-
The Communication Complexity of Approximating Matrix Rank
Authors:
Alexander A. Sherstov,
Andrey A. Storozhenko
Abstract:
We fully determine the communication complexity of approximating matrix rank, over any finite field $\mathbb{F}$. We study the most general version of this problem, where $0\leq r<R\leq n$ are given integers, Alice and Bob's inputs are matrices $A,B\in\mathbb{F}^{n\times n}$, respectively, and they need to distinguish between the cases $\mathrm{rk}(A+B)=r$ and $\mathrm{rk}(A+B)=R$. We show that th…
▽ More
We fully determine the communication complexity of approximating matrix rank, over any finite field $\mathbb{F}$. We study the most general version of this problem, where $0\leq r<R\leq n$ are given integers, Alice and Bob's inputs are matrices $A,B\in\mathbb{F}^{n\times n}$, respectively, and they need to distinguish between the cases $\mathrm{rk}(A+B)=r$ and $\mathrm{rk}(A+B)=R$. We show that this problem has randomized communication complexity $Ω(1+r^{2}\log|\mathbb{F}|)$. This is optimal in a strong sense because $O(1+r^{2}\log|\mathbb{F}|)$ communication is sufficient to determine, for arbitrary $A,B$, whether $\mathrm{rk}(A+B)\leq r$. Prior to our work, lower bounds were known only for consecutive integers $r$ and $R$, with no implication for the approximation of matrix rank. Our lower bound holds even for quantum protocols and even for error probability $\frac{1}{2}-\frac{1}{4}|\mathbb{F}|^{-r/3}$, which too is virtually optimal because the problem has a two-bit classical protocol with error $\frac{1}{2}-Θ(|\mathbb{F}|^{-r})$.
As an application, we obtain an $Ω(\frac{1}{k}\cdot n^{2}\log|\mathbb{F}|)$ space lower bound for any streaming algorithm with $k$ passes that approximates the rank of an input matrix $M\in\mathbb{F}^{n\times n}$ within a factor of $\sqrt{2}-δ$, for any $δ>0$. Our result is an exponential improvement in $k$ over previous work.
We also settle the randomized and quantum communication complexity of several other linear-algebraic problems, for all settings of parameters. This includes the determinant problem (given matrices $A$ and $B$, distinguish between the cases $\mathrm{det}(A+B)=a$ and $\mathrm{det}(A+B)=b$, for fixed field elements $a\ne b)$ and the subspace sum and subspace intersection problem (given subspaces $S$ and $T$ of known dimensions $m$ and $\ell$, respectively, approximate the dimensions of $S+T$ and $S\cap T$).
△ Less
Submitted 26 October, 2024;
originally announced October 2024.
-
The Approximate Degree of DNF and CNF Formulas
Authors:
Alexander A. Sherstov
Abstract:
The approximate degree of a Boolean function $f\colon\{0,1\}^n\to\{0,1\}$ is the minimum degree of a real polynomial $p$ that approximates $f$ pointwise: $|f(x)-p(x)|\leq1/3$ for all $x\in\{0,1\}^n.$ For every $δ>0,$ we construct CNF and DNF formulas of polynomial size with approximate degree $Ω(n^{1-δ}),$ essentially matching the trivial upper bound of $n.$ This improves polynomially on previous…
▽ More
The approximate degree of a Boolean function $f\colon\{0,1\}^n\to\{0,1\}$ is the minimum degree of a real polynomial $p$ that approximates $f$ pointwise: $|f(x)-p(x)|\leq1/3$ for all $x\in\{0,1\}^n.$ For every $δ>0,$ we construct CNF and DNF formulas of polynomial size with approximate degree $Ω(n^{1-δ}),$ essentially matching the trivial upper bound of $n.$ This improves polynomially on previous lower bounds and fully resolves the approximate degree of constant-depth circuits ($\text{AC}^0$), a question that has seen extensive research over the past 10 years. Previously, an $Ω(n^{1-δ})$ lower bound was known only for $\text{AC}^0$ circuits of depth that grows with $1/δ$ (Bun and Thaler, FOCS 2017). Moreover, our CNF and DNF formulas are the simplest possible in that they have constant width. Our result holds even for one-sided approximation, and has the following further consequences.
