-
Strong bounds for skew corner-free sets
Authors:
Michael Jaber,
Shachar Lovett,
Anthony Ostuni
Abstract:
Motivated by applications to matrix multiplication algorithms, Pratt asked (ITCS'24) how large a subset of $[n] \times [n]$ could be without containing a skew-corner: three points $(x,y), (x,y+h),(x+h,y')$ with $h \ne 0$. We prove any skew corner-free set has size at most $\exp(-Ω(\log^{1/12} n))\cdot n^2$, nearly matching the best known lower bound of $\exp(-O(\sqrt{\log n}))\cdot n^2$ by Beker (…
▽ More
Motivated by applications to matrix multiplication algorithms, Pratt asked (ITCS'24) how large a subset of $[n] \times [n]$ could be without containing a skew-corner: three points $(x,y), (x,y+h),(x+h,y')$ with $h \ne 0$. We prove any skew corner-free set has size at most $\exp(-Ω(\log^{1/12} n))\cdot n^2$, nearly matching the best known lower bound of $\exp(-O(\sqrt{\log n}))\cdot n^2$ by Beker (arXiv'24). Our techniques generalize those of Kelley and Meka's recent breakthrough on three-term arithmetic progression (FOCS'23), answering a question of Beker (arXiv'24). We note that a similar bound was obtained concurrently and independently by Milićević (arXiv'24).
△ Less
Submitted 13 April, 2024; v1 submitted 10 April, 2024;
originally announced April 2024.
-
Explicit separations between randomized and deterministic Number-on-Forehead communication
Authors:
Zander Kelley,
Shachar Lovett,
Raghu Meka
Abstract:
We study the power of randomness in the Number-on-Forehead (NOF) model in communication complexity. We construct an explicit 3-player function $f:[N]^3 \to \{0,1\}$, such that: (i) there exist a randomized NOF protocol computing it that sends a constant number of bits; but (ii) any deterministic or nondeterministic NOF protocol computing it requires sending about $(\log N)^{1/3}$ many bits. This e…
▽ More
We study the power of randomness in the Number-on-Forehead (NOF) model in communication complexity. We construct an explicit 3-player function $f:[N]^3 \to \{0,1\}$, such that: (i) there exist a randomized NOF protocol computing it that sends a constant number of bits; but (ii) any deterministic or nondeterministic NOF protocol computing it requires sending about $(\log N)^{1/3}$ many bits. This exponentially improves upon the previously best-known such separation. At the core of our proof is an extension of a recent result of the first and third authors on sets of integers without 3-term arithmetic progressions into a non-arithmetic setting.
△ Less
Submitted 3 January, 2024; v1 submitted 23 August, 2023;
originally announced August 2023.
-
Approximate union closed conjecture
Authors:
Zachary Chase,
Shachar Lovett
Abstract:
A set system is called union closed if for any two sets in the set system their union is also in the set system. Gilmer recently proved that in any union closed set system some element belongs to at least a $0.01$ fraction of sets, and conjectured that his technique can be pushed to the constant $\frac{3-\sqrt{5}}{2}$. We verify his conjecture; show that it extends to approximate union closed set…
▽ More
A set system is called union closed if for any two sets in the set system their union is also in the set system. Gilmer recently proved that in any union closed set system some element belongs to at least a $0.01$ fraction of sets, and conjectured that his technique can be pushed to the constant $\frac{3-\sqrt{5}}{2}$. We verify his conjecture; show that it extends to approximate union closed set systems, where for nearly all pairs of sets their union belong to the set system; and show that for such set systems this bound is optimal.
△ Less
Submitted 21 November, 2022;
originally announced November 2022.
-
A General Stochastic Optimization Framework for Convergence Bidding
Authors:
Letif Mones,
Sean Lovett
Abstract:
Convergence (virtual) bidding is an important part of two-settlement electric power markets as it can effectively reduce discrepancies between the day-ahead and real-time markets. Consequently, there is extensive research into the bidding strategies of virtual participants aiming to obtain optimal bids to submit to the day-ahead market. In this paper, we introduce a price-based general stochastic…
▽ More
Convergence (virtual) bidding is an important part of two-settlement electric power markets as it can effectively reduce discrepancies between the day-ahead and real-time markets. Consequently, there is extensive research into the bidding strategies of virtual participants aiming to obtain optimal bids to submit to the day-ahead market. In this paper, we introduce a price-based general stochastic optimization framework to obtain optimal convergence bid curves. Within this framework, we develop a computationally tractable linear programming-based optimization model, which produces bid prices and volumes simultaneously. We also show that different approximations and simplifications in the general model lead naturally to state-of-the-art convergence bidding approaches, such as self-scheduling and opportunistic approaches. Our general framework also provides a straightforward way to compare the performance of these models, which is demonstrated by numerical experiments on the California (CAISO) market.
△ Less
Submitted 7 February, 2023; v1 submitted 12 October, 2022;
originally announced October 2022.
-
Eigenstripping, Spectral Decay, and Edge-Expansion on Posets
Authors:
Jason Gaitonde,
Max Hopkins,
Tali Kaufman,
Shachar Lovett,
Ruizhe Zhang
Abstract:
We study the relationship between the underlying structure of posets and the spectral and combinatorial properties of their higher-order random walks. While fast mixing of random walks on hypergraphs has led to myriad breakthroughs throughout theoretical computer science in the last five years, many other important applications (e.g. locally testable codes, 2-2 games) rely on the more general non-…
▽ More
We study the relationship between the underlying structure of posets and the spectral and combinatorial properties of their higher-order random walks. While fast mixing of random walks on hypergraphs has led to myriad breakthroughs throughout theoretical computer science in the last five years, many other important applications (e.g. locally testable codes, 2-2 games) rely on the more general non-simplicial structures. These works make it clear that the global expansion properties of posets depend strongly on their underlying architecture (e.g. simplicial, cubical, linear algebraic), but the overall phenomenon remains poorly understood. In this work, we quantify the advantage of different architectures, highlighting how structural regularity controls the spectral decay and edge-expansion of corresponding random walks.
In particular, we show the spectra of walks on expanding posets (Dikstein, Dinur, Filmus, Harsha RANDOM 2018) concentrate in strips around a small number of approximate eigenvalues controlled by the poset's regularity. This gives a simple condition to identify architectures (e.g. the Grassmann) that exhibit fast (exponential) decay of eigenvalues, versus architectures like hypergraphs with slow (linear) decay -- a crucial distinction in applications to hardness of approximation and agreement testing such as the recent proof of the 2-2 Games Conjecture (Khot, Minzer, Safra FOCS 2018). We show these results lead to a tight variance-based characterization of edge-expansion on eposets generalizing (Bafna, Hopkins, Kaufman, and Lovett (SODA 2022)), and pay special attention to the case of the Grassmann where we show our results are tight for a natural set of sparsifications of the Grassmann graphs. We note for clarity that our results do not recover the characterization used in the proof of the 2-2 Games Conjecture which relies on $\ell_\infty$ rather than $\ell_2$-structure.
△ Less
Submitted 12 March, 2023; v1 submitted 2 May, 2022;
originally announced May 2022.
-
Computational-Statistical Gaps in Reinforcement Learning
Authors:
Daniel Kane,
Sihan Liu,
Shachar Lovett,
Gaurav Mahajan
Abstract:
Reinforcement learning with function approximation has recently achieved tremendous results in applications with large state spaces. This empirical success has motivated a growing body of theoretical work proposing necessary and sufficient conditions under which efficient reinforcement learning is possible. From this line of work, a remarkably simple minimal sufficient condition has emerged for sa…
▽ More
Reinforcement learning with function approximation has recently achieved tremendous results in applications with large state spaces. This empirical success has motivated a growing body of theoretical work proposing necessary and sufficient conditions under which efficient reinforcement learning is possible. From this line of work, a remarkably simple minimal sufficient condition has emerged for sample efficient reinforcement learning: MDPs with optimal value function $V^*$ and $Q^*$ linear in some known low-dimensional features. In this setting, recent works have designed sample efficient algorithms which require a number of samples polynomial in the feature dimension and independent of the size of state space. They however leave finding computationally efficient algorithms as future work and this is considered a major open problem in the community.
