2012
DOI: 10.1137/10848232
|View full text |Cite
|
Sign up to set email alerts
|

Blackbox Identity Testing for Bounded Top-Fanin Depth-3 Circuits: The Field Doesn't Matter

Abstract: Let C be a depth-3 circuit with n variables, degree d and top fanin k (called ΣΠΣ (k, d, n)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

1
30
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
4
3
1

Relationship

3
5

Authors

Journals

citations
Cited by 41 publications
(31 citation statements)
references
References 33 publications
1
30
0
Order By: Relevance
“…The currently known blackbox PIT algorithms work only for further restricted depth-3 and depth-4 circuits. The case of bounded top fanin depth-3 circuits has received great attention and has blackbox PIT algorithms [15][16][17][18][19][20][21]. The analogous case for depth-4 circuits is open.…”
mentioning
confidence: 99%
“…The currently known blackbox PIT algorithms work only for further restricted depth-3 and depth-4 circuits. The case of bounded top fanin depth-3 circuits has received great attention and has blackbox PIT algorithms [15][16][17][18][19][20][21]. The analogous case for depth-4 circuits is open.…”
mentioning
confidence: 99%
“…Technically, it is a path of a subcircuit. A path consists of at most k nodes, so that rank of all the forms in the path is at most k+ rk(radsp(I)) Hence, it is a low-rank certificate for the nonzeroness of C. We would like to stress the importance of this theorem, especially since it is central to later improvements for depth-3 PIT [Saxena and Seshadhri 2011b]. THEOREM 4.6 (CERTIFICATE FOR A NONIDENTITY).…”
Section: Applying Chinese Remaindering To Circuitsmentioning
confidence: 99%
“…For depth-two formulae, several deterministic polynomial-time blackbox algorithms are known (Agrawal 2003;Arvind & Mukhopadhyay 2010;Ben-Or & Tiwari 1988;Bläser et al 2009;Klivans & Spielman 2001). For depth three, the state of the art is a deterministic polynomial-time blackbox algorithm when the fanin of the top gate is fixed to any constant (Saxena & Seshadhri 2012). The same is known for depth four when the formulae are multilinear, i.e., when every gate in the formula computes a polynomial of degree at most one in each variable (Saraf & Volkovich 2011).…”
Section: Is There An Efficient Deterministic Identity Test For Arithmmentioning
confidence: 99%