Communication and Computation

نویسنده

  • Ulrich Tamm
چکیده

In computer science, often computational problems can be transformed into communication problems. The most illustrative example is probably the evaluation of a function via a Boolean formula. The correspondence to an equivalent communication game is as follows. A Boolean formula computing the function value g(x1, . . . , xk) can be represented by a binary tree. The leaves are labeled with variables xi ∈ {0, 1} or their negations (the same variable may occur on several leaves). In each inner vertex the two incoming subtrees are combined either via an “and” (∧) gate or an “or” (∨) gate, i. e., in these inner nodes the results g1 and g2 obtained so far, are processed according to g1 ∧ g2 or g1 ∨ g2. The result g(x1, . . . , xk) will finally be found at the root of the tree. So a computation is carried out as a process starting at the leaves and ending at the root. The depth (minimal length of a path from a leaf to a root) of an optimal Boolean formula for the calculation of a function g is an important parameter in theoretical computer science. The equivalent communication game is as follows. Alice holds an input (x1, . . . , xk) with g(x1, . . . , xk) = 1 and Bob holds an input (y1, . . . , yk) with g(y1, . . . , yk) = 0. They exchange bits of information until they find a component i ∈ {1, . . . , k} in which xi = yi. The minimal number of communication bits exchanged by Alice and Bob maximized over all inputs is the communication complexity of this game. The communication protocol can be represented by a binary tree. In this tree the vertices are labeled with the person whose turn it is to send, further an edge to the left successor of a vertex corresponds to a bit 1 and an edge to the right successor correspond to a bit 0. A one–to– one correspondence to a Boolean formula now is obtained by assigning the ∨– gates to Alice and the ∧–gates to Bob (so it is the respective person’s turn to send in these vertices). Hence, we can use the same tree as for the Boolean formula with the difference that communication starts in the root and terminates in the leaves. For recent results on this model we refer to [4]. A similar communication model, based on a decision problem rather than a search problem, is introduced in the next section. Methods from data compression are used to derive lower bounds. Finally, the application to a computation problem will be discussed.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

Investigation to Reliability of Optical Communication Links using Auto-Track Subsystems in Presence of Different Beam Divergences

In this paper, we investigate the effects of auto-tracking subsystem together with different beam divergences on SNR, BER and stability of FSO communication links. For this purpose we compute the values of power, SNR and BER on receiver, based on analytic formula of Gaussian beam on receiver plane. In this computation the atmospheric effects including absorption, scattering and turbulence are c...

متن کامل

Implementation of Face Recognition Algorithm on Fields Programmable Gate Array Card

The evolution of today's application technologies requires a certain level of robustness, reliability and ease of integration. We choose the Fields Programmable Gate Array (FPGA) hardware description language to implement the facial recognition algorithm based on "Eigen faces" using Principal Component Analysis. In this paper, we first present an overview of the PCA used for facial recognition,...

متن کامل

Towards a measure of vulnerability, tenacity of a Graph

If we think of the graph as modeling a network, the vulnerability measure the resistance of the network to disruption of operation after the failure of certain stations or communication links. Many graph theoretical parameters have been used to describe the vulnerability of communication networks, including connectivity, integrity, toughness, binding number and tenacity.In this paper we discuss...

متن کامل

A novel vedic divider based crypto-hardware for nanocomputing paradigm: An extended perspective

Restoring and non-restoring divider has become widely applicability in the era of digital computing application due to its computation speed. In this paper, we have proposed the design of divider of different architecture for the computation of Vedic sutra based. The design of divider in the Vedic mode results in high computation throughput due to its replica architecture, where latency is mini...

متن کامل

A novel vedic divider based crypto-hardware for nanocomputing paradigm: An extended perspective

Restoring and non-restoring divider has become widely applicability in the era of digital computing application due to its computation speed. In this paper, we have proposed the design of divider of different architecture for the computation of Vedic sutra based. The design of divider in the Vedic mode results in high computation throughput due to its replica architecture, where latency is mini...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2003