In this work, we make progress on this open problem by presenting the first computational lower bound for RL with linear function approximation: unless NP=RP, no randomized polynomial time algorithm exists for deterministic transition MDPs with a constant number of actions and linear optimal value functions. To prove this, we show a reduction from Unique-Sat, where we convert a CNF formula into an MDP with deterministic transitions, constant number of actions and low dimensional linear optimal value functions. This result also exhibits the first computational-statistical gap in reinforcement learning with linear function approximation, as the underlying statistical problem is information-theoretically solvable with a polynomial number of queries, but no computationally efficient algorithm exists unless NP=RP. Finally, we also prove a quasi-polynomial time lower bound under the Randomized Exponential Time Hypothesis.
△ Less
Submitted 2 July, 2022; v1 submitted 10 February, 2022;
originally announced February 2022.
-
Hypercontractivity on High Dimensional Expanders: a Local-to-Global Approach for Higher Moments
Authors:
Mitali Bafna,
Max Hopkins,
Tali Kaufman,
Shachar Lovett
Abstract:
Hypercontractivity is one of the most powerful tools in Boolean function analysis. Originally studied over the discrete hypercube, recent years have seen increasing interest in extensions to settings like the $p$-biased cube, slice, or Grassmannian, where variants of hypercontractivity have found a number of breakthrough applications including the resolution of Khot's 2-2 Games Conjecture (Khot, M…
▽ More
Hypercontractivity is one of the most powerful tools in Boolean function analysis. Originally studied over the discrete hypercube, recent years have seen increasing interest in extensions to settings like the $p$-biased cube, slice, or Grassmannian, where variants of hypercontractivity have found a number of breakthrough applications including the resolution of Khot's 2-2 Games Conjecture (Khot, Minzer, Safra FOCS 2018). In this work, we develop a new theory of hypercontractivity on high dimensional expanders (HDX), an important class of expanding complexes that has recently seen similarly impressive applications in both coding theory and approximate sampling. Our results lead to a new understanding of the structure of Boolean functions on HDX, including a tight analog of the KKL Theorem and a new characterization of non-expanding sets.
Unlike previous settings satisfying hypercontractivity, HDX can be asymmetric, sparse, and very far from products, which makes the application of traditional proof techniques challenging. We handle these barriers with the introduction of two new tools of independent interest: a new explicit combinatorial Fourier basis for HDX that behaves well under restriction, and a new local-to-global method for analyzing higher moments. Interestingly, unlike analogous second moment methods that apply equally across all types of expanding complexes, our tools rely inherently on simplicial structure. This suggests a new distinction among high dimensional expanders based upon their behavior beyond the second moment.
△ Less
Submitted 24 November, 2021; v1 submitted 17 November, 2021;
originally announced November 2021.
-
Bilinear Classes: A Structural Framework for Provable Generalization in RL
Authors:
Simon S. Du,
Sham M. Kakade,
Jason D. Lee,
Shachar Lovett,
Gaurav Mahajan,
Wen Sun,
Ruosong Wang
Abstract:
This work introduces Bilinear Classes, a new structural framework, which permit generalization in reinforcement learning in a wide variety of settings through the use of function approximation. The framework incorporates nearly all existing models in which a polynomial sample complexity is achievable, and, notably, also includes new models, such as the Linear $Q^*/V^*$ model in which both the opti…
▽ More
This work introduces Bilinear Classes, a new structural framework, which permit generalization in reinforcement learning in a wide variety of settings through the use of function approximation. The framework incorporates nearly all existing models in which a polynomial sample complexity is achievable, and, notably, also includes new models, such as the Linear $Q^*/V^*$ model in which both the optimal $Q$-function and the optimal $V$-function are linear in some known feature space. Our main result provides an RL algorithm which has polynomial sample complexity for Bilinear Classes; notably, this sample complexity is stated in terms of a reduction to the generalization error of an underlying supervised learning sub-problem. These bounds nearly match the best known sample complexity bounds for existing models. Furthermore, this framework also extends to the infinite dimensional (RKHS) setting: for the the Linear $Q^*/V^*$ model, linear MDPs, and linear mixture MDPs, we provide sample complexities that have no explicit dependence on the explicit feature dimension (which could be infinite), but instead depends only on information theoretic quantities.
△ Less
Submitted 11 July, 2021; v1 submitted 19 March, 2021;
originally announced March 2021.
-
High Dimensional Expanders: Eigenstripping, Pseudorandomness, and Unique Games
Authors:
Mitali Bafna,
Max Hopkins,
Tali Kaufman,
Shachar Lovett
Abstract:
Higher order random walks (HD-walks) on high dimensional expanders (HDX) have seen an incredible amount of study and application since their introduction by Kaufman and Mass [KM16], yet their broader combinatorial and spectral properties remain poorly understood. We develop a combinatorial characterization of the spectral structure of HD-walks on two-sided local-spectral expanders [DK17], which of…
▽ More
Higher order random walks (HD-walks) on high dimensional expanders (HDX) have seen an incredible amount of study and application since their introduction by Kaufman and Mass [KM16], yet their broader combinatorial and spectral properties remain poorly understood. We develop a combinatorial characterization of the spectral structure of HD-walks on two-sided local-spectral expanders [DK17], which offer a broad generalization of the well-studied Johnson and Grassmann graphs. Our characterization, which shows that the spectra of HD-walks lie tightly concentrated in a few combinatorially structured strips, leads to novel structural theorems such as a tight $\ell_2$-characterization of edge-expansion, as well as to a new understanding of local-to-global algorithms on HDX.
Towards the latter, we introduce a spectral complexity measure called Stripped Threshold Rank, and show how it can replace the (much larger) threshold rank in controlling the performance of algorithms on structured objects. Combined with a sum-of-squares proof of the former $\ell_2$-characterization, we give a concrete application of this framework to algorithms for unique games on HD-walks, in many cases improving the state of the art [RBS11, ABS15] from nearly-exponential to polynomial time (e.g. for sparsifications of Johnson graphs or of slices of the $q$-ary hypercube). Our characterization of expansion also holds an interesting connection to hardness of approximation, where an $\ell_\infty$-variant for the Grassmann graphs was recently used to resolve the 2-2 Games Conjecture [KMS18]. We give a reduction from a related $\ell_\infty$-variant to our $\ell_2$-characterization, but it loses factors in the regime of interest for hardness where the gap between $\ell_2$ and $\ell_\infty$ structure is large. Nevertheless, we open the door for further work on the use of HDX in hardness of approximation and unique games.
△ Less
Submitted 17 July, 2021; v1 submitted 9 November, 2020;
originally announced November 2020.
-
Singularity of random integer matrices with large entries
Authors:
Sankeerth Rao Karingula,
Shachar Lovett
Abstract:
We study the singularity probability of random integer matrices. Concretely, the probability that a random $n \times n$ matrix, with integer entries chosen uniformly from $\{-m,\ldots,m\}$, is singular. This problem has been well studied in two regimes: large $n$ and constant $m$; or large $m$ and constant $n$. In this paper, we extend previous techniques to handle the regime where both $n,m$ are…
▽ More
We study the singularity probability of random integer matrices. Concretely, the probability that a random $n \times n$ matrix, with integer entries chosen uniformly from $\{-m,\ldots,m\}$, is singular. This problem has been well studied in two regimes: large $n$ and constant $m$; or large $m$ and constant $n$. In this paper, we extend previous techniques to handle the regime where both $n,m$ are large. We show that the probability that such a matrix is singular is $m^{-cn}$ for some absolute constant $c>0$. We also provide some connections of our result to coding theory.
△ Less
Submitted 31 August, 2021; v1 submitted 22 October, 2020;
originally announced October 2020.
-
Log-rank and lifting for AND-functions
Authors:
Alexander Knop,
Shachar Lovett,
Sam McGuire,
Weiqiang Yuan
Abstract:
Let $f: \{0,1\}^n \to \{0, 1\}$ be a boolean function, and let $f_\land (x, y) = f(x \land y)$ denote the AND-function of $f$, where $x \land y$ denotes bit-wise AND. We study the deterministic communication complexity of $f_\land$ and show that, up to a $\log n$ factor, it is bounded by a polynomial in the logarithm of the real rank of the communication matrix of $f_\land$. This comes within a…
▽ More
Let $f: \{0,1\}^n \to \{0, 1\}$ be a boolean function, and let $f_\land (x, y) = f(x \land y)$ denote the AND-function of $f$, where $x \land y$ denotes bit-wise AND. We study the deterministic communication complexity of $f_\land$ and show that, up to a $\log n$ factor, it is bounded by a polynomial in the logarithm of the real rank of the communication matrix of $f_\land$. This comes within a $\log n$ factor of establishing the log-rank conjecturefor AND-functions with no assumptions on $f$. Our result stands in contrast with previous results on special cases of the log-rank conjecture, which needed significant restrictions on $f$ such as monotonicity or low $\mathbb{F}_2$-degree. Our techniques can also be used to prove (within a $\log n$ factor) a lifting theorem for AND-functions, stating that the deterministic communication complexity of $f_\land$ is polynomially-related to the AND-decision tree complexity of $f$.
