141 results on '"Prahladh Harsha"'
Search Results
102. A Characterization of hard-to-cover CSPs.
- Author
-
Amey Bhangale, Prahladh Harsha, and Girish Varma
- Published
- 2014
103. Super-polylogarithmic hypergraph coloring hardness via low-degree long codes.
- Author
-
Venkatesan Guruswami, Johan Håstad, Prahladh Harsha, Srikanth Srinivasan 0001, and Girish Varma
- Published
- 2013
104. Complexity of Inference in Graphical Models
- Author
-
Venkat Chandrasekaran, Nathan Srebro, and Prahladh Harsha
- Published
- 2012
105. Limits of Approximation Algorithms: PCPs and Unique Games (DIMACS Tutorial Lecture Notes)
- Author
-
Prahladh Harsha, Moses Charikar, Matthew Andrews, Sanjeev Arora, Subhash Khot, Dana Moshkovitz, Lisa Zhang, Ashkan Aazami, Dev Desai, Igor Gorodezky, Geetha Jagannathan, Alexander S. Kulikov, Darakhshan J. Mir, Alantha Newman, Aleksandar Nikolov, David Pritchard 0001, and Gwen Spencer
- Published
- 2010
106. An Invariance Principle for Polytopes
- Author
-
Prahladh Harsha, Adam R. Klivans, and Raghu Meka
- Published
- 2009
107. Bounding the Sensitivity of Polynomial Threshold Functions
- Author
-
Prahladh Harsha, Adam R. Klivans, and Raghu Meka
- Published
- 2009
108. Rigid Matrices From Rectangular PCPs or: Hard Claims Have Complex Proofs
- Author
-
Avishay Tal, Prahladh Harsha, Amey Bhangale, and Orr Paradise
- Subjects
Combinatorics ,NTIME ,Rank (linear algebra) ,Hamming distance ,Disjoint sets ,Computer Science::Computational Complexity ,Composition (combinatorics) ,Binary logarithm ,Square matrix ,Randomness - Abstract
We introduce a variant of PCPs, that we refer to as rectangular PCPs, wherein proofs are thought of as square matrices, and the random coins used by the verifier can be partitioned into two disjoint sets, one determining the row of each query and the other determining the column. We construct PCPs that are efficient, short, smooth and (almost-)rectangular. As a key application, we show that proofs for hard languages in $\text{NTIME}(2^{n})$ , when viewed as matrices, are rigid infinitely often. This strengthens and simplifies a recent result of Alman and Chen [FOCS, 2019] constructing explicit rigid matrices in FNP. Namely, we prove the following theorem: •There is a constant $\delta\in(0,1)$ such that there is an FNP-machine that, for infinitely many $N$ , on input $1^{N}$ outputs $N\times N$ matrices with entries in $\mathbb{F}_{2}$ that are $\delta N^{2}$ -far (in Hamming distance) from matrices of rank at most $2^{\log N/\Omega(\log \log N)}$ . Our construction of rectangular PCPs starts with an analysis of how randomness yields queries in the Reed-Muller-based outer PCP of Ben-Sasson, Goldreich, Harsha, Sudan and Vadhan [SICOMP, 2006; CCC, 2005]. We then show how to preserve rectangularity under PCP composition and a smoothness-inducing transformation. This warrants refined and stronger notions of rectangularity, which we prove for the outer PCP and its transforms.
- Published
- 2020
- Full Text
- View/download PDF
109. Ideal-Theoretic Explanation of Capacity-Achieving Decoding
- Author
-
Siddharth Bhandari and Prahladh Harsha and Mrinal Kumar and Madhu Sudan, Bhandari, Siddharth, Harsha, Prahladh, Kumar, Mrinal, Sudan, Madhu, Siddharth Bhandari and Prahladh Harsha and Mrinal Kumar and Madhu Sudan, Bhandari, Siddharth, Harsha, Prahladh, Kumar, Mrinal, and Sudan, Madhu
- Abstract
In this work, we present an abstract framework for some algebraic error-correcting codes with the aim of capturing codes that are list-decodable to capacity, along with their decoding algorithm. In the polynomial ideal framework, a code is specified by some ideals in a polynomial ring, messages are polynomials and their encoding is the residue modulo the ideals. We present an alternate way of viewing this class of codes in terms of linear operators, and show that this alternate view makes their algorithmic list-decodability amenable to analysis. Our framework leads to a new class of codes that we call affine Folded Reed-Solomon codes (which are themselves a special case of the broader class we explore). These codes are common generalizations of the well-studied Folded Reed-Solomon codes and Univariate Multiplicity codes, while also capturing the less-studied Additive Folded Reed-Solomon codes as well as a large family of codes that were not previously known/studied. More significantly our framework also captures the algorithmic list-decodability of the constituent codes. Specifically, we present a unified view of the decoding algorithm for ideal-theoretic codes and show that the decodability reduces to the analysis of the distance of some related codes. We show that good bounds on this distance lead to capacity-achieving performance of the underlying code, providing a unifying explanation of known capacity-achieving results. In the specific case of affine Folded Reed-Solomon codes, our framework shows that they are list-decodable up to capacity (for appropriate setting of the parameters), thereby unifying the previous results for Folded Reed-Solomon, Multiplicity and Additive Folded Reed-Solomon codes.
- Published
- 2021
- Full Text
- View/download PDF
110. Explicit SoS Lower Bounds from High-Dimensional Expanders
- Author
-
Irit Dinur and Yuval Filmus and Prahladh Harsha and Madhur Tulsiani, Dinur, Irit, Filmus, Yuval, Harsha, Prahladh, Tulsiani, Madhur, Irit Dinur and Yuval Filmus and Prahladh Harsha and Madhur Tulsiani, Dinur, Irit, Filmus, Yuval, Harsha, Prahladh, and Tulsiani, Madhur
- Abstract
We construct an explicit and structured family of 3XOR instances which is hard for O(√{log n}) levels of the Sum-of-Squares hierarchy. In contrast to earlier constructions, which involve a random component, our systems are highly structured and can be constructed explicitly in deterministic polynomial time. Our construction is based on the high-dimensional expanders devised by Lubotzky, Samuels and Vishne, known as LSV complexes or Ramanujan complexes, and our analysis is based on two notions of expansion for these complexes: cosystolic expansion, and a local isoperimetric inequality due to Gromov. Our construction offers an interesting contrast to the recent work of Alev, Jeronimo and the last author (FOCS 2019). They showed that 3XOR instances in which the variables correspond to vertices in a high-dimensional expander are easy to solve. In contrast, in our instances the variables correspond to the edges of the complex.
