring the underlying patterns of communication matrices Concrete techniques 1. Symmetrization Example: Graph Connecitivy With Phillips and Verbin, Composition With Woodruff, 2012 Example: Distinct Elements 10-4

26 Communication complexity I choose not to introduce formal definitions/concepts of communication complexity. Just want to mention Yao s lemma: We will prove lower bounds for randomized protocols. To do that we will usually pick some input distribution, and then prove lower bounds for any deterministic protocol that succeeds w.pr 0.99 under that input distribution. 11-1

27 12-1 1st Technique: Symmetrization

28 Example: graph connectivity k sites each holds a set of edges of a graph Goal: compute whether the graph is connected. A trivial UB: O(nk log n) bits. We prove that this is tight up to a log factor. 13-1

29 Set disjointness (2-DISJ) X Y =? X {1,..., n} Y {1,..., n} 14-1

30 Set disjointness (2-DISJ) X Y =? X {1,..., n} Y {1,..., n} Exists a hard distribution µ β, under which X Y = 1 (YES instance) w.p. β and X Y = 0 (NO instance) w.p. 1 β. Lemma: (Generalization of [Razborov 90, BJKS 04]) E[CC β/100 µ β (2-DISJ)] = Ω(n) 14-2

31 2-DISJ k-conn x 1 Bob x 2 Alice and Bob want to solve the 2-DISJ (X, Y ) µ β. (set β = 1/k 2 ) running a protocol for k-conn on: x 5 x 4 Alice Alice plays a random site S I with input X I = X. Bob plays other k 1 sites, and constructs inputs for them using Y : it choose X i µ β Y (i I). Note: X 1,..., X k are i.i.d. conditioned on Y. Vertices u 1,..., u k, v 1,..., v n. An edge (u i, v j ) exists iff X i,j = 1. Let ν be the distribution of the graph. x

32 2-DISJ k-conn (cont.) v j j [r]\y v j j Y v j Y +1 v j Y +2 v j Y +3 v jn v j1 v j2 v j Y X I Y =? u 1 u 2 u 3 u k (u i, v j ) exists if and only if X i,j =

33 2-DISJ k-conn x 1 Bob x 2 Alice and Bob want to solve the 2-DISJ (X, Y ) µ β. (set β = 1/k 2 ) running a protocol for k-conn on: x 5 x 4 Alice Alice plays a random site S I with input X I = X. Bob plays other k 1 sites, and constructs inputs for them using Y : it choose X i µ β Y (i I). Note: X 1,..., X k are i.i.d. conditioned on Y. Vertices u 1,..., u k, v 1,..., v n. An edge (u i, v j ) exists iff X i,j = 1. Let ν be the distribution of the graph. Correctness: Solving k-conn w.pr. 1 β 1.5 under ν also solves 2-DISJ w.pr. 1 β/100 under µ β. x

34 2-DISJ k-conn x 1 Bob x 2 E[CC β/100 µ β (2-DISJ)] = O ( ) 1 k CC β 1.5 ν (k-conn) Alice and Bob want to solve the 2-DISJ (X, Y ) µ β. (set β = 1/k 2 ) running a protocol for k-conn on: x 5 x 4 Alice Alice plays a random site S I with input X I = X. Bob plays other k 1 sites, and constructs inputs for them using Y : it choose X i µ β Y (i I). Note: X 1,..., X k are i.i.d. conditioned on Y. Vertices u 1,..., u k, v 1,..., v n. An edge (u i, v j ) exists iff X i,j = 1. Let ν be the distribution of the graph. Correctness: Solving k-conn w.pr. 1 β 1.5 under ν also solves 2-DISJ w.pr. 1 β/100 under µ β. x

35 2-DISJ k-conn x 1 Bob x 2 E[CC β/100 µ β (2-DISJ)] = O ( ) 1 k CC β 1.5 ν (k-conn) Ω(n) Alice and Bob want to solve the 2-DISJ (X, Y ) µ β. (set β = 1/k 2 ) running a protocol for k-conn on: x 5 x 4 Alice Alice plays a random site S I with input X I = X. Bob plays other k 1 sites, and constructs inputs for them using Y : it choose X i µ β Y (i I). Note: X 1,..., X k are i.i.d. conditioned on Y. Vertices u 1,..., u k, v 1,..., v n. An edge (u i, v j ) exists iff X i,j = 1. Let ν be the distribution of the graph. Correctness: Solving k-conn w.pr. 1 β 1.5 under ν also solves 2-DISJ w.pr. 1 β/100 under µ β. x

36 2-DISJ k-conn x 1 Bob x 2 E[CC β/100 µ β (2-DISJ)] = O ( ) 1 k CC β 1.5 ν (k-conn) Ω(n) Ω(nk) Alice and Bob want to solve the 2-DISJ (X, Y ) µ β. (set β = 1/k 2 ) running a protocol for k-conn on: x 5 x 4 Alice Alice plays a random site S I with input X I = X. Bob plays other k 1 sites, and constructs inputs for them using Y : it choose X i µ β Y (i I). Note: X 1,..., X k are i.i.d. conditioned on Y. Vertices u 1,..., u k, v 1,..., v n. An edge (u i, v j ) exists iff X i,j = 1. Let ν be the distribution of the graph. Correctness: Solving k-conn w.pr. 1 β 1.5 under ν also solves 2-DISJ w.pr. 1 β/100 under µ β. x

37 A useful message We can show trivial UBs are tight for many statistical and graph problems in the MP model (e.g., #distinct elements, bipartiteness, cycle/triangle-freeness,...), when exact answers are wanted. (Woodruff, Z, 2013a) Approximation is often necessary if we want comm. efficient protocols. 18-1

