Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
column

Guest column: additive combinatorics and theoretical computer science

Published: 20 June 2009 Publication History

Abstract

Additive combinatorics is the branch of combinatorics where the objects of study are subsets of the integers or of other abelian groups, and one is interested in properties and patterns that can be expressed in terms of linear equations. More generally, arithmetic combinatorics deals with properties and patterns that can be expressed via additions and multiplications.
In the past ten years, additive and arithmetic combinatorics have been extremely successful areas of mathematics, featuring a convergence of techniques from graph theory, analysis and ergodic theory. They have helped prove long-standing open questions in additive number theory, and they offer much promise of future progress.
Techniques from additive and arithmetic combinatorics have found several applications in computer science too, to property testing, pseudorandomness, PCP constructions, lower bounds, and extractor constructions. Typically, whenever a technique from additive or arithmetic combinatorics becomes understood by computer scientists, it finds some application.
Considering that there is still a lot of additive and arithmetic combinatorics that computer scientists do not understand (and, the field being very active, even more will be developed in the near future), there seems to be much potential for future connections and applications.

References

[1]
Noga Alon, Richard A. Duke, Hanno Lefmann, Vojtech Rödl, and Raphael Yuster. The algorithmic aspects of the regularity lemma. Journal of Algorithms, 16:80--109, 1994.
[2]
Noga Alon, Eldar Fischer, Michael Krivelevich, and Mario Szegedy. Efficient testing of large graphs. Combinatorica, 20(4):451--476, 2000.
[3]
Noga Alon, Tali Kaufman, Michael Krivelevich, Simon Litsyn, and Dana Ron. Testing low-degree polynomials over GF (2). In Proceedings of RANDOM-APPROX, pages 188--199, 2003.
[4]
Noga Alon. Testing subgraphs in large graphs. Random Structures and Algorithms, 21(3-4):359--370, 2002.
[5]
Noga Alon and Asaf Shapira. Every monotone graph property is testable. SIAM Journal on Computing, 38(2):505--522, 2008.
[6]
Tim Austin and Terence Tao. On the testability and repair of hereditary hypergraph properties. arXiv:0801.2179, 2008.
[7]
Christian Borgs, Jennifer T. Chayes, Laszlo Lovasz, Vera T. Sos, Balazs Szegedy, and Katalin Vesztergombi. Graph limits and parameter testing. In Proceedings of the 38th ACM Symposium on Theory of Computing, pages 261--270, 2006.
[8]
Felix A. Behrend. On the sets of integers which contain no three in arithmetic progression. Proc. Nat. Acad. Sci., 23:331--332, 1946.
[9]
L. Babai, L. Fortnow, and C. Lund. Non-deterministic exponential time has two-prover interactive protocols. Computational Complexity, 1:3--40, 1991. Preliminary version in Proc. of FOCS'90.
[10]
Boaz Barak, Russell Impagliazzo, and Avi Wigderson. Extracting randomness using few independent sources. In Proceedings of the 45th IEEE Symposium on Foundations of Computer Science, pages 384--393, 2004.
[11]
Jean Bourgain, Nets Katz, and Terence Tao. A sum-product estimate for finite fields, and applications. Geometric and Functional Analysis, 14:27--57, 2004.
[12]
Manuel Blum, Michael Luby, and Ronitt Rubinfeld. Self-testing/correcting with applications to numerical problems. Journal of Computer and System Sciences, 47(3):549--595, 1993. Preliminary version in Proc. of STOC'90.
[13]
László Babai, Noam Nisan, and Mario Szegedy. Multiparty protocols, pseudorandom generators for logspace, and time-space trade-offs. Journal of Computer and System Sciences, 45(2):204--232, 1992.
[14]
Jean Bourgain. On triples in arithmetic progression. Geometric and Functional Analysis, 9:968--984, 1999.
[15]
Jean Bourgain. More on the sum-product phenomenon in prime fields and its applications. International Journal of Number Theory, 1(1):1--32, 2005.
[16]
Boaz Barak, Anup Rao, Ronen Shaltiel, and Avi Wigderson. 2-source dispersers for sub-polynomial entropy and Ramsey graphs beating the Frankl-Wilson construction. In Proceedings of the 38th ACM Symposium on Theory of Computing, pages 671--680, 2006.
[17]
Vitaly Bergelson, Terence Tao, and Tamar Ziegler. An inverse theorem for the uniformity semi-norms associated with the action of Fw. arXiv:0901.2602, 2009.
[18]
Andrej Bogdanov and Emanuele Viola. Pseudorandom bits for polynomials. In Proceedings of the 48th IEEE Symposium on Foundations of Computer Science, pages 41--51, 2007.
