Languages with Bounded Multiparty Communication Complexity Arkadev Chattopadhyay (McGill) Joint work with: Andreas Krebs (Tubingen) Michal Koucky (Czech.

Slides:



Advertisements
Similar presentations
Tight Lower Bounds for the Distinct Elements Problem David Woodruff MIT Joint work with Piotr Indyk.
Advertisements

Solving connectivity problems parameterized by treewidth in single exponential time Marek Cygan, Marcin Pilipczuk, Michal Pilipczuk Jesper Nederlof, Dagstuhl.
Bounded-depth circuits: Separating wires from gates Michal Koucký Joint work with: Pavel Pudlák and Denis Thérien.
Approximate List- Decoding and Hardness Amplification Valentine Kabanets (SFU) joint work with Russell Impagliazzo and Ragesh Jaiswal (UCSD)
1 of 16 NORM - CONTROLLABILITY, or How a Nonlinear System Responds to Large Inputs Daniel Liberzon Univ. of Illinois at Urbana-Champaign, U.S.A. NOLCOS.
Lecture 3 Universal TM. Code of a DTM Consider a one-tape DTM M = (Q, Σ, Γ, δ, s). It can be encoded as follows: First, encode each state, each direction,
Theory of Computing Lecture 23 MAS 714 Hartmut Klauck.
Lecture 24 MAS 714 Hartmut Klauck
CSCI 4325 / 6339 Theory of Computation Zhixiang Chen Department of Computer Science University of Texas-Pan American.
Linear Systems With Composite Moduli Arkadev Chattopadhyay (University of Toronto) Joint with: Avi Wigderson TexPoint fonts used in EMF. Read the TexPoint.
Complexity 15-1 Complexity Andrei Bulatov Hierarchy Theorem.
1 Introduction to Computability Theory Lecture12: Reductions Prof. Amos Israeli.
Strong Implementation of Social Choice Functions in Dominant Strategies Clemens ThielenSven O. Krumke 3rd International Workshop on Computational Social.
1 Introduction to Computability Theory Lecture13: Mapping Reductions Prof. Amos Israeli.
CS151 Complexity Theory Lecture 7 April 20, 2004.
Tirgul 10 Rehearsal about Universal Hashing Solving two problems from theoretical exercises: –T2 q. 1 –T3 q. 2.
1 Module 9 Recursive and r.e. language classes –representing solvable and half-solvable problems Proofs of closure properties –for the set of recursive.
Lecture 8 Recursively enumerable (r.e.) languages
1 COMPOSITION PCP proof by Irit Dinur Presentation by Guy Solomon.
Computability and Complexity 32-1 Computability and Complexity Andrei Bulatov Boolean Circuits.
Bit Complexity of Breaking and Achieving Symmetry in Chains and Rings.
מבנה המחשב + מבוא למחשבים ספרתיים תרגול 5# Topics: 1.Encoders and decoders 2.Shifters.
Finite monoids, regular languages, circuit complexity and logic Pascal Tesson Laval University, Quebec City, Canada.
Copyright © Cengage Learning. All rights reserved.
Theory of Computing Lecture 22 MAS 714 Hartmut Klauck.
February 20, 2015CS21 Lecture 191 CS21 Decidability and Tractability Lecture 19 February 20, 2015.
The Power of Super-Log Number of Players Arkadev Chattopadhyay (TIFR, Mumbai) Joint with: Michael Saks ( Rutgers )
1 Regular Expressions/Languages Regular languages –Inductive definitions –Regular expressions syntax semantics Not covered in lecture.
Lecture 18 Various TMs. Allow the head not move Theorem. If the head is allowed to stay at the cell in each move, then every function computed by the.
Index FAQ Limits of Sequences of Real Numbers Sequences of Real Numbers Limits through Rigorous Definitions The Squeeze Theorem Using the Squeeze Theorem.
C&O 355 Mathematical Programming Fall 2010 Lecture 17 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA A.
Regular Model Checking Ahmed Bouajjani,Benget Jonsson, Marcus Nillson and Tayssir Touili Moran Ben Tulila
Plan Lecture 3: 1. Fraisse Limits and Their Automaticity: a. Random Graphs. a. Random Graphs. b. Universal Partial Order. b. Universal Partial Order. 2.
