Communication Complexity Lecture 23 Computing with remote inputs - - PowerPoint PPT Presentation

communication complexity
SMART_READER_LITE
LIVE PREVIEW

Communication Complexity Lecture 23 Computing with remote inputs - - PowerPoint PPT Presentation

Communication Complexity Lecture 23 Computing with remote inputs 1 Communication Complexity 2 Communication Complexity Setting 2 Communication Complexity Setting Alice wants to compute f(x,y) 2 Communication Complexity Setting


slide-1
SLIDE 1

Communication Complexity

Lecture 23 Computing with remote inputs

1

slide-2
SLIDE 2

Communication Complexity

2

slide-3
SLIDE 3

Communication Complexity

Setting

2

slide-4
SLIDE 4

Communication Complexity

Setting Alice wants to compute f(x,y)

2

slide-5
SLIDE 5

Communication Complexity

Setting Alice wants to compute f(x,y) Alice is given only x. Her friend Bob gets y.

2

slide-6
SLIDE 6

Communication Complexity

Setting Alice wants to compute f(x,y) Alice is given only x. Her friend Bob gets y. Least amount of communication to achieve this

2

slide-7
SLIDE 7

Communication Complexity

Setting Alice wants to compute f(x,y) Alice is given only x. Her friend Bob gets y. Least amount of communication to achieve this Compare with decision tree complexity

2

slide-8
SLIDE 8

Communication Complexity

Setting Alice wants to compute f(x,y) Alice is given only x. Her friend Bob gets y. Least amount of communication to achieve this Compare with decision tree complexity Trivial upper-bound of |x|

2

slide-9
SLIDE 9

Communication Complexity

Setting Alice wants to compute f(x,y) Alice is given only x. Her friend Bob gets y. Least amount of communication to achieve this Compare with decision tree complexity Trivial upper-bound of |x| Interested in proving lower bounds for various f

2

slide-10
SLIDE 10

Examples

3

slide-11
SLIDE 11

Examples

PARITY(x,y) = ⊕i (xi⊕yi)

3

slide-12
SLIDE 12

Examples

PARITY(x,y) = ⊕i (xi⊕yi) CC(PARITY) = 1

3

slide-13
SLIDE 13

Examples

PARITY(x,y) = ⊕i (xi⊕yi) CC(PARITY) = 1 EQ(x,y) = 1 iff x=y

3

slide-14
SLIDE 14

Examples

PARITY(x,y) = ⊕i (xi⊕yi) CC(PARITY) = 1 EQ(x,y) = 1 iff x=y Lower-bound?

3

slide-15
SLIDE 15

Examples

PARITY(x,y) = ⊕i (xi⊕yi) CC(PARITY) = 1 EQ(x,y) = 1 iff x=y Lower-bound? DISJ(x,y)=1 if x∧y=0n

3

slide-16
SLIDE 16

Motivation

4

slide-17
SLIDE 17

Motivation

Distributed computing

4

slide-18
SLIDE 18

Motivation

Distributed computing Lower-bounds for Circuit complexity

4

slide-19
SLIDE 19

Motivation

Distributed computing Lower-bounds for Circuit complexity Amount of communication across a cut in the circuit

4

slide-20
SLIDE 20

Motivation

Distributed computing Lower-bounds for Circuit complexity Amount of communication across a cut in the circuit Proving optimality of algorithms and data-structures

4

slide-21
SLIDE 21

Protocol

5

slide-22
SLIDE 22

Protocol

We’ll consider deterministic protocols

5

slide-23
SLIDE 23

Protocol

We’ll consider deterministic protocols Fixed number of rounds (Alice to Bob, then Bob to Alice), each party sends a fixed number of bits in each round

5

slide-24
SLIDE 24

Protocol

We’ll consider deterministic protocols Fixed number of rounds (Alice to Bob, then Bob to Alice), each party sends a fixed number of bits in each round Can even consider protocol to have Alice and Bob alternately exchanging single bits (since not considering number of rounds)

5

slide-25
SLIDE 25

Protocol

We’ll consider deterministic protocols Fixed number of rounds (Alice to Bob, then Bob to Alice), each party sends a fixed number of bits in each round Can even consider protocol to have Alice and Bob alternately exchanging single bits (since not considering number of rounds) At most doubles the communication complexity

5

slide-26
SLIDE 26

Protocol Execution

6

slide-27
SLIDE 27

Protocol Execution

ith message from Alice is a function of her input and previous messages

6

slide-28
SLIDE 28

Protocol Execution

ith message from Alice is a function of her input and previous messages Her output is a function of the final “transcript” and her own input (her “view”)