[19]
Ashok K. Chandra, Merrick L. Furst, and Richard J. Lipton. Multi-party protocols. In Proceedings of the 15th ACM Symposium on Theory of Computing, pages 94--99, 1983.
[20]
Benny Chor and Oded Goldreich. Unbiased bits from sources of weak randomness and probabilistic communication complexity. SIAM Journal on Computing, 17(2):230--261, April 1988.
[21]
Fan R. K. Chung and Prasad Tetali. Communication complexity and quasi randomness. SIAM Journal on Discrete Mathematics, 6(1):110--123, 1993.
[22]
Stefan Dziembowski and Krzysztof Pietrzak. Leakage-resilient cryptography. In Proceedings of the 49th IEEE Symposium on Foundations of Computer Science, pages 293--302, 2008.
[23]
Zeev Dvir. On the size of Kakeya sets in finite fields. Journal of the AMS, to appear, 2008.
[24]
Zeev Dvir and Avi Wigderson. Kakeya sets, new mergers and old extractors. In Proceedings of the 49th IEEE Symposium on Foundations of Computer Science, pages 625--633, 2008.
[25]
Alan Frieze and Ravi Kannan. The regularity lemma and approximation schemes for dense problems. In Proceedings of the 37th IEEE Symposium on Foundations of Computer Science, pages 12--20, 1996.
[26]
Alan Frieze and Ravi Kannan. A simple algorithm for constructing Szemerédi's regularity partition. Electronic Journal of Combinatorics, 6, 1999.
[27]
Alan M. Frieze and Ravi Kannan. Quick approximation to matrices and applications. Combinatorica, 19(2):175--220, 1999.
[28]
Hillel Furstenberg. Ergodic behaviour of diagonal measures and a theorem of Szemerédi on arithmetic progressions. J. d'Analyse Math., 31:204--256, 1977.
[29]
Peter Frankl and Richard M. Wilson. Intersection theorems with geometric consequences. Combinatorica, 1(4):357--368, 1981.
[30]
Oded Goldreich, Shafi Goldwasser, and Dana Ron. Property testing and its connection to learning and approximation. Journal of the ACM, 45(4):653--750, 1998.
[31]
Peter Gemmell, Richard Lipton, Ronitt Rubinfeld, Madhu Sudan, and Avi Wigderson. Self-testing/correcting for polynomials and for approximate functions. In Proceedings of the 23rd ACM Symposium on Theory of Computing, pages 32--42, 1991.
[32]
Timothy Gowers. Lower bounds of tower type for Szemerédi's uniformity lemma. Geometric and Functional Analysis, 7(2):322--337, 1997.
[33]
Timothy Gowers. A new proof of Szeméredi's theorem for progressions of length four. Geometric and Functional Analysis, 8(3):529--551, 1998.
[34]
Timothy Gowers. A new proof of Szeméredi's theorem. Geometric and Functional Analysis, 11(3):465--588, 2001.
[35]
Timothy Gowers. Hypergraph regularity and the multidimensional Szemerédi theorem. Annals of Mathematics, 166:897--946, 2007.
[36]
Timothy Gowers. Decompositions, approximate structure, transference, and the Hahn-Banach theorem. arXiv:0811.3103, 2008.
[37]
Ben Green. Finite field models in additive combinatorics. arXiv:math.NT/0409420, 2004.
[38]
Ben Green. Montreal lecture notes on quadratic Fourier analysis. arXiv:math/0604089, 2006.
[39]
Ben Green and Terence Tao. An inverse theorem for the Gowers U* norm. math.NT/0503014, 2005.
[40]
Ben Green and Terence Tao. Linear equations in primes. math.NT/0606088, 2006.
[41]
Ben Green and Terence Tao. The distribution of polynomials over finite fields, with applications to the Gowers norms. arXiv:0711.3191, 2007.
[42]
Ben Green and Terence Tao. A note on the Freiman and Balog-Szemerédi-Gowers theorems in finite fields. arXiv:math/0701585, 2007.
[43]
Ben Green and Terence Tao. The Möbius function is asymptotically orthogonal to nilsequences. arXiv:0807.1736, 2008.
[44]
Ben Green and Terence Tao. The primes contain arbitrarily long arithmetic progressions. Annals of Mathematics, 167:481--547, 2008.
[45]
Ben Green and Terence Tao. Quadratic uniformity of the Mobius function. Annales de l'Institut Fourier, 58:1863--1935, 2009.
[46]
Timothy Gowers and Julia Wolf. The true complexity of a system of linear equations. arXiv:0711.0185, 2007.
[47]
David R. Heath-Brown. Integer sets containing no arithmetic progressions. Journal of the London Mathematical Society, 35:385--394, 1987.
[48]
Thomas Holenstein. Key agreement from weak bit agreement. In Proceedings of the 37th ACM Symposium on Theory of Computing, pages 664--673, 2005.
[49]
Russell Impagliazzo. Hard-core distributions for somewhat hard problems. In Proceedings of the 36th IEEE Symposium on Foundations of Computer Science, pages 538--545, 1995.
[50]
Russell Impagliazzo. Personal Communication, 2008.
[51]
Sergei Konyagin. A sum-product estimate in fields of prime order. math.NT/0304217, 2003.
[52]