(i) We essentially settle the communication complexity of $\text{AC}^0$ circuits in the bounded-error quantum model, $k$-party number-on-the-forehead randomized model, and $k$-party number-on-the-forehead nondeterministic model: we prove that for every $δ>0$, these models require $Ω(n^{1-δ})$, $Ω(n/4^kk^2)^{1-δ}$, and $Ω(n/4^kk^2)^{1-δ}$, respectively, bits of communication even for polynomial-size constant-width CNF formulas.
(ii) In particular, we show that the multiparty communication class $\text{coNP}_k$ can be separated essentially optimally from $\text{NP}_k$ and $\text{BPP}_k$ by a particularly simple function, a polynomial-size constant-width CNF.
(iii) We give an essentially tight separation, of $O(1)$ versus $Ω(n^{1-δ})$, for the one-sided versus two-sided approximate degree of a function; and $O(1)$ versus $Ω(n^{1-δ})$ for the one-sided approximate degree of a function $f$ versus its negation $\neg f$.
△ Less
Submitted 4 September, 2022;
originally announced September 2022.
-
An Optimal Separation of Randomized and Quantum Query Complexity
Authors:
Alexander A. Sherstov,
Andrey A. Storozhenko,
Pei Wu
Abstract:
We prove that for every decision tree, the absolute values of the Fourier coefficients of a given order $\ell\geq1$ sum to at most $c^{\ell}\sqrt{\binom{d}{\ell}(1+\log n)^{\ell-1}},$ where $n$ is the number of variables, $d$ is the tree depth, and $c>0$ is an absolute constant. This bound is essentially tight and settles a conjecture due to Tal (arxiv 2019; FOCS 2020). The bounds prior to our wor…
▽ More
We prove that for every decision tree, the absolute values of the Fourier coefficients of a given order $\ell\geq1$ sum to at most $c^{\ell}\sqrt{\binom{d}{\ell}(1+\log n)^{\ell-1}},$ where $n$ is the number of variables, $d$ is the tree depth, and $c>0$ is an absolute constant. This bound is essentially tight and settles a conjecture due to Tal (arxiv 2019; FOCS 2020). The bounds prior to our work degraded rapidly with $\ell,$ becoming trivial already at $\ell=\sqrt{d}.$
As an application, we obtain, for every integer $k\geq1,$ a partial Boolean function on $n$ bits that has bounded-error quantum query complexity at most $k$ and randomized query complexity $\tildeΩ(n^{1-\frac{1}{2k}}).$ This separation of bounded-error quantum versus randomized query complexity is best possible, by the results of Aaronson and Ambainis (STOC 2015) and Bravyi, Gosset, Grier, and Schaeffer (2021). Prior to our work, the best known separation was polynomially weaker: $O(1)$ versus $Ω(n^{2/3-ε})$ for any $ε>0$ (Tal, FOCS 2020).
As another application, we obtain an essentially optimal separation of $O(\log n)$ versus $Ω(n^{1-ε})$ for bounded-error quantum versus randomized communication complexity, for any $ε>0.$ The best previous separation was polynomially weaker: $O(\log n)$ versus $Ω(n^{2/3-ε})$ (implicit in Tal, FOCS 2020).
△ Less
Submitted 29 January, 2023; v1 submitted 24 August, 2020;
originally announced August 2020.
-
Quantum Communication Complexity of Distribution Testing
Authors:
Aleksandrs Belovs,
Arturo Castellanos,
François Le Gall,
Guillaume Malod,
Alexander A. Sherstov
Abstract:
The classical communication complexity of testing closeness of discrete distributions has recently been studied by Andoni, Malkin and Nosatzki (ICALP'19). In this problem, two players each receive $t$ samples from one distribution over $[n]$, and the goal is to decide whether their two distributions are equal, or are $ε$-far apart in the $l_1$-distance. In the present paper we show that the quantu…
▽ More
The classical communication complexity of testing closeness of discrete distributions has recently been studied by Andoni, Malkin and Nosatzki (ICALP'19). In this problem, two players each receive $t$ samples from one distribution over $[n]$, and the goal is to decide whether their two distributions are equal, or are $ε$-far apart in the $l_1$-distance. In the present paper we show that the quantum communication complexity of this problem is $\tilde{O}(n/(tε^2))$ qubits when the distributions have low $l_2$-norm, which gives a quadratic improvement over the classical communication complexity obtained by Andoni, Malkin and Nosatzki. We also obtain a matching lower bound by using the pattern matrix method. Let us stress that the samples received by each of the parties are classical, and it is only communication between them that is quantum. Our results thus give one setting where quantum protocols overcome classical protocols for a testing problem with purely classical samples.
