Scribe: Thomas Vidick

نویسنده

  • Thomas Vidick
چکیده

In the past lecture we introduced 3-player variants of both the CHSH and Magic Square games. These have the property that, even though from the point of view of classical players the new games are exactly as hard as the 2-player variants (ω(CHSH2) = ω(CHSH3) and ω(MS2) = ω(MS3)), for quantum players the 3-player variants proved much more challenging: we showed ω∗(CHSH3) = ω(CHSH3) < ω∗(CHSH2) and ω(MS3) ≤ ω∗(MS3) < ω∗(MS2) = 1. The intuition behind the three-player variants is that they make it harder for the quantum players to coordinate. In particular, for the case of CHSH the second player, B, is not told if he is playing CHSH with A or with C: even if he shares EPR pairs with each one of them, which pair should he measure? In this lecture we show that a similar transformation applied to the clause-vs-variable game from our first lecture works, in the following sense. Recall that given any instance φ of a k-CSP on alphabet A we defined a game Gφ as follows: 2-player clause-vs-variable game Gφ. Given a constraint satisfaction problem φ = (C1, . . . , Cm) on n variables xi,

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

CS 286 . 2 Lecture 1 : The PCP theorem , hardness of approximation , and multiplayer games Scribe :

Our first formulation gives the theorem its name (PCP = Probabilistically Checkable Proof). It states that, provided that one is willing to settle for a probabilistic decision process that errs with small probability, all languages in NP have proofs that can be verified very efficiently: only a constant number of symbols of the proof need to be evaluated! To state this formally we first need th...

متن کامل

The Complexity of Entangled Games

The Complexity of Entangled Games

متن کامل

Comparing three proofs on the randomized communication complexity of Hamming distance

We compare the proofs by Chakrabarti and Regev (STOC 2011/SICOMP 2012), Sherstov (Theory of Computing 2012), and the commenter (Chicago J. Theor. Comp. Sci. 2012) of a linear lower bound on the randomized communication complexity of the gap Hamming distance problem. Concurrently with and independently of Sherstov’s work [2] published in Theory of Computing, the author of this comment obtained a...

متن کامل

The role of Baghdad scribe women in developing Islamic sciences and culture in the fourth era of the Abbasid Caliphate (448-656 AH)

Scribe women in the Abbasid era were active in various political, social, and cultural fields. Analyzing Iraq scribe women, specifically Baghdad, in the fourth era of the Abbasid caliphate (448-656 AH), the present study seeks to answer the question of what was their roles in cultural changes and the development of Islamic sciences and culture. This study has used a historical research method b...

متن کامل

Elementary Proofs of Grothendieck Theorems for Completely Bounded Norms

We provide alternative proofs of two recent Grothendieck theorems for jointly completely bounded bilinear forms, originally due to Pisier and Shlyakhtenko [PS02] and Haagerup and Musat [HM08]. Our proofs are elementary and are inspired by the so-called embezzlement states in quantum information theory. Moreover, our proofs lead to quantitative estimates.

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014