- Published
- 2021
- Full Text
- View/download PDF
111. Sound 3-query PCPPs are Long.
- Author
-
Arie Matsliah, Eli Ben-Sasson, Prahladh Harsha, and Oded Lachish
- Published
- 2007
112. The communication complexity of correlation.
- Author
-
Prahladh Harsha, Rahul Jain 0001, David A. McAllester, and Jaikumar Radhakrishnan
- Published
- 2006
113. Lower Bounds for Bounded-Depth Frege Proofs via Buss-Pudlack Games
- Author
-
Eli Ben-Sasson and Prahladh Harsha
- Published
- 2003
114. 3CNF Properties are Hard to Test
- Author
-
Eli Ben-Sasson, Prahladh Harsha, and Sofya Raskhodnikova
- Published
- 2003
115. Decoding Multivariate Multiplicity Codes on Product Sets
- Author
-
Prahladh Harsha, Siddharth Bhandari, Madhu Sudan, and Mrinal Kumar
- Subjects
FOS: Computer and information sciences ,Polynomial ,Discrete Mathematics (cs.DM) ,Computer Science - Information Theory ,List decoding ,0102 computer and information sciences ,02 engineering and technology ,Rational function ,Computational Complexity (cs.CC) ,01 natural sciences ,Upper and lower bounds ,symbols.namesake ,Schwartz–Zippel lemma ,ComputingMethodologies_SYMBOLICANDALGEBRAICMANIPULATION ,0202 electrical engineering, electronic engineering, information engineering ,Mathematics ,Discrete mathematics ,Information Theory (cs.IT) ,Univariate ,020206 networking & telecommunications ,Multiplicity (mathematics) ,Cartesian product ,Computer Science - Computational Complexity ,010201 computation theory & mathematics ,symbols ,Computer Science - Discrete Mathematics - Abstract
The multiplicity Schwartz-Zippel lemma bounds the total multiplicity of zeroes of a multivariate polynomial on a product set. This lemma motivates the multiplicity codes of Kopparty, Saraf and Yekhanin [J. ACM, 2014], who showed how to use this lemma to construct high-rate locally-decodable codes. However, the algorithmic results about these codes crucially rely on the fact that the polynomials are evaluated on a vector space and not an arbitrary product set. In this work, we show how to decode multivariate multiplicity codes of large multiplicities in polynomial time over finite product sets (over fields of large characteristic and zero characteristic). Previously such decoding algorithms were not known even for a positive fraction of errors. In contrast, our work goes all the way to the distance of the code and in particular exceeds both the unique decoding bound and the Johnson bound. For errors exceeding the Johnson bound, even combinatorial list-decodablity of these codes was not known. Our algorithm is an application of the classical polynomial method directly to the multivariate setting. In particular, we do not rely on a reduction from the multivariate to the univariate case as is typical of many of the existing results on decoding codes based on multivariate polynomials. However, a vanilla application of the polynomial method in the multivariate setting does not yield a polynomial upper bound on the list size. We obtain a polynomial bound on the list size by taking an alternative view of multivariate multiplicity codes. In this view, we glue all the partial derivatives of the same order together using a fresh set $z$ of variables. We then apply the polynomial method by viewing this as a problem over the field $\mathbb{F}(z)$ of rational functions in $z$., Comment: 35 pages
- Published
- 2020
- Full Text
- View/download PDF
116. On Multilinear Forms: Bias, Correlation, and Tensor Rank
- Author
-
Abhishek Bhrushundi and Prahladh Harsha and Pooya Hatami and Swastik Kopparty and Mrinal Kumar, Bhrushundi, Abhishek, Harsha, Prahladh, Hatami, Pooya, Kopparty, Swastik, Kumar, Mrinal, Abhishek Bhrushundi and Prahladh Harsha and Pooya Hatami and Swastik Kopparty and Mrinal Kumar, Bhrushundi, Abhishek, Harsha, Prahladh, Hatami, Pooya, Kopparty, Swastik, and Kumar, Mrinal
- Abstract
In this work, we prove new relations between the bias of multilinear forms, the correlation between multilinear forms and lower degree polynomials, and the rank of tensors over F₂. We show the following results for multilinear forms and tensors. Correlation bounds. We show that a random d-linear form has exponentially low correlation with low-degree polynomials. More precisely, for d = 2^{o(k)}, we show that a random d-linear form f(X₁,X₂, … , X_d) : (F₂^{k}) ^d → F₂ has correlation 2^{-k(1-o(1))} with any polynomial of degree at most d/2 with high probability. This result is proved by giving near-optimal bounds on the bias of a random d-linear form, which is in turn proved by giving near-optimal bounds on the probability that a sum of t random d-dimensional rank-1 tensors is identically zero. Tensor rank vs Bias. We show that if a 3-dimensional tensor has small rank then its bias, when viewed as a 3-linear form, is large. More precisely, given any 3-dimensional tensor T: [k]³ → F₂ of rank at most t, the bias of the 3-linear form f_T(X₁, X₂, X₃) : = ∑_{(i₁, i₂, i₃) ∈ [k]³} T(i₁, i₂, i₃)⋅ X_{1,i₁}⋅ X_{2,i₂}⋅ X_{3,i₃} is at least (3/4)^t. This bias vs tensor-rank connection suggests a natural approach to proving nontrivial tensor-rank lower bounds. In particular, we use this approach to give a new proof that the finite field multiplication tensor has tensor rank at least 3.52 k, which is the best known rank lower bound for any explicit tensor in three dimensions over F₂. Moreover, this relation between bias and tensor rank holds for d-dimensional tensors for any fixed d.
- Published
- 2020
- Full Text
- View/download PDF
117. Locally Testable Codes.
- Author
-
Prahladh Harsha
- Published
- 2016
- Full Text
- View/download PDF
118. Improved 3LIN Hardness via Linear Label Cover
- Author
-
Prahladh Harsha and Subhash Khot and Euiwoong Lee and Devanathan Thiruvenkatachari, Harsha, Prahladh, Khot, Subhash, Lee, Euiwoong, Thiruvenkatachari, Devanathan, Prahladh Harsha and Subhash Khot and Euiwoong Lee and Devanathan Thiruvenkatachari, Harsha, Prahladh, Khot, Subhash, Lee, Euiwoong, and Thiruvenkatachari, Devanathan
- Abstract
We prove that for every constant c and epsilon = (log n)^{-c}, there is no polynomial time algorithm that when given an instance of 3-LIN with n variables where an (1 - epsilon)-fraction of the clauses are satisfiable, finds an assignment that satisfies atleast (1/2 + epsilon)-fraction of clauses unless NP subseteq BPP. The previous best hardness using a polynomial time reduction achieves epsilon = (log log n)^{-c}, which is obtained by the Label Cover hardness of Moshkovitz and Raz [J. ACM, 57(5), 2010] followed by the reduction from Label Cover to 3-LIN of Håstad [J. ACM, 48(4):798 - 859, 2001]. Our main idea is to prove a hardness result for Label Cover similar to Moshkovitz and Raz where each projection has a linear structure. This linear structure of Label Cover allows us to use Hadamard codes instead of long codes, making the reduction more efficient. For the hardness of Linear Label Cover, we follow the work of Dinur and Harsha [SIAM J. Comput., 42(6):2452 - 2486, 2013] that simplified the construction of Moshkovitz and Raz, and observe that running their reduction from a hardness of the problem LIN (of unbounded arity) instead of the more standard problem of solving quadratic equations ensures the linearity of the resultant Label Cover.