38 A useful message We can show trivial UBs are tight for many statistical and graph problems in the MP model (e.g., #distinct elements, bipartiteness, cycle/triangle-freeness,...), when exact answers are wanted. (Woodruff, Z, 2013a) Approximation is often necessary if we want comm. efficient protocols. Example: Computing the diameter of a graph exactly needs Ω(kn 2 ) bits (when m = n 2 ) in the MP model. However, there is a protocol that computes the diameter up to an additive error of 2 using Õ(kn3/2 ) bits. 18-2

39 Other problems using symmetrization k-bitwise-maj k-bitwise-or/and/xor With applications in Distinct elements reporting ε-kernels (geometry) Heavy-hitters Testing bipartiteness, Testing cycle Testing triangle-freeness,

40 Other problems using symmetrization k-bitwise-maj k-bitwise-or/and/xor With applications in Distinct elements reporting ε-kernels (geometry) Heavy-hitters Testing bipartiteness, Testing cycle Testing triangle-freeness,... Key: Find the right 2-player problem for reduction 19-2

41 20-1 2nd Technique: Composition

42 Example the F 0 (distinct elements) problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute #distinct elements( k i=1 X i) up to a (1 + ε)-approx. 21-1

43 Example the F 0 (distinct elements) problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute #distinct elements( k i=1 X i) up to a (1 + ε)-approx. Current best UB: Õ(k/ε 2 ) [Cormode, Muth, Yi. 2008] Holds in MP model 21-2

44 Example the F 0 (distinct elements) problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute #distinct elements( k i=1 X i) up to a (1 + ε)-approx. Current best UB: Õ(k/ε 2 ) [Cormode, Muth, Yi. 2008] Holds in MP model Previous LB: Ω(k) And Ω(1/ε 2 ) Direct reduction from Gap-Hamming 21-3

45 Example the F 0 (distinct elements) problem k sites each holds a set X i (i {1, 2,..., k}). Goal: compute #distinct elements( k i=1 X i) up to a (1 + ε)-approx. Current best UB: Õ(k/ε 2 ) [Cormode, Muth, Yi. 2008] Holds in MP model Previous LB: Ω(k) And Ω(1/ε 2 ) Direct reduction from Gap-Hamming New LB: Ω(k/ε 2 ). [Woodruff, Z. 2012, 2013b]. Holds in MP model. Better UB in the BB model 21-4

46 The proof framework Step 1: Find two modular problems k-gap-maj and 2-DISJ of simpler structures s.t. F 0 can be thought as a composition of them. Step 2: Analyze the complexities of k-gap-maj and 2-DISJ. Step 3: Compose two modular problems so that: Complexity(F 0 ) = Complexity(k-GAP-MAJ) Complexity(2-DISJ). 22-1

47 The proof framework Step 1: Find two modular problems k-gap-maj and 2-DISJ of simpler structures s.t. F 0 can be thought as a composition of them. Step 2: Analyze the complexities of k-gap-maj and 2-DISJ. Step 3: Compose two modular problems so that: Complexity(F 0 ) = Complexity(k-GAP-MAJ) Complexity(2-DISJ). The proof presented here is for a special case when k = 2/ε

48 k-gap-maj k sites each holds a bit Z i chosen uniform at random from {0, 1} Goal: compute k-gap-maj(z 1, Z 2,..., Z k ) = 0, if i [k] Z i k/2 k, 1, if i [k] Z i k/2 + k, don t care, otherwise, 23-1

49 k-gap-maj k sites each holds a bit Z i chosen uniform at random from {0, 1} Goal: compute k-gap-maj(z 1, Z 2,..., Z k ) = 0, if i [k] Z i k/2 k, 1, if i [k] Z i k/2 + k, don t care, otherwise, Lemma: Any protocol Π that computes k-gap-maj correctly w.p has to learn Ω(k) Z i s well, that is, In other words: I(Π; Z 1,..., Z k ) = Ω(k). H(Z i Π) H b (1/100) for Ω(k) of i. 23-2

50 Set disjointness (2-DISJ) X Y =? X {1,..., n} Y {1,..., n} 24-1

51 Set disjointness (2-DISJ) X Y =? X {1,..., n} Y {1,..., n} Exists a hard distribution µ β, under which X Y = 1 (YES instance) w.p. β and X Y = 0 (NO instance) w.p. 1 β. Lemma: (Generalization of [Razborov 90, BJKS 04]) E[CC β/100 µ β (2-DISJ)] = Ω(n) 24-2

52 The proof sketch coordinator 2-DISJ C Y sites S 1 S 2 S 3 S k X 1 X 2 X 3 X k (X i, Y ) µ 1/2 (hard input dist. for DISJ) for each i [k] 25-1

53 The proof sketch coordinator 2-DISJ C Y Z i = X i Y { 1 w.p. 1/2 0 w.p. 1/2 sites S 1 S 2 S 3 S k X 1 X 2 X 3 X k (X i, Y ) µ 1/2 (hard input dist. for DISJ) for each i [k] 25-2

54 The proof sketch coordinator 2-DISJ C Y Z i = X i Y { 1 w.p. 1/2 0 w.p. 1/2 sites S 1 S 2 S 3 S k X 1 X 2 X 3 X k (X i, Y ) µ 1/2 (hard input dist. for DISJ) for each i [k] F 0 (X 1, X 2,..., X k ) k-gap-maj(z 1, Z 2,..., Z k ) (Z i = X i Y ) = learn Ω(k) Z i s well = need Ω(nk) bits (using an embedding argument) 25-3

55 The proof sketch coordinator 2-DISJ C Y Z i = X i Y { 1 w.p. 1/2 0 w.p. 1/2 sites S 1 S 2 S 3 S k Q.E.D. X 1 X 2 X 3 X k (X i, Y ) µ 1/2 (hard input dist. for DISJ) for each i [k] F 0 (X 1, X 2,..., X k ) k-gap-maj(z 1, Z 2,..., Z k ) For the reduction set universe n = Θ(1/ε 2 ) we get Ω(k/ε 2 ) LB. (Z i = X i Y ) = learn Ω(k) Z i s well = need Ω(nk) bits (using an embedding argument) 25-4

