Lecture 16: Communication Complexity

نویسنده

  • Paul Beame
چکیده

Definition 1.1. Formally, a protocol P is a rooted binary tree with each internal node v labelled by either “A” or “B” and two out-edges, one labelled 0 and the other labelled 1. Each leaf has an output label (typically in {0, 1}. There is a function fv associated with node v; if v is labelled A then fv : X → {0, 1} and if v is labelled B then fv : Y → {0, 1}. The bit sent at node v is sent by the corresponding player and the value is fv(x) if v has label A and fv(y) if v has label B. The output P (x, y) of the protocol on input (x, y) ∈ X × Y is the label of the leaf reached on input x. The cost of the protocol is the height of P .

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

5 . Applications to streaming

In this lecture, we will see applications of communication complexity to proving lower bounds for streaming algorithms. Towards the end of the lecture, we will introduce combinatorial auctions, and we will see applications of communication complexity to auctions in the next lecture. The references for this lecture include Lecture 7 of Troy Lee’s course on communication complexity [Lee10], Lectu...

متن کامل

CS369E: Communication Complexity (for Algorithm Designers) Lecture #3: Lower Bounds for Compressive Sensing∗

We begin with an appetizer before starting the lecture proper — an example that demonstrates that randomized one-way communication protocols can sometimes exhibit surprising power. It won’t surprise you that the Equality function — with f(x,y) = 1 if and only if x = y — is a central problem in communication complexity. It’s easy to prove, by the Pigeonhole Principle, that its deterministic one-...

متن کامل

Lecture 18 - 19 : Communication complexity lower bounds

In the previous lecture we discussed the fooling set method for proving lower bounds on deterministic communication complexity. In this lecture we’ll see two more ways we can prove these lower bounds: the Rectangle Size Method and the Rank Method. Both of these are stronger than the fooling set method. We’ll show Ω(n) lower bounds for the dot product function with both methods while the fooling...

متن کامل

A Comparative Study on the Effect of lecture and multimedia Training of applying SBAR communication model on Emergency Nurses’ Knowledge, attitude and performance of nursing documentation in Selected Military Hospitals

Introduction: Nursing recording and reporting is an important part of nursing care that can be useful and necessary for patients, nurses, and other health care providers. Objective: The purpose of this study was to compare the effect of lecture training and multimedia training on knowledge, attitude and department nurses’ emergency performance in applying a communication model in nursing recor...

متن کامل

Matrix Rank in Communication Complexity

This lecture focuses on proving communication lower bounds using matrix rank. Similar to fooling sets and rectangle size bounds, the matrix rank technique also gives a lower bound on the number of monochromatic rectangles in any partition of X × Y but it does so in an algebraic way[1]. This makes algebraic tools available for proving communication lower bounds. We begin by solving the problem a...

متن کامل

CS 369 E : Communication Complexity ( for Algorithm Designers ) Lecture # 9 : Lower Bounds in Property Testing ∗

We first give a brief introduction to the field of property testing. Section 3 gives upper bounds for the canonical property of “monotonicity testing,” and Section 4 shows how to derive property testing lower bounds from communication complexity lower bounds. We won’t need to develop any new communication complexity; our existing toolbox (specifically, Disjointness) is already rich enough to de...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016