2013 IEEE 54th Annual Symposium on Foundations of Computer Science 2013
DOI: 10.1109/focs.2013.77
|View full text |Cite
|
Sign up to set email alerts
|

A Tight Bound for Set Disjointness in the Message-Passing Model

Abstract: In a multiparty message-passing model of communication, there are k players. Each player has a private input, and they communicate by sending messages to one another over private channels. While this model has been used extensively in distributed computing and in multiparty computation, lower bounds on communication complexity in this model and related models have been somewhat scarce. In recent work [40,46,47], strong lower bounds of the form Ω(n · k) were obtained for several functions in the message-passing… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
59
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 53 publications
(62 citation statements)
references
References 41 publications
(70 reference statements)
3
59
0
Order By: Relevance
“…The reason this bound cannot be shown using existing techniques is that they either require proving a distributional communication lower bound [24], or they prove a lower bound on the information cost [6]. For the 2-player 2-NEQ problem of deciding whether two strings are not equal, for any distribution µ there is an upper bound of O(log 1/δ), where δ is the error probability over inputs drawn from µ [21].…”
Section: Our Resultsmentioning
confidence: 98%
See 1 more Smart Citation
“…The reason this bound cannot be shown using existing techniques is that they either require proving a distributional communication lower bound [24], or they prove a lower bound on the information cost [6]. For the 2-player 2-NEQ problem of deciding whether two strings are not equal, for any distribution µ there is an upper bound of O(log 1/δ), where δ is the error probability over inputs drawn from µ [21].…”
Section: Our Resultsmentioning
confidence: 98%
“…The communication is point-to-point, meaning that each pair of players has a private communication channel and messages sent between the two players are not seen by other players. This is also referred to as the message-passing model [12,24,25,27,6,18]. One of the main goals is to minimize the total number of bits exchanged between the players, i.e., the communication complexity of accomplishing this task.…”
Section: Introductionmentioning
confidence: 99%
“…One very successful approach for proving communication lower bounds against randomized protocols is the information complexity methodology [16,6,33,15,25,32,18,11,10,9,24]. In this approach one argues that the transcripts of correct protocols must necessarily "leak" information about the input; the amount of information leaked automatically lower bounds the communication.…”
Section: New Models Uam and Zammentioning
confidence: 99%
“…We notice that after the conference version of this paper, Braverman et al [8] and Huang et al [23] independently developed two new (and different) definitions for icost in the coordinator model, and used them to prove some tight lower bounds in the coordinator model.…”
Section: A Brief Comparison To the Icost Methodsmentioning
confidence: 99%
“…As will be discussed in Section 7.2, due to a limitation of the symmetrization technique, it cannot be used to prove a tight lower bound for the k-player disjointness problem. This was listed as an open problem in the conference version of this paper, and was later settled by Braverman et al [8], using a different technique based on information complexity. Recently Huang et al [23] applied symmetrization together with information complexity to prove tight lower bounds for approximate maximum matchings; Li et al [29] used the symmetrization technique to prove lower bounds for numerical linear algebra problems.…”
Section: Subsequent Workmentioning
confidence: 99%