- Published
- 2019
- Full Text
- View/download PDF
119. From Local to Robust Testing via Agreement Testing
- Author
-
Irit Dinur and Prahladh Harsha and Tali Kaufman and Noga Ron-Zewi, Dinur, Irit, Harsha, Prahladh, Kaufman, Tali, Ron-Zewi, Noga, Irit Dinur and Prahladh Harsha and Tali Kaufman and Noga Ron-Zewi, Dinur, Irit, Harsha, Prahladh, Kaufman, Tali, and Ron-Zewi, Noga
- Abstract
A local tester for an error-correcting code is a probabilistic procedure that queries a small subset of coordinates, accepts codewords with probability one, and rejects non-codewords with probability proportional to their distance from the code. The local tester is robust if for non-codewords it satisfies the stronger property that the average distance of local views from accepting views is proportional to the distance from the code. Robust testing is an important component in constructions of locally testable codes and probabilistically checkable proofs as it allows for composition of local tests. In this work we show that for certain codes, any (natural) local tester can be converted to a roubst tester with roughly the same number of queries. Our result holds for the class of affine-invariant lifted codes which is a broad class of codes that includes Reed-Muller codes, as well as recent constructions of high-rate locally testable codes (Guo, Kopparty, and Sudan, ITCS 2013). Instantiating this with known local testing results for lifted codes gives a more direct proof that improves some of the parameters of the main result of Guo, Haramaty, and Sudan (FOCS 2015), showing robustness of lifted codes. To obtain the above transformation we relate the notions of local testing and robust testing to the notion of agreement testing that attempts to find out whether valid partial assignments can be stitched together to a global codeword. We first show that agreement testing implies robust testing, and then show that local testing implies agreement testing. Our proof is combinatorial, and is based on expansion / sampling properties of the collection of local views of local testers. Thus, it immediately applies to local testers of lifted codes that query random affine subspaces in F_q^m, and moreover seems amenable to extension to other families of locally testable codes with expanding families of local views.
- Published
- 2019
- Full Text
- View/download PDF
120. A novel PEGylated carbon nanotube conjugated mangiferin: An explorative nanomedicine for brain cancer cells
- Author
-
Manish Kumar, Poonam Negi, Rajneet Kaur Khurana, Bhupinder Singh, Saurabh Sharma, Kaisar Raza, Prahladh Harsha, Anupama Mittal, and Nagarani Thotakura
- Subjects
medicine.diagnostic_test ,Chemistry ,Pharmaceutical Science ,02 engineering and technology ,021001 nanoscience & nanotechnology ,030226 pharmacology & pharmacy ,Bioavailability ,Flow cytometry ,03 medical and health sciences ,chemistry.chemical_compound ,0302 clinical medicine ,Pharmacokinetics ,Biophysics ,medicine ,Nanomedicine ,Nanocarriers ,0210 nano-technology ,Cytotoxicity ,Mangiferin ,Conjugate - Abstract
In the present study, polyethylene glycol-linked conjugate of carbon nanotubes with Mangiferin was synthesized and characterized by means of Fourier transform infrared and nuclear magnetic resonance spectroscopic techniques. Studies for the determination of particle size, polydispersity index and zeta potential were performed. Morphological characterization was performed using transmission electron microscopy. Phytochemical conjugated nanotubes were also evaluated for hemo-compatibility, protein binding capacity and in-vitro drug release. Cytotoxicity studies and flow cytometry were performed on U-87 cell lines. Drug release studies confirmed a spatiotemporal pattern of release at the cancer cell pH. Cytotoxicity studies proved that there was 1.28 folds decrease in the IC50 value indicating effective anticancer activity, whereas hemolytic profile established the safety. Flow cytometry confirmed effective induction of apoptosis with minimum necrosis by the nano-conjugate vis-a-vis the naive drug. The pharmacokinetic study showcased that there was 4 times escalation in the area under the curve, i.e., bioavailability of the drug after the conjugation to that of plain mangiferin. From the obtained results, it can be concluded that these functionalized nanocarriers are capable of the effective and safer delivery of phytochemicals to the brain cancerous cells.
- Published
- 2019
- Full Text
- View/download PDF
121. On the Probabilistic Degree of OR over the Reals
- Author
-
Siddharth Bhandari and Prahladh Harsha and Tulasimohan Molli and Srikanth Srinivasan, Bhandari, Siddharth, Harsha, Prahladh, Molli, Tulasimohan, Srinivasan, Srikanth, Siddharth Bhandari and Prahladh Harsha and Tulasimohan Molli and Srikanth Srinivasan, Bhandari, Siddharth, Harsha, Prahladh, Molli, Tulasimohan, and Srinivasan, Srikanth
- Abstract
We study the probabilistic degree over R of the OR function on n variables. For epsilon in (0,1/3), the epsilon-error probabilistic degree of any Boolean function f:{0,1}^n -> {0,1} over R is the smallest non-negative integer d such that the following holds: there exists a distribution of polynomials Pol in R[x_1,...,x_n] entirely supported on polynomials of degree at most d such that for all z in {0,1}^n, we have Pr_{P ~ Pol}[P(z) = f(z)] >= 1- epsilon. It is known from the works of Tarui (Theoret. Comput. Sci. 1993) and Beigel, Reingold, and Spielman (Proc. 6th CCC 1991), that the epsilon-error probabilistic degree of the OR function is at most O(log n * log(1/epsilon)). Our first observation is that this can be improved to O{log (n atop <= log(1/epsilon))}, which is better for small values of epsilon. In all known constructions of probabilistic polynomials for the OR function (including the above improvement), the polynomials P in the support of the distribution Pol have the following special structure: P(x_1,...,x_n) = 1 - prod_{i in [t]} (1- L_i(x_1,...,x_n)), where each L_i(x_1,..., x_n) is a linear form in the variables x_1,...,x_n, i.e., the polynomial 1-P(bar{x}) is a product of affine forms. We show that the epsilon-error probabilistic degree of OR when restricted to polynomials of the above form is Omega(log (n over <= log(1/epsilon))/log^2 (log (n over <= log(1/epsilon))})), thus matching the above upper bound (up to polylogarithmic factors).