The results rely on a new structural result regarding boolean functions $f:\{0, 1\}^n \to \{0, 1\}$ with a sparse polynomial representation, which may be of independent interest. We show that if the polynomial computing $f$ has few monomials then the set system of the monomials has a small hitting set, of size poly-logarithmic in its sparsity. We also establish extensions of this result to multi-linear polynomials $f:\{0,1\}^n \to \mathbb{R}$ with a larger range.
△ Less
Submitted 22 October, 2020; v1 submitted 18 October, 2020;
originally announced October 2020.
-
Improved bounds for the sunflower lemma
Authors:
Ryan Alweiss,
Shachar Lovett,
Kewen Wu,
Jiapeng Zhang
Abstract:
A sunflower with $r$ petals is a collection of $r$ sets so that the intersection of each pair is equal to the intersection of all of them. Erdős and Rado proved the sunflower lemma: for any fixed $r$, any family of sets of size $w$, with at least about $w^w$ sets, must contain a sunflower with $r$ petals. The famous sunflower conjecture states that the bound on the number of sets can be improved t…
▽ More
A sunflower with $r$ petals is a collection of $r$ sets so that the intersection of each pair is equal to the intersection of all of them. Erdős and Rado proved the sunflower lemma: for any fixed $r$, any family of sets of size $w$, with at least about $w^w$ sets, must contain a sunflower with $r$ petals. The famous sunflower conjecture states that the bound on the number of sets can be improved to $c^w$ for some constant $c$. In this paper, we improve the bound to about $(\log w)^w$. In fact, we prove the result for a robust notion of sunflowers, for which the bound we obtain is sharp up to lower order terms.
△ Less
Submitted 30 August, 2021; v1 submitted 22 August, 2019;
originally announced August 2019.
-
From DNF compression to sunflower theorems via regularity
Authors:
Shachar Lovett,
Noam Solomon,
Jiapeng Zhang
Abstract:
The sunflower conjecture is one of the most well-known open problems in combinatorics. It has several applications in theoretical computer science, one of which is DNF compression, due to Gopalan, Meka and Reingold [Computational Complexity 2013]. In this paper, we show that improved bounds for DNF compression imply improved bounds for the sunflower conjecture, which is the reverse direction of [C…
▽ More
The sunflower conjecture is one of the most well-known open problems in combinatorics. It has several applications in theoretical computer science, one of which is DNF compression, due to Gopalan, Meka and Reingold [Computational Complexity 2013]. In this paper, we show that improved bounds for DNF compression imply improved bounds for the sunflower conjecture, which is the reverse direction of [Computational Complexity 2013]. The main approach is based on regularity of set systems and a structure-vs-pseudorandomness approach to the sunflower conjecture.
△ Less
Submitted 6 June, 2019; v1 submitted 1 March, 2019;
originally announced March 2019.
-
A bilinear Bogolyubov-Ruzsa lemma with poly-logarithmic bounds
Authors:
Kaave Hosseini,
Shachar Lovett
Abstract:
The Bogolyubov-Ruzsa lemma, in particular the quantitative bounds obtained by Sanders, plays a central role in obtaining effective bounds for the inverse $U^3$ theorem for the Gowers norms. Recently, Gowers and Milićević applied a bilinear Bogolyubov-Ruzsa lemma as part of a proof of the inverse $U^4$ theorem with effective bounds. The goal of this note is to obtain quantitative bounds for the bil…
▽ More
The Bogolyubov-Ruzsa lemma, in particular the quantitative bounds obtained by Sanders, plays a central role in obtaining effective bounds for the inverse $U^3$ theorem for the Gowers norms. Recently, Gowers and Milićević applied a bilinear Bogolyubov-Ruzsa lemma as part of a proof of the inverse $U^4$ theorem with effective bounds. The goal of this note is to obtain quantitative bounds for the bilinear Bogolyubov-Ruzsa lemma which are similar to those obtained by Sanders for the Bogolyubov-Ruzsa lemma.
We show that if a set $A \subset \mathbb{F}_p^n \times \mathbb{F}_p^n$ has density $α$, then after a constant number of horizontal and vertical sums, the set $A$ would contain a bilinear structure of co-dimension $r=\log^{O(1)} α^{-1}$. This improves the results of Gowers and Milićević which obtained similar results with a weaker bound of $r=\exp(\exp(\log^{O(1)} α^{-1}))$ and by Bienvenu and Lê which obtained $r=\exp(\exp(\exp(\log^{O(1)} α^{-1})))$.
△ Less
Submitted 12 June, 2019; v1 submitted 15 August, 2018;
originally announced August 2018.
-
The analytic rank of tensors and its applications
Authors:
Shachar Lovett
Abstract:
The analytic rank of a tensor, first defined by Gowers and Wolf in the context of higher-order Fourier analysis, is defined to be the logarithm of the bias of the tensor. We prove that it is a subadditive measure of rank: that is, the analytic rank of the sum of two tensors is at most the sum of their individual analytic ranks.
This analytic property turns out to have surprising applications: (i…
▽ More
The analytic rank of a tensor, first defined by Gowers and Wolf in the context of higher-order Fourier analysis, is defined to be the logarithm of the bias of the tensor. We prove that it is a subadditive measure of rank: that is, the analytic rank of the sum of two tensors is at most the sum of their individual analytic ranks.
This analytic property turns out to have surprising applications: (i) common roots of tensors are always positively correlated; and (ii) the slice rank and partition rank, which were defined recently in the resolution of the cap-set problem in Ramsey theory, can be replaced by the analytic rank.
△ Less
Submitted 3 June, 2019; v1 submitted 24 June, 2018;
originally announced June 2018.
-
MDS matrices over small fields: A proof of the GM-MDS conjecture
Authors:
Shachar Lovett
Abstract:
An MDS matrix is a matrix whose minors all have full rank. A question arising in coding theory is what zero patterns can MDS matrices have. There is a natural combinatorial characterization (called the MDS condition) which is necessary over any field, as well as sufficient over very large fields by a probabilistic argument.
Dau et al. (ISIT 2014) conjectured that the MDS condition is sufficient…
▽ More
An MDS matrix is a matrix whose minors all have full rank. A question arising in coding theory is what zero patterns can MDS matrices have. There is a natural combinatorial characterization (called the MDS condition) which is necessary over any field, as well as sufficient over very large fields by a probabilistic argument.
Dau et al. (ISIT 2014) conjectured that the MDS condition is sufficient over small fields as well, where the construction of the matrix is algebraic instead of probabilistic. This is known as the GM-MDS conjecture. Concretely, if a $k \times n$ zero pattern satisfies the MDS condition, then they conjecture that there exists an MDS matrix with this zero pattern over any field of size $|\mathbb{F}| \ge n+k-1$. In recent years, this conjecture was proven in several special cases. In this work, we resolve the conjecture.
△ Less
Submitted 20 March, 2018; v1 submitted 6 March, 2018;
originally announced March 2018.
-
Near-optimal linear decision trees for k-SUM and related problems
Authors:
Daniel M. Kane,
Shachar Lovett,
Shay Moran
Abstract:
We construct near optimal linear decision trees for a variety of decision problems in combinatorics and discrete geometry. For example, for any constant $k$, we construct linear decision trees that solve the $k$-SUM problem on $n$ elements using $O(n \log^2 n)$ linear queries. Moreover, the queries we use are comparison queries, which compare the sums of two $k$-subsets; when viewed as linear quer…
▽ More
We construct near optimal linear decision trees for a variety of decision problems in combinatorics and discrete geometry. For example, for any constant $k$, we construct linear decision trees that solve the $k$-SUM problem on $n$ elements using $O(n \log^2 n)$ linear queries. Moreover, the queries we use are comparison queries, which compare the sums of two $k$-subsets; when viewed as linear queries, comparison queries are $2k$-sparse and have only $\{-1,0,1\}$ coefficients. We give similar constructions for sorting sumsets $A+B$ and for solving the SUBSET-SUM problem, both with optimal number of queries, up to poly-logarithmic terms.
