Separation in Quantum and Randomized Query Complexity based on Cheat Sheet model
|
|
- Jane Goodman
- 7 years ago
- Views:
Transcription
1 Separation in Quantum and Randomized Query Complexity based on Cheat Sheet model Hardik Bansal Advisor : Prof. Rajat Mittal Abstract Recent result by Shalev [1] have shown super-quadratic separation between randomized and quantum query complexity, refuting the long standing conjecture that for any total function R(f) = O(Q(f) 2 ) by giving a function h such that R(h) = Ω(Q(h) 2 ). He converted a partial function, having best known separation between Q(f) and R(f), into a total function using cheat sheet model, defined in the paper, where a set of two functions f and g can be seen as parameter to the model. In this report we studied this model and tried to analyze and improve this separation by fixing the function f and calculate the bounds for some arbitrary function g. 1 Introduction It has always been an interesting question to explore the power and limits of quantum computing but no progress has been made in separating quantum and randomized query complexity of a total boolean function for more than a decade. Although we have better than exponential separation for a partial function, for total functions there is still a lower bound of Q(f) = Ω(R(f) 1/6 ) given by Beals et al. [2]. Till now best known separation for a total function was quadratic, for unstructured search problem [3], whose quantum query complexity Q(f) = θ( N) as compared to its randomized lower bound of R(f) = θ(n). In recent breakthroughs, various improved bounds and separations are proved depicting the power of quantum algorithms over classical ones. One of the results is super-quadratic(better than quadratic) separation between R(f) and Q(f) refuting the long standing conjecture that Q(f) = Ω(R(f) 1/2 ). In this paper, Shalev converted a partial function, introduced by Scott et al. in [4], with best known separation in R(f) and Q(f), into a total function using addressing scheme and cheat sheet technique. In this paper we will explore and analyze these techniques and try to see how we can improve this separation. Recent papers [5] [6] has also shown better separation between R 0 (f) and Q(f), R 0 (f) and D(f) and Q(f), where D(f) is deterministic query complexity and R 0 is query complexity for Las-Vegas algorithm. 1
2 2 Preliminaries 2 3 Boolean Function Boolean functions are one of the most studied functions in computer science. Input to a boolean function can be expressed as a string of bits and output is either 0 or 1. We can define Boolean function over n bits as follow: f : D {0, 1} n {0, 1} Function is total if D = {0, 1} n, i.e. it is defined for all input string over n bits. Similarly, a partial boolean function is a boolean function such that D {0, 1} n. Input for a partial function are said to satisfy a certain promise P. such that x D, iff, x satisfies promise P. 3.1 Deterministic Query Complexity A deterministic query complexity for a Boolean function f is defined by a decision tree T with internal nodes labelled by elements of [n] and every node has outgoing degree 2. Also the leaves are labelled with {0, 1}, which can be seen as the final answer. Answer to an input x is defined by T (x) by following the path from the root to a leaf, where we move from vertex u labelled n u by taking an outgoing edge corresponding to x nu. We do this until we reach a leaf and the label of the leaf is the final answer. We say tree T deterministically computes function f if x : T (x) = f(x). We define deterministic query complexity as follow: where D(T, x) is query required bt decision tree T over input x. 3.2 Randomized Query Complexity D(f) = min max D(T, x) (1) T computes f x Randomized query complexity is defined in a similar manner to Deterministic query complexity but instead of deterministic algorithm we have randomized algorithm with probability error of at most 1/3. This model is equivalent to consider a distribution D over all possible decision tree and success probability can be defined as Pr [T (x) = f(x)] should be greater than equal to 2/3. Since T D there is a distribution over decision we need to look at the concept of expected number of queries for an input x which is defined as E (Q(T, x)). So, in the similar manner as deterministic query T D complexity we can define Randomized query complexity of a function as follow: R(f) = D Pr T D min max [T (x)=f(x)]>=2/3[ x 3.3 Quantum Query Complexity Model [ E T D (Q(T, x))]] (2) Let us define quantum query complexity for a function f : {0, 1} n {0, 1}. In quantum query model, we are given input as an oracle say O x and in order to access some bit of the input we have to give input i b to the oracle and the output of the oracle is i b x i. Now, we can describe any algorithm with t queries to oracle as follow:
3 φ := U t O x U t 1 O x U 1 O x U 0 0 n (3) After this we measure the first qubit of output and the result obtained is the output of function. Query complexity of a function is defined as the minimum query complexity over all the algorithms computing function f Q(f) = min QC(A) (4) A computes f 4 Shalev s Approach 4.1 Forrelation and its importance In his paper [1], he converted a partial function to a total function and it makes sense to use Forrelation as the basis for partial function as it has best known separation for partial function and it might help us extend it to the total function case. Forrelation has Q(f) = O(1), while it has R(f) = Ω( n), giving it a better than exponential separation. It has also been conjectured by Scott in [4] that there exist another promise version of Forrelation that have Q(f) = O(1) and R(f) = O( n). Although he made use of Forrelation, structure of problem in itself is not important to get the separation. Any function with these bounds will be sufficient to get the result. 4.2 OR-AND Another function used in the construction is OR-AND, which is just OR composed with m-instances of AND over m bits. This function is critical to the result as it has certain unique properties. First, it has best possible separation for any total function. Second, its certificate complexity is small. We will see later why certificate complexity of this function is critical for the bound. This is one of the important factor why OR-AND was preferred over unstructured search when both have same separation in query complexity. 4.3 Forandlation Let us define a new function called Forandlation which is Forrelation composed with m OR-AND instances over m m bits each. Quantum query complexity of this function is O(1 m 2 ) = O(m) while the R(f) = Ω( m m 2 ) = Ω(m 2.5 ). Prove is quite straightforward which is just reduction of Forrelation into a Forandlation instance. This function is still partial and we need to make it total. But the main point here is why he used the OR-AND to make Forandlation function. Why not just use Forrelation? While defining cheat sheet we will see why Forandlation makes much more sense than just using Forrelation. 4.4 Cheat Sheet Model and Addressing Schema Here we see how he convert a partial function to a total function. One of the intuitive thing to think is make function output 0 for the cases where promise on the input is not satisfied. But how can we do that? Here, we can make use of a cheat sheet which is given as extra input and is used to check the promise. Suppose we want to make Forandlation a total function what we can do is define a new function in which input is divided in two parts say x = x 1 x 2, where x 1 is input for Forandlation and x 2 are extra m bits. Now these extra bits can be used to denote the output of 3
4 4 m OR-AND instances and check the promise directly by querying them. Also, for this we need to check whether the output of all OR-AND instances actually correspond to these extra m bits or not. But as you can notice, now we can just query m bits out of m 3 bits and make a partial function into total. So, now we can answer the question why not Forrelation. If we would have used the Forrelation function here total input will be O(m) and queries that we need to make to check promise are also O(m), which does not give any advantage over randomized algorithm. So, using Forandlation is makes more sense. But even this construction has problems. Problem is that now a randomized algorithm does not need to compute OR-AND instances and can just look at the second part of the input and directly calculate Forrelation over these m bits. In order overtake this problem we will make use of Addressing scheme as described below: Addressing scheme help us address the above issue by making it hard for a function to jump directly to a cheat sheet. For this we create a large enough array of cheat sheet, so that it is hard for any randomized algorithm to guess the required cheat sheet and solve the function directly. Also the index of required cheat sheet in array is made dependent on the output of Forandlation so that any randomized algorithm, now, have to calculate these instances to get to the required cheat sheet. Below we have given the formal definition of final function h. First, we will define the input of the function h as follow: 1. Input x has two parts x = x 1 x Where x 1 are 10log(m) instances of Forandlation on m 3 bits. 3. x 2 is called array of cheat sheet. This is where we make the function total by checking the promise. A cheat sheet y is made up of three parts y = y 1 y 2 y 3. y 1 can be seen as answers corresponding to all the answers of OR-AND instances(in our case O(m logm)) y 2 can be seen as certificate corresponding to all the answers of OR-AND instances. y 3 is a single bit Now let us define the function. First of all, the function needs to output zero if the promises on any of the instance of Forandlation is not satisfied. Suppose all the promises are satisfied then after solving the 10logm instance of Forandlation, we will get the required index for the cheat sheet array. Corresponding cheat sheet must certify that promises are satisfied for all Forandlation instances as defined earlier and all the answers corresponding to OR-AND written in cheat must also be true. If anything is false, we output 0. Otherwise, we output y Thoughts behind this conversion In the start we had a partial function named Forandlation with Q(f) = O(m). Now, we want to make it false for every input that is not satisfying the promise. For that we can add the answers corresponding to OR-AND instances as extra input but we need to add certificates to make sure these answers are indeed correct. These is exactly what he did but instead he made problem a little bit difficult for randomization by increasing the instances of Forandlation and using address scheme for cheat sheet with index corresponding to answers given by (logm) instances of Forandlation. He could have just added the cheat sheet at the end but he did not because then there is no point in solving the Forandlation.