- Published
- 2018
- Full Text
- View/download PDF
122. Boolean Function Analysis on High-Dimensional Expanders
- Author
-
Yotam Dikstein and Irit Dinur and Yuval Filmus and Prahladh Harsha, Dikstein, Yotam, Dinur, Irit, Filmus, Yuval, Harsha, Prahladh, Yotam Dikstein and Irit Dinur and Yuval Filmus and Prahladh Harsha, Dikstein, Yotam, Dinur, Irit, Filmus, Yuval, and Harsha, Prahladh
- Abstract
We initiate the study of Boolean function analysis on high-dimensional expanders. We describe an analog of the Fourier expansion and of the Fourier levels on simplicial complexes, and generalize the FKN theorem to high-dimensional expanders. Our results demonstrate that a high-dimensional expanding complex X can sometimes serve as a sparse model for the Boolean slice or hypercube, and quite possibly additional results from Boolean function analysis can be carried over to this sparse model. Therefore, this model can be viewed as a derandomization of the Boolean slice, containing |X(k)|=O(n) points in comparison to binom{n}{k+1} points in the (k+1)-slice (which consists of all n-bit strings with exactly k+1 ones).
- Published
- 2018
- Full Text
- View/download PDF
123. Polynomially Low Error PCPs with polyloglog n Queries via Modular Composition
- Author
-
Prahladh Harsha, Guy Kindler, and Irit Dinur
- Subjects
Polynomial (hyperelastic model) ,Soundness ,FOS: Computer and information sciences ,Conjecture ,Inverse ,List decoding ,Arity ,Composition (combinatorics) ,Computational Complexity (cs.CC) ,Computer Science::Computational Complexity ,16. Peace & justice ,Combinatorics ,Computer Science - Computational Complexity ,Completeness (logic) ,TheoryofComputation_ANALYSISOFALGORITHMSANDPROBLEMCOMPLEXITY ,Mathematics - Abstract
We show that every language in NP has a PCP verifier that tosses $O(\log n)$ random coins, has perfect completeness, and a soundness error of at most $1/\text{poly}(n)$, while making at most $O(\text{poly}\log\log n)$ queries into a proof over an alphabet of size at most $n^{1/\text{poly}\log\log n}$. Previous constructions that obtain $1/\text{poly}(n)$ soundness error used either $\text{poly}\log n $ queries or an exponential sized alphabet, i.e. of size $2^{n^c}$ for some $c>0$. Our result is an exponential improvement in both parameters simultaneously. Our result can be phrased as a polynomial-gap hardness for approximate CSPs with arity $\text{poly}\log\log n$ and alphabet size $n^{1/\text{poly}\log n}$. The ultimate goal, in this direction, would be to prove polynomial hardness for CSPs with constant arity and polynomial alphabet size (aka the sliding scale conjecture for inverse polynomial soundness error). Our construction is based on a modular generalization of previous PCP constructions in this parameter regime, which involves a composition theorem that uses an extra `consistency' query but maintains the inverse polynomial relation between the soundness error and the alphabet size. Our main technical/conceptual contribution is a new notion of soundness, which we refer to as {\em distributional soundness}, that replaces the previous notion of "list decoding soundness", and that allows us to prove a modular composition theorem with tighter parameters. This new notion of soundness allows us to invoke composition a super-constant number of times without incurring a blow-up in the soundness error.
- Published
- 2015
124. Multiplayer Parallel Repetition for Expanding Games
- Author
-
Irit Dinur and Prahladh Harsha and Rakesh Venkat and Henry Yuen, Dinur, Irit, Harsha, Prahladh, Venkat, Rakesh, Yuen, Henry, Irit Dinur and Prahladh Harsha and Rakesh Venkat and Henry Yuen, Dinur, Irit, Harsha, Prahladh, Venkat, Rakesh, and Yuen, Henry
- Abstract
We investigate the value of parallel repetition of one-round games with any number of players k>=2. It has been an open question whether an analogue of Raz's Parallel Repetition Theorem holds for games with more than two players, i.e., whether the value of the repeated game decays exponentially with the number of repetitions. Verbitsky has shown, via a reduction to the density Hales-Jewett theorem, that the value of the repeated game must approach zero, as the number of repetitions increases. However, the rate of decay obtained in this way is extremely slow, and it is an open question whether the true rate is exponential as is the case for all two-player games. Exponential decay bounds are known for several special cases of multi-player games, e.g., free games and anchored games. In this work, we identify a certain expansion property of the base game and show all games with this property satisfy an exponential decay parallel repetition bound. Free games and anchored games satisfy this expansion property, and thus our parallel repetition theorem reproduces all earlier exponential-decay bounds for multiplayer games. More generally, our parallel repetition bound applies to all multiplayer games that are *connected* in a certain sense. We also describe a very simple game, called the GHZ game, that does not satisfy this connectivity property, and for which we do not know an exponential decay bound. We suspect that progress on bounding the value of this the parallel repetition of the GHZ game will lead to further progress on the general question.