△ Less
Submitted 26 June, 2020;
originally announced June 2020.
-
Vanishing-Error Approximate Degree and QMA Complexity
Authors:
Alexander A. Sherstov,
Justin Thaler
Abstract:
The $ε$-approximate degree of a function $f\colon X \to \{0, 1\}$ is the least degree of a multivariate real polynomial $p$ such that $|p(x)-f(x)| \leq ε$ for all $x \in X$. We determine the $ε$-approximate degree of the element distinctness function, the surjectivity function, and the permutation testing problem, showing they are $Θ(n^{2/3} \log^{1/3}(1/ε))$, $\tildeΘ(n^{3/4} \log^{1/4}(1/ε))$, a…
▽ More
The $ε$-approximate degree of a function $f\colon X \to \{0, 1\}$ is the least degree of a multivariate real polynomial $p$ such that $|p(x)-f(x)| \leq ε$ for all $x \in X$. We determine the $ε$-approximate degree of the element distinctness function, the surjectivity function, and the permutation testing problem, showing they are $Θ(n^{2/3} \log^{1/3}(1/ε))$, $\tildeΘ(n^{3/4} \log^{1/4}(1/ε))$, and $Θ(n^{1/3} \log^{2/3}(1/ε))$, respectively. Previously, these bounds were known only for constant $ε.$
We also derive a connection between vanishing-error approximate degree and quantum Merlin--Arthur (QMA) query complexity. We use this connection to show that the QMA complexity of permutation testing is $Ω(n^{1/4})$. This improves on the previous best lower bound of $Ω(n^{1/6})$ due to Aaronson (Quantum Information & Computation, 2012), and comes somewhat close to matching a known upper bound of $O(n^{1/3})$.
△ Less
Submitted 16 September, 2019;
originally announced September 2019.
-
The Hardest Halfspace
Authors:
Alexander A. Sherstov
Abstract:
We study the approximation of halfspaces $h:\{0,1\}^n\to\{0,1\}$ in the infinity norm by polynomials and rational functions of any given degree. Our main result is an explicit construction of the "hardest" halfspace, for which we prove polynomial and rational approximation lower bounds that match the trivial upper bounds achievable for all halfspaces. This completes a lengthy line of work started…
▽ More
We study the approximation of halfspaces $h:\{0,1\}^n\to\{0,1\}$ in the infinity norm by polynomials and rational functions of any given degree. Our main result is an explicit construction of the "hardest" halfspace, for which we prove polynomial and rational approximation lower bounds that match the trivial upper bounds achievable for all halfspaces. This completes a lengthy line of work started by Myhill and Kautz (1961).
As an application, we construct a communication problem that achieves essentially the largest possible separation, of $O(n)$ versus $2^{-Ω(n)},$ between the sign-rank and discrepancy. Equivalently, our problem exhibits a gap of $\log n$ versus $Ω(n)$ between the communication complexity with unbounded versus weakly unbounded error, improving quadratically on previous constructions and completing a line of work started by Babai, Frankl, and Simon (FOCS 1986). Our results further generalize to the $k$-party number-on-the-forehead model, where we obtain an explicit separation of $\log n$ versus $Ω(n/4^{n})$ for communication with unbounded versus weakly unbounded error. This gap is a quadratic improvement on previous work and matches the state of the art for number-on-the-forehead lower bounds.
△ Less
Submitted 5 February, 2019;
originally announced February 2019.
-
Near-Optimal Lower Bounds on the Threshold Degree and Sign-Rank of AC^0
Authors:
Alexander A. Sherstov,
Pei Wu
Abstract:
The threshold degree of a Boolean function $f\colon\{0,1\}^n\to\{0,1\}$ is the minimum degree of a real polynomial $p$ that represents $f$ in sign: $\mathrm{sgn}\; p(x)=(-1)^{f(x)}.$ A related notion is sign-rank, defined for a Boolean matrix $F=[F_{ij}]$ as the minimum rank of a real matrix $M$ with $\mathrm{sgn}\; M_{ij}=(-1)^{F_{ij}}$. Determining the maximum threshold degree and sign-rank achi…
▽ More
The threshold degree of a Boolean function $f\colon\{0,1\}^n\to\{0,1\}$ is the minimum degree of a real polynomial $p$ that represents $f$ in sign: $\mathrm{sgn}\; p(x)=(-1)^{f(x)}.$ A related notion is sign-rank, defined for a Boolean matrix $F=[F_{ij}]$ as the minimum rank of a real matrix $M$ with $\mathrm{sgn}\; M_{ij}=(-1)^{F_{ij}}$. Determining the maximum threshold degree and sign-rank achievable by constant-depth circuits ($\text{AC}^{0}$) is a well-known and extensively studied open problem, with complexity-theoretic and algorithmic applications.
