Partitions and Covers

Similar documents
Nondeterminism LECTURE Nondeterminism as a proof system. University of California, Los Angeles CS 289A Communication Complexity

Matrix Rank in Communication Complexity

Communication Complexity

Breaking the Rectangle Bound Barrier against Formula Size Lower Bounds

Lecture Lecture 9 October 1, 2015

CS Introduction to Complexity Theory. Lecture #11: Dec 8th, 2015

Approximation norms and duality for communication complexity lower bounds

CS Communication Complexity: Applications and New Directions

Lecture 20: Lower Bounds for Inner Product & Indexing

14. Direct Sum (Part 1) - Introduction

Lecture 16: Communication Complexity

On the P versus NP intersected with co-np question in communication complexity

Communication is bounded by root of rank

15-251: Great Theoretical Ideas In Computer Science Recitation 9 : Randomized Algorithms and Communication Complexity Solutions

Clique vs. Independent Set

25.2 Last Time: Matrix Multiplication in Streaming Model

arxiv: v1 [cs.cc] 12 Feb 2009

Quantum Communication Complexity

CS Foundations of Communication Complexity

Lecture 21: Quantum communication complexity

Lecture 1 : Data Compression and Entropy

Lecture 15 April 9, 2007

Asymmetric Communication Complexity and Data Structure Lower Bounds

Communication Complexity

A Lower Bound Technique for Nondeterministic Graph-Driven Read-Once-Branching Programs and its Applications

CMPUT 675: Approximation Algorithms Fall 2014

QUANTUM COMMUNICATIONS BASED ON QUANTUM HASHING. Alexander Vasiliev. Kazan Federal University

CS 395T Computational Learning Theory. Scribe: Mike Halcrow. x 4. x 2. x 6

A note on monotone real circuits

Non-deterministic Communication Complexity with Few Witnesses

Hardness of MST Construction

An Information Complexity Approach to the Inner Product Problem

Classes of Boolean Functions

ROUNDS IN COMMUNICATION COMPLEXITY REVISITED

Structure of protocols for XOR functions

Course Introduction. 1.1 Overview. Lecture 1. Scribe: Tore Frederiksen

Distributed Statistical Estimation of Matrix Products with Applications

Rounds in Communication Complexity Revisited

On the tightness of the Buhrman-Cleve-Wigderson simulation

Lower Bounds in Communication Complexity

Randomized Simultaneous Messages: Solution of a Problem of Yao in Communication Complexity

Optimal computation of symmetric Boolean functions in Tree networks

Separating Deterministic from Nondeterministic NOF Multiparty Communication Complexity

Lower Bounds on Arithmetic Circuits via Partial Derivatives

Math 262A Lecture Notes - Nechiporuk s Theorem

Approximating maximum satisfiable subsystems of linear equations of bounded width

Cell Probe Lower Bounds and Approximations for Range Mode

ON SENSITIVITY OF k-uniform HYPERGRAPH PROPERTIES

Assignment 5: Solutions

Combinatorial Auctions Do Need Modest Interaction

Quiz 1 Solutions. Problem 2. Asymptotics & Recurrences [20 points] (3 parts)

Cell-Probe Lower Bounds for the Partial Match Problem

On Randomized One-Round Communication Complexity. Ilan Kremer Noam Nisan Dana Ron. Hebrew University, Jerusalem 91904, Israel

Sensitivity, Block Sensitivity and Certificate Complexity of Boolean Functions (Master s Thesis)

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Space and Nondeterminism

Introduction to integer programming II

Kernelization by matroids: Odd Cycle Transversal

Lecture 10 Oct. 3, 2017

Chapter 1. Comparison-Sorting and Selecting in. Totally Monotone Matrices. totally monotone matrices can be found in [4], [5], [9],

Information Complexity vs. Communication Complexity: Hidden Layers Game

Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007

Lecture 5: Derandomization (Part II)

An Improved Approximation Algorithm for Requirement Cut

Toward Better Formula Lower Bounds: the Composition of a Function and a Universal Relation

An Approximation Algorithm for Approximation Rank

Lecture 17: Trees and Merge Sort 10:00 AM, Oct 15, 2018

Lecture 16 Oct 21, 2014

Notes for Lecture 15

On extracting computations from propositional proofs (a survey)

On shredders and vertex connectivity augmentation

Kernelization Lower Bounds: A Brief History

Lecture 23 Branch-and-Bound Algorithm. November 3, 2009

COS597D: Information Theory in Computer Science October 5, Lecture 6

The quantum adversary method and classical formula size lower bounds

CMSC 858F: Algorithmic Lower Bounds: Fun with Hardness Proofs Fall 2014 Introduction to Streaming Algorithms

1 Randomized Computation

Communication Complexity. The dialogues of Alice and Bob...