5 4.5 Quantum Algorithm and Upper Bound First of all let us look at the quantum upper bound of Forandlation function. Since, it is Forrelation composed with m-instances of OR-AND, we can write Q(F A) = O(Q(F OR m ) Q(OA) m 2) = O(m) Quantum algorithm for function is straight forward as described below: Algorithm 1. Compute all Forandlation instances and obtain index for cheat sheet array. 2. Query all the bits in first part y 1 of the corresponding cheat sheet and check whether all the promises are satisfied or not as per the cheat sheet. 3. Verify that cheat sheet is indeed correct by applying grover search all the instances of OR-AND and verifying it via certificate in cheat sheet. Query Complexity Analysis: Quantum Algorithm is straight forward and it just the combination of Grover s search with the classical algorithm. First of all we will calculate the O(logm) instances of Forandlation in O(m logm) queries. After that we will check whether the cheat sheet corresponding to address we get from Forandlation instances is actually certifying the input part x 1 as valid or not. This will take O( log m m) = Õ(m). After that we need to check whether these answers are actually matching corresponding to x 1 we have. We can do it in O( m log m mlog m), where first m log m is correspond to number of OR-AND instances and other m correspond to size of certificate complexity. And this where the point comes of why we cannot use just the AND/OR function instead of OR-AND function. It is because C(f) = max{c 0 (f), C 1 (f)} = n for OR/AND function while it is n for OR-AND function. which in then reduces the check time. 4.6 Randomized Lower Bound for Forandlation We will first prove a lower bound on the Forandlation function using the reduction techniques, one of the major tool in theoretical computer science for proving lower bounds. He converted an instance of Forrelation into a hard Forandlation instance so that, if we can solve these instances in o(n 2.5 ) then Forrelation can be solved in o(n 0.5 ). Reduction: For this we can just take each input bit of Forrelation and convert it into an instance of OR-AND such that its answer is same as the input bit. Since, need to prove that if we can do Forandlation in o(n 2.5 ) then we can do Forrelation in o(n 0.5 ) queries. So, we must make this reduction in such a way so that in order to get answer to the OR-AND instance(which is equivalent to querying corresponding input bit), we need to make at least O(n 2 ) queries. This can be easily achieved by converting a bit into hard input distribution over OR-AND rather than just some fixed input. To do this we will make a n n matrix and for each column select a row at uniformly random and fill 0 in the corresponding entries and fill all the remaining matrix with 1. We now have a matrix with 1 zero in each column. Now, we will randomly select a column and replace the 0 bit in that column with bit b. Cleary, output of OR-AND will be b, as required. Now, he argued that in order to query b any randomized must query ω(n 2 ) other bits. Since, we are worried only about queries to b i we can say, if we can solve Forandlation in o(f(n)) queries then Forrelation can be solved in o(f(n)/n 2 ) queries giving a lower bound of Ω(n 2.5 ) for Forandlation. 5
6 4.7 Randomized Lower bound on Final Function It is intuitive to see that if we cannot solve one instances of Forandlation then it should be hard for us to solve a function which is dependent on O(logn) instances of it. But one thing that we should keep in mind is that addressing scheme might make this function easy for a randomized algorithm, which we need to prove is not true. In order to prove this one can take hard case input for the final function h and argue that if we can solve the function in o(r(f A)). One can say that if the input to all the Forandlation instances satisfies the promise, then, we have to query at least one bit of the corresponding cheat sheet from the array with very high probability if we want the algorithm to succeed. It can be said based on two nearly same input with different outputs. Assuming all the promise to all the instances are satisfied and for one input cheat sheet is just {0} while for other it is all 0 except for the corresponding cheat sheet which is also a correct cheat sheet for the input. Clearly, we can see these two inputs have opposite values and so if any randomized algorithm wants to correct answer with high probability must make at least one query from the corresponding cheat sheet with very high probability. This in then can be used to prove the above lower bound. 5 Our take on this approach Although this algorithm proved a super-quadratic separation between quantum query complexity and randomized query complexity, it does not take into account some important information that we think might me useful in improving this bound. First, and most important of it is the structure of Forrelation function, which can be used to make more concrete statement regarding the randomized lower bound. While proving lower bound Shalev just said that any randomized algorithm must query at least one query from the corresponding entry, which I think can be increased to some better, which might contribute to a better lower bound. For this project, we explored the possibilities over co-function(in his paper OR-AND) that might help in improving the separation. So, we fix the function Forrelation, which if we just ignore the structure is best to consider because of its best separation for any partial function. We explored what are the properties of the co-function that we need to improve the separation and based on it, maybe we could design some function satisfying these properties. 5.1 Upper Bound on Quantum Algorithm Let us denote Forrelation function as f and consider a new function g, which we will use in place of OR-AND function. Now we will follow the same construction as in Shalev s paper and see what we can say about the separation based on arbitrary function g. Consider a new function h : {0, 1} nn {0, 1} as f composed with n instances of g on m input bits each. Finally using the cheat sheet model and addressing scheme, we define a new function F. Quantum Algorithm: We need to look at three steps while calculating its quantum query complexity 1. Calculate all the O(logn) instances of h. 2. See whether all the promises are satisfied or not. 3. To check whether cheat-sheet is correct or not using the certificate structure. 6
7 7 Step 1 will take O(log(n)Q(f)Q(g)). Here we have Q(f) = O(1), therefore, Step 1 can be done in Õ(Q(g)). In step 2, we need to know about the structure of the promise to know how much query will be needed to determine whether promise is satisfied or not but since we are not considering the structure of the function f, we will just ignore it and say that we have to query all the bits. It will take another O(log(n) n ) queries. After that we need to check whether the cheat sheet is indeed correct by looking at the certificate structure in the cheat sheet. There are O(n logn) instances of function g and we need to check all these answers are indeed specified correctly in the cheat sheet. To do that we can do grover search over these instances and each check will take O( C(g)) queries using grover search to find any mismatch from the certificate. So in total O( n C(g)) queries will be needed to check the cheat sheet. All steps combined will give a upper bound of Õ(Q(g) + n + n C(g)) on quantum query complexity of function F. So, we have: 5.2 Randomized Lower Bound Q(F ) = Õ(Q(g) + n + n C(g)) (5) One of the part in proving randomized lower bound for function is to show that R(F ) = Ω(R(h)). This can be proved in the similar manner as in the paper. We can prove that there exist k such that array size is equal to n k such that R(F ) = Ω(R(h)). This will require klogn instances of function h which clearly will not increase the quantum query complexity. One thing that is still need to be proved is lower bound on the randomized query comeplexity of function h. 6 Future Work One of the dimension for the future work is that we can also take an arbitrary function in place of Forrelation and then look at the bounds. for e.g. we can use functions like Simon s problem in place of Forrelation and this will not affect the analysis. Most importantly, we can look at the structure of primary function(here Forrelation), which is not done in the paper [1]. It can be exploited to give a better bounds.