56 Other problems using composition Frequency moments F p (p > 1) Entropy l p Heavy-hitters Quantile 26-1

57 Other problems using composition Frequency moments F p (p > 1) Entropy l p Heavy-hitters Quantile Key: Find the right modular problems 26-2

58 27-1 Furture directions

59 Future directions Problem space The current understandings statistics graph linear algebra DB queries Exact computation well medium limited Approximation well limited limited limited 28-1

60 Future directions Problem space The current understandings statistics graph linear algebra DB queries Exact computation well medium limited Approximation well limited limited limited Concretely, e.g., What is the CC of computing a const approx of the size of the matching? 28-2

61 Future directions Problem space (cont.) Communication complexity of distributed property testing. Communication complexity of distributed property testing can also be used for proving LBs for traditional property testing, by extending a framework by Blais et al

62 Future directions Problem space (cont.) Communication complexity of distributed property testing. Communication complexity of distributed property testing can also be used for proving LBs for traditional property testing, by extending a framework by Blais et al Communication complexity of relations (instead of functions, useful for database queries) 29-2

63 Future directions Problem space (cont.) Communication complexity of distributed property testing. Communication complexity of distributed property testing can also be used for proving LBs for traditional property testing, by extending a framework by Blais et al Communication complexity of relations (instead of functions, useful for database queries) Need to understand more primitive problems (building blocks), e.g., breadth-first search (BFS), pointer-chasing, etc. So far building blocks are quite limited: mainly 2-DISJ, 2- GAP-HAMMING, k-gap-maj, k-or and their variants. 29-3

64 Future directions Model/Technique space Can we relax or generalize the symmetrization technique? E.g., do not require totally symmetric distributions 30-1

65 Future directions Model/Technique space Can we relax or generalize the symmetrization technique? E.g., do not require totally symmetric distributions Consider round complexity (practical needs). Consider players with limited space (practical needs). 30-2

66 The end T HAN K YOU Questions? 31-1

Tight Bounds for Distributed Streaming

Tight Bounds for Distributed Streaming Tight Bounds for Distributed Streaming (a.k.a., Distributed Functional Monitoring) David Woodruff IBM Research Almaden Qin Zhang MADALGO, Aarhus Univ. STOC 12 May 22, 2012 1-1 The distributed streaming

More information

Tight Bounds for Distributed Functional Monitoring

Tight Bounds for Distributed Functional Monitoring Tight Bounds for Distributed Functional Monitoring Qin Zhang MADALGO, Aarhus University Joint with David Woodruff, IBM Almaden NII Shonan meeting, Japan Jan. 2012 1-1 The distributed streaming model (a.k.a.

More information

Lower Bounds for Number-in-Hand Multiparty Communication Complexity, Made Easy

Lower Bounds for Number-in-Hand Multiparty Communication Complexity, Made Easy Lower Bounds for Number-in-Hand Multiparty Communication Complexity, Made Easy Jeff M. Phillips School of Computing University of Utah jeffp@cs.utah.edu Elad Verbin Dept. of Computer Science Aarhus University,

More information

Distributed Statistical Estimation of Matrix Products with Applications

Distributed Statistical Estimation of Matrix Products with Applications Distributed Statistical Estimation of Matrix Products with Applications David Woodruff CMU Qin Zhang IUB PODS 2018 June, 2018 1-1 The Distributed Computation Model p-norms, heavy-hitters,... A {0, 1} m

More information

c 2016 Jeff M. Phillips, Elad Verbin, and Qin Zhang

c 2016 Jeff M. Phillips, Elad Verbin, and Qin Zhang SIAM J. COMPUT. Vol. 45, No. 1, pp. 174 196 c 2016 Jeff M. Phillips, Elad Verbin, and Qin Zhang LOWER BOUNDS FOR NUMBER-IN-HAND MULTIPARTY COMMUNICATION COMPLEXITY, MADE EASY JEFF M. PHILLIPS, ELAD VERBIN,

More information

Lecture 16: Communication Complexity

Lecture 16: Communication Complexity CSE 531: Computational Complexity I Winter 2016 Lecture 16: Communication Complexity Mar 2, 2016 Lecturer: Paul Beame Scribe: Paul Beame 1 Communication Complexity In (two-party) communication complexity

More information

Lecture Lecture 9 October 1, 2015

Lecture Lecture 9 October 1, 2015 CS 229r: Algorithms for Big Data Fall 2015 Lecture Lecture 9 October 1, 2015 Prof. Jelani Nelson Scribe: Rachit Singh 1 Overview In the last lecture we covered the distance to monotonicity (DTM) and longest

More information

Linear Sketches A Useful Tool in Streaming and Compressive Sensing

Linear Sketches A Useful Tool in Streaming and Compressive Sensing Linear Sketches A Useful Tool in Streaming and Compressive Sensing Qin Zhang 1-1 Linear sketch Random linear projection M : R n R k that preserves properties of any v R n with high prob. where k n. M =

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 2429 - Foundations of Communication Complexity Lecturer: Sergey Gorbunov 1 Introduction In this lecture we will see how to use methods of (conditional) information complexity to prove lower bounds for

More information

Communication-Efficient Computation on Distributed Noisy Datasets. Qin Zhang Indiana University Bloomington

Communication-Efficient Computation on Distributed Noisy Datasets. Qin Zhang Indiana University Bloomington Communication-Efficient Computation on Distributed Noisy Datasets Qin Zhang Indiana University Bloomington SPAA 15 June 15, 2015 1-1 Model of computation The coordinator model: k sites and 1 coordinator.

