Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1109/FOCS.2007.36guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Linear Equations Modulo 2 and the L1 Diameter of Convex Bodies

Published: 21 October 2007 Publication History

Abstract

We design a randomized polynomial time algorithm which, given a 3-tensor of real numbers A = \left\{ {aijk} \right\}_{i,j,k = 1}^n such that for all i,j,k \in \left\{ {1, \ldots,n} \right\} we have a_{ijk}= a_{ikj}= a_{kji}= a_{jik}= a_{kij}= a_{jki} and a_{iik}= a_{ijj}= a_{iji}= 0, computes a number Alg(A) which satisfies with probability at least \frac{1} {2}, \Omega (\sqrt {\frac{{\log n}} {n}}\cdot _{\chi\in \left\{ { - 1,1} \right\}^n }^{\max} \sum\limits_{i,j,k = 1}^n {a_{ijk} x_i x_i } x_k\leqslant A\lg (A) \leqslant _{\chi\in \left\{ { - 1,1} \right\}^n }^{\max } \sum\limits_{i,j,k = 1}^n {a_{ijk} x_i x_j x_k }. On the other hand, we show via a simple reduction from a result of Håstad and Venkatesh [22] that under the assumption {\rm N}{\rm P} \varsubsetneq DTIME(n^{(\log n){\rm O}(1)} ), for every \varepsilon\le 0 there is no algorithm that approximates \max _{\chi\in \left\{ { - 1,1} \right\}^n } \sum\limits_{}^{} {_{i,j,k = 1}^n } a_{ijk} x_i x_j x_k within a factor of 2^{(\log n)^{1 - \varepsilon } } in time 2^{(\log n)^{{\rm O}(1)} }. Our algorithm is based on a reduction to the problem of computing the diameter of a convex body in \mathbb{R}^n with respect to the L_1 norm. We show that it is possible to do so up to a multiplicative error of {\rm O}(\sqrt {\frac{n} {{\log n}}} ), while no randomized polynomial time algorithm can achieve accuracy {\rm O}(\sqrt {\frac{n} {{\log n}}} ). This resolves a question posed by Brieden, Gritzmann, Kannan, Klee, Lovász and Simonovits in [10]. We apply our new algorithm to improve the algorithm of Håstad and Venkatesh [22] for the Max-E3-Lin-2 problem. Given an over-determined system \varepsilon of N linear equations modulo 2 in n \leqslant N Boolean variables, such that in each equation appear only three distinct variables, the goal is to approximate in polynomial time the maximum number of satisfiable equations in \varepsilon minus \frac{N} {2} (i.e. we subtract the expected number of satisfied equations in a random assignment). Håstad and Venkatesh [22] obtained an algorithm which approximates this value up to a factor of {\rm O}(\sqrt N ). We obtain a {\rm O}(\sqrt {\frac{n} {{\log n}}} ) approximation algorithm. By relating this problem to the refutation problem for random 3-CNF formulas we give evidence that obtaining a significant improvement over this approximation factor is likely to be difficult.

Cited By

View all
  • (2024)History-Independent Concurrent ObjectsProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662814(14-24)Online publication date: 17-Jun-2024
  • (2024)History-Independent Dynamic Partitioning: Operation-Order Privacy in Ordered Data StructuresProceedings of the ACM on Management of Data10.1145/36516092:2(1-27)Online publication date: 14-May-2024
  • (2023)Protection of Access PatternProceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence10.1145/3638584.3638585(99-105)Online publication date: 8-Dec-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
FOCS '07: Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science
October 2007
695 pages
ISBN:0769530109

Publisher

IEEE Computer Society

United States

Publication History

Published: 21 October 2007

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)History-Independent Concurrent ObjectsProceedings of the 43rd ACM Symposium on Principles of Distributed Computing10.1145/3662158.3662814(14-24)Online publication date: 17-Jun-2024
  • (2024)History-Independent Dynamic Partitioning: Operation-Order Privacy in Ordered Data StructuresProceedings of the ACM on Management of Data10.1145/36516092:2(1-27)Online publication date: 14-May-2024
  • (2023)Protection of Access PatternProceedings of the 2023 7th International Conference on Computer Science and Artificial Intelligence10.1145/3638584.3638585(99-105)Online publication date: 8-Dec-2023
  • (2023)Control, Confidentiality, and the Right to be ForgottenProceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security10.1145/3576915.3616585(3358-3372)Online publication date: 15-Nov-2023
  • (2019)eHIFSProceedings of the 2019 ACM Asia Conference on Computer and Communications Security10.1145/3321705.3329839(573-585)Online publication date: 2-Jul-2019
  • (2014)Phase-concurrent hash tables for determinismProceedings of the 26th ACM symposium on Parallelism in algorithms and architectures10.1145/2612669.2612687(96-107)Online publication date: 23-Jun-2014
  • (2013)HIFSProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516724(1285-1296)Online publication date: 4-Nov-2013
  • (2013)Dependent types for enforcement of information flow and erasure policies in heterogeneous data structuresProceedings of the 15th Symposium on Principles and Practice of Declarative Programming10.1145/2505879.2505895(145-156)Online publication date: 16-Sep-2013
  • (2012)Internally deterministic parallel algorithms can be fastACM SIGPLAN Notices10.1145/2370036.214584047:8(181-192)Online publication date: 25-Feb-2012
  • (2012)History-independenceProceedings of the 27th Annual ACM Symposium on Applied Computing10.1145/2245276.2245279(7-12)Online publication date: 26-Mar-2012
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media