We give an essentially optimal solution to this problem. For any $ε>0,$ we construct an $\text{AC}^{0}$ circuit in $n$ variables that has threshold degree $Ω(n^{1-ε})$ and sign-rank $\exp(Ω(n^{1-ε})),$ improving on the previous best lower bounds of $Ω(\sqrt{n})$ and $\exp(\tildeΩ(\sqrt{n}))$, respectively. Our results subsume all previous lower bounds on the threshold degree and sign-rank of $\text{AC}^{0}$ circuits of any given depth, with a strict improvement starting at depth $4$. As a corollary, we also obtain near-optimal bounds on the discrepancy, threshold weight, and threshold density of $\text{AC}^{0}$, strictly subsuming previous work on these quantities. Our work gives some of the strongest lower bounds to date on the communication complexity of $\text{AC}^{0}$.
△ Less
Submitted 4 January, 2019;
originally announced January 2019.
-
Algorithmic Polynomials
Authors:
Alexander A. Sherstov
Abstract:
The approximate degree of a Boolean function $f(x_{1},x_{2},\ldots,x_{n})$ is the minimum degree of a real polynomial that approximates $f$ pointwise within $1/3$. Upper bounds on approximate degree have a variety of applications in learning theory, differential privacy, and algorithm design in general. Nearly all known upper bounds on approximate degree arise in an existential manner from bounds…
▽ More
The approximate degree of a Boolean function $f(x_{1},x_{2},\ldots,x_{n})$ is the minimum degree of a real polynomial that approximates $f$ pointwise within $1/3$. Upper bounds on approximate degree have a variety of applications in learning theory, differential privacy, and algorithm design in general. Nearly all known upper bounds on approximate degree arise in an existential manner from bounds on quantum query complexity. We develop a first-principles, classical approach to the polynomial approximation of Boolean functions. We use it to give the first constructive upper bounds on the approximate degree of several fundamental problems:
- $O\bigl(n^{\frac{3}{4}-\frac{1}{4(2^{k}-1)}}\bigr)$ for the $k$-element distinctness problem;
- $O(n^{1-\frac{1}{k+1}})$ for the $k$-subset sum problem;
- $O(n^{1-\frac{1}{k+1}})$ for any $k$-DNF or $k$-CNF formula;
- $O(n^{3/4})$ for the surjectivity problem.
In all cases, we obtain explicit, closed-form approximating polynomials that are unrelated to the quantum arguments from previous work. Our first three results match the bounds from quantum query complexity. Our fourth result improves polynomially on the $Θ(n)$ quantum query complexity of the problem and refutes the conjecture by several experts that surjectivity has approximate degree $Ω(n)$. In particular, we exhibit the first natural problem with a polynomial gap between approximate degree and quantum query complexity.
△ Less
Submitted 14 January, 2018;
originally announced January 2018.
-
Inner Product and Set Disjointness: Beyond Logarithmically Many Parties
Authors:
Vladimir V. Podolskii,
Alexander A. Sherstov
Abstract:
A basic goal in complexity theory is to understand the communication complexity of number-on-the-forehead problems $f\colon(\{0,1\}^n)^{k}\to\{0,1\}$ with $k\gg\log n$ parties. We study the problems of inner product and set disjointness and determine their randomized communication complexity for every $k\geq\log n$, showing in both cases that $Θ(1+\lceil\log n\rceil/\log\lceil1+k/\log n\rceil)$ bi…
▽ More
A basic goal in complexity theory is to understand the communication complexity of number-on-the-forehead problems $f\colon(\{0,1\}^n)^{k}\to\{0,1\}$ with $k\gg\log n$ parties. We study the problems of inner product and set disjointness and determine their randomized communication complexity for every $k\geq\log n$, showing in both cases that $Θ(1+\lceil\log n\rceil/\log\lceil1+k/\log n\rceil)$ bits are necessary and sufficient. In particular, these problems admit constant-cost protocols if and only if the number of parties is $k\geq n^ε$ for some constant $ε>0.$
△ Less
Submitted 28 November, 2017;
originally announced November 2017.