8 References 8 [1] Shalev Ben-David. A super-grover separation between randomized and quantum query complexities. arxiv preprint arxiv: , [2] Robert Beals, Harry Buhrman, Richard Cleve, Michele Mosca, and Ronald De Wolf. Quantum lower bounds by polynomials. Journal of the ACM (JACM), 48(4): , [3] Lov K Grover. A fast quantum mechanical algorithm for database search. In Proceedings of the twenty-eighth annual ACM symposium on Theory of computing, pages ACM, [4] Scott Aaronson and Andris Ambainis. Forrelation: a problem that optimally separates quantum from classical computing. arxiv preprint arxiv: , [5] Andris Ambainis, Kaspars Balodis, Aleksandrs Belovs, Troy Lee, Miklos Santha, and Juris Smotrovs. Separations in query complexity based on pointer functions. arxiv preprint arxiv: , [6] Sagnik Mukhopadhyay and Swagato Sanyal. Towards better separation between deterministic and randomized query complexity. arxiv preprint arxiv: , 2015.
Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range
THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis
More informationInfluences in low-degree polynomials
Influences in low-degree polynomials Artūrs Bačkurs December 12, 2012 1 Introduction In 3] it is conjectured that every bounded real polynomial has a highly influential variable The conjecture is known
More informationLecture 5 - CPA security, Pseudorandom functions
Lecture 5 - CPA security, Pseudorandom functions Boaz Barak October 2, 2007 Reading Pages 82 93 and 221 225 of KL (sections 3.5, 3.6.1, 3.6.2 and 6.5). See also Goldreich (Vol I) for proof of PRF construction.
More informationLecture 1: Course overview, circuits, and formulas
Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik
More informationComputing Relations in the Quantum Query Model 1
Scientific Papers, University of Latvia, 2011. Vol. 770 Computer Science and Information Technologies 68 89 P. Computing Relations in the Quantum Query Model 1 Alina Vasilieva, Taisia Mischenko-Slatenkova
More informationMathematical Induction
Mathematical Induction In logic, we often want to prove that every member of an infinite set has some feature. E.g., we would like to show: N 1 : is a number 1 : has the feature Φ ( x)(n 1 x! 1 x) How
More informationCSE 326, Data Structures. Sample Final Exam. Problem Max Points Score 1 14 (2x7) 2 18 (3x6) 3 4 4 7 5 9 6 16 7 8 8 4 9 8 10 4 Total 92.
Name: Email ID: CSE 326, Data Structures Section: Sample Final Exam Instructions: The exam is closed book, closed notes. Unless otherwise stated, N denotes the number of elements in the data structure
More informationLecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs
CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like
More informationCOMP 250 Fall 2012 lecture 2 binary representations Sept. 11, 2012
Binary numbers The reason humans represent numbers using decimal (the ten digits from 0,1,... 9) is that we have ten fingers. There is no other reason than that. There is nothing special otherwise about
More informationIntroduction to Algorithms March 10, 2004 Massachusetts Institute of Technology Professors Erik Demaine and Shafi Goldwasser Quiz 1.
Introduction to Algorithms March 10, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Quiz 1 Quiz 1 Do not open this quiz booklet until you are directed
More information8.1 Min Degree Spanning Tree
CS880: Approximations Algorithms Scribe: Siddharth Barman Lecturer: Shuchi Chawla Topic: Min Degree Spanning Tree Date: 02/15/07 In this lecture we give a local search based algorithm for the Min Degree
More informationLecture 3. Linear Programming. 3B1B Optimization Michaelmas 2015 A. Zisserman. Extreme solutions. Simplex method. Interior point method
Lecture 3 3B1B Optimization Michaelmas 2015 A. Zisserman Linear Programming Extreme solutions Simplex method Interior point method Integer programming and relaxation The Optimization Tree Linear Programming
More informationLecture 2: Universality
CS 710: Complexity Theory 1/21/2010 Lecture 2: Universality Instructor: Dieter van Melkebeek Scribe: Tyson Williams In this lecture, we introduce the notion of a universal machine, develop efficient universal
More informationP versus NP, and More
1 P versus NP, and More Great Ideas in Theoretical Computer Science Saarland University, Summer 2014 If you have tried to solve a crossword puzzle, you know that it is much harder to solve it than to verify
More information(67902) Topics in Theory and Complexity Nov 2, 2006. Lecture 7
(67902) Topics in Theory and Complexity Nov 2, 2006 Lecturer: Irit Dinur Lecture 7 Scribe: Rani Lekach 1 Lecture overview This Lecture consists of two parts In the first part we will refresh the definition
More informationOHJ-2306 Introduction to Theoretical Computer Science, Fall 2012 8.11.2012
276 The P vs. NP problem is a major unsolved problem in computer science It is one of the seven Millennium Prize Problems selected by the Clay Mathematics Institute to carry a $ 1,000,000 prize for the
More informationData Structures Fibonacci Heaps, Amortized Analysis
Chapter 4 Data Structures Fibonacci Heaps, Amortized Analysis Algorithm Theory WS 2012/13 Fabian Kuhn Fibonacci Heaps Lacy merge variant of binomial heaps: Do not merge trees as long as possible Structure:
More informationQuantum Computing Lecture 7. Quantum Factoring. Anuj Dawar
Quantum Computing Lecture 7 Quantum Factoring Anuj Dawar Quantum Factoring A polynomial time quantum algorithm for factoring numbers was published by Peter Shor in 1994. polynomial time here means that
More informationDiscuss the size of the instance for the minimum spanning tree problem.
