Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2013
On the power of conditional samples in distribution testing
ITCS '13: Proceedings of the 4th conference on Innovations in Theoretical Computer SciencePages 561–580https://doi.org/10.1145/2422436.2422497In this paper we define and examine the power of the conditional sampling oracle in the context of distribution-property testing. The conditional sampling oracle for a discrete distribution μ takes as input a subset S ⊂ [n] of the domain, and outputs a ...
- research-articleJanuary 2013
H-wise independence
ITCS '13: Proceedings of the 4th conference on Innovations in Theoretical Computer SciencePages 541–552https://doi.org/10.1145/2422436.2422495For a hypergraph H on the vertex set {1,...,n}, a distribution D = (D_1,...,D_n) over {0,1}^n is H-wise independent if every restriction of D to indices which form an edge in H is uniform. This generalizes the notion of k-wise independence obtained by ...
- research-articleJanuary 2013
Pseudo-partitions, transversality and locality: a combinatorial characterization for the space measure in algebraic proof systems
ITCS '13: Proceedings of the 4th conference on Innovations in Theoretical Computer SciencePages 455–472https://doi.org/10.1145/2422436.2422486We devise a new combinatorial framework for proving space lower bounds in algebraic proof systems like Polynomial Calculus (Pc) and Polynomial Calculus with Resolution (Pcr). Our method can be thought as a Spoiler-Duplicator game, which is capturing ...
- research-articleJanuary 2013
Publicly verifiable proofs of sequential work
ITCS '13: Proceedings of the 4th conference on Innovations in Theoretical Computer SciencePages 373–388https://doi.org/10.1145/2422436.2422479We construct a publicly verifiable protocol for proving computational work based on collision-resistant hash functions and a new plausible complexity assumption regarding the existence of "inherently sequential" hash functions. Our protocol is based on ...
- abstractJanuary 2013
Active self-assembly of algorithmic shapes and patterns in polylogarithmic time
ITCS '13: Proceedings of the 4th conference on Innovations in Theoretical Computer SciencePages 353–354https://doi.org/10.1145/2422436.2422476We describe a computational model for studying the complexity of self-assembled structures with active molecular components. Our model captures notions of growth and movement ubiquitous in biological systems. The model is inspired by biology's fantastic ...
- research-articleJanuary 2013
Stronger methods of making quantum interactive proofs perfectly complete
ITCS '13: Proceedings of the 4th conference on Innovations in Theoretical Computer SciencePages 329–352https://doi.org/10.1145/2422436.2422475This paper presents stronger methods of achieving perfect completeness in quantum interactive proofs. First, it is proved that any problem in QMA has a two-message quantum interactive proof system of perfect completeness with constant soundness error, ...
- abstractJanuary 2013
A classical leash for a quantum system: command of quantum systems via rigidity of CHSH games
ITCS '13: Proceedings of the 4th conference on Innovations in Theoretical Computer SciencePages 321–322https://doi.org/10.1145/2422436.2422473Can a classical experimentalist command an untrusted quantum system to realize arbitrary quantum dynamics, aborting if it misbehaves? If so, then we could realize the dream of device-independent quantum cryptography: using untrusted quantum devices to ...
- research-articleJanuary 2013
An energy complexity model for algorithms
ITCS '13: Proceedings of the 4th conference on Innovations in Theoretical Computer SciencePages 283–304https://doi.org/10.1145/2422436.2422470Energy consumption has emerged as a first class computing resource for both server systems and personal computing devices. The growing importance of energy has led to rethink in hardware design, hypervisors, operating systems and compilers. Algorithm ...
- research-articleJanuary 2013
On the power of many one-bit provers
ITCS '13: Proceedings of the 4th conference on Innovations in Theoretical Computer SciencePages 215–220https://doi.org/10.1145/2422436.2422461We study the class of languages, denoted by MIP[k, 1-ε, s], which have k-prover games where each prover just sends a single bit, with completeness 1-ε and soundness error s. For the case that k=1 (i.e., for the case of interactive proofs), Goldreich, ...
- research-articleJanuary 2013
Space-bounded communication complexity
ITCS '13: Proceedings of the 4th conference on Innovations in Theoretical Computer SciencePages 159–172https://doi.org/10.1145/2422436.2422456In the past thirty years, Communication Complexity has emerged as a foundational tool to proving lower bounds in many areas of computer science. Its power comes from its generality, but this generality comes at a price---no superlinear communication ...
- research-articleJanuary 2013
Evasiveness through a circuit lens
ITCS '13: Proceedings of the 4th conference on Innovations in Theoretical Computer SciencePages 139–144https://doi.org/10.1145/2422436.2422454A function f : {0, 1}n -> {0, 1} is called evasive if its decision tree complexity is maximal, i.e., D(f) = n. The long-standing Anderaa-Rosenberg-Karp (ARK) Conjecture asserts that every non-trivial monotone graph property is evasive. The Evasiveness ...
- research-articleJanuary 2013
Can theories be tested?: a cryptographic treatment of forecast testing
ITCS '13: Proceedings of the 4th conference on Innovations in Theoretical Computer SciencePages 47–56https://doi.org/10.1145/2422436.2422443How do we test if a weather forecaster actually knows something about whether it will rain or not? Intuitively, a "good" forecast test should be complete---namely, a forecaster knowing the distribution of Nature should be able to pass the test with high ...