-
Strong direct product theorems for quantum communication and query complexity
Authors:
Alexander A. Sherstov
Abstract:
A strong direct product theorem (SDPT) states that solving n instances of a problem requires Omega(n) times the resources for a single instance, even to achieve success probability exp(-Omega(n)). We prove that quantum communication complexity obeys an SDPT whenever the communication lower bound for a single instance is proved by the generalized discrepancy method, the strongest technique in that…
▽ More
A strong direct product theorem (SDPT) states that solving n instances of a problem requires Omega(n) times the resources for a single instance, even to achieve success probability exp(-Omega(n)). We prove that quantum communication complexity obeys an SDPT whenever the communication lower bound for a single instance is proved by the generalized discrepancy method, the strongest technique in that model. We prove that quantum query complexity obeys an SDPT whenever the query lower bound for a single instance is proved by the polynomial method, one of the two main techniques in that model. In both models, we prove the corresponding XOR lemmas and threshold direct product theorems.
△ Less
Submitted 22 November, 2010;
originally announced November 2010.
-
A Separation of NP and coNP in Multiparty Communication Complexity
Authors:
Dmytro Gavinsky,
Alexander A. Sherstov
Abstract:
We prove that NP differs from coNP and coNP is not a subset of MA in the number-on-forehead model of multiparty communication complexity for up to k = (1-ε)log(n) players, where ε>0 is any constant. Specifically, we construct a function F with co-nondeterministic complexity O(log(n)) and Merlin-Arthur complexity n^{Ω(1)}. The problem was open for k > 2.
We prove that NP differs from coNP and coNP is not a subset of MA in the number-on-forehead model of multiparty communication complexity for up to k = (1-ε)log(n) players, where ε>0 is any constant. Specifically, we construct a function F with co-nondeterministic complexity O(log(n)) and Merlin-Arthur complexity n^{Ω(1)}. The problem was open for k > 2.
△ Less
Submitted 6 April, 2010;
originally announced April 2010.
-
Optimal bounds for sign-representing the intersection of two halfspaces by polynomials
Authors:
Alexander A. Sherstov
Abstract:
The threshold degree of a function f:{0,1}^n->{-1,+1} is the least degree of a real polynomial p with f(x)=sgn p(x). We prove that the intersection of two halfspaces on {0,1}^n has threshold degree Omega(n), which matches the trivial upper bound and completely answers a question due to Klivans (2002). The best previous lower bound was Omega(sqrt n). Our result shows that the intersection of two…
▽ More
The threshold degree of a function f:{0,1}^n->{-1,+1} is the least degree of a real polynomial p with f(x)=sgn p(x). We prove that the intersection of two halfspaces on {0,1}^n has threshold degree Omega(n), which matches the trivial upper bound and completely answers a question due to Klivans (2002). The best previous lower bound was Omega(sqrt n). Our result shows that the intersection of two halfspaces on {0,1}^n only admits a trivial 2^{Theta(n)}-time learning algorithm based on sign-representation by polynomials, unlike the advances achieved in PAC learning DNF formulas and read-once Boolean formulas. The proof introduces a new technique of independent interest, based on Fourier analysis and matrix theory.
△ Less
Submitted 24 February, 2010; v1 submitted 22 October, 2009;
originally announced October 2009.
-
The intersection of two halfspaces has high threshold degree
Authors:
Alexander A. Sherstov
Abstract:
The threshold degree of a Boolean function f:{0,1}^n->{-1,+1} is the least degree of a real polynomial p such that f(x)=sgn p(x). We construct two halfspaces on {0,1}^n whose intersection has threshold degree Theta(sqrt n), an exponential improvement on previous lower bounds. This solves an open problem due to Klivans (2002) and rules out the use of perceptron-based techniques for PAC learning t…
▽ More
The threshold degree of a Boolean function f:{0,1}^n->{-1,+1} is the least degree of a real polynomial p such that f(x)=sgn p(x). We construct two halfspaces on {0,1}^n whose intersection has threshold degree Theta(sqrt n), an exponential improvement on previous lower bounds. This solves an open problem due to Klivans (2002) and rules out the use of perceptron-based techniques for PAC learning the intersection of two halfspaces, a central unresolved challenge in computational learning. We also prove that the intersection of two majority functions has threshold degree Omega(log n), which is tight and settles a conjecture of O'Donnell and Servedio (2003).
Our proof consists of two parts. First, we show that for any nonconstant Boolean functions f and g, the intersection f(x)^g(y) has threshold degree O(d) if and only if ||f-F||_infty + ||g-G||_infty < 1 for some rational functions F, G of degree O(d). Second, we settle the least degree required for approximating a halfspace and a majority function to any given accuracy by rational functions.