Our constructions are based on the notion of "inference dimension", recently introduced by the authors in the context of active classification with comparison queries. This can be viewed as another contribution to the fruitful link between machine learning and discrete geometry, which goes back to the discovery of the VC dimension.
△ Less
Submitted 4 May, 2017;
originally announced May 2017.
-
Probabilistic Existence of Large Sets of Designs
Authors:
Shachar Lovett,
Sankeerth Rao,
Alexander Vardy
Abstract:
A new probabilistic technique for establishing the existence of certain regular combinatorial structures has been recentlyintroduced by Kuperberg, Lovett, and Peled (STOC 2012). Using this technique, it can be shown that under certain conditions, a randomly chosen structure has the required properties of a $t$-$(n,k,λ)$ combinatorial design with tiny, yet positive, probability.
The proof method…
▽ More
A new probabilistic technique for establishing the existence of certain regular combinatorial structures has been recentlyintroduced by Kuperberg, Lovett, and Peled (STOC 2012). Using this technique, it can be shown that under certain conditions, a randomly chosen structure has the required properties of a $t$-$(n,k,λ)$ combinatorial design with tiny, yet positive, probability.
The proof method of KLP is adapted to show the existence of large sets of designs and similar combinatorial structures as follows. We modify the random choice and the analysis to show that, under the same conditions, not only does a $t$-$(n,k,λ)$ design exist but, in fact, with positive probability there exists a large set of such designs -- that is, a partition of the set of $k$-subsets of $[n]$ into $t$-designs $t$-$(n,k,λ)$ designs. Specifically, using the probabilistic approach derived herein, we prove that for all sufficiently large $n$, large sets of $t$-$(n,k,λ)$ designs exist whenever $k > 12t$ and the necessary divisibility conditions are satisfied. This resolves the existence conjecture for large sets of designs for all $k > 12t$.
△ Less
Submitted 1 July, 2020; v1 submitted 25 April, 2017;
originally announced April 2017.
-
The independence number of the Birkhoff polytope graph, and applications to maximally recoverable codes
Authors:
Daniel Kane,
Shachar Lovett,
Sankeerth Rao
Abstract:
Maximally recoverable codes are codes designed for distributed storage which combine quick recovery from single node failure and optimal recovery from catastrophic failure. Gopalan et al [SODA 2017] studied the alphabet size needed for such codes in grid topologies and gave a combinatorial characterization for it.
Consider a labeling of the edges of the complete bipartite graph $K_{n,n}$ with la…
▽ More
Maximally recoverable codes are codes designed for distributed storage which combine quick recovery from single node failure and optimal recovery from catastrophic failure. Gopalan et al [SODA 2017] studied the alphabet size needed for such codes in grid topologies and gave a combinatorial characterization for it.
Consider a labeling of the edges of the complete bipartite graph $K_{n,n}$ with labels coming from $F_2^d$ , that satisfies the following condition: for any simple cycle, the sum of the labels over its edges is nonzero. The minimal d where this is possible controls the alphabet size needed for maximally recoverable codes in n x n grid topologies.
Prior to the current work, it was known that d is between $(\log n)^2$ and $n\log n$. We improve both bounds and show that d is linear in n. The upper bound is a recursive construction which beats the random construction. The lower bound follows by first relating the problem to the independence number of the Birkhoff polytope graph, and then providing tight bounds for it using the representation theory of the symmetric group.
△ Less
Submitted 31 March, 2017; v1 submitted 19 February, 2017;
originally announced February 2017.
-
Towards a Constructive Version of Banaszczyk's Vector Balancing Theorem
Authors:
Daniel Dadush,
Shashwat Garg,
Shachar Lovett,
Aleksandar Nikolov
Abstract:
An important theorem of Banaszczyk (Random Structures & Algorithms `98) states that for any sequence of vectors of $\ell_2$ norm at most $1/5$ and any convex body $K$ of Gaussian measure $1/2$ in $\mathbb{R}^n$, there exists a signed combination of these vectors which lands inside $K$. A major open problem is to devise a constructive version of Banaszczyk's vector balancing theorem, i.e. to find a…
▽ More
An important theorem of Banaszczyk (Random Structures & Algorithms `98) states that for any sequence of vectors of $\ell_2$ norm at most $1/5$ and any convex body $K$ of Gaussian measure $1/2$ in $\mathbb{R}^n$, there exists a signed combination of these vectors which lands inside $K$. A major open problem is to devise a constructive version of Banaszczyk's vector balancing theorem, i.e. to find an efficient algorithm which constructs the signed combination.
We make progress towards this goal along several fronts. As our first contribution, we show an equivalence between Banaszczyk's theorem and the existence of $O(1)$-subgaussian distributions over signed combinations. For the case of symmetric convex bodies, our equivalence implies the existence of a universal signing algorithm (i.e. independent of the body), which simply samples from the subgaussian sign distribution and checks to see if the associated combination lands inside the body. For asymmetric convex bodies, we provide a novel recentering procedure, which allows us to reduce to the case where the body is symmetric.
As our second main contribution, we show that the above framework can be efficiently implemented when the vectors have length $O(1/\sqrt{\log n})$, recovering Banaszczyk's results under this stronger assumption. More precisely, we use random walk techniques to produce the required $O(1)$-subgaussian signing distributions when the vectors have length $O(1/\sqrt{\log n})$, and use a stochastic gradient ascent method to implement the recentering procedure for asymmetric bodies.
△ Less
Submitted 13 December, 2016;
originally announced December 2016.
-
A counterexample to a strong variant of the Polynomial Freiman-Ruzsa conjecture in Euclidean space
Authors:
Shachar Lovett,
Oded Regev
Abstract:
The Polynomial Freiman-Ruzsa conjecture is one of the central open problems in additive combinatorics. If true, it would give tight quantitative bounds relating combinatorial and algebraic notions of approximate subgroups. In this note, we restrict our attention to subsets of Euclidean space. In this regime, the original conjecture considers approximate algebraic subgroups as the set of lattice po…
▽ More
The Polynomial Freiman-Ruzsa conjecture is one of the central open problems in additive combinatorics. If true, it would give tight quantitative bounds relating combinatorial and algebraic notions of approximate subgroups. In this note, we restrict our attention to subsets of Euclidean space. In this regime, the original conjecture considers approximate algebraic subgroups as the set of lattice points in a convex body. Green asked in 2007 whether this can be simplified to a generalized arithmetic progression, while not losing more than a polynomial factor in the underlying parameters. We give a negative answer to this question, based on a recent reverse Minkowski theorem combined with estimates for random lattices.
△ Less
Submitted 9 May, 2017; v1 submitted 10 December, 2016;
originally announced December 2016.
-
The Fourier structure of low degree polynomials
Authors:
Shachar Lovett
Abstract:
We study the structure of the Fourier coefficients of low degree multivariate polynomials over finite fields. We consider three properties: (i) the number of nonzero Fourier coefficients; (ii) the sum of the absolute value of the Fourier coefficients; and (iii) the size of the linear subspace spanned by the nonzero Fourier coefficients. For quadratic polynomials, tight relations are known between…
▽ More
We study the structure of the Fourier coefficients of low degree multivariate polynomials over finite fields. We consider three properties: (i) the number of nonzero Fourier coefficients; (ii) the sum of the absolute value of the Fourier coefficients; and (iii) the size of the linear subspace spanned by the nonzero Fourier coefficients. For quadratic polynomials, tight relations are known between all three quantities. In this work, we extend this relation to higher degree polynomials. Specifically, for degree $d$ polynomials, we show that the three quantities are equivalent up to factors exponential in $d$.
△ Less
Submitted 14 March, 2016; v1 submitted 26 February, 2016;
originally announced March 2016.
-
On the Beck-Fiala Conjecture for Random Set Systems
Authors:
Esther Ezra,
Shachar Lovett
Abstract:
Motivated by the Beck-Fiala conjecture, we study discrepancy bounds for random sparse set systems. Concretely, these are set systems $(X,Σ)$, where each element $x \in X$ lies in $t$ randomly selected sets of $Σ$, where $t$ is an integer parameter. We provide new bounds in two regimes of parameters. We show that when $|Σ| \ge |X|$ the hereditary discrepancy of $(X,Σ)$ is with high probability…
▽ More
Motivated by the Beck-Fiala conjecture, we study discrepancy bounds for random sparse set systems. Concretely, these are set systems $(X,Σ)$, where each element $x \in X$ lies in $t$ randomly selected sets of $Σ$, where $t$ is an integer parameter. We provide new bounds in two regimes of parameters. We show that when $|Σ| \ge |X|$ the hereditary discrepancy of $(X,Σ)$ is with high probability $O(\sqrt{t \log t})$; and when $|X| \gg |Σ|^t$ the hereditary discrepancy of $(X,Σ)$ is with high probability $O(1)$. The first bound combines the Lov{á}sz Local Lemma with a new argument based on partial matchings; the second follows from an analysis of the lattice spanned by sparse vectors.