6

slide-29
SLIDE 29

Protocol Execution

ith message from Alice is a function of her input and previous messages Her output is a function of the final “transcript” and her own input (her “view”) Similarly for Bob. His view = transcript + his input

6

slide-30
SLIDE 30

Protocol Execution

ith message from Alice is a function of her input and previous messages Her output is a function of the final “transcript” and her own input (her “view”) Similarly for Bob. His view = transcript + his input #transcripts ≤ 2CC. i.e. CC ≥ log(#transcripts)

6

slide-31
SLIDE 31

Transcript Table

7

slide-32
SLIDE 32

Transcript Table

Consider the transcript table

7

slide-33
SLIDE 33

Transcript Table

Consider the transcript table If on (a1,b1) and (a2,b2) same transcript

7

slide-34
SLIDE 34

Transcript Table

Consider the transcript table If on (a1,b1) and (a2,b2) same transcript Then same transcript

  • n (a1,b2) also!

7

slide-35
SLIDE 35

Transcript Table

Consider the transcript table If on (a1,b1) and (a2,b2) same transcript Then same transcript

  • n (a1,b2) also!

Alice and Bob never realize the difference through out the protocol

7

slide-36
SLIDE 36

Fooling Set

8

slide-37
SLIDE 37

Fooling Set

If on (a1,b1) and (a2,b2) same transcript, then same transcript on (a1,b2) also

8

slide-38
SLIDE 38

Fooling Set

If on (a1,b1) and (a2,b2) same transcript, then same transcript on (a1,b2) also Showing a set S of input-pairs that must have distinct transcripts

8

slide-39
SLIDE 39

Fooling Set

If on (a1,b1) and (a2,b2) same transcript, then same transcript on (a1,b2) also Showing a set S of input-pairs that must have distinct transcripts All pairs have same output

8

slide-40
SLIDE 40

Fooling Set

If on (a1,b1) and (a2,b2) same transcript, then same transcript on (a1,b2) also Showing a set S of input-pairs that must have distinct transcripts All pairs have same output “Cross” of no two pairs has the same output

8

slide-41
SLIDE 41

Fooling Set

If on (a1,b1) and (a2,b2) same transcript, then same transcript on (a1,b2) also Showing a set S of input-pairs that must have distinct transcripts All pairs have same output “Cross” of no two pairs has the same output If S is a set of such pairs, CC ≥ log(|S|)

8

slide-42
SLIDE 42

Fooling Set for EQ

9

slide-43
SLIDE 43

Fooling Set for EQ

S = set of all pairs (x,x)

9

slide-44
SLIDE 44

Fooling Set for EQ

S = set of all pairs (x,x) CC(EQ) ≥ log(|S|) ≥ n

9

slide-45
SLIDE 45

Fooling Set for EQ

S = set of all pairs (x,x) CC(EQ) ≥ log(|S|) ≥ n True for any function in which each row and column has exactly one 1

9

slide-46
SLIDE 46

Fooling Set for EQ

S = set of all pairs (x,x) CC(EQ) ≥ log(|S|) ≥ n True for any function in which each row and column has exactly one 1 Other functions too

9

slide-47
SLIDE 47

Fooling Set for EQ

S = set of all pairs (x,x) CC(EQ) ≥ log(|S|) ≥ n True for any function in which each row and column has exactly one 1 Other functions too e.g.: DISJ(x,y) if x∧y=0n

9

slide-48
SLIDE 48

Fooling Set for EQ

S = set of all pairs (x,x) CC(EQ) ≥ log(|S|) ≥ n True for any function in which each row and column has exactly one 1 Other functions too e.g.: DISJ(x,y) if x∧y=0n S = set of complementary pairs, (x,¬x)

9

slide-49
SLIDE 49

Monochromatic Rectangles

10

slide-50
SLIDE 50

Monochromatic Rectangles

Rectangle: a subset of D1xD2

  • f the form S1xS2

10

slide-51
SLIDE 51

Monochromatic Rectangles

Rectangle: a subset of D1xD2

  • f the form S1xS2

Monochromatic: same f-value

10

slide-52
SLIDE 52

Monochromatic Rectangles

Rectangle: a subset of D1xD2

  • f the form S1xS2

Monochromatic: same f-value Recall: for any protocol, set

  • f all input-pairs with the

same transcript is a rectangle

10

slide-53
SLIDE 53

Monochromatic Rectangles

Rectangle: a subset of D1xD2

  • f the form S1xS2

Monochromatic: same f-value Recall: for any protocol, set

  • f all input-pairs with the

same transcript is a rectangle For protocol to be correct, the rectangles should be monochromatic

