The Log-Rank Conjecture for Read- k XOR Functions
نویسندگان
چکیده
The log-rank conjecture states that the deterministic communication complexity of a Boolean function g (denoted by D(g)) is polynomially related to the logarithm of the rank of the communication matrixMg whereMg is the communication matrix defined byMg(x, y) = g(x, y). An XOR function F : {0, 1} × {0, 1} → {0, 1} with respect to f : {0, 1} → {0, 1} is a function defined by F (x, y) = f(x⊕ y). It is well-known that ||f̂ ||0 = rank(MF ) where ||f̂ ||0 is the Fourier 0-norm of f , MF is the communication matrix defined by MF (x, y) = F (x, y), and rank(MF ) is the dimension of the row space of MF over reals. The log-rank conjecture for XOR functions is equivalent to the question whether the deterministic communication complexity of an XOR function F with respect to a function f is polynomially related to the logarithm of the Fourier sparsity of f , namely D(F ) = log(||f̂ ||0) for a fixed constant c. Previously, the logrank conjecture holds for XOR functions with respect to symmetric functions, linear threshold functions, monotone functions, AC functions, and constant-degree polynomials over F2. In this paper, we consider a special class of functions called read-k polynomials over F2. We study the communication complexity of the XOR function F with respect to a read-k polynomial f . We show that D(F ) = O(kd log(||f̂ ||1)) where d is the F2-degree of f . By the well-known bound that d ≤ log(||f̂ ||0), we conclude that D(F ) = O(k log(||f̂ ||0)). In particular, if k ≤ log(||f̂ ||0), then we have D(F ) = O(log(rank(MF ))).
منابع مشابه
Sensitivity Conjecture and Log-Rank Conjecture for Functions with Small Alternating Numbers
The Sensitivity Conjecture and the Log-rank Conjecture are among the most important and challenging problems in concrete complexity. Incidentally, the Sensitivity Conjecture is known to hold for monotone functions, and so is the Log-rank Conjecture for f(x∧y) and f(x⊕y) with monotone functions f , where ∧ and ⊕ are bit-wise AND and XOR, respectively. In this paper, we extend these results to fu...
متن کاملPolynomial representation, Fourier transform and complexity of Boolean functions
We study the Log-rank Conjecture for XOR functions and the Sensitivity Conjecture by exploiting structure of the Fourier transform and polynomial representations of Boolean functions. For the Log-rank Conjecture for XOR functions, we show that the it is true for functions with small spectral norm or low F2-degree. More precisely, we prove the following two bounds. 1. CC(f(x⊕ y)) = O(‖f̂‖1 · log ...
متن کاملEfficient quantum protocols for XOR functions
We show that for any Boolean function f : {0, 1} → {0, 1}, the bounded-error quantum communication complexity Q (f ◦ ⊕) of XOR functions f(x ⊕ y) satisfies that Q (f ◦ ⊕) = O ( 2 ( log ‖f̂‖1, + log n ) log(1/ ) ) , where d = deg2(f) is the F2-degree of f , and ‖f̂‖1, = ming:‖f−g‖∞≤ ‖ĝ‖1. This implies that the previous lower bound Q (f ◦ ⊕) = Ω(log ‖f̂‖1, ) by Lee and Shraibman [LS09] is tight for ...
متن کاملDual polynomials and communication complexity of XOR functions
We show a new duality between the polynomial margin complexity of f and the discrepancy of the function f ◦XOR, called an XOR function. Using this duality, we develop polynomial based techniques for understanding the bounded error (BPP) and the weakly-unbounded error (PP) communication complexities of XOR functions. This enables us to show the following. • A weak form of an interesting conjectu...
متن کاملDual polynomials and communication complexity of $\textsf{XOR}$ functions
We show a new duality between the polynomial margin complexity of f and the discrepancy of the function f ◦XOR, called an XOR function. Using this duality, we develop polynomial based techniques for understanding the bounded error (BPP) and the weakly-unbounded error (PP) communication complexities of XOR functions. This enables us to show the following. • A weak form of an interesting conjectu...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- J. Inf. Sci. Eng.
دوره 34 شماره
صفحات -
تاریخ انتشار 2018