A Threshold of ln(n) for approximating set cover

Report on PIR with Low Storage Overhead

(2) E M = E C = X\E M

1 Approximate Quantiles and Summaries

A Lower Bound for the Size of Syntactically Multilinear Arithmetic Circuits

An Algebraic View of the Relation between Largest Common Subtrees and Smallest Common Supertrees

Notes on Computer Theory Last updated: November, Circuits

On the Sensitivity of Cyclically-Invariant Boolean Functions

CS Foundations of Communication Complexity

On Convex Complexity Measures

An Approximation Algorithm for Constructing Error Detecting Prefix Codes

1 AC 0 and Håstad Switching Lemma

Lecture 4: Hashing and Streaming Algorithms

How many rounds can Random Selection handle?

Randomized Sorting Algorithms Quick sort can be converted to a randomized algorithm by picking the pivot element randomly. In this case we can show th

Optimal Tree-decomposition Balancing and Reachability on Low Treewidth Graphs

Finite Metric Spaces & Their Embeddings: Introduction and Basic Tools

Online Learning versus Offline Learning*

EDUCATIONAL PEARL. Proof-directed debugging revisited for a first-order version

5.1 Learning using Polynomial Threshold Functions

Information Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017

Lecture 2 September 4, 2014

Transcription:

University of California, Los Angeles CS 289A Communication Complexity Instructor: Alexander Sherstov Scribe: Dong Wang Date: January 2, 2012 LECTURE 4 Partitions and Covers In previous lectures, we saw that every communication protocol induces a partition of the domain into monochromatic rectangles, and learned two lower bound techniques for the number of rectangles in such a partition. The techniques presented so far take into account only the number of monochromatic rectangles in partitions of the space X Y and ignore the additional restriction that these partitions should correspond to some protocol. A natural question is how tight these lower bound techniques are. In addition, we are also interested in relaxing the need to partition the space X Y into f-monochromatic rectangles by allowing overlaps among rectangles. In other words, we are interested in covering X Y by monochromatic rectangles. Coverings are more natural combinatorial objects than partitions and can sometimes be more efficient. This raises the question of how much more efficient a cover can be than a partition. In this lecture, we study the relations among these combinatorial measures and their relation to communication complexity. 4.1 Key definitions Definition 4.1. Let f : X Y {0, 1} be a function. Define C P (f) to be the smallest number of leaves in any protocol tree for f. Define C D (f) to be the smallest number of f-monochromatic rectangles in any partition of X Y. Define C(f) to be the smallest number of f-monochromatic rectangles in any cover of X Y. The following relationships hold among these quantities: Theorem 4.2. For all f : X Y {0, 1}: 2 Θ(D(f)) = C P (f) C D (f) C(f) 2 Θ( D(f)) The first and last inequalities are fundamental results and will be proved in this lecture. The other inequalities are immediate from the definitions. In particular, we infer that covers and partitions cannot be significantly more efficient than partitions that arise from communication protocols.

