The Proof That N

نویسنده

  • K. Mehlhorn
چکیده

is similar to the proof of Theorem 2.4 ((rst direction), together with the second part of Lemma 4.3 that guarantees that D 1 (e) = D 1 (e f) D 1 (e g). Using the last two theorems, we get Let us now brieey discuss the case of computing general relations and not necessarily functions. The equality in Lemma 4.3 part (1), does not hold anymore. However, by FKN91] the two sides cannot be too far. As a result, Theorem 4.4 is changed as well and it claims: Let R and S be two relations. Then Simple lower bound for monotone clique using a communication game", Information Processing Letters, 41, pp. 221-226 (1992). K71] V. Khrapchenko, \A method of determining lower bounds for the complexity of-schemes", Now, we can come back to the proof of Theorem 4.1. To analyze the two-round deterministic communication complexity of a relation R, we deene the following hypergraph H 2 R. The vertices are again all the pairs in f0; 1g n f0; 1g n. The hyperedges are all the rectangles of the form A f0; 1g n , where A f0; 1g n. Now, for each such hyperedge e we deene its weight to be D 1 (e), the one-way deterministic communication complexity of computing R on the sub-domain e. in the opposite direction, let us concentrate for a while on the case of computing functions. We need the following lemma.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A SHORT PROOF OF A RESULT OF NAGEL

Let $(R,fm)$ be a Gorenstein local ring and$M,N$ be two finitely generated modules over $R$. Nagel proved that if $M$ and $N$ are inthe same even liaison class, thenone has $H^i_{fm}(M)cong H^i_{fm}(N)$ for all $iIn this paper, we provide a short proof to this result.

متن کامل

The Basic Theorem and its Consequences

Let T be a compact Hausdorff topological space and let M denote an n–dimensional subspace of the space C(T ), the space of real–valued continuous functions on T and let the space be equipped with the uniform norm. Zukhovitskii [7] attributes the Basic Theorem to E.Ya.Remez and gives a proof by duality. He also gives a proof due to Shnirel’man, which uses Helly’s Theorem, now the paper obtains a...

متن کامل

On the Closed-Form Solution of a Nonlinear Difference Equation and Another Proof to Sroysang’s Conjecture

The purpose of this paper is twofold. First we derive theoretically, using appropriate transformation on x(n), the closed-form solution of the nonlinear difference equation x(n+1) = 1/(±1 + x(n)), n ∈ N_0. The form of solution of this equation, however, was first obtained in [10] but through induction principle. Then, with the solution of the above equation at hand, we prove a case ...

متن کامل

Comparison of Conflict Management Strategies of Physical Education Office Managers Based on some Demographic Characteristics

The purpose of study was comparison of conflict management strategies of physical education office managers based on their some demographic characteristics. All of managers of physical education office of Mazandaran (n = 15) and Guilan (n = 16) province and their assistant [(n = 15) and (n =16) respectively] response to Putnam and Wilson’s “organizational communication conflict instrument (OCCI...

متن کامل

Outlier test for a group of multivariate observations

Assume that we have m independent random samples each of size n from Np(; ) and our goal is to test whether or not the ith sample is an outlier (i=1,2,…..m). To date it is well known that a test statistics exist whose null distribution is Betta and given the relationship between Betta and F distribution, an F test statistic can be used. In the statistical literature however a clear and preci...

متن کامل

A new security proof for FMNV continuous non-malleable encoding scheme

A non-malleable code is a variant of an encoding scheme which is resilient to tampering attacks. The main idea behind non-malleable coding is that the adversary should not be able to obtain any valuable information about the message. Non-malleable codes are used in tamper-resilient cryptography and protecting memories against tampering attacks. Many different types of non-malleability have alre...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 1992