△ Less
Submitted 2 November, 2015;
originally announced November 2015.
-
Bias vs structure of polynomials in large fields, and applications in information theory
Authors:
Abhishek Bhowmick,
Shachar Lovett
Abstract:
Let $f$ be a polynomial of degree $d$ in $n$ variables over a finite field $\mathbb{F}$. The polynomial is said to be unbiased if the distribution of $f(x)$ for a uniform input $x \in \mathbb{F}^n$ is close to the uniform distribution over $\mathbb{F}$, and is called biased otherwise. The polynomial is said to have low rank if it can be expressed as a composition of a few lower degree polynomials.…
▽ More
Let $f$ be a polynomial of degree $d$ in $n$ variables over a finite field $\mathbb{F}$. The polynomial is said to be unbiased if the distribution of $f(x)$ for a uniform input $x \in \mathbb{F}^n$ is close to the uniform distribution over $\mathbb{F}$, and is called biased otherwise. The polynomial is said to have low rank if it can be expressed as a composition of a few lower degree polynomials. Green and Tao [Contrib. Discrete Math 2009] and Kaufman and Lovett [FOCS 2008] showed that bias implies low rank for fixed degree polynomials over fixed prime fields. This lies at the heart of many tools in higher order Fourier analysis. In this work, we extend this result to all prime fields (of size possibly growing with $n$). We also provide a generalization to nonprime fields in the large characteristic case. However, we state all our applications in the prime field setting for the sake of simplicity of presentation.
Using the above generalization to large fields as a starting point, we are also able to settle the list decoding radius of fixed degree Reed-Muller codes over growing fields. The case of fixed size fields was solved by Bhowmick and Lovett [STOC 2015], which resolved a conjecture of Gopalan-Klivans-Zuckerman [STOC 2008]. Here, we show that the list decoding radius is equal the minimum distance of the code for all fixed degrees, even when the field size is possibly growing with $n$.
Additionally, we effectively resolve the weight distribution problem for Reed-Muller codes of fixed degree over all fields, first raised in 1977 in the classic textbook by MacWilliams and Sloane [Research Problem 15.1 in Theory of Error Correcting Codes].
△ Less
Submitted 20 January, 2022; v1 submitted 5 June, 2015;
originally announced June 2015.
-
Large Supports are required for Well-Supported Nash Equilibria
Authors:
Yogesh Anbalagan,
Hao Huang,
Shachar Lovett,
Sergey Norin,
Adrian Vetta,
Hehui Wu
Abstract:
We prove that for any constant $k$ and any $ε<1$, there exist bimatrix win-lose games for which every $ε$-WSNE requires supports of cardinality greater than $k$. To do this, we provide a graph-theoretic characterization of win-lose games that possess $ε$-WSNE with constant cardinality supports. We then apply a result in additive number theory of Haight to construct win-lose games that do not satis…
▽ More
We prove that for any constant $k$ and any $ε<1$, there exist bimatrix win-lose games for which every $ε$-WSNE requires supports of cardinality greater than $k$. To do this, we provide a graph-theoretic characterization of win-lose games that possess $ε$-WSNE with constant cardinality supports. We then apply a result in additive number theory of Haight to construct win-lose games that do not satisfy the requirements of the characterization. These constructions disprove graph theoretic conjectures of Daskalakis, Mehta and Papadimitriou, and Myers.
△ Less
Submitted 14 April, 2015;
originally announced April 2015.
-
On the structure of the spectrum of small sets
Authors:
Kaave Hosseini,
Shachar Lovett
Abstract:
Let $G$ be a finite abelian group and $A$ a subset of $G$. The spectrum of $A$ is the set of its large Fourier coefficients. Known combinatorial results on the structure of spectrum, such as Chang's theorem, become trivial in the regime $|A| = |G|^α$ whenever $α\le c$, where $c \ge 1/2$ is some absolute constant. On the other hand, there are statistical results, which apply only to a noticeable fr…
▽ More
Let $G$ be a finite abelian group and $A$ a subset of $G$. The spectrum of $A$ is the set of its large Fourier coefficients. Known combinatorial results on the structure of spectrum, such as Chang's theorem, become trivial in the regime $|A| = |G|^α$ whenever $α\le c$, where $c \ge 1/2$ is some absolute constant. On the other hand, there are statistical results, which apply only to a noticeable fraction of the elements, which give nontrivial bounds even to much smaller sets. One such theorem (due to Bourgain) goes as follows. For a noticeable fraction of pairs $γ_1,γ_2 $ in the spectrum, $γ_1+γ_2$ belongs to the spectrum of the same set with a smaller threshold. Here we show that this result can be made combinatorial by restricting to a large subset. That is, we show that for any set $A$ there exists a large subset $A'$, such that the sumset of the spectrum of $A'$ has bounded size. Our results apply to sets of size $|A| = |G|^α$ for any constant $α>0$, and even in some sub-constant regime.
△ Less
Submitted 4 April, 2015;
originally announced April 2015.
-
An Improved Lower Bound for Arithmetic Regularity
Authors:
Kaave Hosseini,
Shachar Lovett,
Guy Moshkovitz,
Asaf Shapira
Abstract:
The arithmetic regularity lemma due to Green [GAFA 2005] is an analogue of the famous Szemer{é}di regularity lemma in graph theory. It shows that for any abelian group $G$ and any bounded function $f:G \to [0,1]$, there exists a subgroup $H \le G$ of bounded index such that, when restricted to most cosets of $H$, the function $f$ is pseudorandom in the sense that all its nontrivial Fourier coeffic…
▽ More
The arithmetic regularity lemma due to Green [GAFA 2005] is an analogue of the famous Szemer{é}di regularity lemma in graph theory. It shows that for any abelian group $G$ and any bounded function $f:G \to [0,1]$, there exists a subgroup $H \le G$ of bounded index such that, when restricted to most cosets of $H$, the function $f$ is pseudorandom in the sense that all its nontrivial Fourier coefficients are small. Quantitatively, if one wishes to obtain that for $1-ε$ fraction of the cosets, the nontrivial Fourier coefficients are bounded by $ε$, then Green shows that $|G/H|$ is bounded by a tower of twos of height $1/ε^3$. He also gives an example showing that a tower of height $Ω(\log 1/ε)$ is necessary. Here, we give an improved example, showing that a tower of height $Ω(1/ε)$ is necessary.
△ Less
Submitted 17 May, 2014;
originally announced May 2014.
-
Group representations that resist random sampling
Authors:
Shachar Lovett,
Cristopher Moore,
Alexander Russell
Abstract:
We show that there exists a family of groups $G_n$ and nontrivial irreducible representations $ρ_n$ such that, for any constant $t$, the average of $ρ_n$ over $t$ uniformly random elements $g_1, \ldots, g_t \in G_n$ has operator norm $1$ with probability approaching 1 as $n \rightarrow \infty$. More quantitatively, we show that there exist families of finite groups for which $Ω(\log \log |G|)$ ran…
▽ More
We show that there exists a family of groups $G_n$ and nontrivial irreducible representations $ρ_n$ such that, for any constant $t$, the average of $ρ_n$ over $t$ uniformly random elements $g_1, \ldots, g_t \in G_n$ has operator norm $1$ with probability approaching 1 as $n \rightarrow \infty$. More quantitatively, we show that there exist families of finite groups for which $Ω(\log \log |G|)$ random elements are required to bound the norm of a typical representation below $1$. This settles a conjecture of A. Wigderson.
△ Less
Submitted 4 June, 2014; v1 submitted 14 May, 2014;
originally announced May 2014.
-
Recent advances on the log-rank conjecture in communication complexity
Authors:
Shachar Lovett
Abstract:
The log-rank conjecture is one of the fundamental open problems in communication complexity. It speculates that the deterministic communication complexity of any two-party function is equal to the log of the rank of its associated matrix, up to polynomial factors. Despite much research, we still know very little about this conjecture. Recently, there has been renewed interest in this conjecture an…
▽ More
The log-rank conjecture is one of the fundamental open problems in communication complexity. It speculates that the deterministic communication complexity of any two-party function is equal to the log of the rank of its associated matrix, up to polynomial factors. Despite much research, we still know very little about this conjecture. Recently, there has been renewed interest in this conjecture and its relations to other fundamental problems in complexity theory. This survey describes some of the recent progress, and hints at potential directions for future research.