More information

CMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms

CMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms CMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms Instructor: Mohammad T. Hajiaghayi Scribe: Huijing Gong November 11, 2014 1 Overview In the

More information

Algorithms for Querying Noisy Distributed/Streaming Datasets

Algorithms for Querying Noisy Distributed/Streaming Datasets Algorithms for Querying Noisy Distributed/Streaming Datasets Qin Zhang Indiana University Bloomington Sublinear Algo Workshop @ JHU Jan 9, 2016 1-1 The big data models The streaming model (Alon, Matias

More information

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Information Complexity and Applications Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Coding vs complexity: a tale of two theories Coding Goal: data transmission Different channels

More information

An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems

An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems An Optimal Algorithm for l 1 -Heavy Hitters in Insertion Streams and Related Problems Arnab Bhattacharyya, Palash Dey, and David P. Woodruff Indian Institute of Science, Bangalore {arnabb,palash}@csa.iisc.ernet.in

More information

arxiv: v6 [cs.dc] 16 Sep 2015

arxiv: v6 [cs.dc] 16 Sep 2015 Distributed Computation of Large-scale Graph Problems Hartmut Klauck Danupon Nanongkai Gopal Pandurangan Peter Robinson arxiv:1311.6209v6 [cs.dc] 16 Sep 2015 Abstract Motivated by the increasing need for

More information

Lecture 10. Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1

Lecture 10. Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1 Lecture 10 Sublinear Time Algorithms (contd) CSC2420 Allan Borodin & Nisarg Shah 1 Recap Sublinear time algorithms Deterministic + exact: binary search Deterministic + inexact: estimating diameter in a

More information

On the tightness of the Buhrman-Cleve-Wigderson simulation

On the tightness of the Buhrman-Cleve-Wigderson simulation On the tightness of the Buhrman-Cleve-Wigderson simulation Shengyu Zhang Department of Computer Science and Engineering, The Chinese University of Hong Kong. syzhang@cse.cuhk.edu.hk Abstract. Buhrman,

More information

Topology Matters in Communication

Topology Matters in Communication Electronic Colloquium on Computational Complexity, Report No. 74 204 Topology Matters in Communication Arkadev Chattopadhyay Jaikumar Radhakrishnan Atri Rudra May 4, 204 Abstract We provide the first communication

More information

Streaming and communication complexity of Hamming distance

Streaming and communication complexity of Hamming distance Streaming and communication complexity of Hamming distance Tatiana Starikovskaya IRIF, Université Paris-Diderot (Joint work with Raphaël Clifford, ICALP 16) Approximate pattern matching Problem Pattern

More information

25.2 Last Time: Matrix Multiplication in Streaming Model

25.2 Last Time: Matrix Multiplication in Streaming Model EE 381V: Large Scale Learning Fall 01 Lecture 5 April 18 Lecturer: Caramanis & Sanghavi Scribe: Kai-Yang Chiang 5.1 Review of Streaming Model Streaming model is a new model for presenting massive data.

More information

Communication Lower Bounds for Statistical Estimation Problems via a Distributed Data Processing Inequality

Communication Lower Bounds for Statistical Estimation Problems via a Distributed Data Processing Inequality Communication Lower Bounds for Statistical Estimation Problems via a Distributed Data Processing Inequality Mark Braverman Ankit Garg Tengyu Ma Huy Nguyen David Woodruff DIMACS Workshop on Big Data through

More information

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity

Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Matt Brown Date: January 25, 2012 LECTURE 5 Nondeterminism In this lecture, we introduce nondeterministic

More information

Approximation norms and duality for communication complexity lower bounds

Approximation norms and duality for communication complexity lower bounds Approximation norms and duality for communication complexity lower bounds Troy Lee Columbia University Adi Shraibman Weizmann Institute From min to max The cost of a best algorithm is naturally phrased

More information

Stream Computation and Arthur- Merlin Communication

Stream Computation and Arthur- Merlin Communication Stream Computation and Arthur- Merlin Communication Justin Thaler, Yahoo! Labs Joint Work with: Amit Chakrabarti, Dartmouth Graham Cormode, University of Warwick Andrew McGregor, Umass Amherst Suresh Venkatasubramanian,

More information

Communication Lower Bounds via Critical Block Sensitivity

Communication Lower Bounds via Critical Block Sensitivity Communication Lower Bounds via Critical Block Sensitivity Mika Göös & Toniann Pitassi University of Toronto Göös & Pitassi (Univ. of Toronto) Communication Lower Bounds 13th January 2014 1 / 18 Communication

More information

Algebraic Problems in Computational Complexity

Algebraic Problems in Computational Complexity Algebraic Problems in Computational Complexity Pranab Sen School of Technology and Computer Science, Tata Institute of Fundamental Research, Mumbai 400005, India pranab@tcs.tifr.res.in Guide: Prof. R.

More information

Linear sketching for Functions over Boolean Hypercube

Linear sketching for Functions over Boolean Hypercube Linear sketching for Functions over Boolean Hypercube Grigory Yaroslavtsev (Indiana University, Bloomington) http://grigory.us with Sampath Kannan (U. Pennsylvania), Elchanan Mossel (MIT) and Swagato Sanyal

More information

Sketching and Streaming for Distributions

Sketching and Streaming for Distributions Sketching and Streaming for Distributions Piotr Indyk Andrew McGregor Massachusetts Institute of Technology University of California, San Diego Main Material: Stable distributions, pseudo-random generators,

More information

B669 Sublinear Algorithms for Big Data

B669 Sublinear Algorithms for Big Data B669 Sublinear Algorithms for Big Data Qin Zhang 1-1 2-1 Part 1: Sublinear in Space The model and challenge The data stream model (Alon, Matias and Szegedy 1996) a n a 2 a 1 RAM CPU Why hard? Cannot store

More information

Quantum Communication Complexity

Quantum Communication Complexity Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,

