On the Communication Complexity of Solving a Polynomial Equation
نویسندگان
چکیده
We consider the problem of evaluating a function f(x, y) (x E sm, y E Rn) using two processors P1 and P2, assuming that processor P1 (respectively, P2) has access to input z (respectively, y) and the functional form of f. We establish a new general lower bound on the communication complexity (i.e., the minimum number of real-valued messages that have to be exchanged). We then apply our result to the case where f(z, y) is defined as a root z of a polynomial equation Ad1(xi + yi)zi = 0 and obtain a lower bound of n. This is in contrast to the 2q(1) lower bound obtained by applying earlier results of Abelson. 'Research supported by the ONR under contract N00014-84-K-0519 (NR 649-003) and the ARO under contract DAAL03-86-K-0171. 2Operations Research Center and Laboratory for Information and Decision Systems, MIT, Cambridge, Mass. 02139.
منابع مشابه
Extension of Cube Attack with Probabilistic Equations and its Application on Cryptanalysis of KATAN Cipher
Cube Attack is a successful case of Algebraic Attack. Cube Attack consists of two phases, linear equation extraction and solving the extracted equation system. Due to the high complexity of equation extraction phase in finding linear equations, we can extract nonlinear ones that could be approximated to linear equations with high probability. The probabilistic equations could be considered as l...
متن کاملAdomian Polynomial and Elzaki Transform Method of Solving Fifth Order Korteweg-De Vries Equation
Elzaki transform and Adomian polynomial is used to obtain the exact solutions of nonlinear fifth order Korteweg-de Vries (KdV) equations. In order to investigate the effectiveness of the method, three fifth order KdV equations were considered. Adomian polynomial is introduced as an essential tool to linearize all the nonlinear terms in any given equation because Elzaki transform cannot handle n...
متن کاملAn infeasible interior-point method for the $P*$-matrix linear complementarity problem based on a trigonometric kernel function with full-Newton step
An infeasible interior-point algorithm for solving the$P_*$-matrix linear complementarity problem based on a kernelfunction with trigonometric barrier term is analyzed. Each (main)iteration of the algorithm consists of a feasibility step andseveral centrality steps, whose feasibility step is induced by atrigonometric kernel function. The complexity result coincides withthe best result for infea...
متن کاملSolving Single Phase Fluid Flow Instability Equations Using Chebyshev Tau- QZ Polynomial
In this article the instability of single phase flow in a circular pipe from laminar to turbulence regime has been investigated. To this end, after finding boundary conditions and equation related to instability of flow in cylindrical coordination system, which is called eigenvalue Orr Sommerfeld equation, the solution method for these equation has been investigated. In this article Chebyshev p...
متن کاملA Numerical Approach for Solving of Two-Dimensional Linear Fredholm Integral Equations with Boubaker Polynomial Bases
In this paper, a new collocation method, which is based on Boubaker polynomials, is introduced for the approximate solutions of a class of two-dimensional linear Fredholm integral equationsof the second kind. The properties of two-dimensional Boubaker functions are presented. The fundamental matrices of integration with the collocation points are utilized to reduce the solution of the integral ...
متن کاملNumerical solution of the spread of infectious diseases mathematical model based on shifted Bernstein polynomials
The Volterra delay integral equations have numerous applications in various branches of science, including biology, ecology, physics and modeling of engineering and natural sciences. In many cases, it is difficult to obtain analytical solutions of these equations. So, numerical methods as an efficient approximation method for solving Volterra delay integral equations are of interest to many res...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- SIAM J. Comput.
دوره 20 شماره
صفحات -
تاریخ انتشار 1991