Our technique further allows us to make progress on Aaronson's challenge (2008) and contribute strong direct product theorems for polynomial representations of composed Boolean functions of the form F(f_1,...,f_n). In particular, we give an improved lower bound on the approximate degree of the AND-OR tree.
△ Less
Submitted 12 October, 2009;
originally announced October 2009.
-
The Pattern Matrix Method (Journal Version)
Authors:
Alexander A. Sherstov
Abstract:
We develop a novel and powerful technique for communication lower bounds, the pattern matrix method. Specifically, fix an arbitrary function f:{0,1}^n->{0,1} and let A_f be the matrix whose columns are each an application of f to some subset of the variables x_1,x_2,...,x_{4n}. We prove that A_f has bounded-error communication complexity Omega(d), where d is the approximate degree of f. This res…
▽ More
We develop a novel and powerful technique for communication lower bounds, the pattern matrix method. Specifically, fix an arbitrary function f:{0,1}^n->{0,1} and let A_f be the matrix whose columns are each an application of f to some subset of the variables x_1,x_2,...,x_{4n}. We prove that A_f has bounded-error communication complexity Omega(d), where d is the approximate degree of f. This result remains valid in the quantum model, regardless of prior entanglement. In particular, it gives a new and simple proof of Razborov's breakthrough quantum lower bounds for disjointness and other symmetric predicates. We further characterize the discrepancy, approximate rank, and approximate trace norm of A_f in terms of well-studied analytic properties of f, broadly generalizing several recent results on small-bias communication and agnostic learning. The method of this paper has recently enabled important progress in multiparty communication complexity.
△ Less
Submitted 23 June, 2009;
originally announced June 2009.
-
On Quantum-Classical Equivalence for Composed Communication Problems
Authors:
Alexander A. Sherstov
Abstract:
An open problem in communication complexity proposed by several authors is to prove that for every Boolean function f, the task of computing f(x AND y) has polynomially related classical and quantum bounded-error complexities. We solve a variant of this question. For every f, we prove that the task of computing, on input x and y, both of the quantities f(x AND y) and f(x OR y) has polynomially r…
▽ More
An open problem in communication complexity proposed by several authors is to prove that for every Boolean function f, the task of computing f(x AND y) has polynomially related classical and quantum bounded-error complexities. We solve a variant of this question. For every f, we prove that the task of computing, on input x and y, both of the quantities f(x AND y) and f(x OR y) has polynomially related classical and quantum bounded-error complexities. We further show that the quantum bounded-error complexity is polynomially related to the classical deterministic complexity and the block sensitivity of f. This result holds regardless of prior entanglement.
△ Less
Submitted 3 February, 2010; v1 submitted 7 June, 2009;
originally announced June 2009.
-
Communication Lower Bounds Using Dual Polynomials
Authors:
Alexander A. Sherstov
Abstract:
Representations of Boolean functions by real polynomials play an important role in complexity theory. Typically, one is interested in the least degree of a polynomial p(x_1,...,x_n) that approximates or sign-represents a given Boolean function f(x_1,...,x_n). This article surveys a new and growing body of work in communication complexity that centers around the dual objects, i.e., polynomials th…
▽ More
Representations of Boolean functions by real polynomials play an important role in complexity theory. Typically, one is interested in the least degree of a polynomial p(x_1,...,x_n) that approximates or sign-represents a given Boolean function f(x_1,...,x_n). This article surveys a new and growing body of work in communication complexity that centers around the dual objects, i.e., polynomials that certify the difficulty of approximating or sign-representing a given function. We provide a unified guide to the following results, complete with all the key proofs:
(1) Sherstov's Degree/Discrepancy Theorem, which translates lower bounds on the threshold degree of a Boolean function into upper bounds on the discrepancy of a related function;
(2) Two different methods for proving lower bounds on bounded-error communication based on the approximate degree: Sherstov's pattern matrix method and Shi and Zhu's block composition method;
(3) Extension of the pattern matrix method to the multiparty model, obtained by Lee and Shraibman and by Chattopadhyay and Ada, and the resulting improved lower bounds for DISJOINTNESS;
(4) David and Pitassi's separation of NP and BPP in multiparty communication complexity for k=(1-eps)log n players.
△ Less
Submitted 14 May, 2008;
originally announced May 2008.