10

slide-54
SLIDE 54

Tiling Lower-Bound

11

slide-55
SLIDE 55

Tiling Lower-Bound

For protocol to be correct, same-transcript rectangles should be monochromatic

11

slide-56
SLIDE 56

Tiling Lower-Bound

For protocol to be correct, same-transcript rectangles should be monochromatic Find the least number of monochromatic rectangles that can tile the function, χ(f)

11

slide-57
SLIDE 57

Tiling Lower-Bound

For protocol to be correct, same-transcript rectangles should be monochromatic Find the least number of monochromatic rectangles that can tile the function, χ(f) #transcripts ≥ χ(f)

11

slide-58
SLIDE 58

Tiling Lower-Bound

For protocol to be correct, same-transcript rectangles should be monochromatic Find the least number of monochromatic rectangles that can tile the function, χ(f) #transcripts ≥ χ(f) CC(f) ≥ log(χ(f))

11

slide-59
SLIDE 59

Tiling Lower-Bound

For protocol to be correct, same-transcript rectangles should be monochromatic Find the least number of monochromatic rectangles that can tile the function, χ(f) #transcripts ≥ χ(f) CC(f) ≥ log(χ(f)) How to lower-bound χ(f)?

11

slide-60
SLIDE 60

Lower-Bounding χ(f)

12

slide-61
SLIDE 61

Lower-Bounding χ(f)

If a fooling set of size S, no two input-pairs from S can be on the same tile in a monochromatic tiling

12

slide-62
SLIDE 62

Lower-Bounding χ(f)

If a fooling set of size S, no two input-pairs from S can be on the same tile in a monochromatic tiling χ(f) ≥ |S| for every fooling set S

12

slide-63
SLIDE 63

Lower-Bounding χ(f)

If a fooling set of size S, no two input-pairs from S can be on the same tile in a monochromatic tiling χ(f) ≥ |S| for every fooling set S Rank lower-bound

12

slide-64
SLIDE 64

Lower-Bounding χ(f)

If a fooling set of size S, no two input-pairs from S can be on the same tile in a monochromatic tiling χ(f) ≥ |S| for every fooling set S Rank lower-bound χ(f) ≥ Rank(Mf)

12

slide-65
SLIDE 65

Lower-Bounding χ(f)

If a fooling set of size S, no two input-pairs from S can be on the same tile in a monochromatic tiling χ(f) ≥ |S| for every fooling set S Rank lower-bound χ(f) ≥ Rank(Mf) Discrepancy lower-bound

12

slide-66
SLIDE 66

Lower-Bounding χ(f)

If a fooling set of size S, no two input-pairs from S can be on the same tile in a monochromatic tiling χ(f) ≥ |S| for every fooling set S Rank lower-bound χ(f) ≥ Rank(Mf) Discrepancy lower-bound χ(f) ≥ Discrepancy(f)

12

slide-67
SLIDE 67

Rank(M)

13

slide-68
SLIDE 68

Rank(M)

Rank of a matrix

13

slide-69
SLIDE 69

Rank(M)

Rank of a matrix Maximum number of linearly independent rows (or equivalently, columns)

13

slide-70
SLIDE 70

Rank(M)

Rank of a matrix Maximum number of linearly independent rows (or equivalently, columns) Linear independence: operations in a field

13

slide-71
SLIDE 71

Rank(M)

Rank of a matrix Maximum number of linearly independent rows (or equivalently, columns) Linear independence: operations in a field Rank-r matrix: after row & column reductions D(mxn) diagonal, with r 1’ s, rest 0’

  • s. M = UDV

13

slide-72
SLIDE 72

Rank(M)

Rank of a matrix Maximum number of linearly independent rows (or equivalently, columns) Linear independence: operations in a field Rank-r matrix: after row & column reductions D(mxn) diagonal, with r 1’ s, rest 0’

  • s. M = UDV

Rank(M) ≤ r, iff M can be written as sum of ≤ r rank 1 matrices

13

slide-73
SLIDE 73

Rank(M)

Rank of a matrix Maximum number of linearly independent rows (or equivalently, columns) Linear independence: operations in a field Rank-r matrix: after row & column reductions D(mxn) diagonal, with r 1’ s, rest 0’