3.1 Algorithm complexity The algorithms A, B are given. The former has complexity O(n 2 ), the latter O(2 n ), where n is the size of the instance. Let n A 0 be the size of the largest instance that can
More informationLecture 2: Complexity Theory Review and Interactive Proofs
600.641 Special Topics in Theoretical Cryptography January 23, 2007 Lecture 2: Complexity Theory Review and Interactive Proofs Instructor: Susan Hohenberger Scribe: Karyn Benson 1 Introduction to Cryptography
More informationThe Goldberg Rao Algorithm for the Maximum Flow Problem
The Goldberg Rao Algorithm for the Maximum Flow Problem COS 528 class notes October 18, 2006 Scribe: Dávid Papp Main idea: use of the blocking flow paradigm to achieve essentially O(min{m 2/3, n 1/2 }
More information1 The Line vs Point Test
6.875 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 5: Low Degree Testing Lecturer: Dana Moshkovitz Scribe: Gregory Minton and Dana Moshkovitz Having seen a probabilistic verifier for linearity
More information2.1 Complexity Classes
15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look
More informationDigital Signatures. What are Signature Schemes?
Digital Signatures Debdeep Mukhopadhyay IIT Kharagpur What are Signature Schemes? Provides message integrity in the public key setting Counter-parts of the message authentication schemes in the public
More informationVieta s Formulas and the Identity Theorem
Vieta s Formulas and the Identity Theorem This worksheet will work through the material from our class on 3/21/2013 with some examples that should help you with the homework The topic of our discussion
More informationLecture 13 - Basic Number Theory.
Lecture 13 - Basic Number Theory. Boaz Barak March 22, 2010 Divisibility and primes Unless mentioned otherwise throughout this lecture all numbers are non-negative integers. We say that A divides B, denoted
More informationv w is orthogonal to both v and w. the three vectors v, w and v w form a right-handed set of vectors.
3. Cross product Definition 3.1. Let v and w be two vectors in R 3. The cross product of v and w, denoted v w, is the vector defined as follows: the length of v w is the area of the parallelogram with
More informationFactoring by Quantum Computers
Factoring by Quantum Computers Ragesh Jaiswal University of California, San Diego A Quantum computer is a device that uses uantum phenomenon to perform a computation. A classical system follows a single
More informationCMPSCI611: Approximating MAX-CUT Lecture 20
CMPSCI611: Approximating MAX-CUT Lecture 20 For the next two lectures we ll be seeing examples of approximation algorithms for interesting NP-hard problems. Today we consider MAX-CUT, which we proved to
More information14.1 Rent-or-buy problem
CS787: Advanced Algorithms Lecture 14: Online algorithms We now shift focus to a different kind of algorithmic problem where we need to perform some optimization without knowing the input in advance. Algorithms
More informationSecond Order Linear Nonhomogeneous Differential Equations; Method of Undetermined Coefficients. y + p(t) y + q(t) y = g(t), g(t) 0.
Second Order Linear Nonhomogeneous Differential Equations; Method of Undetermined Coefficients We will now turn our attention to nonhomogeneous second order linear equations, equations with the standard
More informationLinear Programming Notes VII Sensitivity Analysis
Linear Programming Notes VII Sensitivity Analysis 1 Introduction When you use a mathematical model to describe reality you must make approximations. The world is more complicated than the kinds of optimization
More informationOnline Adwords Allocation
Online Adwords Allocation Shoshana Neuburger May 6, 2009 1 Overview Many search engines auction the advertising space alongside search results. When Google interviewed Amin Saberi in 2004, their advertisement
More informationMATH10212 Linear Algebra. Systems of Linear Equations. Definition. An n-dimensional vector is a row or a column of n numbers (or letters): a 1.
MATH10212 Linear Algebra Textbook: D. Poole, Linear Algebra: A Modern Introduction. Thompson, 2006. ISBN 0-534-40596-7. Systems of Linear Equations Definition. An n-dimensional vector is a row or a column
More informationFaster deterministic integer factorisation
David Harvey (joint work with Edgar Costa, NYU) University of New South Wales 25th October 2011 The obvious mathematical breakthrough would be the development of an easy way to factor large prime numbers
More informationIntroduction to Learning & Decision Trees
Artificial Intelligence: Representation and Problem Solving 5-38 April 0, 2007 Introduction to Learning & Decision Trees Learning and Decision Trees to learning What is learning? - more than just memorizing
More informationDiagonalization. Ahto Buldas. Lecture 3 of Complexity Theory October 8, 2009. Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach.
