On the Saks-Wigderson Conjecture NingNing Peng Mathematical Institute, Tohoku University

Abstract We investigate the deterministic and the randomized decision tree complexities for Boolean function f , denoted D(f ) and R(f ), respectively. The cost of an algorithm for computing f is measured by the number of input variables read to determine the value of f for the worst case. Thus, D(f ) is the minimum (by the best deterministic algorithm) of the maximal costs (over the probability distributions for inputs) for computing f . So, for a read-once function f , D(f ) = n, where n is the number of input variables. On the other hand, R(f ) is the maximum average cost by the best randomized algorithm for computing f . Clearly, n ≤ R(f ) ≤ D(f ) for every Boolean function f . A major open question is how small R(f ) can be with respect to D(f ). It is well known that R(f ) ≥ D(f )0.5 for every Boolean function f . In 1991, Heiman and Wigderson [1] show that R(f ) ≥ D(f )0.51 . Some Boolean function f is know to have R(f ) = Θ(n0.753 ). The well-know Saks-Wigderson [2] Conjecture is the statement that for any Boolean function f , R(f ) = Ω(n0.753 ) where n is the number of inputs. Liu and Tanaka [3] made some important contributions to this problem. We survey their results and related works.

References [1] Rafi Heiman and Avi Wigderson. Randomized vs. deterministic decision tree complexity for read-once Boolean functions. Comput complexity 1 (1991) 311-329. [2] Michael saks and Avi Wigderson. Probabilistic Boolean decision trees and the complexity of Evaluating Game trees. In Proc. 27th IEEE Symp. On Foundations of Computer Science, (1986) 29-38. [3] ChenGuang Liu and Kazuyuki Tanaka. Eigen-distribution on random assignments for game trees. Information Processing Letters 104 (2007) 73-77.

Email address: [email protected] (NingNing Peng)

May 1, 2012

On the Saks-Wigderson Conjecture

May 1, 2012 - We investigate the deterministic and the randomized decision tree complexities for Boolean function f, denoted D(f) and R(f), respectively.

105KB Sizes 2 Downloads 204 Views

Recommend Documents

A Comment on the Hadamard Conjecture
binary error correcting block codes and sets of mutually orthogonal F- squares. Except in the case of F-squares, the ratio between the lower bound given by ...

On Ramsey's conjecture: efficient allocations in the ... - Science Direct
www.elsevier.com/locate/jet. On Ramsey's conjecture: efficient allocations in the neoclassical growth model with private information. Emilio Espino. ∗. Department of Economics and Finance, Institute for Advanced Studies (IHS), Sumpergasse 56,. A-10

On Forster's Conjecture and Related Results
C[X1,X2,X3]/p has a singularity at the origin. ...... En(A). ∼ (a1 + λ2a2 + ททท + λnan,a2,...,an). Theorem 2.1.6 Let A be a ring and [b1,b2,...,bn] ∈ An be a ...

The Collatz Conjecture
In all other cases, the T-orbit of x is said to be divergent. REMARK. The Collatz Conjecture is equivalent to the statement that the orbits of all positive integers under T are convergent. 4. Conjugacy. Now that we have defined some of the basic term

On Forster's Conjecture and Related Results
However, if A = k[X1,...,Xn] and p ⊂ A is a prime ideal such that A/p is regular, then Forster (cf. [9]) proved that p is generated by n+1 elements. He conjectured that p is generated by n elements. The conjecture of Forster was settled by Sathaye

On a Conjecture of Butler and Graham
where x ∈ [k]kmr, y ∈ [k]t, and z ∈ [k]a. Furthermore, we index x by a pair (i, j) ∈ Zm k × [r],. i.e. xi,j ∈ [k] are the coordinates of x (where i ∈ Zm k ,j ∈ [r])3. For a point (x, y, z) ∈ [k]n and i ∈ Zm k ,j ∈ [r], denote by

Explorations of the Collatz Conjecture - CiteSeerX
have all gone above and beyond the call of duty. You have .... parity vector of x. We will call this the partial parity vector of length n. For ... trajectories merge.