- Published
- 2017
- Full Text
- View/download PDF
125. On Polynomial Approximations Over Z/2^kZ*
- Author
-
Abhishek Bhrushundi and Prahladh Harsha and Srikanth Srinivasan, Bhrushundi, Abhishek, Harsha, Prahladh, Srinivasan, Srikanth, Abhishek Bhrushundi and Prahladh Harsha and Srikanth Srinivasan, Bhrushundi, Abhishek, Harsha, Prahladh, and Srinivasan, Srikanth
- Abstract
We study approximation of Boolean functions by low-degree polynomials over the ring Z/2^kZ. More precisely, given a Boolean function F:{0,1}^n -> {0,1}, define its k-lift to be F_k:{0,1}^n -> {0,2^(k-1)} by F_k(x) = 2^(k-F(x)) (mod 2^k). We consider the fractional agreement (which we refer to as \gamma_{d,k}(F)) of F_k with degree d polynomials from Z/2^kZ[x_1,..,x_n]. Our results are the following: * Increasing k can help: We observe that as k increases, gamma_{d,k}(F) cannot decrease. We give two kinds of examples where gamma_{d,k}(F) actually increases. The first is an infinite family of functions F such that gamma_{2d,2}(F) - gamma_{3d-1,1}(F) >= Omega(1). The second is an infinite family of functions F such that gamma_{d,1}(F) <= 1/2+o(1) - as small as possible - but gamma_{d,3}(F) >= 1/2 + Omega(1). * Increasing k doesn't always help: Adapting a proof of Green [Comput. Complexity, 9(1):16--38, 2000], we show that irrespective of the value of k, the Majority function Maj_n satisfies gamma_{d,k}(Maj_n) <= 1/2+ O(d)/sqrt{n}. In other words, polynomials over Z/2^kZ for large k do not approximate the majority function any better than polynomials over Z/2Z. We observe that the model we study subsumes the model of non-classical polynomials, in the sense that proving bounds in our model implies bounds on the agreement of non-classical polynomials with Boolean functions. In particular, our results answer questions raised by Bhowmick and Lovett [In Proc. 30th Computational Complexity Conf., pages 72-87, 2015] that ask whether non-classical polynomials approximate Boolean functions better than classical polynomials of the same degree.
- Published
- 2017
- Full Text
- View/download PDF
126. Small PCPs with low query complexity
- Author
-
Madhu Sudan and Prahladh Harsha
- Subjects
Discrete mathematics ,PCP theorem ,Polynomial ,NEXPTIME ,General Mathematics ,Assertion ,Mathematical proof ,Theoretical Computer Science ,Computational Mathematics ,TheoryofComputation_MATHEMATICALLOGICANDFORMALLANGUAGES ,Transformation (function) ,Computational Theory and Mathematics ,TheoryofComputation_LOGICSANDMEANINGSOFPROGRAMS ,Constant (mathematics) ,Probabilistically checkable proof ,Mathematics - Abstract
Most known constructions of probabilistically checkable proofs (PCPs) either blow up the proof size by a large polynomial, or have a high (though constant) query complexity. In this paper we give a transformation with slightly-super-cubic blowup in proof size, with a low query complexity. Specifically, the verifier probes the proof in 16 bits and rejects every proof of a false assertion with probability arbitrarily close to 1/2, while accepting correct proofs of theorems with probability one. The proof is obtained by revisiting known constructions and improving numerous components therein. In the process we abstract a number of new modules that may be of use in other PCP constructions.
- Published
- 2000
- Full Text
- View/download PDF
127. Embedding Approximately Low-Dimensional l_2^2 Metrics into l_1
- Author
-
Amit Deshpande and Prahladh Harsha and Rakesh Venkat, Deshpande, Amit, Harsha, Prahladh, Venkat, Rakesh, Amit Deshpande and Prahladh Harsha and Rakesh Venkat, Deshpande, Amit, Harsha, Prahladh, and Venkat, Rakesh
- Abstract
Goemans showed that any n points x_1,..., x_n in d-dimensions satisfying l_2^2 triangle inequalities can be embedded into l_{1}, with worst-case distortion at most sqrt{d}. We consider an extension of this theorem to the case when the points are approximately low-dimensional as opposed to exactly low-dimensional, and prove the following analogous theorem, albeit with average distortion guarantees: There exists an l_{2}^{2}-to-l_{1} embedding with average distortion at most the stable rank, sr(M), of the matrix M consisting of columns {x_i-x_j}_{i
- Published
- 2016
- Full Text
- View/download PDF
128. On Polynomial Approximations to AC^0
- Author
-
Prahladh Harsha and Srikanth Srinivasan, Harsha, Prahladh, Srinivasan, Srikanth, Prahladh Harsha and Srikanth Srinivasan, Harsha, Prahladh, and Srinivasan, Srikanth
- Abstract
We make progress on some questions related to polynomial approximations of AC^0. It is known, from the works of Tarui (Theoret. Comput. Sci. 1993) and Beigel, Reingold, and Spielman (Proc. 6th CCC 1991), that any AC^0 circuit of size s and depth d has an epsilon-error probabilistic polynomial over the reals of degree (log (s/epsilon))^{O(d)}. We improve this upper bound to (log s)^{O(d)}* log(1/epsilon), which is much better for small values of epsilon. We give an application of this result by using it to resolve a question posed by Tal (ECCC 2014): we show that (log s)^{O(d)}* log(1/epsilon)-wise independence fools AC^0, improving on Tal's strengthening of Braverman's theorem (J. ACM 2010) that (log (s/epsilon))^{O(d)}-wise independence fools AC^0. Up to the constant implicit in the O(d), our result is tight. As far as we know, this is the first PRG construction for AC^0 that achieves optimal dependence on the error epsilon. We also prove lower bounds on the best polynomial approximations to AC^0. We show that any polynomial approximating the OR function on n bits to a small constant error must have degree at least ~Omega(sqrt{log n}). This result improves exponentially on a recent lower bound demonstrated by Meka, Nguyen, and Vu (arXiv 2015).
- Published
- 2016
- Full Text
- View/download PDF
129. Partition Bound Is Quadratically Tight for Product Distributions
- Author
-
Prahladh Harsha and Rahul Jain and Jaikumar Radhakrishnan, Harsha, Prahladh, Jain, Rahul, Radhakrishnan, Jaikumar, Prahladh Harsha and Rahul Jain and Jaikumar Radhakrishnan, Harsha, Prahladh, Jain, Rahul, and Radhakrishnan, Jaikumar
- Abstract
Let f: {0,1}^n*{0,1}^n -> {0,1} be a 2-party function. For every product distribution mu on {0,1}^n*{0,1}^n, we show that CC^{mu}_{0.49}(f) = O(log(prt_{1/8}(f))*log(log(prt_{1/8}(f)))^2), where CC^{mu}_{epsilon}(f) is the distributional communication complexity of f with error at most epsilon under the distribution mu and prt_{1/8}(f) is the partition bound of f, as defined by Jain and Klauck [Proc. 25th CCC, 2010]. We also prove a similar bound in terms of IC_{1/8}(f), the information complexity of f, namely, CC^{mu}_{0.49}(f) = O((IC_{1/8}(f)*log(IC_{1/8}(f)))^2). The latter bound was recently and independently established by Kol [Proc. 48th STOC, 2016] using a different technique. We show a similar result for query complexity under product distributions. Let g: {0,1}^n -> {0,1} be a function. For every bit-wise product distribution mu on {0,1}^n, we show that QC^{mu}_{0.49}(g) = O((log(qprt_{1/8}(g))*log(log(qprt_{1/8}(g))))^2), where QC^{mu}_{epsilon}(g) is the distributional query complexity of f with error at most epsilon under the distribution mu and qprt_{1/8}(g) is the query partition bound of the function g. Partition bounds were introduced (in both communication complexity and query complexity models) to provide LP-based lower bounds for randomized communication complexity and randomized query complexity. Our results demonstrate that these lower bounds are polynomially tight for product distributions.