  • s. M = UDV

Rank(M) ≤ r, iff M can be written as sum of ≤ r rank 1 matrices M = UDV = Σi≤r Dii Ui(mx1) Vi(1xn) = Σi≤r Bi, where Rank(Bi)=1

13

slide-74
SLIDE 74

Rank(M)

Rank of a matrix Maximum number of linearly independent rows (or equivalently, columns) Linear independence: operations in a field Rank-r matrix: after row & column reductions D(mxn) diagonal, with r 1’ s, rest 0’

  • s. M = UDV

Rank(M) ≤ r, iff M can be written as sum of ≤ r rank 1 matrices M = UDV = Σi≤r Dii Ui(mx1) Vi(1xn) = Σi≤r Bi, where Rank(Bi)=1 If M = Σi≤r Bi = UDV, Rank(M) ≤ min{Rank(U),Rank(D),Rank(V)} ≤ Rank(D) = r

13

slide-75
SLIDE 75

χ(f) ≥ Rank(Mf)

14

slide-76
SLIDE 76

χ(f) ≥ Rank(Mf)

If M = Σi≤r Bi with Rank(Bi)=1, then Rank(M) ≤ r

14

slide-77
SLIDE 77

χ(f) ≥ Rank(Mf)

If M = Σi≤r Bi with Rank(Bi)=1, then Rank(M) ≤ r Mf = Σi≤χ(f) Tilei, where Tilei has a monochromatic rectangle and 0’ s elsewhere

14

slide-78
SLIDE 78

χ(f) ≥ Rank(Mf)

If M = Σi≤r Bi with Rank(Bi)=1, then Rank(M) ≤ r Mf = Σi≤χ(f) Tilei, where Tilei has a monochromatic rectangle and 0’ s elsewhere Rank(Tilei)=1

14

slide-79
SLIDE 79

χ(f) ≥ Rank(Mf)

If M = Σi≤r Bi with Rank(Bi)=1, then Rank(M) ≤ r Mf = Σi≤χ(f) Tilei, where Tilei has a monochromatic rectangle and 0’ s elsewhere Rank(Tilei)=1 Rank(Mf) ≤ χ(f)

14

slide-80
SLIDE 80

χ(f) ≥ Rank(Mf)

If M = Σi≤r Bi with Rank(Bi)=1, then Rank(M) ≤ r Mf = Σi≤χ(f) Tilei, where Tilei has a monochromatic rectangle and 0’ s elsewhere Rank(Tilei)=1 Rank(Mf) ≤ χ(f) CC(f) ≥ log(χ(f)) ≥ log(Rank(Mf))

14

slide-81
SLIDE 81

Discrepancy

15

slide-82
SLIDE 82

Discrepancy

Discrepancy of a 0-1 matrix

15

slide-83
SLIDE 83

Discrepancy

Discrepancy of a 0-1 matrix max “imbalance” in any rectangle

15

slide-84
SLIDE 84

Discrepancy

Discrepancy of a 0-1 matrix max “imbalance” in any rectangle Imbalance = | #1’ s - #0’ s |

15

slide-85
SLIDE 85

Discrepancy

Discrepancy of a 0-1 matrix max “imbalance” in any rectangle Imbalance = | #1’ s - #0’ s | Disc(M) = 1/(mn) maxrect imbalance(rect)

15

slide-86
SLIDE 86

Discrepancy

Discrepancy of a 0-1 matrix max “imbalance” in any rectangle Imbalance = | #1’ s - #0’ s | Disc(M) = 1/(mn) maxrect imbalance(rect) χ(f) ≥ 1/Disc(Mf)

15

slide-87
SLIDE 87

Discrepancy

Discrepancy of a 0-1 matrix max “imbalance” in any rectangle Imbalance = | #1’ s - #0’ s | Disc(M) = 1/(mn) maxrect imbalance(rect) χ(f) ≥ 1/Disc(Mf) Disc(Mf) ≥ 1/(mn) (size of largest monochromatic tile)

15

slide-88
SLIDE 88

Discrepancy

Discrepancy of a 0-1 matrix max “imbalance” in any rectangle Imbalance = | #1’ s - #0’ s | Disc(M) = 1/(mn) maxrect imbalance(rect) χ(f) ≥ 1/Disc(Mf) Disc(Mf) ≥ 1/(mn) (size of largest monochromatic tile) χ(f) ≥ (mn)/(size of largest monochromatic tile)

15

slide-89
SLIDE 89

CC Lower-bounds Summary

16

slide-90
SLIDE 90

CC Lower-bounds Summary

CC(f) ≥ log(#transcripts)