△ Less
Submitted 31 March, 2014;
originally announced March 2014.
-
General systems of linear forms: equidistribution and true complexity
Authors:
Hamed Hatami,
Pooya Hatami,
Shachar Lovett
Abstract:
The densities of small linear structures (such as arithmetic progressions) in subsets of Abelian groups can be expressed as certain analytic averages involving linear forms. Higher-order Fourier analysis examines such averages by approximating the indicator function of a subset by a function of bounded number of polynomials. Then, to approximate the average, it suffices to know the joint distribut…
▽ More
The densities of small linear structures (such as arithmetic progressions) in subsets of Abelian groups can be expressed as certain analytic averages involving linear forms. Higher-order Fourier analysis examines such averages by approximating the indicator function of a subset by a function of bounded number of polynomials. Then, to approximate the average, it suffices to know the joint distribution of the polynomials applied to the linear forms. We prove a near-equidistribution theorem that describes these distributions for the group $\mathbb{F}_p^n$ when $p$ is a fixed prime. This fundamental fact is equivalent to a strong near-orthogonality statement regarding the higher-order characters, and was previously known only under various extra assumptions about the linear forms.
As an application of our near-equidistribution theorem, we settle a conjecture of Gowers and Wolf on the true complexity of systems of linear forms for the group $\mathbb{F}_p^n$.
△ Less
Submitted 7 May, 2014; v1 submitted 30 March, 2014;
originally announced March 2014.
-
Nontrivial t-Designs over Finite Fields Exist for All t
Authors:
Arman Fazeli,
Shachar Lovett,
Alexander Vardy
Abstract:
A $t$-$(n,k,λ)$ design over $\F_q$ is a collection of $k$-dimensional subspaces of $\F_q^n$, called blocks, such that each $t$-dimensional subspace of $\F_q^n$ is contained in exactly $λ$ blocks. Such $t$-designs over $\F_q$ are the $q$-analogs of conventional combinatorial designs. Nontrivial $t$-$(n,k,λ)$ designs over $\F_q$ are currently known to exist only for $t \leq 3$. Herein, we prove that…
▽ More
A $t$-$(n,k,λ)$ design over $\F_q$ is a collection of $k$-dimensional subspaces of $\F_q^n$, called blocks, such that each $t$-dimensional subspace of $\F_q^n$ is contained in exactly $λ$ blocks. Such $t$-designs over $\F_q$ are the $q$-analogs of conventional combinatorial designs. Nontrivial $t$-$(n,k,λ)$ designs over $\F_q$ are currently known to exist only for $t \leq 3$. Herein, we prove that simple (meaning, without repeated blocks) nontrivial $t$-$(n,k,λ)$ designs over $\F_q$ exist for all $t$ and $q$, provided that $k > 12t$ and $n$ is sufficiently large. This may be regarded as a $q$-analog of the celebrated Teirlinck theorem for combinatorial designs.
△ Less
Submitted 9 June, 2013;
originally announced June 2013.
-
Communication is bounded by root of rank
Authors:
Shachar Lovett
Abstract:
We prove that any total boolean function of rank $r$ can be computed by a deterministic communication protocol of complexity $O(\sqrt{r} \cdot \log(r))$. Equivalently, any graph whose adjacency matrix has rank $r$ has chromatic number at most $2^{O(\sqrt{r} \cdot \log(r))}$. This gives a nearly quadratic improvement in the dependence on the rank over previous results.
We prove that any total boolean function of rank $r$ can be computed by a deterministic communication protocol of complexity $O(\sqrt{r} \cdot \log(r))$. Equivalently, any graph whose adjacency matrix has rank $r$ has chromatic number at most $2^{O(\sqrt{r} \cdot \log(r))}$. This gives a nearly quadratic improvement in the dependence on the rank over previous results.
△ Less
Submitted 8 October, 2013; v1 submitted 8 June, 2013;
originally announced June 2013.
-
Probabilistic existence of regular combinatorial structures
Authors:
Greg Kuperberg,
Shachar Lovett,
Ron Peled
Abstract:
We show the existence of regular combinatorial objects which previously were not known to exist. Specifically, for a wide range of the underlying parameters, we show the existence of non-trivial orthogonal arrays, t-designs, and t-wise permutations. In all cases, the sizes of the objects are optimal up to polynomial overhead. The proof of existence is probabilistic. We show that a randomly chosen…
▽ More
We show the existence of regular combinatorial objects which previously were not known to exist. Specifically, for a wide range of the underlying parameters, we show the existence of non-trivial orthogonal arrays, t-designs, and t-wise permutations. In all cases, the sizes of the objects are optimal up to polynomial overhead. The proof of existence is probabilistic. We show that a randomly chosen structure has the required properties with positive yet tiny probability. Our method allows also to give rather precise estimates on the number of objects of a given size and this is applied to count the number of orthogonal arrays, t-designs and regular hypergraphs. The main technical ingredient is a special local central limit theorem for suitable lattice random walks with finitely many steps.
△ Less
Submitted 6 April, 2017; v1 submitted 18 February, 2013;
originally announced February 2013.
-
The Freiman--Ruzsa Theorem over Finite Fields
Authors:
Chaim Even-Zohar,
Shachar Lovett
Abstract:
Let G be a finite abelian group of torsion r and let A be a subset of G. The Freiman--Ruzsa theorem asserts that if |A+A| < K|A| then A is contained in a coset of a subgroup of G of size at most r^{K^4}K^2|A|. It was conjectured by Ruzsa that the subgroup size can be reduced to r^{CK}|A| for some absolute constant C >= 2. This conjecture was verified for r = 2 in a sequence of recent works, which…
▽ More
Let G be a finite abelian group of torsion r and let A be a subset of G. The Freiman--Ruzsa theorem asserts that if |A+A| < K|A| then A is contained in a coset of a subgroup of G of size at most r^{K^4}K^2|A|. It was conjectured by Ruzsa that the subgroup size can be reduced to r^{CK}|A| for some absolute constant C >= 2. This conjecture was verified for r = 2 in a sequence of recent works, which have, in fact, yielded a tight bound. In this work, we establish the same conjecture for any prime torsion.
△ Less
Submitted 5 May, 2014; v1 submitted 22 December, 2012;
originally announced December 2012.
-
Every locally characterized affine-invariant property is testable
Authors:
Arnab Bhattacharyya,
Eldar Fischer,
Hamed Hatami,
Pooya Hatami,
Shachar Lovett
Abstract:
Let F = F_p for any fixed prime p >= 2. An affine-invariant property is a property of functions on F^n that is closed under taking affine transformations of the domain. We prove that all affine-invariant property having local characterizations are testable. In fact, we show a proximity-oblivious test for any such property P, meaning that there is a test that, given an input function f, makes a con…
▽ More
Let F = F_p for any fixed prime p >= 2. An affine-invariant property is a property of functions on F^n that is closed under taking affine transformations of the domain. We prove that all affine-invariant property having local characterizations are testable. In fact, we show a proximity-oblivious test for any such property P, meaning that there is a test that, given an input function f, makes a constant number of queries to f, always accepts if f satisfies P, and rejects with positive probability if the distance between f and P is nonzero. More generally, we show that any affine-invariant property that is closed under taking restrictions to subspaces and has bounded complexity is testable.
We also prove that any property that can be described as the property of decomposing into a known structure of low-degree polynomials is locally characterized and is, hence, testable. For example, whether a function is a product of two degree-d polynomials, whether a function splits into a product of d linear polynomials, and whether a function has low rank are all examples of degree-structural properties and are therefore locally characterized.
Our results depend on a new Gowers inverse theorem by Tao and Ziegler for low characteristic fields that decomposes any polynomial with large Gowers norm into a function of low-degree non-classical polynomials. We establish a new equidistribution result for high rank non-classical polynomials that drives the proofs of both the testability results and the local characterization of degree-structural properties.
△ Less
Submitted 17 January, 2013; v1 submitted 16 December, 2012;
originally announced December 2012.
-
A Tail Bound for Read-k Families of Functions
Authors:
Dmytro Gavinsky,
Shachar Lovett,
Michael Saks,
Srikanth Srinivasan
Abstract:
We prove a Chernoff-like large deviation bound on the sum of non-independent random variables that have the following dependence structure. The variables $Y_1,...,Y_r$ are arbitrary Boolean functions of independent random variables $X_1,...,X_m$, modulo a restriction that every $X_i$ influences at most $k$ of the variables $Y_1,...,Y_r$.