Diagonalization Slides based on S.Aurora, B.Barak. Complexity Theory: A Modern Approach. Ahto Buldas Ahto.Buldas@ut.ee Background One basic goal in complexity theory is to separate interesting complexity
More information6.3 Conditional Probability and Independence
222 CHAPTER 6. PROBABILITY 6.3 Conditional Probability and Independence Conditional Probability Two cubical dice each have a triangle painted on one side, a circle painted on two sides and a square painted
More informationLecture 3: Finding integer solutions to systems of linear equations
Lecture 3: Finding integer solutions to systems of linear equations Algorithmic Number Theory (Fall 2014) Rutgers University Swastik Kopparty Scribe: Abhishek Bhrushundi 1 Overview The goal of this lecture
More informationApproximation Algorithms
Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms
More informationOffline 1-Minesweeper is NP-complete
Offline 1-Minesweeper is NP-complete James D. Fix Brandon McPhail May 24 Abstract We use Minesweeper to illustrate NP-completeness proofs, arguments that establish the hardness of solving certain problems.
More informationIn mathematics, it is often important to get a handle on the error term of an approximation. For instance, people will write
Big O notation (with a capital letter O, not a zero), also called Landau's symbol, is a symbolism used in complexity theory, computer science, and mathematics to describe the asymptotic behavior of functions.
More informationNetwork File Storage with Graceful Performance Degradation
Network File Storage with Graceful Performance Degradation ANXIAO (ANDREW) JIANG California Institute of Technology and JEHOSHUA BRUCK California Institute of Technology A file storage scheme is proposed
More informationLecture 10: CPA Encryption, MACs, Hash Functions. 2 Recap of last lecture - PRGs for one time pads
CS 7880 Graduate Cryptography October 15, 2015 Lecture 10: CPA Encryption, MACs, Hash Functions Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Chosen plaintext attack model of security MACs
More information1 Domain Extension for MACs
CS 127/CSCI E-127: Introduction to Cryptography Prof. Salil Vadhan Fall 2013 Reading. Lecture Notes 17: MAC Domain Extension & Digital Signatures Katz-Lindell Ÿ4.34.4 (2nd ed) and Ÿ12.0-12.3 (1st ed).
More information6.080/6.089 GITCS Feb 12, 2008. Lecture 3
6.8/6.89 GITCS Feb 2, 28 Lecturer: Scott Aaronson Lecture 3 Scribe: Adam Rogal Administrivia. Scribe notes The purpose of scribe notes is to transcribe our lectures. Although I have formal notes of my
More information1 Problem Statement. 2 Overview
Lecture Notes on an FPRAS for Network Unreliability. Eric Vigoda Georgia Institute of Technology Last updated for 7530 - Randomized Algorithms, Spring 200. In this lecture, we will consider the problem
More informationDynamic Programming. Lecture 11. 11.1 Overview. 11.2 Introduction
Lecture 11 Dynamic Programming 11.1 Overview Dynamic Programming is a powerful technique that allows one to solve many different types of problems in time O(n 2 ) or O(n 3 ) for which a naive approach
More informationOpen Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary
Open Problems in Quantum Information Processing John Watrous Department of Computer Science University of Calgary #1 Open Problem Find new quantum algorithms. Existing algorithms: Shor s Algorithm (+ extensions)
More informationQuantum Computability and Complexity and the Limits of Quantum Computation
Quantum Computability and Complexity and the Limits of Quantum Computation Eric Benjamin, Kenny Huang, Amir Kamil, Jimmy Kittiyachavalit University of California, Berkeley December 7, 2003 This paper will
More informationOn the Unique Games Conjecture
On the Unique Games Conjecture Antonios Angelakis National Technical University of Athens June 16, 2015 Antonios Angelakis (NTUA) Theory of Computation June 16, 2015 1 / 20 Overview 1 Introduction 2 Preliminary
More informationECON 459 Game Theory. Lecture Notes Auctions. Luca Anderlini Spring 2015
ECON 459 Game Theory Lecture Notes Auctions Luca Anderlini Spring 2015 These notes have been used before. If you can still spot any errors or have any suggestions for improvement, please let me know. 1
More informationChapter 6 Quantum Computing Based Software Testing Strategy (QCSTS)
Chapter 6 Quantum Computing Based Software Testing Strategy (QCSTS) 6.1 Introduction Software testing is a dual purpose process that reveals defects and is used to evaluate quality attributes of the software,
More information1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)
Some N P problems Computer scientists have studied many N P problems, that is, problems that can be solved nondeterministically in polynomial time. Traditionally complexity question are studied as languages:
More informationHash-based Digital Signature Schemes
Hash-based Digital Signature Schemes Johannes Buchmann Erik Dahmen Michael Szydlo October 29, 2008 Contents 1 Introduction 2 2 Hash based one-time signature schemes 3 2.1 Lamport Diffie one-time signature
More informationRow Echelon Form and Reduced Row Echelon Form
These notes closely follow the presentation of the material given in David C Lay s textbook Linear Algebra and its Applications (3rd edition) These notes are intended primarily for in-class presentation
More informationVictor Shoup Avi Rubin. fshoup,rubing@bellcore.com. Abstract
Session Key Distribution Using Smart Cards Victor Shoup Avi Rubin Bellcore, 445 South St., Morristown, NJ 07960 fshoup,rubing@bellcore.com Abstract In this paper, we investigate a method by which smart
More informationAnalysis of Algorithms, I
Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications
More information1 Error in Euler s Method
1 Error in Euler s Method Experience with Euler s 1 method raises some interesting questions about numerical approximations for the solutions of differential equations. 1. What determines the amount of
More informationIntroduction to computer science
Introduction to computer science Michael A. Nielsen University of Queensland Goals: 1. Introduce the notion of the computational complexity of a problem, and define the major computational complexity classes.