Explorations of the Collatz Conjecture - CiteSeerX
are a truly fantastic group of friends and I am blessed to have you. .... The total stopping time σ∞(x) of a positive integer x is defined to be the num-.

The LU-LC Conjecture is FALSE - ICTS
(−1). Q(x). = n. ∏ j=1 c xj j. , then all cj's can be chosen from {±1,±i}. s. Q(x) = x1 x2 + x1 x4 + x1 x5 + x3 x4 + x4 x5 + x4 . s. Fix Q(x),S: A system of equations in cj.

The Teitelbaum conjecture in the indefinite setting
We call M≤h (resp. M>h) the slope ≤ h (resp. slope > h) part. It is clear that ...... its L-invariant is LD = LN− . Its base change to K is built from the K-vector space ...

A Survey of the Multiplier Conjecture
Nov 19, 2015 - We review the current status of the multiplier conjecture for dif- ference sets, present some new results on it, and determine the open cases of the conjecture for abelian groups of order < 106. It turns out that for Paley parameters (

The Section Conjecture for Graphs and Conical Curves
none at all, and yet have a trivial Brauer group. In particular, the .... which we shall call the Grothendieck exact sequence associated with (Π,Γ). Now suppose ...

Homology of GLn: injectivity conjecture for GL4
Jul 24, 2007 - Abstract The homology of GLn(R)and SLn(R)is studied, where R is a ... Our main theorem states that the natural map H4(GL3(R), k)→.

Network Externalities and the Coase Conjecture - Semantic Scholar
Nov 11, 1998 - a broad class of network bene t functions those that are increasing over some range of the network size , the ... function is used; section 3 deals with speci c examples. Section 4 ..... School of Business, N.Y.U.. Economides, N.

CONJUGACY AND THE 3x + 1 CONJECTURE 1 ...
The conjecture states that for every positive integer x, there exists a positive integer k such that Tk(x) = 1 where Tk is the k-fold composition of T with itself.

The LU-LC Conjecture is FALSE
Joint work with Jianxin Chen, Zhaohui Wei and Mingsheng Ying. †. State Key Laboratory of Computer Science, Institute of Software, Chinese Academy of ...

The Unique Games Conjecture and some of its ...
Unique Games conjecture allows us to design a 2-bit test. 3.3 The Raz Verifier's ...... to approximate within factor (k −3−epsilon). Electronic Colloquium on ...

Millennium Prize for the Poincaré Conjecture
Mar 18, 2010 - The program will be posted on www.claymath.org. ... Conjecture, noted: "Poincaré altered twentieth-century mathematics by teaching us how to .... wide class of shapes (Haken manifolds) that have a sufficient degree of complexity. ...

generalized volume conjecture and the a-polynomials
Mar 3, 2007 - in Appendix. The last section is devoted to conclusions and discussions. 2. QUANTUM DILOGARITHM FUNCTION. We define a function Φγ(ϕ) ...

IITAKA CONJECTURE Cn,m IN DIMENSION SIX 1 ...
Jun 27, 2008 - for some l ∈ N, we call Y a good minimal model. The minimal ... If the nef dimension n(L) = 2 or if κ(Z) = κ(Z ) = 2, then ip(KZ +. L) is big for some ...

Sub-Consensus hierarchy conjecture is false
Nov 11, 2009 - Adapted from [9]. Consider a 3-process system {p1,p2,p3}. Let task T12 require processes p1 and p2 to agree; p3 can decide on anything. Consider detector Ω12 such that if at least one p ∈ {p1,p2} is correct, it eventually outputs th

Purity of critical cohomology and Kac's conjecture
each Zi \ Zi−1 has pure compactly supported cohomology, from which it follows that Z does too. This in turn implies the positivity of the associated weight polynomial, as odd cohomology vanishes. The idea of relating polynomials arising in positivi

The Prime Power Conjecture is True for n < 2000000
Aug 11, 1994 - differences di − dj contains every nonzero element of G exactly λ times, then D is called a (v, k, ... to test the PPC up to two million. Section 2 ...