4.2 Communication complexity versus protocol cover Theorem 4.. For all f : X Y {0, 1}, D(f) = Θ(log C P (f)) Proof. The maximum number of leaves in a binary tree with depth D(f) is 2 D(f). Thus, C P (f) 2 D(f), on equivalently D(f) log 2 C P (f). For the upper bound on D(f), consider a protocol for f with l leaves. root v u Figure 4.1: Figure for finding targetbob u. Consider Figure 4.1. Alice and Bob identify a node u in the tree such that the subtree rooted at u has between l 2l and leaves. To find such a node, we start at the root of the tree and keep going to the child that has more than 2l leaves in its subtree. This process stops at some node v. By assumption, the subtrees rooted at v s children each have at most 2l leaves, and furthermore Alice one of them must have at least l leaves (since the subtree rooted at v has more than 2l leaves). Thus, one of v s children is the desired node u. Note that finding u requires no communication. Since u is a node in the protocol tree, the set of inputs arriving at u is a rectangle; call it R u. Thus, with 2 bits of communication Alice and Bob are able to determine whether (x, y) R u. If (x, y) R u, Alice and Bob recursively process the subtree rooted at u, which has between l 2l and leaves. If (x, y) / R u, they recursively process the original tree with u replaced by a terminal node 0 (the label actually does not matter). In either case, the recursive step is applied to a tree with at most 2l leaves, giving the recurrence D(l) 2 + D(2l/) where D(l) is the maximum communication complexity over all functions f with C P (f) l. The recurrence solves to D(l) Θ(log l) as claimed. 4. Communication complexity versus cover size Definition 4.4. Let f : X Y {0, 1} be a function. Define C 0 (f) to be the smallest number of f-monochromatic rectangles needed to cover f 1 (0). Define C 1 (f) to be the smallest number of f-monochromatic rectangles needed to cover f 1 (1). 4-2

By definition, C(f) = C 0 (f) + C 1 (f). We will now show a bound on D(f) in terms of C(f). Theorem 4.5 (Aho, Ullman, Yannakakis [1]). D(f) O(log 2 C 0 (f) log 2 C 1 (f)). In particular, D(f) O(log 2 C(f)). Proof. The proof relies on a simple property of rectangles. Let R and S denote f- monochromatic rectangles in a cover of f 1 (0) and f 1 (1), respectively. As Figure 4.2 shows, R and S must be disjoint either in rows or columns or both. Figure 4.2: Intersections in rows or columns Fix an optimal cover of f 1 (0) and f 1 (1) by f-monochromatic rectangles. We now describe a protocol for Alice and Bob. The idea is for them to look for a 1-rectangle that contains the input (x, y). If they fail, the conclude that f(x, y) = 0. In each round the players do the following: 1. Alice looks for a 1-rectangle Q that contains column x and is disjoint from at least half of the rectangles in the cover of f 1 (0). If she finds it, she sends its index to Bob, using log 2 C 1 (f) bits, and the rectangles in the cover of f 1 (0) that are disjoint from Q are discarded. 2. If Alice fails, Bob looks for a 1-rectangle Q that contains row y and is disjoint from at least half of the rectangles in the cover of f 1 (0). If he finds it, he sends its index to 4-

Alice using log 2 C 1 (f) bits, and the rectangles in the cover of f 1 (0) that are disjoint from Q are discarded.. If both Alice and Bob failed, we know that f(x, y) = 0 and no further communication is necessary. 4. If they find the desired rectangle, they recursively process the remaining rectangles in the cover of f. When there are no 0-rectangle left, they return 1. Each round reduces the number of 0-rectangles by a factor of at least 2, so there can be at most log 2 C 0 (f) + 1 rounds. Therefore, the protocol costs O(log 2 C 0 (f) log 2 C 1 (f)) bits in the worst case. 4.4 Lower bounds for covers and disjoint covers We now revisit several lower bound techniques for deterministic communication complexity and see which ones of them can directly bound quantities such as C(f) and C D (f). In the statement to follow, we let FS(f) denote the size of the largest fooling set for f. Theorem 4.6. For any f : X Y {0, 1} and any field F, C(f) FS(f); C D (f) rk F (M f ). Here, we sketch the proofs of these two statements. Proof. Fix a fooling set S X Y for f, where f(s) = z. For every pair of (x 1, y 1 ), (x 2, y 2 ) S: f(x 1, y 1 ) = z f(x 2, y 2 ) = z Either f(x 1, y 2 ) z or f(x 2, y 1 ) z. Therefore, (x 1, y 1 ) and (x 2, y 2 ) cannot occupy the same rectangle in a cover of f 1 (z), so that C(f) C z (f) S. For the second part, let R be a cover of X Y by pairwise disjoint f-monochromatic rectangles. Let R R be the set of rectangles covering f 1 (1). By the pairwise disjointness of the rectangles, M f = R R M R, where the matrix M R is defined by M R (x, y) = 1 for (x, y) R and M R (x, y) = 0 for (x, y) / R. By the subadditivity of rank, rk M f R R rk M R R C D (f), since the rank of each M R is at most 1. 4-4