More information8 Primes and Modular Arithmetic
8 Primes and Modular Arithmetic 8.1 Primes and Factors Over two millennia ago already, people all over the world were considering the properties of numbers. One of the simplest concepts is prime numbers.
More informationEfficient Data Structures for Decision Diagrams
Artificial Intelligence Laboratory Efficient Data Structures for Decision Diagrams Master Thesis Nacereddine Ouaret Professor: Supervisors: Boi Faltings Thomas Léauté Radoslaw Szymanek Contents Introduction...
More informationALGEBRA. sequence, term, nth term, consecutive, rule, relationship, generate, predict, continue increase, decrease finite, infinite
ALGEBRA Pupils should be taught to: Generate and describe sequences As outcomes, Year 7 pupils should, for example: Use, read and write, spelling correctly: sequence, term, nth term, consecutive, rule,
More informationGuessing Game: NP-Complete?
Guessing Game: NP-Complete? 1. LONGEST-PATH: Given a graph G = (V, E), does there exists a simple path of length at least k edges? YES 2. SHORTEST-PATH: Given a graph G = (V, E), does there exists a simple
More information11 Multivariate Polynomials
CS 487: Intro. to Symbolic Computation Winter 2009: M. Giesbrecht Script 11 Page 1 (These lecture notes were prepared and presented by Dan Roche.) 11 Multivariate Polynomials References: MC: Section 16.6
More informationNotes 11: List Decoding Folded Reed-Solomon Codes
Introduction to Coding Theory CMU: Spring 2010 Notes 11: List Decoding Folded Reed-Solomon Codes April 2010 Lecturer: Venkatesan Guruswami Scribe: Venkatesan Guruswami At the end of the previous notes,
More informationLecture 22: November 10
CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny
More informationSequential Data Structures
Sequential Data Structures In this lecture we introduce the basic data structures for storing sequences of objects. These data structures are based on arrays and linked lists, which you met in first year
More informationSolution to Homework 2
Solution to Homework 2 Olena Bormashenko September 23, 2011 Section 1.4: 1(a)(b)(i)(k), 4, 5, 14; Section 1.5: 1(a)(b)(c)(d)(e)(n), 2(a)(c), 13, 16, 17, 18, 27 Section 1.4 1. Compute the following, if
More informationBits Superposition Quantum Parallelism
7-Qubit Quantum Computer Typical Ion Oscillations in a Trap Bits Qubits vs Each qubit can represent both a or at the same time! This phenomenon is known as Superposition. It leads to Quantum Parallelism
More information5.1 Bipartite Matching
CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson
More informationBinary Adders: Half Adders and Full Adders
Binary Adders: Half Adders and Full Adders In this set of slides, we present the two basic types of adders: 1. Half adders, and 2. Full adders. Each type of adder functions to add two binary bits. In order
More informationComputer Algorithms. NP-Complete Problems. CISC 4080 Yanjun Li
Computer Algorithms NP-Complete Problems NP-completeness The quest for efficient algorithms is about finding clever ways to bypass the process of exhaustive search, using clues from the input in order
More informationChapter 1. NP Completeness I. 1.1. Introduction. By Sariel Har-Peled, December 30, 2014 1 Version: 1.05
Chapter 1 NP Completeness I By Sariel Har-Peled, December 30, 2014 1 Version: 1.05 "Then you must begin a reading program immediately so that you man understand the crises of our age," Ignatius said solemnly.
More informationQuantum Machine Learning Algorithms: Read the Fine Print
Quantum Machine Learning Algorithms: Read the Fine Print Scott Aaronson For twenty years, quantum computing has been catnip to science journalists. Not only would a quantum computer harness the notorious
More informationFormal Languages and Automata Theory - Regular Expressions and Finite Automata -
Formal Languages and Automata Theory - Regular Expressions and Finite Automata - Samarjit Chakraborty Computer Engineering and Networks Laboratory Swiss Federal Institute of Technology (ETH) Zürich March
More informationOptimization Modeling for Mining Engineers
Optimization Modeling for Mining Engineers Alexandra M. Newman Division of Economics and Business Slide 1 Colorado School of Mines Seminar Outline Linear Programming Integer Linear Programming Slide 2
More information6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008
MIT OpenCourseWare http://ocw.mit.edu 6.080 / 6.089 Great Ideas in Theoretical Computer Science Spring 2008 For information about citing these materials or our Terms of Use, visit: http://ocw.mit.edu/terms.
