Rectangle size bounds and threshold covers in communication complexity

被引:58
作者
Klauck, H [1 ]
机构
[1] Inst Adv Study, Sch Math, Princeton, NJ 08540 USA
来源
18TH IEEE ANNUAL CONFERENCE ON COMPUTATIONAL COMPLEXITY, PROCEEDINGS | 2003年
关键词
D O I
10.1109/CCC.2003.1214415
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We investigate the power of the most important lower bound technique in randomized communication complexity, which is based on an evaluation of the maximal size of approximately monochromatic rectangles, with respect to arbitrary distributions on the inputs. While it is known that the 0-error version of this bound is polynomially tight for deterministic communication, nothing in this direction is known for constant error and randomized communication complexity. We first study a one-sided version of this bound and obtain that its value lies between the MA- and AM-complexities of the considered function. Hence the lower bound actually works for a (communication) complexity class between MA boolean AND co - MA and AM boolean AND co - AM, and allows to show that the MA-complexity of the disjointness problem is Omega(rootn). Following this we consider the conjecture that the lower bound method is polynomially tight for randomized communication complexity. First we disprove a distributional version of this conjecture. Then we give a combinatorial characterization of the value of the lower bound method, in which the optimization over all distributions is absent. This characterization is done by what we call a bounded error uniform threshold cover and reduces showing tightness of the bound to the construction of an efficient protocol for a specific communication problem. We then study relaxations of bounded error uniform threshold covers, namely approximate majority covers and majority covers, and exhibit exponential separations between them. Each of these covers captures a lower bound method previously used for randomized communication complexity.
引用
收藏
页码:118 / 134
页数:17
相关论文
共 21 条
[1]  
AHO AV, 1983, P 15 ANN ACM S THEOR, P133, DOI [DOI 10.1145/800061.808742, 10.1145/800061.808742.]
[2]  
[Anonymous], 1997, COMMUNICATION COMPLE
[3]  
Babai L., 1986, 27th Annual Symposium on Foundations of Computer Science (Cat. No.86CH2354-9), P303, DOI 10.1109/SFCS.1986.1
[4]   ARTHUR-MERLIN GAMES - A RANDOMIZED PROOF SYSTEM, AND A HIERARCHY OF COMPLEXITY CLASSES [J].
BABAI, L ;
MORAN, S .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1988, 36 (02) :254-276
[5]  
Babai Laszlo, 1985, Proceedings of the 17th annual ACM Symposium on Theory of Computing, P421, DOI 10.1145/22145.22192
[6]  
Bar-Yossef Z, 2002, ANN IEEE SYMP FOUND, P209, DOI 10.1109/SFCS.2002.1181944
[7]   RELATIONS BETWEEN COMMUNICATION COMPLEXITY CLASSES [J].
HALSTENBERG, B ;
REISCHUK, R .
JOURNAL OF COMPUTER AND SYSTEM SCIENCES, 1990, 41 (03) :402-429
[8]   Threshold computation and cryptographic security [J].
Han, YN ;
Hemaspaandra, LA ;
Thierauf, T .
SIAM JOURNAL ON COMPUTING, 1997, 26 (01) :59-78
[9]  
HROMKOVIC J, 1996, 28 ACM S THEOR COMP, P551
[10]   THE PROBABILISTIC COMMUNICATION COMPLEXITY OF SET INTERSECTION [J].
KALYANASUNDARAM, B ;
SCHNITGER, G .
SIAM JOURNAL ON DISCRETE MATHEMATICS, 1992, 5 (04) :545-557