- Published
- 2016
- Full Text
- View/download PDF
130. Robust Multiplication-Based Tests for Reed-Muller Codes
- Author
-
Prahladh Harsha and Srikanth Srinivasan, Harsha, Prahladh, Srinivasan, Srikanth, Prahladh Harsha and Srikanth Srinivasan, Harsha, Prahladh, and Srinivasan, Srikanth
- Abstract
We consider the following multiplication-based tests to check if a given function f: F^n_q -> F_q is the evaluation of a degree-d polynomial over F_q for q prime. Test_{e,k}: Pick P_1,...,P_k independent random degree-e polynomials and accept iff the function f P_1 ... P_k is the evaluation of a degree-(d + ek) polynomial. We prove the robust soundness of the above tests for large values of e, answering a question of Dinur and Guruswami (FOCS 2013). Previous soundness analyses of these tests were known only for the case when either e = 1 or k = 1. Even for the case k = 1 and e > 1, earlier soundness analyses were not robust. We also analyze a derandomized version of this test, where (for example) the polynomials P_1 ,... , P_k can be the same random polynomial P. This generalizes a result of Guruswami et al. (STOC 2014). One of the key ingredients that go into the proof of this robust soundness is an extension of the standard Schwartz-Zippel lemma over general finite fields F_q, which may be of independent interest.
- Published
- 2016
- Full Text
- View/download PDF
131. Front Matter, Table of Contents, Preface, Conference Organization
- Author
-
Prahladh Harsha and G. Ramalingam, Harsha, Prahladh, Ramalingam, G., Prahladh Harsha and G. Ramalingam, Harsha, Prahladh, and Ramalingam, G.
- Abstract
Front Matter, Table of Contents, Preface, Conference Organization
- Published
- 2015
- Full Text
- View/download PDF
132. LIPIcs, Volume 45, FSTTCS'15, Complete Volume
- Author
-
Prahladh Harsha and G. Ramalingam, Harsha, Prahladh, Ramalingam, G., Prahladh Harsha and G. Ramalingam, Harsha, Prahladh, and Ramalingam, G.
- Abstract
LIPIcs, Volume 45, FSTTCS'15, Complete Volume
- Published
- 2015
- Full Text
- View/download PDF
133. Derandomized Graph Product Results Using the Low Degree Long Code
- Author
-
Irit Dinur and Prahladh Harsha and Srikanth Srinivasan and Girish Varma, Dinur, Irit, Harsha, Prahladh, Srinivasan, Srikanth, Varma, Girish, Irit Dinur and Prahladh Harsha and Srikanth Srinivasan and Girish Varma, Dinur, Irit, Harsha, Prahladh, Srinivasan, Srikanth, and Varma, Girish
- Abstract
In this paper, we address the question of whether the recent derandomization results obtained by the use of the low-degree long code can be extended to other product settings. We consider two settings: (1) the graph product results of Alon, Dinur, Friedgut and Sudakov [GAFA, 2004] and (2) the "majority is stablest" type of result obtained by Dinur, Mossel and Regev [SICOMP, 2009] and Dinur and Shinkar [In Proc. APPROX, 2010] while studying the hardness of approximate graph coloring. In our first result, we show that there exists a considerably smaller subgraph of K_3^{\otimes R} which exhibits the following property (shown for K_3^{\otimes R} by Alon et al.): independent sets close in size to the maximum independent set are well approximated by dictators. The "majority is stablest" type of result of Dinur et al. and Dinur and Shinkar shows that if there exist two sets of vertices A and B in K_3^{\otimes R} with very few edges with one endpoint in A and another in B, then it must be the case that the two sets A and B share a single influential coordinate. In our second result, we show that a similar "majority is stablest" statement holds good for a considerably smaller subgraph of K_3^{\otimes R}. Furthermore using this result, we give a more efficient reduction from Unique Games to the graph coloring problem, leading to improved hardness of approximation results for coloring.
- Published
- 2015
- Full Text
- View/download PDF
134. A Characterization of Hard-to-cover CSPs
- Author
-
Amey Bhangale and Prahladh Harsha and Girish Varma, Bhangale, Amey, Harsha, Prahladh, Varma, Girish, Amey Bhangale and Prahladh Harsha and Girish Varma, Bhangale, Amey, Harsha, Prahladh, and Varma, Girish
- Abstract
We continue the study of covering complexity of constraint satisfaction problems (CSPs) initiated by Guruswami, Håstad and Sudan [SIAM J. Computing, 31(6):1663--1686, 2002] and Dinur and Kol [in Proc. 28th IEEE Conference on Computational Complexity, 2013]. The covering number of a CSP instance Phi, denoted by nu(Phi) is the smallest number of assignments to the variables of Phi, such that each constraint of Phi is satisfied by at least one of the assignments. We show the following results regarding how well efficient algorithms can approximate the covering number of a given CSP instance. 1. Assuming a covering unique games conjecture, introduced by Dinur and Kol, we show that for every non-odd predicate P over any constant sized alphabet and every integer K, it is NP-hard to distinguish between P-CSP instances (i.e., CSP instances where all the constraints are of type P) which are coverable by a constant number of assignments and those whose covering number is at least K. Previously, Dinur and Kol, using the same covering unique games conjecture, had shown a similar hardness result for every non-odd predicate over the Boolean alphabet that supports a pairwise independent distribution. Our generalization yields a complete characterization of CSPs over constant sized alphabet Sigma that are hard to cover since CSPs over odd predicates are trivially coverable with |Sigma| assignments. 2. For a large class of predicates that are contained in the 2k-LIN predicate, we show that it is quasi-NP-hard to distinguish between instances which have covering number at most two and covering number at least Omega(log(log(n))). This generalizes the 4-LIN result of Dinur and Kol that states it is quasi-NP-hard to distinguish between 4-LIN-CSP instances which have covering number at most two and covering number at least Omega(log(log(log(n)))).
