2016 IEEE 57th Annual Symposium on Foundations of Computer Science (FOCS) 2016
DOI: 10.1109/focs.2016.40
|View full text |Cite
|
Sign up to set email alerts
|

How Limited Interaction Hinders Real Communication (and What It Means for Proof and Circuit Complexity)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
12
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(12 citation statements)
references
References 37 publications
0
12
0
Order By: Relevance
“…Communication model References deterministic deterministic [28,14,10,17] nondeterministic nondeterministic [13,11] polynomial degree rank [35,34,29,31] conical junta degree nonnegative rank [13,22] Sherali-Adams LP extension complexity [9,22] sum-of-squares SDP extension complexity [24] The lower bound is tight up to the square root, since (1) can be adapted for composed functions to yield…”
Section: Query Modelmentioning
confidence: 99%
“…Communication model References deterministic deterministic [28,14,10,17] nondeterministic nondeterministic [13,11] polynomial degree rank [35,34,29,31] conical junta degree nonnegative rank [13,22] Sherali-Adams LP extension complexity [9,22] sum-of-squares SDP extension complexity [24] The lower bound is tight up to the square root, since (1) can be adapted for composed functions to yield…”
Section: Query Modelmentioning
confidence: 99%
“…We now utilize the real communication model introduced by Kraíček [1998] (see also de Rezende et al [2016]) in order to establish linear size lower bounds for neural networks. Consider a Boolean function f : {0, 1} d → {0, 1} whose input is split between two players, Alice and Bob.…”
Section: ω(D) Lower Bound For Exact Computationmentioning
confidence: 99%
“…A theorem of this type was conjectured by Beame, Huynh, and Pitassi [5, §6]. We also note that lifting theory for deterministic tree-like protocols-with applications to monotone formula size, tree-like refutation size, and size-space tradeoffs-has been developed in quite some detail [42,28,20,21,13,56,11]. We import techniques from this line of work into the DAG-like setting.…”
Section: Appetizermentioning
confidence: 99%
“…THEORY OF COMPUTING, Volume 16 (13), 2020, pp. 1-30 mKW search problem S f = input: a pair (x, y) ∈ f −1 (1) × f −1 (0) output: a coordinate i ∈ [n] such that x i > y i CNF search problem S F = input: an n-variable truth assignment z ∈ {0, 1} n output: clause D of F unsatisfied by z, i. e., D(z) = 0…”
Section: Dag-like Modelsmentioning
confidence: 99%
See 1 more Smart Citation