Complexity 2-1 Problems and Languages Complexity Andrei Bulatov.
Basic Counting. This Lecture We will study some basic rules for counting. Sum rule, product rule, generalized product rule Permutations, combinations.
Quantum Computing MAS 725 Hartmut Klauck NTU TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A.
February 18, 2015CS21 Lecture 181 CS21 Decidability and Tractability Lecture 18 February 18, 2015.
Logic Circuits Chapter 2. Overview  Many important functions computed with straight-line programs No loops nor branches Conveniently described with circuits.
DISCRETE COMPUTATIONAL STRUCTURES CS Fall 2005.
CS 103 Discrete Structures Lecture 10 Basic Structures: Sets (1)
Decidable Questions About Regular languages 1)Membership problem: “Given a specification of known type and a string w, is w in the language specified?”
Number Theory Project The Interpretation of the definition Andre (JianYou) Wang Joint with JingYi Xue.
Quantum Computing MAS 725 Hartmut Klauck NTU
Computer Science 101 Circuit Design - Examples. Sum of Products Algorithm Identify each row of the output that has a 1. Identify each row of the output.
Circuit Lower Bounds via Ehrenfeucht- Fraïssé Games Michal Koucký Joint work with: Clemens Lautemann, Sebastian Poloczek, Denis Thérien.
Fall 2013 CMU CS Computational Complexity Lectures 8-9 Randomness, communication, complexity of unique solutions These slides are mostly a resequencing.
1 Turing’s Thesis. 2 Turing’s thesis: Any computation carried out by mechanical means can be performed by a Turing Machine (1930)
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
Complexity and Computability Theory I Lecture #8 Instructor: Rina Zviel-Girshin Lea Epstein.
NP-Completness Turing Machine. Hard problems There are many many important problems for which no polynomial algorithms is known. We show that a polynomial-time.
Tight Bound for the Gap Hamming Distance Problem Oded Regev Tel Aviv University TexPoint fonts used in EMF. Read the TexPoint manual before you delete.
FORMAL LANGUAGES, AUTOMATA AND COMPUTABILITY TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AA.
Compression for Fixed-Width Memories Ori Rottenstriech, Amit Berman, Yuval Cassuto and Isaac Keslassy Technion, Israel.
1 Finite Model Theory Lecture 5 Turing Machines and Finite Models.
C&O 355 Lecture 19 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
Multiparty Communication Complexity (A biased introduction) Arkadev Chattopadhyay TIFR, Mumbai TexPoint fonts used in EMF. Read the TexPoint manual before.
From Classical Proof Theory to P vs. NP
On the Size of Pairing-based Non-interactive Arguments
Automata, Grammars and Languages
HIERARCHY THEOREMS Hu Rui Prof. Takahashi laboratory
CS 154, Lecture 6: Communication Complexity
Basic Counting.
Chapter 34: NP-Completeness
Copyright © Cengage Learning. All rights reserved.
Basic Counting Lecture 9: Nov 5, 6.
Imperfectly Shared Randomness
Instructor: Aaron Roth
TexPoint fonts used in EMF.
Recap lecture 18 NFA corresponding to union of FAs,example, NFA corresponding to concatenation of FAs,examples, NFA corresponding to closure of an FA,examples.
Presentation transcript:

Languages with Bounded Multiparty Communication Complexity Arkadev Chattopadhyay (McGill) Joint work with: Andreas Krebs (Tubingen) Michal Koucky (Czech Acad. Sciences) Mario Szegedy (Rutgers) Pascal Tesson (Laval) Denis Therien (McGill) TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: AAAA A A A

‘Number on Forehead’ Model Player Player Player Cost of protocol is worst case cost. D k (f) is the cost of best protocol for f for the worst partition.