More information

Kernelization Lower Bounds: A Brief History

Kernelization Lower Bounds: A Brief History Kernelization Lower Bounds: A Brief History G Philip Max Planck Institute for Informatics, Saarbrücken, Germany New Developments in Exact Algorithms and Lower Bounds. Pre-FSTTCS 2014 Workshop, IIT Delhi

More information

Computing the Entropy of a Stream

Computing the Entropy of a Stream Computing the Entropy of a Stream To appear in SODA 2007 Graham Cormode graham@research.att.com Amit Chakrabarti Dartmouth College Andrew McGregor U. Penn / UCSD Outline Introduction Entropy Upper Bound

More information

Grothendieck Inequalities, XOR games, and Communication Complexity

Grothendieck Inequalities, XOR games, and Communication Complexity Grothendieck Inequalities, XOR games, and Communication Complexity Troy Lee Rutgers University Joint work with: Jop Briët, Harry Buhrman, and Thomas Vidick Overview Introduce XOR games, Grothendieck s

More information

Streaming Communication Protocols

Streaming Communication Protocols Streaming Communication Protocols Lucas Boczkowski, Iordanis Kerenidis, and Frédéric Magniez CNRS, IRIF, Univ Paris Diderot, Paris, France. Abstract We define the Streaming Communication model that combines

More information

A Tight Lower Bound for Dynamic Membership in the External Memory Model

A Tight Lower Bound for Dynamic Membership in the External Memory Model A Tight Lower Bound for Dynamic Membership in the External Memory Model Elad Verbin ITCS, Tsinghua University Qin Zhang Hong Kong University of Science & Technology April 2010 1-1 The computational model

More information

6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory

6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory 6895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 3: Coding Theory Lecturer: Dana Moshkovitz Scribe: Michael Forbes and Dana Moshkovitz 1 Motivation In the course we will make heavy use of

More information

The space complexity of approximating the frequency moments

The space complexity of approximating the frequency moments The space complexity of approximating the frequency moments Felix Biermeier November 24, 2015 1 Overview Introduction Approximations of frequency moments lower bounds 2 Frequency moments Problem Estimate

More information

Sublinear Algorithms for Big Data

Sublinear Algorithms for Big Data Sublinear Algorithms for Big Data Qin Zhang 1-1 2-1 Part 2: Sublinear in Communication Sublinear in communication The model x 1 = 010011 x 2 = 111011 x 3 = 111111 x k = 100011 Applicaitons They want to

More information

Networks Cannot Compute Their Diameter in Sublinear Time

Networks Cannot Compute Their Diameter in Sublinear Time Networks Cannot Compute Their Diameter in Sublinear Time Preliminary version, please check for updates Silvio Frischknecht Stephan Holzer Roger Wattenhofer {fsilvio, stholzer, wattenhofer}@ethzch Computer

More information

PROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY

PROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY PROPERTY TESTING LOWER BOUNDS VIA COMMUNICATION COMPLEXITY Eric Blais, Joshua Brody, and Kevin Matulef February 1, 01 Abstract. We develop a new technique for proving lower bounds in property testing,

More information

Combinatorial Auctions Do Need Modest Interaction

Combinatorial Auctions Do Need Modest Interaction Combinatorial Auctions Do Need Modest Interaction SEPEHR ASSADI, University of Pennsylvania We study the necessity of interaction for obtaining efficient allocations in combinatorial auctions with subadditive

More information

Chebyshev Polynomials, Approximate Degree, and Their Applications

Chebyshev Polynomials, Approximate Degree, and Their Applications Chebyshev Polynomials, Approximate Degree, and Their Applications Justin Thaler 1 Georgetown University Boolean Functions Boolean function f : { 1, 1} n { 1, 1} AND n (x) = { 1 (TRUE) if x = ( 1) n 1 (FALSE)

More information

Multi-join Query Evaluation on Big Data Lecture 2

Multi-join Query Evaluation on Big Data Lecture 2 Multi-join Query Evaluation on Big Data Lecture 2 Dan Suciu March, 2015 Dan Suciu Multi-Joins Lecture 2 March, 2015 1 / 34 Multi-join Query Evaluation Outline Part 1 Optimal Sequential Algorithms. Thursday

More information

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015 CS 2401 - Introduction to Complexity Theory Lecture #11: Dec 8th, 2015 Lecturer: Toniann Pitassi Scribe Notes by: Xu Zhao 1 Communication Complexity Applications Communication Complexity (CC) has many

More information

CS Communication Complexity: Applications and New Directions

CS Communication Complexity: Applications and New Directions CS 2429 - Communication Complexity: Applications and New Directions Lecturer: Toniann Pitassi 1 Introduction In this course we will define the basic two-party model of communication, as introduced in the

More information

to be more efficient on enormous scale, in a stream, or in distributed settings.

to be more efficient on enormous scale, in a stream, or in distributed settings. 16 Matrix Sketching The singular value decomposition (SVD) can be interpreted as finding the most dominant directions in an (n d) matrix A (or n points in R d ). Typically n > d. It is typically easy to

More information

Multi-Dimensional Online Tracking

Multi-Dimensional Online Tracking Multi-Dimensional Online Tracking Ke Yi and Qin Zhang Hong Kong University of Science & Technology SODA 2009 January 4-6, 2009 1-1 A natural problem Bob: tracker f(t) g(t) Alice: observer (t, g(t)) t 2-1

More information

Lecture th January 2009 Fall 2008 Scribes: D. Widder, E. Widder Today s lecture topics

Lecture th January 2009 Fall 2008 Scribes: D. Widder, E. Widder Today s lecture topics 0368.4162: Introduction to Cryptography Ran Canetti Lecture 11 12th January 2009 Fall 2008 Scribes: D. Widder, E. Widder Today s lecture topics Introduction to cryptographic protocols Commitments 1 Cryptographic

More information

15-251: Great Theoretical Ideas In Computer Science Recitation 9 : Randomized Algorithms and Communication Complexity Solutions

15-251: Great Theoretical Ideas In Computer Science Recitation 9 : Randomized Algorithms and Communication Complexity Solutions 15-251: Great Theoretical Ideas In Computer Science Recitation 9 : Randomized Algorithms and Communication Complexity Solutions Definitions We say a (deterministic) protocol P computes f if (x, y) {0,

More information

Clique vs. Independent Set

Clique vs. Independent Set Lower Bounds for Clique vs. Independent Set Mika Göös University of Toronto Mika Göös (Univ. of Toronto) Clique vs. Independent Set rd February 5 / 4 On page 6... Mika Göös (Univ. of Toronto) Clique vs.

