Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/1060590.1060627acmconferencesArticle/Chapter ViewAbstractPublication PagesstocConference Proceedingsconference-collections
Article

Balanced boolean functions that can be evaluated so that every input bit is unlikely to be read

Published: 22 May 2005 Publication History

Abstract

A Boolean function of n bits is balanced if it takes the value 1 with probability 1⁄2. We exhibit a balanced Boolean function with a randomized evaluation procedure (with probability 0 of making a mistake) so that on uniformly random inputs, no input bit is read with probability more than Θ(n-1/2√ log n). We construct a balanced monotone Boolean function and a randomized algorithm computing it for which each bit is read with probability Θ(n-1⁄3 log n). We then show that for any randomized algorithm for evaluating a balanced Boolean function, when the input bits are uniformly random, there is some input bit that is read with probability at least Θ(n-1𔊪). For balanced monotone Boolean functions, there is some input bit that is read with probability at least Θ(n-1𔊫).

References

[1]
Michael Ben-Or and Nathan Linial. Collective coin flipping. In S. Micali, editor, Randomness and Computation, pages 91--115, New York, 1989. Academic Press.
[2]
Itai Benjamini and Oded Schramm. Percolation beyond Zd, many questions and a few answers. Electron. Comm. Probab., 1(8):71--82, 1996.
[3]
M. Campanino and L. Russo. An upper bound on the critical percolation probability for the three-dimensional cubic lattice. Ann. Probab., 13(2):478--491, 1985.
[4]
T. S. Jayram, Ravi Kumar, and D. Sivakumar. Two applications of information complexity. In Proceedings of the 35th ACM Symposium on the Theory of Computing, pages 673--682, 2003.
[5]
Jeff Kahn, Gil Kalai, and Nathan Linial. The influence of variables on Boolean functions (extended abstract). In 29th Annual Symposium on Foundations of Computer Science, pages 68--80, 1988.
[6]
F. Thomson Leighton. Introduction to Parallel Algorithms and Architectures: Arrays, Trees, Hypercubes. Morgan Kaufmann, San Mateo, CA, 1992.
[7]
Radford M. Neal. Circularly-coupled Markov chain sampling. Technical Report 9910 (revised), Dept. of Statistics, University of Toronto, 2002.
[8]
Ryan O'Donnell, Mike Saks, Oded Schramm, and Rocco Servedio. Every decision tree has an influential variable, 2004. In preparation.
[9]
Ryan O'Donnell and Rocco Servedio. On decision trees, influences, and learning monotone decision trees. Technical Report CUCS-023-04, Columbia University, Dept. of Computer Science, 2004.
[10]
Alexander Polishchuk and Daniel A. Spielman. Nearly-linear size holographic proofs. In Proceedings of the twenty-sixth annual ACM symposium on Theory of computing, pages 194--203. ACM Press, 1994.
[11]
James G. Propp and David B. Wilson. How to get a perfectly random sample from a generic Markov chain and generate a random spanning tree of a directed graph. Journal of Algorithms, 27:170--217, 1998.
[12]
M. Saks and A Wigderson. Probabilistic Boolean decision trees and the complexity of evaluating games. In Proceedings of the 27th IEEE Symposium on Foundations of Computer Science, pages 29--38, 1986.
[13]
Miklos Santha. On the Monte Carlo Boolean decision tree complexity of read-once formulae. In Structure in Complexity Theory Conference, pages 180--187, 1991.
[14]
Oded Schramm and Jeff Steif. Quantitative noise sensitivity and exceptional times for percolation, 2004. In preparation.

Cited By

View all
  • (2022)Boolean function metrics can assist modelers to check and choose logical rulesJournal of Theoretical Biology10.1016/j.jtbi.2022.111025538(111025)Online publication date: Apr-2022
  • (2022)Upper bounds on the one-arm exponent for dependent percolation modelsProbability Theory and Related Fields10.1007/s00440-022-01176-3185:1-2(41-88)Online publication date: 22-Nov-2022
  • (2018)On security of image ciphers based on logic circuits and chaotic permutationsMultimedia Tools and Applications10.1007/s11042-017-5439-677:16(20455-20476)Online publication date: 1-Aug-2018
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
STOC '05: Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
May 2005
778 pages
ISBN:1581139608
DOI:10.1145/1060590
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 22 May 2005

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. boolean function
  2. butterfly network
  3. percolation
  4. randomized decision tree

Qualifiers

  • Article

Conference

STOC05
Sponsor:
STOC05: Symposium on Theory of Computing
May 22 - 24, 2005
MD, Baltimore, USA

Acceptance Rates

Overall Acceptance Rate 1,469 of 4,586 submissions, 32%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)4
  • Downloads (Last 6 weeks)1
Reflects downloads up to 26 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Boolean function metrics can assist modelers to check and choose logical rulesJournal of Theoretical Biology10.1016/j.jtbi.2022.111025538(111025)Online publication date: Apr-2022
  • (2022)Upper bounds on the one-arm exponent for dependent percolation modelsProbability Theory and Related Fields10.1007/s00440-022-01176-3185:1-2(41-88)Online publication date: 22-Nov-2022
  • (2018)On security of image ciphers based on logic circuits and chaotic permutationsMultimedia Tools and Applications10.1007/s11042-017-5439-677:16(20455-20476)Online publication date: 1-Aug-2018
  • (2015)Query Complexity in Errorless Hardness AmplificationComputational Complexity10.1007/s00037-015-0117-424:4(823-850)Online publication date: 1-Dec-2015
  • (2014)Noise sensitivity in continuum percolationIsrael Journal of Mathematics10.1007/s11856-014-1038-y201:2(847-899)Online publication date: 7-Feb-2014
  • (2011)Oded Schramm’s contributions to noise sensitivityThe Annals of Probability10.1214/10-AOP58239:5Online publication date: 1-Sep-2011
  • (2010)Quantitative noise sensitivity and exceptional times for percolationAnnals of Mathematics10.4007/annals.2010.171.619171:2(619-672)Online publication date: 25-Mar-2010
  • (2007)Exponential Time/Space Speedups for Resolution and the PSPACE-completeness of Black-White PebblingProceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science10.1109/FOCS.2007.25(137-149)Online publication date: 21-Oct-2007
  • (2005)Every decision tree has an in.uential variableProceedings of the 46th Annual IEEE Symposium on Foundations of Computer Science10.1109/SFCS.2005.34(31-39)Online publication date: 23-Oct-2005

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media