- Published
- 2015
- Full Text
- View/download PDF
135. An Invariance Principle for Polytopes
- Author
-
Adam R. Klivans, Raghu Meka, and Prahladh Harsha
- Subjects
Computational Geometry (cs.CG) ,FOS: Computer and information sciences ,Discrete Mathematics (cs.DM) ,Gaussian ,Pseudorandomness ,Polytope ,Pseudorandom generator ,Computational Complexity (cs.CC) ,Computer Science::Computational Complexity ,Machine Learning (cs.LG) ,Combinatorics ,symbols.namesake ,Intersection ,Integer ,Artificial Intelligence ,FOS: Mathematics ,Central limit theorem ,Mathematics ,Discrete mathematics ,Invariance principle ,Probability (math.PR) ,Binary logarithm ,Computer Science - Computational Complexity ,Computer Science - Learning ,Hardware and Architecture ,Control and Systems Engineering ,symbols ,Computer Science - Computational Geometry ,Hypercube ,Software ,Mathematics - Probability ,Information Systems ,Computer Science - Discrete Mathematics - Abstract
Let X be randomly chosen from {-1,1}^n, and let Y be randomly chosen from the standard spherical Gaussian on R^n. For any (possibly unbounded) polytope P formed by the intersection of k halfspaces, we prove that |Pr [X belongs to P] - Pr [Y belongs to P]| < log^{8/5}k * Delta, where Delta is a parameter that is small for polytopes formed by the intersection of "regular" halfspaces (i.e., halfspaces with low influence). The novelty of our invariance principle is the polylogarithmic dependence on k. Previously, only bounds that were at least linear in k were known. We give two important applications of our main result: (1) A polylogarithmic in k bound on the Boolean noise sensitivity of intersections of k "regular" halfspaces (previous work gave bounds linear in k). (2) A pseudorandom generator (PRG) with seed length O((log n)*poly(log k,1/delta)) that delta-fools all polytopes with k faces with respect to the Gaussian distribution. We also obtain PRGs with similar parameters that fool polytopes formed by intersection of regular halfspaces over the hypercube. Using our PRG constructions, we obtain the first deterministic quasi-polynomial time algorithms for approximately counting the number of solutions to a broad class of integer programs, including dense covering problems and contingency tables., Added a lowerbound and minor corrections
- Published
- 2009
136. Composition of Low-Error 2-Query PCPs Using Decodable PCPs
- Author
-
Prahladh Harsha and Irit Dinur
- Subjects
General Computer Science ,Computational complexity theory ,General Mathematics ,0102 computer and information sciences ,02 engineering and technology ,Mathematical proof ,01 natural sciences ,Constant error ,03 medical and health sciences ,Consistency (database systems) ,0302 clinical medicine ,Robustness (computer science) ,0202 electrical engineering, electronic engineering, information engineering ,Composition methods ,Mathematics ,Discrete mathematics ,Composition theorem ,business.industry ,Probabilistic logic ,020206 networking & telecommunications ,Composition (combinatorics) ,Modular design ,010201 computation theory & mathematics ,business ,030217 neurology & neurosurgery ,Decoding methods ,Modular composition - Abstract
The main result of this paper is a generic composition theorem for low error two-query probabilistically checkable proofs (PCPs). Prior to this work, composition of PCPs was well-understood only in the constant error regime. Existing composition methods in the low error regime were non-modular (i.e., very much tailored to the specific PCPs that were being composed), resulting in complicated constructions of PCPs. Furthermore, until recently, composition in the low error regime suffered from incurring an extra 'consistency' query, resulting in PCPs that are not 'two-query' and hence, much less useful for hardness-of-approximation reductions. In a recent breakthrough, Moshkovitz and Raz [In Proc. 49th IEEE Symp. on Foundations of Comp. Science (FOCS), 2008] constructed almost linear-sized low-error 2-query PCPs for every language in NP. Indeed, the main technical component of their construction is a novel composition of certain specific PCPs. We give a modular and simpler proof of their result by repeatedly applying the new composition theorem to known PCP components. To facilitate the new modular composition, we introduce a new variant of PCP, which we call a "decodable PCP (dPCP)". A dPCP is an encoding of an NP witness that is both locally checkable and locally decodable. The dPCP verifier in addition to verifying the validity of the given proof like a standard PCP verifier, also locally decodes the original NP witness. Our composition is generic in the sense that it works regardless of the way the component PCPs are constructed.
- Published
- 2009
- Full Text
- View/download PDF
137. A Strong Direct Product Theorem for the Tribes Function via the Smooth-Rectangle Bound
- Author
-
Prahladh Harsha and Rahul Jain, Harsha, Prahladh, Jain, Rahul, Prahladh Harsha and Rahul Jain, Harsha, Prahladh, and Jain, Rahul
- Abstract
The main result of this paper is an optimal strong direct product result for the two-party public-coin randomized communication complexity of the Tribes function. This is proved by providing an alternate proof of the optimal lower bound of Omega(n) for the randomised communication complexity of the Tribes function using the so-called smooth-rectangle bound, introduced by Jain and Klauck [CCC/2010]. The optimal Omega(n) lower bound for Tribes was originally proved by Jayram, Kumar and Sivakumar [STOC/2003], using a more powerful lower bound technique, namely the information complexity bound. The information complexity bound is known to be at least as strong a lower bound method as the smooth-rectangle bound [Kerenidis et al, 2012]. On the other hand, we are not aware of any function or relation for which the smooth-rectangle bound is (asymptotically) smaller than its public-coin randomized communication complexity. The optimal direct product for Tribes is obtained by combining our smooth-rectangle bound for tribes with the strong direct product result of Jain and Yao (2012) in terms of smooth-rectangle bound.
- Published
- 2013
- Full Text
- View/download PDF
138. Some 3CNF properties are hard to test
- Author
-
Sofya Raskhodnikova, Prahladh Harsha, and Eli Ben-Sasson
- Subjects
Property testing ,Discrete mathematics ,Property (philosophy) ,General Computer Science ,True quantified Boolean formula ,General Mathematics ,Linear space ,Hamming distance ,Context (language use) ,Sublinear algorithms ,Witness ,Test (assessment) ,Combinatorics ,Without loss of generality ,Low-density parity-check code ,Partially ordered set ,Linear number ,Mathematics - Abstract
For a Boolean formula $\phi$ on n variables, the associated property $P_\phi$ is the collection of n-bit strings that satisfy $\phi$. We study the query complexity of tests that distinguish (with high probability) between strings in $P_\phi$ and strings that are far from $P_\phi$ in Hamming distance. We prove that there are 3CNF formulae (with O(n) clauses) such that testing for the associated property requires $\Omega(n)$ queries, even with adaptive tests. This contrasts with 2CNF formulae, whose associated properties are always testable with $O(\sqrt{n})$ queries [E. Fischer et al., Monotonicity testing over general poset domains, in Proceedings of the 34th Annual ACM Symposium on Theory of Computing, ACM, New York, 2002, pp. 474--483]. Notice that for every negative instance (i.e., an assignment that does not satisfy $\phi$) there are three bit queries that witness this fact. Nevertheless, finding such a short witness requires reading a constant fraction of the input, even when the input is very far from satisfying the formula that is associated with the property. A property is linear if its elements form a linear space. We provide sufficient conditions for linear properties to be hard to test, and in the course of the proof include the following observations which are of independent interest: In the context of testing for linear properties, adaptive two-sided error tests have no more power than nonadaptive one-sided error tests. Moreover, without loss of generality, any test for a linear property is a linear test. A linear test verifies that a portion of the input satisfies a set of linear constraints, which define the property, and rejects if and only if it finds a falsified constraint. A linear test is by definition nonadaptive and, when applied to linear properties, has a one-sided error. Random low density parity check codes (which are known to have linear distance and constant rate) are not locally testable. In fact, testing such a code of length n requires $\Omega(n)$ queries.