More information

Communication Complexity

Communication Complexity Communication Complexity Jaikumar Radhakrishnan School of Technology and Computer Science Tata Institute of Fundamental Research Mumbai 31 May 2012 J 31 May 2012 1 / 13 Plan 1 Examples, the model, the

More information

Near-Optimal Lower Bounds on the Multi-Party Communication Complexity of Set Disjointness

Near-Optimal Lower Bounds on the Multi-Party Communication Complexity of Set Disjointness Near-Optimal Lower Bounds on the Multi-Party Communication Complexity of Set Disjointness Amit Chakrabarti School of Mathematics Institute for Advanced Study Princeton, NJ 08540 amitc@ias.edu Subhash Khot

More information

Asymmetric Communication Complexity and Data Structure Lower Bounds

Asymmetric Communication Complexity and Data Structure Lower Bounds Asymmetric Communication Complexity and Data Structure Lower Bounds Yuanhao Wei 11 November 2014 1 Introduction This lecture will be mostly based off of Miltersen s paper Cell Probe Complexity - a Survey

More information

CSCI-B609: A Theorist s Toolkit, Fall 2016 Oct 4. Theorem 1. A non-zero, univariate polynomial with degree d has at most d roots.

CSCI-B609: A Theorist s Toolkit, Fall 2016 Oct 4. Theorem 1. A non-zero, univariate polynomial with degree d has at most d roots. CSCI-B609: A Theorist s Toolkit, Fall 2016 Oct 4 Lecture 14: Schwartz-Zippel Lemma and Intro to Coding Theory Lecturer: Yuan Zhou Scribe: Haoyu Zhang 1 Roots of polynomials Theorem 1. A non-zero, univariate

More information

Randomized Algorithms. Lecture 4. Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010

Randomized Algorithms. Lecture 4. Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010 Randomized Algorithms Lecture 4 Lecturer: Moni Naor Scribe by: Tamar Zondiner & Omer Tamuz Updated: November 25, 2010 1 Pairwise independent hash functions In the previous lecture we encountered two families

More information

With P. Berman and S. Raskhodnikova (STOC 14+). Grigory Yaroslavtsev Warren Center for Network and Data Sciences

With P. Berman and S. Raskhodnikova (STOC 14+). Grigory Yaroslavtsev Warren Center for Network and Data Sciences L p -Testing With P. Berman and S. Raskhodnikova (STOC 14+). Grigory Yaroslavtsev Warren Center for Network and Data Sciences http://grigory.us Property Testing [Goldreich, Goldwasser, Ron; Rubinfeld,

More information

Hardness of MST Construction

Hardness of MST Construction Lecture 7 Hardness of MST Construction In the previous lecture, we saw that an MST can be computed in O( n log n+ D) rounds using messages of size O(log n). Trivially, Ω(D) rounds are required, but what

More information

Fourier analysis of boolean functions in quantum computation

Fourier analysis of boolean functions in quantum computation Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge

More information

Exponential Separation of Quantum and Classical Non-Interactive Multi-Party Communication Complexity

Exponential Separation of Quantum and Classical Non-Interactive Multi-Party Communication Complexity Electronic Colloquium on Computational Complexity, Report No. 74 (2007) Exponential Separation of Quantum and Classical Non-Interactive ulti-party Communication Complexity Dmitry Gavinsky Pavel Pudlák

More information

There are no zero-hard problems in multiparty communication complexity

There are no zero-hard problems in multiparty communication complexity There are no zero-hard problems in multiparty communication complexity László Babai and Denis Pankratov University of Chicago DRAFT: 2015-04-29 7:00pm Abstract We study the feasibility of generalizing

More information

Optimal Error Rates for Interactive Coding II: Efficiency and List Decoding

Optimal Error Rates for Interactive Coding II: Efficiency and List Decoding Optimal Error Rates for Interactive Coding II: Efficiency and List Decoding Mohsen Ghaffari MIT ghaffari@mit.edu Bernhard Haeupler Microsoft Research haeupler@cs.cmu.edu Abstract We study coding schemes

More information

Communication vs information complexity, relative discrepancy and other lower bounds

Communication vs information complexity, relative discrepancy and other lower bounds Communication vs information complexity, relative discrepancy and other lower bounds Iordanis Kerenidis CNRS, LIAFA- Univ Paris Diderot 7 Joint work with: L. Fontes, R. Jain, S. Laplante, M. Lauriere,

More information

Random Sampling on Big Data: Techniques and Applications Ke Yi

Random Sampling on Big Data: Techniques and Applications Ke Yi : Techniques and Applications Ke Yi Hong Kong University of Science and Technology yike@ust.hk Big Data in one slide The 3 V s: Volume Velocity Variety Integers, real numbers Points in a multi-dimensional

More information

Algorithms for Distributed Functional Monitoring

Algorithms for Distributed Functional Monitoring Algorithms for Distributed Functional Monitoring Graham Cormode AT&T Labs and S. Muthukrishnan Google Inc. and Ke Yi Hong Kong University of Science and Technology We study what we call functional monitoring

