Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJune 2018
Prediction with a short memory
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 1074–1087https://doi.org/10.1145/3188745.3188954We consider the problem of predicting the next observation given a sequence of past observations, and consider the extent to which accurate prediction requires complex algorithms that explicitly leverage long-range dependencies. Perhaps surprisingly, ...
- research-articleJune 2018
On the complexity of hazard-free circuits
- Christian Ikenmeyer,
- Balagopal Komarath,
- Christoph Lenzen,
- Vladimir Lysikov,
- Andrey Mokhov,
- Karteek Sreenivasaiah
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 878–889https://doi.org/10.1145/3188745.3188912The problem of constructing hazard-free Boolean circuits dates back to the 1940s and is an important problem in circuit design. Our main lower-bound result unconditionally shows the existence of functions whose circuit complexity is polynomially bounded ...
- research-articleJune 2018
Crossing the logarithmic barrier for dynamic Boolean data structure lower bounds
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 978–989https://doi.org/10.1145/3188745.3188790This paper proves the first super-logarithmic lower bounds on the cell probe complexity of dynamic boolean (a.k.a. decision) data structure problems, a long-standing milestone in data structure lower bounds.
We introduce a new approach and use it to ...
- research-articleJune 2018
Near-optimal linear decision trees for k-SUM and related problems
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 554–563https://doi.org/10.1145/3188745.3188770We construct near optimal linear decision trees for a variety of decision problems in combinatorics and discrete geometry. For example, for any constant k, we construct linear decision trees that solve the k-SUM problem on n elements using O(n log2 n) ...
- research-articleJune 2018
Universal points in the asymptotic spectrum of tensors
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 289–296https://doi.org/10.1145/3188745.3188766The asymptotic restriction problem for tensors s and t is to find the smallest β ≥ 0 such that the nth tensor power of t can be obtained from the (β n+o(n))th tensor power of s by applying linear maps to the tensor legs — this is called restriction — ...
-
- research-articleJune 2018
Discovering the roots: uniform closure results for algebraic classes under factoring
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 1152–1165https://doi.org/10.1145/3188745.3188760Newton iteration (NI) is an almost 350 years old recursive formula that approximates a simple root of a polynomial quite rapidly. We generalize it to a matrix recurrence (allRootsNI) that approximates all the roots simultaneously. In this form, the ...
- research-articleJune 2018
A converse to Banach's fixed point theorem and its CLS-completeness
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 44–50https://doi.org/10.1145/3188745.3188968Banach's fixed point theorem for contraction maps has been widely used to analyze the convergence of iterative methods in non-convex problems. It is a common experience, however, that iterative maps fail to be globally contracting under the natural ...
- research-articleJune 2018
Extractor-based time-space lower bounds for learning
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 990–1002https://doi.org/10.1145/3188745.3188962A matrix M: A × X → {−1,1} corresponds to the following learning problem: An unknown element x ∈ X is chosen uniformly at random. A learner tries to learn x from a stream of samples, (a1, b1), (a2, b2) …, where for every i, ai ∈ A is chosen uniformly at ...
- research-articleJune 2018
Algorithmic polynomials
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 311–324https://doi.org/10.1145/3188745.3188958The approximate degree of a Boolean function f(x1,x2,…,xn) is the minimum degree of a real polynomial that approximates f pointwise within 1/3. Upper bounds on approximate degree have a variety of applications in learning theory, differential privacy, ...
- research-articleJune 2018
Interactive compression to external information
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 964–977https://doi.org/10.1145/3188745.3188956We describe a new way of compressing two-party communication protocols to get protocols with potentially smaller communication. We show that every communication protocol that communicates C bits and reveals I bits of information about the participants’ ...
- research-articleJune 2018
Towards tight approximation bounds for graph diameter and eccentricities
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 267–280https://doi.org/10.1145/3188745.3188950Among the most important graph parameters is the Diameter, the largest distance between any two vertices. There are no known very efficient algorithms for computing the Diameter exactly. Thus, much research has been devoted to how fast this parameter ...
- research-articleJune 2018
More consequences of falsifying SETH and the orthogonal vectors conjecture
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 253–266https://doi.org/10.1145/3188745.3188938The Strong Exponential Time Hypothesis and the OV-conjecture are two popular hardness assumptions used to prove a plethora of lower bounds, especially in the realm of polynomial-time algorithms. The OV-conjecture in moderate dimension states there is no ...
- research-articleJune 2018
Breaking the circuit-size barrier in secret sharing
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 699–708https://doi.org/10.1145/3188745.3188936We study secret sharing schemes for general (non-threshold) access structures. A general secret sharing scheme for n parties is associated to a monotone function F:{0,1}n→{0,1}. In such a scheme, a dealer distributes shares of a secret s among n ...
- research-articleJune 2018
Explicit binary tree codes with polylogarithmic size alphabet
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 535–544https://doi.org/10.1145/3188745.3188928This paper makes progress on the problem of explicitly constructing a binary tree code with constant distance and constant alphabet size.
We give an explicit binary tree code with constant distance and alphabet size poly(logn), where n is the depth of ...
- research-articleJune 2018
Succinct delegation for low-space non-deterministic computation
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 709–721https://doi.org/10.1145/3188745.3188924We construct a delegation scheme for verifying non-deterministic computations, with complexity proportional only to the non-deterministic space of the computation. Specifically, letting n denote the input length, we construct a delegation scheme for any ...
- research-articleJune 2018
Lifting Nullstellensatz to monotone span programs over any field
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 1207–1219https://doi.org/10.1145/3188745.3188914We characterize the size of monotone span programs computing certain “structured” boolean functions by the Nullstellensatz degree of a related unsatisfiable Boolean formula. This yields the first exponential lower bounds for monotone span programs over ...
- research-articleJune 2018
Circuit lower bounds for nondeterministic quasi-polytime: an easy witness lemma for NP and NQP
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 890–901https://doi.org/10.1145/3188745.3188910We prove that if every problem in NP has nk-size circuits for a fixed constant k, then for every NP-verifier and every yes-instance x of length n for that verifier, the verifier’s search space has an nO(k3)-size witness circuit: a witness for x that can ...
- research-articleJune 2018
Interactive coding over the noisy broadcast channel
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 507–520https://doi.org/10.1145/3188745.3188884A set of n players, each holding a private input bit, communicate over a noisy broadcast channel. Their mutual goal is for all players to learn all inputs. At each round one of the players broadcasts a bit to all the other players, and the bit received ...
- research-articleJune 2018
Consensus halving is PPA-complete
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 51–64https://doi.org/10.1145/3188745.3188880We show that the computational problem Consensus Halving is PPA-Complete, the first PPA-Completeness result for a problem whose definition does not involve an explicit circuit. We also show that an approximate version of this problem is polynomial-time ...
- research-articleJune 2018
Simulation beats richness: new data-structure lower bounds
STOC 2018: Proceedings of the 50th Annual ACM SIGACT Symposium on Theory of ComputingPages 1013–1020https://doi.org/10.1145/3188745.3188874We develop a new technique for proving lower bounds in the setting of asymmetric communication, a model that was introduced in the famous works of Miltersen (STOC’94) and Miltersen, Nisan, Safra and Wigderson (STOC’95). At the core of our technique is ...