16

slide-91
SLIDE 91

CC Lower-bounds Summary

CC(f) ≥ log(#transcripts) Tiling Lower-bound: #transcripts ≥ χ(f)

16

slide-92
SLIDE 92

CC Lower-bounds Summary

CC(f) ≥ log(#transcripts) Tiling Lower-bound: #transcripts ≥ χ(f) Both fairly tight: CC(f) = O( log2(χ(f)) )

16

slide-93
SLIDE 93

CC Lower-bounds Summary

CC(f) ≥ log(#transcripts) Tiling Lower-bound: #transcripts ≥ χ(f) Both fairly tight: CC(f) = O( log2(χ(f)) ) To lower-bound χ(f): fooling-set, rank, 1/Disc

16

slide-94
SLIDE 94

CC Lower-bounds Summary

CC(f) ≥ log(#transcripts) Tiling Lower-bound: #transcripts ≥ χ(f) Both fairly tight: CC(f) = O( log2(χ(f)) ) To lower-bound χ(f): fooling-set, rank, 1/Disc χ(f) ≥ |max fooling-set| ≥ (Rank(Mf))2

16

slide-95
SLIDE 95

CC Lower-bounds Summary

CC(f) ≥ log(#transcripts) Tiling Lower-bound: #transcripts ≥ χ(f) Both fairly tight: CC(f) = O( log2(χ(f)) ) To lower-bound χ(f): fooling-set, rank, 1/Disc χ(f) ≥ |max fooling-set| ≥ (Rank(Mf))2 1/Discrepancy lower-bounds can be very loose

16

slide-96
SLIDE 96

CC Lower-bounds Summary

CC(f) ≥ log(#transcripts) Tiling Lower-bound: #transcripts ≥ χ(f) Both fairly tight: CC(f) = O( log2(χ(f)) ) To lower-bound χ(f): fooling-set, rank, 1/Disc χ(f) ≥ |max fooling-set| ≥ (Rank(Mf))2 1/Discrepancy lower-bounds can be very loose Conjecture: Rank(Mf) (and hence fooling set) is fairly tight

16

slide-97
SLIDE 97

CC Lower-bounds Summary

CC(f) ≥ log(#transcripts) Tiling Lower-bound: #transcripts ≥ χ(f) Both fairly tight: CC(f) = O( log2(χ(f)) ) To lower-bound χ(f): fooling-set, rank, 1/Disc χ(f) ≥ |max fooling-set| ≥ (Rank(Mf))2 1/Discrepancy lower-bounds can be very loose Conjecture: Rank(Mf) (and hence fooling set) is fairly tight i.e., CC(f) = O(polylog(Rank(Mf))

16

slide-98
SLIDE 98

Many Variants

17

slide-99
SLIDE 99

Many Variants

Randomized protocols: significant savings in expectation

17

slide-100
SLIDE 100

Many Variants

Randomized protocols: significant savings in expectation Non-deterministic: Alice and Bob are non-deterministic. “Communication” now includes shared guess

17

slide-101
SLIDE 101

Many Variants

Randomized protocols: significant savings in expectation Non-deterministic: Alice and Bob are non-deterministic. “Communication” now includes shared guess Multi-party: Input split across multiple parties. Broadcast channels for communication.

17

slide-102
SLIDE 102

Many Variants

Randomized protocols: significant savings in expectation Non-deterministic: Alice and Bob are non-deterministic. “Communication” now includes shared guess Multi-party: Input split across multiple parties. Broadcast channels for communication. Number on the forehead version

17

slide-103
SLIDE 103

Many Variants

Randomized protocols: significant savings in expectation Non-deterministic: Alice and Bob are non-deterministic. “Communication” now includes shared guess Multi-party: Input split across multiple parties. Broadcast channels for communication. Number on the forehead version Non-boolean output

17

slide-104
SLIDE 104

Many Variants

Randomized protocols: significant savings in expectation Non-deterministic: Alice and Bob are non-deterministic. “Communication” now includes shared guess Multi-party: Input split across multiple parties. Broadcast channels for communication. Number on the forehead version Non-boolean output Multi-valued functions: agree on one value

17

slide-105
SLIDE 105

Many Variants

Randomized protocols: significant savings in expectation Non-deterministic: Alice and Bob are non-deterministic. “Communication” now includes shared guess Multi-party: Input split across multiple parties. Broadcast channels for communication. Number on the forehead version Non-boolean output Multi-valued functions: agree on one value Different costs: asymmetric communication, average-case complexity

17