Shachar Lovett, Roy Meshulam, and Alex Samorodnitsky. Inverse conjecture for the Gowers norm is false. In Proceedings of the 40th ACM Symposium on Theory of Computing, pages 547--556, 2008.
[53]
Shachar Lovett. Unconditional pseudorandom generators for low degree polynomials. In Proceedings of the 40th ACM Symposium on Theory of Computing, pages 557--562, 2008.
[54]
László Lovász and Balázs Szegedy. Limits of dense graph sequences. J. of Combinatorial Theory, Series B, 6(96):933--957, 2006.
[55]
Roy Meshulam. On subsets of finite abelian groups with no 3-term arithmetic progressions. Journal of Combinatorial Theory Series A, 71:168--172, 1995.
[56]
Brendan Nagle, Vojtech Rödl, and Mathias Schacht. The counting lemma for regular k -uniform hypergraphs. Random Structures and Algorithms, 26:1--67, 2006.
[57]
Ran Raz. The BNS-Chung criterion for multi-party communication complexity. Computational Complexity, 9(2), 2000.
[58]
Klaus Roth. On certain sets of integers. J. London Math. Soc., 28:104--109, 1953.
[59]
Imre Ruzsa and Endre Szemerédi. Triple systems with no six points carrying three triangles. In Proceedings of the Fifth Hungarian Colloquium on Combinatorics, pages 939--945, 1976. Volume II.
[60]
Vojtech Rödl and Jozef Skokan. Regularity lemma for k -uniform hypergraphs. Random Structures and Algorithms, 25(1):1--42, 2004.
[61]
Omer Reingold, Luca Trevisan, Madhur Tulsiani, and Salil Vadhan. Dense subsets of pseudo-random sets. In Proceedings of the 49th IEEE Symposium on Foundations of Computer Science, pages 76--85, 2008.
[62]
Alex Samorodnitsky. Low-degree tests at large distances. In Proceedings of the 39th ACM Symposium on Theory of Computing, pages 506--515, 2007.
[63]
Saharon Shelah. Primitive recursive bounds for Van der Waerden numbers. Journal of Symbolic Logic, 55:887--888, 1990.
[64]
Alex Samorodnitsky and Luca Trevisan. Gowers uniformity, in uence of variables, and PCPs. In Proceedings of the 38th ACM Symposium on Theory of Computing, pages 11--20, 2006.
[65]
Endre Szemerédi. On sets of integers containing no four elements in arithmetic progression. Acta Math. Acad. Sci. Hung., 20:89--104, 1969.
[66]
Endre Szemerédi. On sets of integers containing no k elements in arithmetic progression. Acta Arithmetica, 27:199--245, 1975.
[67]
Endre Szemerédi. Integer sets containing no arithmetic progressions. Acta Math. Hungar., 56(1-2):155--158, 1990.
[68]
Terence Tao. From rotating needles to stability of waves: Emerging connections between combinatorics, analysis, and PDE. Notices of the AMS, 48(3):294--303, 2001.
[69]
Terence Tao. The dichotomy between structure and randomness, arithmetic progressions, and the primes. In Proceedings of the International Congress of Mathematicians, 2006.
[70]
Terence Tao. Szemerédi's regularity lemma revisited. Contributions to Discrete Mathematics, 1:8--28, 2006.
[71]
Terence Tao. A variant of the hypergraph removal lemma. Journal of Combinatorial Theory, Series A, 113:1257--1280, 2006.
[72]
Terence Tao. Structure and randomness in combinatorics. In Proceedings of the 48th IEEE Symposium on Foundations of Computer Science, pages 3--18, 2007.
[73]
Luca Trevisan, Madhur Tulsiani, and Salil Vadhan. Regularity, boosting, and efficiently simulating every high-entropy distribution. In Proceedings of the 24th IEEE Conference on Computational Complexity, 2009.
[74]
Terence Tao and Van Vu. Additive Combinatorics. Cambridge University Press, 2006.
[75]
Terence Tao and Tamar Ziegler. The inverse conjecture for the Gowers norm over finite fields via the correspondence principle. arXiv:0810.5527, 2008.
[76]
Terence Tao and Tamar Ziegler. The primes contain arbitrarily long polynomial progressions. Acta Mathematica, 201:213--305, 2008.
[77]
Emanuele Viola. Selected results in additive combinatorics: an exposition. Technical Report TR07-103, Electronic Colloquium on Computational Complexity, 2007.
[78]
Emanuele Viola. The sum of d small-bias generators fools polynomials of degree d. In Proceedings of the 23rd IEEE Conference on Computational Complexity, pages 124--127, 2008.
[79]
Emanuele Viola and Avi Wigderson. Norms, XOR lemmas, and lower bounds for GF(2) polynomials and multiparty protocols. In Proceedings of the 22nd IEEE Conference on Computational Complexity, pages 141--154, 2007.
[80]
Thomas Wolff. Recent work connected with the Kakeya problem. In Prospects in mathematics (Princeton, NJ, 1996), pages 129--162. AMS, 1999.
[81]
David Zuckerman. General weak random sources. In Proceedings of the 31st IEEE Symposium on Foundations of Computer Science, pages 534--543, 1990.

