Proceedings of the Forty-Seventh Annual ACM Symposium on Theory of Computing 2015
DOI: 10.1145/2746539.2746596
|View full text |Cite
|
Sign up to set email alerts
|

Rectangles Are Nonnegative Juntas

Abstract: We develop a new method to prove communication lower bounds for composed functions of the form f • g n where f is any boolean function on n inputs and g is a sufficiently "hard" two-party gadget. Our main structure theorem states that each rectangle in the communication matrix of f • g n can be simulated by a nonnegative combination of juntas. This is the strongest yet formalization for the intuition that each low-communication randomized protocol can only "query" few inputs of f as encoded by the gadget g. Co… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
11
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
4
2
2

Relationship

1
7

Authors

Journals

citations
Cited by 24 publications
(11 citation statements)
references
References 51 publications
(65 reference statements)
0
11
0
Order By: Relevance
“…It has also been proven in [21] that MA = SBP, solving another open problem posed in the original version of this paper [22]. Thomas …”
Section: Subsequent Developmentsmentioning
confidence: 91%
See 1 more Smart Citation
“…It has also been proven in [21] that MA = SBP, solving another open problem posed in the original version of this paper [22]. Thomas …”
Section: Subsequent Developmentsmentioning
confidence: 91%
“…It has been proven in [21] that SBP( f ) ≤ O(USBP( f ) + log n) for all f (even partial f ) using a new and elementary "Truncation Lemma" which enables rectangle-based techniques to be applied to low nonnegative rank matrices in certain situations. Combining this result with Corollary 1.2 yields an alternative proof of Theorem 1.3 and shows the class equality SBP = USBP.…”
Section: Subsequent Developmentsmentioning
confidence: 99%
“…To the best of our knowledge, min-entropy has only been used very recently in communication complexity [27,28] though it has found numerous applications in pseudorandomness and cryptography for at least two decades [57]. Our work adds to the recently growing body of work that uses min-entropy to prove communication complexity results [17].…”
Section: Widths Of Ghds E Internal Node Width (H ) Of a Ghd Focuses mentioning
confidence: 93%
“…Taking into account that A can be (τ , δ )-bad, we have that A|B (A) = S is ϵ bad (S)-close to an (η, n(1 − η) − log(1/δ ))-block source. 27 . Here, the inequality follows from the fact that any marginal probability values are always at most their original joint probability values.…”
Section: H3 a Is A Good Enough Block Sourcementioning
confidence: 99%
“…This suggests that the "Laurent polynomial method" may prove to be useful even for problems involving ordinary polynomials. 1 There even exists an oracle relative to which SBP is not closed under intersection [7], and SBP's closure or non-closure under intersection in the unrelativized world remains an open problem.…”
Section: Introductionmentioning
confidence: 99%