4.5 The rectangle size bound characterizes cover size In this section we prove the rather surprising fact, due to Karchmer, Kushilevitz, and Nisan [2], that the rectangle size bound nearly tightly characterizes the smallest cover size for any given function. Recall that to use the rectangle size bound, we define some probability distribution µ on, say, the 1-inputs of f. We then compute the largest µ(r), where R ranges over all 1-monochromatic rectangles, and conclude that the reciprocal of that quantity is a lower bound on C 1 (f). Definition 4.7. For f : X Y {0, 1}, define RS 1 (f) = min µ on f 1 (1) max µ(r), R where the minimum ranges over all probability distributions µ on f 1 (1) and the maximum over all f-monochromatic rectangles R f 1 (1). Analogously, let RS 0 (f) = min µ on f 1 (0) max µ(r) R where the minimum ranges over all probability distributions µ on f 1 (0) and the maximum over all f-monochromatic rectangles R f 1 (0). Recall that C 0 (f) C 1 (f) We now prove matching upper bounds. 1 RS 0 (f), 1 RS 1 (f). Theorem 4.8 (Karchmer, Kushilevitz, and Nisan [2]). For any function f : {0, 1} n {0, 1} n {0, 1}, one has ( ) n C 0 (f) O, RS 0 (f) ( n C 1 (f) O RS 1 (f) Proof. By symmetry, it suffices to prove the first statement. We do so by building a cover for f 1 (0) adaptively. 1. Let µ i be a uniform distribution on those points in f 1 (0) uncovered in previous i 1 iterations. Thus, µ 1 is the uniform distribution on f 1 (0). 2. According to our definition of RS 0 (f), there exists a rectangle R i f 1 (0) with µ i (R i ) RS 0 (f).. Remove the points covered by R i. Trivially, f 1 (0) 4 n. Each iteration covers at least an RS 0 (f) fraction of previously uncovered points, so that after k iterations at most (1 RS 0 (f)) k 4 n points remain uncovered. It follows that all points will be covered in O(n/RS 0 (f)) iterations. ). 4-5

These results still leave a small gap between the lower and upper bounds on C 0 (f) in terms of RS 0 (f), corresponding to the factor of n in the theorem above. As the following example shows, this gap cannot be narrowed further. We use the following observation: Proposition 4.9. For all f : X Y {0, 1}, D(f) C 0 (f) + 1. Proof. On input (x, y), Alice sends Bob a single bit for each rectangle in the cover of f 1 (0), indicating whether that rectangle intersects the row x. Bob checks the same for his input y. Finally, he outputs 1 if and only if no rectangle in the cover of f 1 (0) intersects both the row x and the column y. Example 4.10. Consider the equality function EQ n : {0, 1} n {0, 1} n {0, 1}. From previous lectures, we know that D(EQ) = n + 1, so that C 0 (f) n by the proposition above. On the other hand, we claim that RS 0 (f) 1/4. Let µ be any distribution on (0). Consider a 0-monochromatic rectangle for EQ n chosen at random as follows: choose a random n-bit string r {0, 1} n and a random bit b, and let EQ 1 n R r,b = {x : x, r = b} {y : y, r b}. For any fixed (x, y) with x y, P r[(x, y) R r,b ] = 1/4 by the properties of inner product. It follows that E µ P r r,b [(x, y) R r,b ] 1/4 whence E r,b P r µ [(x, y) R r,b ] 1/4. }{{} =µ(r r,b ) Thus, there exists at least one 0-monochromatic rectangle R r,b with µ(r r,b ) 1/4. Since the choice of µ was arbitrary, we have RS 0 (EQ n ) 1/4. References [1] A. V. Aho, J. D. Ullman, and M. Yannakakis. On notions of information transfer in VLSI circuits. In Proceedings of the Fifteenth Annual ACM Symposium on Theory of Computing (STOC), pages 1 19, 198. [2] M. Karchmer, E. Kushilevitz, and N. Nisan. Fractional covers and communication complexity. SIAM J. Discrete Math., 8(1):76 92, 1995. 4-6