2016
DOI: 10.1137/15m103145x
|View full text |Cite
|
Sign up to set email alerts
|

Rectangles Are Nonnegative Juntas

Abstract: We develop a new method to prove communication lower bounds for composed functions of the form f • g n where f is any boolean function on n inputs and g is a sufficiently "hard" two-party gadget. Our main structure theorem states that each rectangle in the communication matrix of f • g n can be simulated by a nonnegative combination of juntas. This is a new formalization for the intuition that each low-communication randomized protocol can only "query" few inputs of f as encoded by the gadget g. Consequently, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
38
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
3
1

Relationship

3
4

Authors

Journals

citations
Cited by 39 publications
(38 citation statements)
references
References 54 publications
(91 reference statements)
0
38
0
Order By: Relevance
“…In fact, the separation of [8] already witnesses PostBPP cc UPostBPP cc where the latter is the unrestricted version of the former. By contrast, we prove that the distinction is immaterial for WAPP and SBP, even for partial functions: the unrestricted models UWAPP cc and USBP cc (see [16] for definitions) are essentially no more powerful than their restricted counterparts. Consequently, the Simulation Theorem can be applied to analyze these unrestricted models, too-but the equivalences are also interesting in their own right.…”
Section: Theorem 3 Sbp CC Is Not Closed Under Intersectionmentioning
confidence: 77%
See 2 more Smart Citations
“…In fact, the separation of [8] already witnesses PostBPP cc UPostBPP cc where the latter is the unrestricted version of the former. By contrast, we prove that the distinction is immaterial for WAPP and SBP, even for partial functions: the unrestricted models UWAPP cc and USBP cc (see [16] for definitions) are essentially no more powerful than their restricted counterparts. Consequently, the Simulation Theorem can be applied to analyze these unrestricted models, too-but the equivalences are also interesting in their own right.…”
Section: Theorem 3 Sbp CC Is Not Closed Under Intersectionmentioning
confidence: 77%
“…Our discussion in this extended abstract is somewhat informal; see the full version [16] for precise definitions.…”
Section: Communication Versus Query: Simulation Theoremmentioning
confidence: 99%
See 1 more Smart Citation
“…The simulation theorem asserts that the optimal protocol for f • g n is to simulate the decision tree that computes f if g is a hard function. Simulation theorems have been established in various cases, when g is bitwise AND or OR [15], Inner-Product [3], Index Function [13,4]. Our work gives a new simulation theorem when g is an XOR function.…”
Section: Related Workmentioning
confidence: 95%
“…After almost a decade of efforts, the conjecture has been established for several classes of XOR-function, such as symmetric functions [20], monotone functions and linear threshold functions [12], constant F 2 -degree functions [17]. A different line of work close to ours is the simulation theorem in [13,20,15,3,4]. They study the relationship between the (regular) decision tree complexity of function f and the communication complexity of f • g n where g is a 2-argument function of small size.…”
Section: Related Workmentioning
confidence: 99%