We prove a Chernoff-like large deviation bound on the sum of non-independent random variables that have the following dependence structure. The variables $Y_1,...,Y_r$ are arbitrary Boolean functions of independent random variables $X_1,...,X_m$, modulo a restriction that every $X_i$ influences at most $k$ of the variables $Y_1,...,Y_r$.
△ Less
Submitted 24 April, 2012;
originally announced May 2012.
-
New Lower Bounds for Matching Vector Codes
Authors:
Abhishek Bhowmick,
Zeev Dvir,
Shachar Lovett
Abstract:
A Matching Vector (MV) family modulo $m$ is a pair of ordered lists $U=(u_1,...,u_t)$ and $V=(v_1,...,v_t)$ where $u_i,v_j \in \mathbb{Z}_m^n$ with the following inner product pattern: for any $i$, $< u_i,v_i>=0$, and for any $i \ne j$, $< u_i,v_j> \ne 0$. A MV family is called $q$-restricted if inner products $< u_i,v_j>$ take at most $q$ different values.
Our interest in MV families stems from…
▽ More
A Matching Vector (MV) family modulo $m$ is a pair of ordered lists $U=(u_1,...,u_t)$ and $V=(v_1,...,v_t)$ where $u_i,v_j \in \mathbb{Z}_m^n$ with the following inner product pattern: for any $i$, $< u_i,v_i>=0$, and for any $i \ne j$, $< u_i,v_j> \ne 0$. A MV family is called $q$-restricted if inner products $< u_i,v_j>$ take at most $q$ different values.
Our interest in MV families stems from their recent application in the construction of sub-exponential locally decodable codes (LDCs). There, $q$-restricted MV families are used to construct LDCs with $q$ queries, and there is special interest in the regime where $q$ is constant. When $m$ is a prime it is known that such constructions yield codes with exponential block length. However, for composite $m$ the behaviour is dramatically different. A recent work by Efremenko [STOC 2009] (based on an approach initiated by Yekhanin [JACM 2008]) gives the first sub-exponential LDC with constant queries. It is based on a construction of a MV family of super-polynomial size by Grolmusz [Combinatorica 2000] modulo composite $m$.
In this work, we prove two lower bounds on the block length of LDCs which are based on black box construction using MV families. When $q$ is constant (or sufficiently small), we prove that such LDCs must have a quadratic block length. When the modulus $m$ is constant (as it is in the construction of Efremenko) we prove a super-polynomial lower bound on the block-length of the LDCs, assuming a well-known conjecture in additive combinatorics, the polynomial Freiman-Ruzsa conjecture over $\mathbb{Z}_m$.
△ Less
Submitted 29 March, 2013; v1 submitted 5 April, 2012;
originally announced April 2012.
-
Constructive Discrepancy Minimization by Walking on The Edges
Authors:
Shachar Lovett,
Raghu Meka
Abstract:
Minimizing the discrepancy of a set system is a fundamental problem in combinatorics. One of the cornerstones in this area is the celebrated six standard deviations result of Spencer (AMS 1985): In any system of n sets in a universe of size n, there always exists a coloring which achieves discrepancy 6\sqrt{n}. The original proof of Spencer was existential in nature, and did not give an efficient…
▽ More
Minimizing the discrepancy of a set system is a fundamental problem in combinatorics. One of the cornerstones in this area is the celebrated six standard deviations result of Spencer (AMS 1985): In any system of n sets in a universe of size n, there always exists a coloring which achieves discrepancy 6\sqrt{n}. The original proof of Spencer was existential in nature, and did not give an efficient algorithm to find such a coloring. Recently, a breakthrough work of Bansal (FOCS 2010) gave an efficient algorithm which finds such a coloring. His algorithm was based on an SDP relaxation of the discrepancy problem and a clever rounding procedure. In this work we give a new randomized algorithm to find a coloring as in Spencer's result based on a restricted random walk we call "Edge-Walk". Our algorithm and its analysis use only basic linear algebra and is "truly" constructive in that it does not appeal to the existential arguments, giving a new proof of Spencer's theorem and the partial coloring lemma.
△ Less
Submitted 11 October, 2012; v1 submitted 26 March, 2012;
originally announced March 2012.
-
Variety Evasive Sets
Authors:
Zeev Dvir,
János Kollár,
Shachar Lovett
Abstract:
We give an explicit construction of a large subset of F^n, where F is a finite field, that has small intersection with any affine variety of fixed dimension and bounded degree. Our construction generalizes a recent result of Dvir and Lovett (STOC 2012) who considered varieties of degree one (affine subspaces).
We give an explicit construction of a large subset of F^n, where F is a finite field, that has small intersection with any affine variety of fixed dimension and bounded degree. Our construction generalizes a recent result of Dvir and Lovett (STOC 2012) who considered varieties of degree one (affine subspaces).
△ Less
Submitted 20 March, 2012;
originally announced March 2012.
-
Testing Low Complexity Affine-Invariant Properties
Authors:
Arnab Bhattacharyya,
Eldar Fischer,
Shachar Lovett
Abstract:
Invariance with respect to linear or affine transformations of the domain is arguably the most common symmetry exhibited by natural algebraic properties. In this work, we show that any low complexity affine-invariant property of multivariate functions over finite fields is testable with a constant number of queries. This immediately reproves, for instance, that the Reed-Muller code over F_p of deg…
▽ More
Invariance with respect to linear or affine transformations of the domain is arguably the most common symmetry exhibited by natural algebraic properties. In this work, we show that any low complexity affine-invariant property of multivariate functions over finite fields is testable with a constant number of queries. This immediately reproves, for instance, that the Reed-Muller code over F_p of degree d < p is testable, with an argument that uses no detailed algebraic information about polynomials except that low degree is preserved by composition with affine maps.
The complexity of an affine-invariant property P refers to the maximum complexity, as defined by Green and Tao (Ann. Math. 2008), of the sets of linear forms used to characterize P. A more precise statement of our main result is that for any fixed prime p >=2 and fixed integer R >= 2, any affine-invariant property P of functions f: F_p^n -> [R] is testable, assuming the complexity of the property is less than p. Our proof involves developing analogs of graph-theoretic techniques in an algebraic setting, using tools from higher-order Fourier analysis.
△ Less
Submitted 8 October, 2012; v1 submitted 1 January, 2012;
originally announced January 2012.
-
An additive combinatorics approach to the log-rank conjecture in communication complexity
Authors:
Eli Ben-Sasson,
Shachar Lovett,
Noga Zewi
Abstract:
For a $\{0,1\}$-valued matrix $M$ let $\rm{CC}(M)$ denote the deterministic communication complexity of the boolean function associated with $M$. The log-rank conjecture of Lovász and Saks [FOCS 1988] states that $\rm{CC}(M) \leq \log^c(\rm{rank}(M))$ for some absolute constant $c$ where $\rm{rank}(M)$ denotes the rank of $M$ over the field of real numbers. We show that…
▽ More
For a $\{0,1\}$-valued matrix $M$ let $\rm{CC}(M)$ denote the deterministic communication complexity of the boolean function associated with $M$. The log-rank conjecture of Lovász and Saks [FOCS 1988] states that $\rm{CC}(M) \leq \log^c(\rm{rank}(M))$ for some absolute constant $c$ where $\rm{rank}(M)$ denotes the rank of $M$ over the field of real numbers. We show that $\rm{CC}(M)\leq c \cdot \rm{rank}(M)/\log \rm{rank}(M)$ for some absolute constant $c$, assuming a well-known conjecture from additive combinatorics known as the Polynomial Freiman-Ruzsa (PFR) conjecture.
Our proof is based on the study of the "approximate duality conjecture" which was recently suggested by Ben-Sasson and Zewi [STOC 2011] and studied there in connection to the PFR conjecture. First we improve the bounds on approximate duality assuming the PFR conjecture. Then we use the approximate duality conjecture (with improved bounds) to get the aforementioned upper bound on the communication complexity of low-rank martices, where this part uses the methodology suggested by Nisan and Wigderson [Combinatorica 1995].
△ Less
Submitted 24 November, 2011;
originally announced November 2011.