A Theorem for k =2 Question. What functions can be computed in constant communication for the worst partition by two players (denoted by CCC 2 )? Remark: A priori there is no reason to believe that CCC 2 should have any relationship to space-time complexity classes! Theorem (Szegedy93). Every function in CCC 2 can be computed by linear sized ACC 0 circuits.

Three Players Question: What can we say about CCC k, for k ¸ 3 ? We show, Theorem 1. CCC 3 contains functions that have arbitrarily large circuit complexity. We use a coding trick to show this.

The Coding Idea Let C : { 0,1 } * ! { 0,1 } * be an encoding function. Definition. For a L, define C(L) as follows: y 2 C(L) if there exists x 2 L s.t. C(x)=y. Observation. If C has efficient encoding and decoding algorithms, then L and C(L) have comparable complexity. Fact. If the relative distance of C is more than 2/3, then C(L) 2 CCC 3.

Proof of Fact Player X Player Y Player Z Find w ² x Find w ² x w ² y ? w ² z ? w 2 C(L)?w 2 C(L)?

Such Codes Exist Fact: Reed-Solomon codes concatenated with unary codes can be used to carry out this idea! Remark: Picking a hard L (that is guaranteed to exist by a counting argument), proves our Theorem. Question. What makes 3 players so powerful?

Key Features of Three Players Every pair of input bits is looked at by some player. At least a third of the input bits overlap the view of two players. Each player knows the precise position in the input word of every input bit that he sees. Question. How useful is the third feature? Answer. We obtain insight into this question by considering two simple classes of functions.

Neutral Letter and Symmetricity Definition. Boolean function f :  * ! { 0, 1 } has neutral letter e if for every x, y 2  *, f(xey) = f(xy). Theorem 2. Every language with a neutral letter that is in CCC k for some fixed k, is regular. We can also give a decidable algebraic characterization of such languages. Definition. f over  is symmetric if for any permutation  and any input string x, f(x)=f(  (x)). Theorem 3. A symmetric function f is in CCC k for some fixed k iff it is in CCC 2.

Promised Partition Let A be a 0-1 matrix of dimension k £ n. Let there be a promise that each column of A has at most one 1. Definition. PPart n k (A) is 1 if each column of A has a 1. Theorem. PPart n k cannot be computed by k players using c bits of communication for the row-wise partition of inputs if n ¸ HJ(k, 2 c ). The above Theorem will give us a handle on languages with a neutral letter in CCC k

Partition to Neutral Letter Let f, g be two functions that have alphabet  = { a,b,e }, where e is neutral. Let w 2 { a,b } * be the minimal word s.t. f(w)  g(w), with | w |= m. Let D 3 (f) = D 3 (g) = c. Claim: PPart m 3 can be computed by three players using 2c bits of communication for the row-wise partition of input bits.

Proof of the Claim 0100 Player X 1000 Player Y 0001 Player Z Let w = abab, m =| w |= 4 x = ebee z = eeeb y = aeee u = x § y § z = eae bee eee eeb Compute f(u) =f(abb) Compute g(u) = g(abb) Output 1 iff f(u)  g(u)

Consequence Corollary: If f and g are any two functions over a given alphabet with a neutral letter, can be computed by k players using c bits of communication and they agree on all inputs of length at most HJ(k, 2 2c ), then they must be identical. Remark: There are only a finite number of such functions over a given alphabet that can be computed by k players communicating c bits, for each fixed k and c. Fact: This observation can be used to show that languages in CCC k having a neutral letter, are regular.

Conclusion We omit the characterization for symmetric functions. If your are interested, please check out the full version on ECCC at 117/Paper.pdf THANK YOU!