More informationProblem Set 7 Solutions
8 8 Introduction to Algorithms May 7, 2004 Massachusetts Institute of Technology 6.046J/18.410J Professors Erik Demaine and Shafi Goldwasser Handout 25 Problem Set 7 Solutions This problem set is due in
More informationComplexity Theory. Jörg Kreiker. Summer term 2010. Chair for Theoretical Computer Science Prof. Esparza TU München
Complexity Theory Jörg Kreiker Chair for Theoretical Computer Science Prof. Esparza TU München Summer term 2010 Lecture 8 PSPACE 3 Intro Agenda Wrap-up Ladner proof and time vs. space succinctness QBF
More informationONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN. Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015
ONLINE DEGREE-BOUNDED STEINER NETWORK DESIGN Sina Dehghani Saeed Seddighin Ali Shafahi Fall 2015 ONLINE STEINER FOREST PROBLEM An initially given graph G. s 1 s 2 A sequence of demands (s i, t i ) arriving
More informationIntroduction to Algorithms. Part 3: P, NP Hard Problems
Introduction to Algorithms Part 3: P, NP Hard Problems 1) Polynomial Time: P and NP 2) NP-Completeness 3) Dealing with Hard Problems 4) Lower Bounds 5) Books c Wayne Goddard, Clemson University, 2004 Chapter
More informationGRAPH THEORY LECTURE 4: TREES
GRAPH THEORY LECTURE 4: TREES Abstract. 3.1 presents some standard characterizations and properties of trees. 3.2 presents several different types of trees. 3.7 develops a counting method based on a bijection
More informationEnumerating possible Sudoku grids
Enumerating possible Sudoku grids Bertram Felgenhauer Department of Computer Science TU Dresden 00 Dresden Germany bf@mail.inf.tu-dresden.de Frazer Jarvis Department of Pure Mathematics University of Sheffield,
More information6.852: Distributed Algorithms Fall, 2009. Class 2
.8: Distributed Algorithms Fall, 009 Class Today s plan Leader election in a synchronous ring: Lower bound for comparison-based algorithms. Basic computation in general synchronous networks: Leader election
More informationIMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE OPERATORS
Volume 2, No. 3, March 2011 Journal of Global Research in Computer Science RESEARCH PAPER Available Online at www.jgrcs.info IMPROVING PERFORMANCE OF RANDOMIZED SIGNATURE SORT USING HASHING AND BITWISE
More information3 Some Integer Functions
3 Some Integer Functions A Pair of Fundamental Integer Functions The integer function that is the heart of this section is the modulo function. However, before getting to it, let us look at some very simple
More informationCS/COE 1501 http://cs.pitt.edu/~bill/1501/
CS/COE 1501 http://cs.pitt.edu/~bill/1501/ Lecture 01 Course Introduction Meta-notes These notes are intended for use by students in CS1501 at the University of Pittsburgh. They are provided free of charge
More informationNP-Completeness and Cook s Theorem
NP-Completeness and Cook s Theorem Lecture notes for COM3412 Logic and Computation 15th January 2002 1 NP decision problems The decision problem D L for a formal language L Σ is the computational task:
More informationOperations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras
Operations and Supply Chain Management Prof. G. Srinivasan Department of Management Studies Indian Institute of Technology Madras Lecture - 41 Value of Information In this lecture, we look at the Value
More informationOracle Turing machines faced with the verification problem
Oracle Turing machines faced with the verification problem 1 Introduction Alan Turing is widely known in logic and computer science to have devised the computing model today named Turing machine. In computer
More informationLecture Notes on Binary Search Trees
Lecture Notes on Binary Search Trees 15-122: Principles of Imperative Computation Frank Pfenning André Platzer Lecture 17 October 23, 2014 1 Introduction In this lecture, we will continue considering associative
More informationWRITING PROOFS. Christopher Heil Georgia Institute of Technology
WRITING PROOFS Christopher Heil Georgia Institute of Technology A theorem is just a statement of fact A proof of the theorem is a logical explanation of why the theorem is true Many theorems have this
More informationrecursion, O(n), linked lists 6/14
recursion, O(n), linked lists 6/14 recursion reducing the amount of data to process and processing a smaller amount of data example: process one item in a list, recursively process the rest of the list
More informationLecture Notes on Binary Search Trees
Lecture Notes on Binary Search Trees 15-122: Principles of Imperative Computation Frank Pfenning Lecture 17 March 17, 2010 1 Introduction In the previous two lectures we have seen how to exploit the structure
More informationBinary Search Trees. A Generic Tree. Binary Trees. Nodes in a binary search tree ( B-S-T) are of the form. P parent. Key. Satellite data L R
Binary Search Trees A Generic Tree Nodes in a binary search tree ( B-S-T) are of the form P parent Key A Satellite data L R B C D E F G H I J The B-S-T has a root node which is the only node whose parent
More informationLab 11. Simulations. The Concept
Lab 11 Simulations In this lab you ll learn how to create simulations to provide approximate answers to probability questions. We ll make use of a particular kind of structure, called a box model, that
More informationCMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma
CMSC 858T: Randomized Algorithms Spring 2003 Handout 8: The Local Lemma Please Note: The references at the end are given for extra reading if you are interested in exploring these ideas further. You are
More informationLecture 11: The Goldreich-Levin Theorem
COM S 687 Introduction to Cryptography September 28, 2006 Lecture 11: The Goldreich-Levin Theorem Instructor: Rafael Pass Scribe: Krishnaprasad Vikram Hard-Core Bits Definition: A predicate b : {0, 1}
More information7 Gaussian Elimination and LU Factorization
7 Gaussian Elimination and LU Factorization In this final section on matrix factorization methods for solving Ax = b we want to take a closer look at Gaussian elimination (probably the best known method
More information