More information

Lecture 21: Quantum communication complexity

Lecture 21: Quantum communication complexity CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 21: Quantum communication complexity April 6, 2006 In this lecture we will discuss how quantum information can allow for a

More information

communication complexity lower bounds yield data structure lower bounds

communication complexity lower bounds yield data structure lower bounds communication complexity lower bounds yield data structure lower bounds Implementation of a database - D: D represents a subset S of {...N} 2 3 4 Access to D via "membership queries" - Q for each i, can

More information

Sketching in Adversarial Environments

Sketching in Adversarial Environments Sketching in Adversarial Environments Ilya Mironov Moni Naor Gil Segev Abstract We formalize a realistic model for computations over massive data sets. The model, referred to as the adversarial sketch

More information

Information Complexity: A Paradigm for Proving Lower Bounds. Amit Chakrabarti

Information Complexity: A Paradigm for Proving Lower Bounds. Amit Chakrabarti Information Complexity: A Paradigm for Proving Lower Bounds Amit Chakrabarti Dartmouth College Hanover, NH, USA STOC 2013, Palo Alto 1 History The applications came first; theory built in service of applications

More information

Complexity of Finding a Duplicate in a Stream: Simple Open Problems

Complexity of Finding a Duplicate in a Stream: Simple Open Problems Complexity of Finding a Duplicate in a Stream: Simple Open Problems Jun Tarui Univ of Electro-Comm, Tokyo Shonan, Jan 2012 1 Duplicate Finding Problem Given: Stream a 1,,a m a i {1,,n} Assuming m > n,

More information

Sketching as a Tool for Numerical Linear Algebra

Sketching as a Tool for Numerical Linear Algebra Sketching as a Tool for Numerical Linear Algebra David P. Woodruff presented by Sepehr Assadi o(n) Big Data Reading Group University of Pennsylvania February, 2015 Sepehr Assadi (Penn) Sketching for Numerical

More information

11 Heavy Hitters Streaming Majority

11 Heavy Hitters Streaming Majority 11 Heavy Hitters A core mining problem is to find items that occur more than one would expect. These may be called outliers, anomalies, or other terms. Statistical models can be layered on top of or underneath

More information

Matrix Rank in Communication Complexity

Matrix Rank in Communication Complexity University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Mohan Yang Date: January 18, 2012 LECTURE 3 Matrix Rank in Communication Complexity This lecture

More information

Sketching in Adversarial Environments

Sketching in Adversarial Environments Sketching in Adversarial Environments Ilya Mironov Moni Naor Gil Segev Abstract We formalize a realistic model for computations over massive data sets. The model, referred to as the adversarial sketch

More information

On the Cryptographic Complexity of the Worst Functions

On the Cryptographic Complexity of the Worst Functions On the Cryptographic Complexity of the Worst Functions Amos Beimel 1, Yuval Ishai 2, Ranjit Kumaresan 2, and Eyal Kushilevitz 2 1 Dept. of Computer Science, Ben Gurion University of the Negev, Be er Sheva,

More information

Streaming Algorithms for Set Cover. Piotr Indyk With: Sepideh Mahabadi, Ali Vakilian

Streaming Algorithms for Set Cover. Piotr Indyk With: Sepideh Mahabadi, Ali Vakilian Streaming Algorithms for Set Cover Piotr Indyk With: Sepideh Mahabadi, Ali Vakilian Set Cover Input: a collection S of sets S 1...S m that covers U={1...n} I.e., S 1 S 2. S m = U Output: a subset I of

More information

Partitions and Covers

Partitions and Covers University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Dong Wang Date: January 2, 2012 LECTURE 4 Partitions and Covers In previous lectures, we saw

More information

14. Direct Sum (Part 1) - Introduction

14. Direct Sum (Part 1) - Introduction Communication Complexity 14 Oct, 2011 (@ IMSc) 14. Direct Sum (Part 1) - Introduction Lecturer: Prahladh Harsha Scribe: Abhishek Dang 14.1 Introduction The Direct Sum problem asks how the difficulty in

More information

Finding Frequent Items in Probabilistic Data

Finding Frequent Items in Probabilistic Data Finding Frequent Items in Probabilistic Data Qin Zhang, Hong Kong University of Science & Technology Feifei Li, Florida State University Ke Yi, Hong Kong University of Science & Technology SIGMOD 2008

More information

An exponential separation between quantum and classical one-way communication complexity

An exponential separation between quantum and classical one-way communication complexity An exponential separation between quantum and classical one-way communication complexity Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical

More information

A Stable Marriage Requires Communication

A Stable Marriage Requires Communication A Stable Marriage Requires Communication Yannai A. Gonczarowski Noam Nisan Rafail Ostrovsky Will Rosenbaum Abstract The Gale-Shapley algorithm for the Stable Marriage Problem is known to take Θ(n 2 ) steps

More information

Settling the Query Complexity of Non-Adaptive Junta Testing

Settling the Query Complexity of Non-Adaptive Junta Testing Settling the Query Complexity of Non-Adaptive Junta Testing Erik Waingarten, Columbia University Based on joint work with Xi Chen (Columbia University) Rocco Servedio (Columbia University) Li-Yang Tan

More information

Lecture 3 Frequency Moments, Heavy Hitters

Lecture 3 Frequency Moments, Heavy Hitters COMS E6998-9: Algorithmic Techniques for Massive Data Sep 15, 2015 Lecture 3 Frequency Moments, Heavy Hitters Instructor: Alex Andoni Scribes: Daniel Alabi, Wangda Zhang 1 Introduction This lecture is

More information

Lower Bounds for Quantile Estimation in Random-Order and Multi-Pass Streaming

Lower Bounds for Quantile Estimation in Random-Order and Multi-Pass Streaming Lower Bounds for Quantile Estimation in Random-Order and Multi-Pass Streaming Sudipto Guha 1 and Andrew McGregor 2 1 University of Pennsylvania sudipto@cis.upenn.edu 2 University of California, San Diego

