2006
DOI: 10.1007/11821069_13
|View full text |Cite
|
Sign up to set email alerts
|

The Multiparty Communication Complexity of Exact-T: Improved Bounds and New Problems

Abstract: Let x 1 , . . . , x k be n-bit numbers and T ∈ N. Assume that P 1 , . . . , P k are players such that P i knows all of the numbers except x i . The players want to determine if k j=1 x j = T by broadcasting as few bits as possible. Chandra, Furst, and Lipton obtained an upper bound of O( √ n) bits for the k = 3 case, and a lower bound of ω(1) for k ≥ 3 when T = Θ(2 n ). We obtain (1) for general k ≥ 3 an upper bound of k + O(n 1/(k−1) ), ( 2) for k = 3, T = Θ(2 n ), a lower bound of Ω(log log n), (3) a general… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
18
0

Year Published

2010
2010
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 9 publications
(19 citation statements)
references
References 20 publications
1
18
0
Order By: Relevance
“…(We believe that the latter is, in fact, super-polylogarithmic.) The best previously known deterministic lower bound for a function with efficient randomized NOF protocols is the Ω (log log n) lower bound given by Beigel, Gasarch, and Glenn [9] for the Exact-T function, which was originally investigated in [12] in the special case of k = 3 players. As a corollary, we also obtain the fact that the function families we define have Ω (log log n) private-coin randomized NOF communication complexity but only O (1) public-coin randomized NOF communication complexity.…”
Section: Introductionmentioning
confidence: 99%
“…(We believe that the latter is, in fact, super-polylogarithmic.) The best previously known deterministic lower bound for a function with efficient randomized NOF protocols is the Ω (log log n) lower bound given by Beigel, Gasarch, and Glenn [9] for the Exact-T function, which was originally investigated in [12] in the special case of k = 3 players. As a corollary, we also obtain the fact that the function families we define have Ω (log log n) private-coin randomized NOF communication complexity but only O (1) public-coin randomized NOF communication complexity.…”
Section: Introductionmentioning
confidence: 99%
“…an Ω(log log log n) lower bounds for the communication complexity of any two-dimensional permutation [1,6,4,8]. For higher-dimensional permutations the best lower bound is Ω(log * n) [8], but it is outside the scope of techniques discussed here.…”
Section: Previous Results a Closer Lookmentioning
confidence: 99%
“…Namely, a graph function always has a very simple type of protocol in which one of the players is oblivious and the others send only one bit. This protocol was also previously used for a specific graph function by Chandra, Furst and Lipton in [5] and for a more general family of permutations in [4].…”
Section: Introductionmentioning
confidence: 99%
“…Since then, the breadth and profoundness of this relation is better understood, see e.g. [20,5,7,1,16]. This note offers another strong bridge, showing that the Hales-Jewett theorem, a pillar of Ramsey theory, and related questions, are naturally formulated in this model of communication complexity.…”
Section: Discussion and Open Problemsmentioning
confidence: 99%
“…Proof The protocol uses a known reduction to the Exactly-n function, see e.g. [5,7]. Define Exactly n,k (x 1 , .…”
Section: Lemma 11mentioning
confidence: 99%