-
Probabilistic existence of rigid combinatorial structures
Authors:
Greg Kuperberg,
Shachar Lovett,
Ron Peled
Abstract:
We show the existence of rigid combinatorial objects which previously were not known to exist. Specifically, for a wide range of the underlying parameters, we show the existence of non-trivial orthogonal arrays, $t$-designs, and $t$-wise permutations. In all cases, the sizes of the objects are optimal up to polynomial overhead. The proof of existence is probabilistic. We show that a randomly chose…
▽ More
We show the existence of rigid combinatorial objects which previously were not known to exist. Specifically, for a wide range of the underlying parameters, we show the existence of non-trivial orthogonal arrays, $t$-designs, and $t$-wise permutations. In all cases, the sizes of the objects are optimal up to polynomial overhead. The proof of existence is probabilistic. We show that a randomly chosen such object has the required properties with positive yet tiny probability. The main technical ingredient is a special local central limit theorem for suitable lattice random walks with finitely many steps.
△ Less
Submitted 2 November, 2011;
originally announced November 2011.
-
Subspace Evasive Sets
Authors:
Zeev Dvir,
Shachar Lovett
Abstract:
In this work we describe an explicit, simple, construction of large subsets of F^n, where F is a finite field, that have small intersection with every k-dimensional affine subspace. Interest in the explicit construction of such sets, termed subspace-evasive sets, started in the work of Pudlak and Rodl (2004) who showed how such constructions over the binary field can be used to construct explicit…
▽ More
In this work we describe an explicit, simple, construction of large subsets of F^n, where F is a finite field, that have small intersection with every k-dimensional affine subspace. Interest in the explicit construction of such sets, termed subspace-evasive sets, started in the work of Pudlak and Rodl (2004) who showed how such constructions over the binary field can be used to construct explicit Ramsey graphs. More recently, Guruswami (2011) showed that, over large finite fields (of size polynomial in n), subspace evasive sets can be used to obtain explicit list-decodable codes with optimal rate and constant list-size. In this work we construct subspace evasive sets over large fields and use them to reduce the list size of folded Reed-Solomon codes form poly(n) to a constant.
△ Less
Submitted 25 October, 2011;
originally announced October 2011.
-
Higher-order Fourier analysis of $\mathbb{F}_p^n$ and the complexity of systems of linear forms
Authors:
Hamed Hatami,
Shachar Lovett
Abstract:
Consider a subset $A$ of $\mathbb{F}_p^n$ and a decomposition of its indicator function as the sum of two bounded functions $1_A=f_1+f_2$. For every family of linear forms, we find the smallest degree of uniformity $k$ such that assuming that $\|f_2\|_{U^k}$ is sufficiently small, it is possible to discard $f_2$ and replace $1_A$ with $f_1$ in the average over this family of linear forms, affectin…
▽ More
Consider a subset $A$ of $\mathbb{F}_p^n$ and a decomposition of its indicator function as the sum of two bounded functions $1_A=f_1+f_2$. For every family of linear forms, we find the smallest degree of uniformity $k$ such that assuming that $\|f_2\|_{U^k}$ is sufficiently small, it is possible to discard $f_2$ and replace $1_A$ with $f_1$ in the average over this family of linear forms, affecting it only negligibly. Previously, Gowers and Wolf solved this problem for the case where $f_1$ is a constant function. Furthermore, our main result solves Problem 7.6 in [W. T. Gowers and J. Wolf. Linear forms and higher-degree uniformity for functions on $\mathbb{F}_p^n$. Geom. Funct. Anal., 21(1):36--69, 2011] regarding the analytic averages that involve more than one subset of $\mathbb{F}_p^n$.] regarding the analytic averages that involve more than one subset of $\mathbb{F}_p^n$.
△ Less
Submitted 24 March, 2011; v1 submitted 20 November, 2010;
originally announced November 2010.
-
Equivalence of polynomial conjectures in additive combinatorics
Authors:
Shachar Lovett
Abstract:
We study two conjectures in additive combinatorics. The first is the polynomial Freiman-Ruzsa conjecture, which relates to the structure of sets with small doubling. The second is the inverse Gowers conjecture for $U^3$, which relates to functions which locally look like quadratics. In both cases a weak form, with exponential decay of parameters is known, and a strong form with only a polynomial…
▽ More
We study two conjectures in additive combinatorics. The first is the polynomial Freiman-Ruzsa conjecture, which relates to the structure of sets with small doubling. The second is the inverse Gowers conjecture for $U^3$, which relates to functions which locally look like quadratics. In both cases a weak form, with exponential decay of parameters is known, and a strong form with only a polynomial loss of parameters is conjectured. Our main result is that the two conjectures are in fact equivalent.
△ Less
Submitted 19 January, 2010;
originally announced January 2010.
-
Worst Case to Average Case Reductions for Polynomials
Authors:
Tali Kaufman,
Shachar Lovett
Abstract:
A degree-$d$ polynomial $p$ in $n$ variables over a field $\F$ is {\em equidistributed} if it takes on each of its $|\F|$ values close to equally often, and {\em biased} otherwise. We say that $p$ has a {\em low rank} if it can be expressed as a bounded combination of polynomials of lower degree. Green and Tao [gt07] have shown that bias imply low rank over large fields (i.e. for the case…
▽ More
A degree-$d$ polynomial $p$ in $n$ variables over a field $\F$ is {\em equidistributed} if it takes on each of its $|\F|$ values close to equally often, and {\em biased} otherwise. We say that $p$ has a {\em low rank} if it can be expressed as a bounded combination of polynomials of lower degree. Green and Tao [gt07] have shown that bias imply low rank over large fields (i.e. for the case $d < |\F|$). They have also conjectured that bias imply low rank over general fields. In this work we affirmatively answer their conjecture. Using this result we obtain a general worst case to average case reductions for polynomials. That is, we show that a polynomial that can be {\em approximated} by few polynomials of bounded degree, can be {\em computed} by few polynomials of bounded degree. We derive some relations between our results to the construction of pseudorandom generators, and to the question of testing concise representations.
△ Less
Submitted 2 July, 2008; v1 submitted 27 June, 2008;
originally announced June 2008.
-
Inverse Conjecture for the Gowers norm is false
Authors:
Shachar Lovett,
Roy Meshulam,
Alex Samorodnitsky
Abstract:
Let $p$ be a fixed prime number, and $N$ be a large integer. The 'Inverse Conjecture for the Gowers norm' states that if the "$d$-th Gowers norm" of a function $f:\F_p^N \to \F_p$ is non-negligible, that is larger than a constant independent of $N$, then $f$ can be non-trivially approximated by a degree $d-1$ polynomial. The conjecture is known to hold for $d=2,3$ and for any prime $p$. In this…
▽ More
Let $p$ be a fixed prime number, and $N$ be a large integer. The 'Inverse Conjecture for the Gowers norm' states that if the "$d$-th Gowers norm" of a function $f:\F_p^N \to \F_p$ is non-negligible, that is larger than a constant independent of $N$, then $f$ can be non-trivially approximated by a degree $d-1$ polynomial. The conjecture is known to hold for $d=2,3$ and for any prime $p$. In this paper we show the conjecture to be false for $p=2$ and for $d = 4$, by presenting an explicit function whose 4-th Gowers norm is non-negligible, but whose correlation any polynomial of degree 3 is exponentially small.
Essentially the same result (with different correlation bounds) was independently obtained by Green and Tao \cite{gt07}. Their analysis uses a modification of a Ramsey-type argument of Alon and Beigel \cite{ab} to show inapproximability of certain functions by low-degree polynomials. We observe that a combination of our results with the argument of Alon and Beigel implies the inverse conjecture to be false for any prime $p$, for $d = p^2$.
△ Less
Submitted 20 October, 2008; v1 submitted 21 November, 2007;
originally announced November 2007.
-
Almost Euclidean sections of the N-dimensional cross-polytope using O(N) random bits
Authors:
Shachar Lovett,
Sasha Sodin
Abstract:
It is well known that R^N has subspaces of dimension proportional to N on which the \ell_1 norm is equivalent to the \ell_2 norm; however, no explicit constructions are known. Extending earlier work by Artstein--Avidan and Milman, we prove that such a subspace can be generated using O(N) random bits.
It is well known that R^N has subspaces of dimension proportional to N on which the \ell_1 norm is equivalent to the \ell_2 norm; however, no explicit constructions are known. Extending earlier work by Artstein--Avidan and Milman, we prove that such a subspace can be generated using O(N) random bits.
△ Less
Submitted 20 October, 2008; v1 submitted 3 January, 2007;
originally announced January 2007.