More information

New Characterizations in Turnstile Streams with Applications

New Characterizations in Turnstile Streams with Applications New Characterizations in Turnstile Streams with Applications Yuqing Ai 1, Wei Hu 1, Yi Li 2, and David P. Woodruff 3 1 The Institute for Theoretical Computer Science (ITCS), Institute for Interdisciplinary

More information

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Compute the Fourier transform on the first register to get x {0,1} n x 0. CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary

More information

CPSC 467: Cryptography and Computer Security

CPSC 467: Cryptography and Computer Security CPSC 467: Cryptography and Computer Security Michael J. Fischer Lecture 18 November 3, 2014 CPSC 467, Lecture 18 1/43 Zero Knowledge Interactive Proofs (ZKIP) Secret cave protocol ZKIP for graph isomorphism

More information

CISC 4090: Theory of Computation Chapter 1 Regular Languages. Section 1.1: Finite Automata. What is a computer? Finite automata

CISC 4090: Theory of Computation Chapter 1 Regular Languages. Section 1.1: Finite Automata. What is a computer? Finite automata CISC 4090: Theory of Computation Chapter Regular Languages Xiaolan Zhang, adapted from slides by Prof. Werschulz Section.: Finite Automata Fordham University Department of Computer and Information Sciences

More information

B490 Mining the Big Data

B490 Mining the Big Data B490 Mining the Big Data 1 Finding Similar Items Qin Zhang 1-1 Motivations Finding similar documents/webpages/images (Approximate) mirror sites. Application: Don t want to show both when Google. 2-1 Motivations

More information

A Mergeable Summaries

A Mergeable Summaries A Mergeable Summaries Pankaj K. Agarwal, Graham Cormode, Zengfeng Huang, Jeff M. Phillips, Zhewei Wei, and Ke Yi We study the mergeability of data summaries. Informally speaking, mergeability requires

More information

A Tight Lower Bound for High Frequency Moment Estimation with Small Error

A Tight Lower Bound for High Frequency Moment Estimation with Small Error A Tight Lower Bound for High Frequency Moment Estimation with Small Error Yi Li Department of EECS University of Michigan, Ann Arbor leeyi@umich.edu David P. Woodruff IBM Research, Almaden dpwoodru@us.ibm.com

More information

An Optimal Lower Bound on the Communication Complexity of GAP-HAMMING-DISTANCE

An Optimal Lower Bound on the Communication Complexity of GAP-HAMMING-DISTANCE An Optimal Lower Bound on the Communication Complexity of GAP-HAMMING-DISTANCE Amit Chakrabarti Oded Regev June 29, 2012 Abstract We prove an optimal Ω(n) lower bound on the randomized communication complexity

More information

The Communication Complexity of Correlation. Prahladh Harsha Rahul Jain David McAllester Jaikumar Radhakrishnan

The Communication Complexity of Correlation. Prahladh Harsha Rahul Jain David McAllester Jaikumar Radhakrishnan The Communication Complexity of Correlation Prahladh Harsha Rahul Jain David McAllester Jaikumar Radhakrishnan Transmitting Correlated Variables (X, Y) pair of correlated random variables Transmitting

More information

Direct product theorem for discrepancy

Direct product theorem for discrepancy Direct product theorem for discrepancy Troy Lee Rutgers University Joint work with: Robert Špalek Direct product theorems Knowing how to compute f, how can you compute f f f? Obvious upper bounds: If can

More information

Secure Two-Party Distribution Testing

Secure Two-Party Distribution Testing Department of Computer Science Columbia University rax - 2012 Secure Two-Party Distribution Testing Alexandr Andoni Tal Malkin Negev Shekel Nosatzki Department of Computer Science Columbia University Privacy

More information

Tight Bounds for Distributed Functional Monitoring

Tight Bounds for Distributed Functional Monitoring Tight Bounds for Distributed Functiona Monitoring David P. Woodruff IBM Amaden dpwoodru@us.ibm.com Qin Zhang IBM Amaden qinzhang@cse.ust.hk Abstract We resove severa fundamenta questions in the area of

More information

Spectral gaps and geometric representations. Amir Yehudayoff (Technion)

Spectral gaps and geometric representations. Amir Yehudayoff (Technion) Spectral gaps and geometric representations Amir Yehudayoff (Technion) Noga Alon (Tel Aviv) Shay Moran (Simons) pseudorandomness random objects have properties difficult to describe hard to compute expanders

More information

Communication Complexity 16:198:671 2/15/2010. Lecture 6. P (x) log

Communication Complexity 16:198:671 2/15/2010. Lecture 6. P (x) log Communication Complexity 6:98:67 2/5/200 Lecture 6 Lecturer: Nikos Leonardos Scribe: Troy Lee Information theory lower bounds. Entropy basics Let Ω be a finite set and P a probability distribution on Ω.

More information

Question 1. The Chinese University of Hong Kong, Spring 2018

Question 1. The Chinese University of Hong Kong, Spring 2018 CSCI 5440: Cryptography The Chinese University of Hong Kong, Spring 2018 Homework 2 Solutions Question 1 Consider the following encryption algorithm based on the shortlwe assumption. The secret key is

More information

Connectedness. Proposition 2.2. The following are equivalent for a topological space (X, T ).

Connectedness. Proposition 2.2. The following are equivalent for a topological space (X, T ). Connectedness 1 Motivation Connectedness is the sort of topological property that students love. Its definition is intuitive and easy to understand, and it is a powerful tool in proofs of well-known results.

More information

Quantum Oracle Classification

Quantum Oracle Classification Quantum Oracle Classification The Case of Group Structure Mark Zhandry Princeton University Query Complexity x O(x) O:Xà Y Info about O Examples: Pre- image of given output Collision Complete description

More information