Cited By

View all
  • (2014)How to Fake Auxiliary InputTheory of Cryptography10.1007/978-3-642-54242-8_24(566-590)Online publication date: 2014
  • (2013)Additive Combinatorics: With a View Towards Computer Science and Cryptography—An ExpositionNumber Theory and Related Fields10.1007/978-1-4614-6642-0_4(99-128)Online publication date: 5-Apr-2013
  • (2013)The number of Sidon sets and the maximum size of Sidon sets contained in a sparse random set of integersRandom Structures & Algorithms10.1002/rsa.2049646:1(1-25)Online publication date: 3-Apr-2013
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM SIGACT News
ACM SIGACT News  Volume 40, Issue 2
June 2009
91 pages
ISSN:0163-5700
DOI:10.1145/1556154
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 20 June 2009
Published in SIGACT Volume 40, Issue 2

Check for updates

Qualifiers

  • Column

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)19
  • Downloads (Last 6 weeks)0
Reflects downloads up to 28 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2014)How to Fake Auxiliary InputTheory of Cryptography10.1007/978-3-642-54242-8_24(566-590)Online publication date: 2014
  • (2013)Additive Combinatorics: With a View Towards Computer Science and Cryptography—An ExpositionNumber Theory and Related Fields10.1007/978-1-4614-6642-0_4(99-128)Online publication date: 5-Apr-2013
  • (2013)The number of Sidon sets and the maximum size of Sidon sets contained in a sparse random set of integersRandom Structures & Algorithms10.1002/rsa.2049646:1(1-25)Online publication date: 3-Apr-2013
  • (2011)The maximum size of a Sidon set contained in a sparse random set of integersProceedings of the twenty-second annual ACM-SIAM symposium on Discrete algorithms10.5555/2133036.2133050(159-171)Online publication date: 23-Jan-2011
  • (2010)On the structure of cubic and quartic polynomialsProceedings of the forty-second ACM symposium on Theory of computing10.1145/1806689.1806736(331-340)Online publication date: 5-Jun-2010

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media