139. 35th IARCS Annual Conference on Foundation of Software Technology and Theoretical Computer Science, FSTTCS 2015, December 16-18, 2015, Bangalore, India
- Author
-
Prahladh Harsha and G. Ramalingam
- Published
- 2015
140. An ω-Algebra for Real-Time Energy Problems
- Author
-
Cachera, David, Fahrenberg, Uli, Legay, Axel, Software certification with semantic analysis (CELTIQUE), LANGAGE ET GÉNIE LOGICIEL (IRISA-D4), Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), CentraleSupélec-Télécom Bretagne-Université de Rennes 1 (UR1), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-Institut National de Recherche en Informatique et en Automatique (Inria)-École normale supérieure - Rennes (ENS Rennes)-Université de Bretagne Sud (UBS)-Centre National de la Recherche Scientifique (CNRS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-CentraleSupélec-Télécom Bretagne-Université de Rennes 1 (UR1), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA)-Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria), Efficient STAtistical methods in SYstems of systems (ESTASYS), Inria Rennes – Bretagne Atlantique, Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-LANGAGE ET GÉNIE LOGICIEL (IRISA-D4), Université de Rennes (UNIV-RENNES)-Université de Rennes (UNIV-RENNES)-École normale supérieure - Rennes (ENS Rennes)-Université de Bretagne Sud (UBS)-Centre National de la Recherche Scientifique (CNRS)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Université de Rennes (UNIV-RENNES)-Institut National des Sciences Appliquées (INSA), Prahladh Harsha G. Ramalingam, ANR-13-INSE-0003,MALTHY,Méthodes ALgèbriques pour la vérification de modèles Temporisés et HYbrides(2013), Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Université de Rennes (UR)-Institut National des Sciences Appliquées - Rennes (INSA Rennes), Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Institut National de Recherche en Informatique et en Automatique (Inria)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)-Institut de Recherche en Informatique et Systèmes Aléatoires (IRISA), and Institut National des Sciences Appliquées (INSA)-Institut National des Sciences Appliquées (INSA)-Université de Bretagne Sud (UBS)-École normale supérieure - Rennes (ENS Rennes)-Télécom Bretagne-CentraleSupélec-Centre National de la Recherche Scientifique (CNRS)
- Subjects
FOS: Computer and information sciences ,Real time ,[INFO.INFO-FL]Computer Science [cs]/Formal Languages and Automata Theory [cs.FL] ,Formal Languages and Automata Theory (cs.FL) ,Star-continuous Kleene algebra ,[INFO]Computer Science [cs] ,Energy problem ,Computer Science::Databases ,Computer Science::Formal Languages and Automata Theory ,Logic in Computer Science (cs.LO) - Abstract
International audience; We develop a *-continuous Kleene ω-algebra of real-time energy functions. Together with corresponding automata, these can be used to model systems which can consume and regain energy (or other types of resources) depending on available time. Using recent results on *-continuous Kleene ω-algebras and computability of certain manipulations on real-time energy functions, it follows that reachability and Büchi acceptance in real-time energy automata can be decided in a static way which only involves manipulations of real-time energy functions.
- Published
- 2015
141. Simple Priced Timed Games Are Not That Simple
- Author
-
Brihaye, Thomas, Geeraerts, Gilles, Haddad, Axel, Lefaucheux, Engel, Monmege, Benjamin, Université de Mons (UMons), Université libre de Bruxelles (ULB), École normale supérieure - Cachan (ENS Cachan), Modélisation et Vérification (MOVE), Laboratoire d'informatique Fondamentale de Marseille (LIF), Aix Marseille Université (AMU)-École Centrale de Marseille (ECM)-Centre National de la Recherche Scientifique (CNRS)-Aix Marseille Université (AMU)-École Centrale de Marseille (ECM)-Centre National de la Recherche Scientifique (CNRS), Prahladh Harsha and G. Ramalingam, and Centre National de la Recherche Scientifique (CNRS)-École Centrale de Marseille (ECM)-Aix Marseille Université (AMU)-Centre National de la Recherche Scientifique (CNRS)-École Centrale de Marseille (ECM)-Aix Marseille Université (AMU)
- Subjects
FOS: Computer and information sciences ,Computer Science::Computer Science and Game Theory ,000 Computer science, knowledge, general works ,[INFO.INFO-GT]Computer Science [cs]/Computer Science and Game Theory [cs.GT] ,D.2.4 ,ComputingMilieux_PERSONALCOMPUTING ,[INFO.INFO-LO]Computer Science [cs]/Logic in Computer Science [cs.LO] ,[INFO.INFO-CL]Computer Science [cs]/Computation and Language [cs.CL] ,F.3.1 ,[INFO.INFO-FL]Computer Science [cs]/Formal Languages and Automata Theory [cs.FL] ,Computer Science - Computer Science and Game Theory ,Computer Science ,Priced timed games ,Real-time systems ,Game theory ,Computer Science and Game Theory (cs.GT) - Abstract
International audience; Priced timed games are two-player zero-sum games played on priced timed automata (whose locations and transitions are labeled by weights modeling the costs of spending time in a state and executing an action, respectively). The goals of the players are to minimise and maximise the cost to reach a target location, respectively. We consider priced timed games with one clock and arbitrary (positive and negative) weights and show that, for an important subclass of theirs (the so-called simple priced timed games), one can compute, in exponential time, the optimal values that the players can achieve, with their associated optimal strategies. As side results, we also show that one-clock priced timed games are determined and that we can use our result on simple priced timed games to solve the more general class of so-called reset-acyclic priced timed games (with arbitrary weights and one-clock).
- Published
- 2015
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.