skip to main content
research-article

Real Advantage

Published:01 November 2013Publication History
Skip Abstract Section

Abstract

We highlight the challenge of proving correlation bounds between boolean functions and real-valued polynomials, where any non-boolean output counts against correlation.

We prove that real-valued polynomials of degree 1 2 lg2 lg2 n have correlation with parity at most zero. Such a result is false for modular and threshold polynomials. Its proof is based on a variant of an anti-concentration result by Costello et al. [2006].

References

  1. James Aspnes, Richard Beigel, Merrick Furst, and Steven Rudich. 1994. The expressive power of voting polynomials. Combinatorica 14, 2, 135--148.Google ScholarGoogle ScholarCross RefCross Ref
  2. Richard Beigel. 1993. The polynomial method in circuit complexity. In Proceedings of the 8th Structure in Complexity Theory Conference. 82--95.Google ScholarGoogle ScholarCross RefCross Ref
  3. Kevin P. Costello. 2009. Bilinear and quadratic variants on the littlewood-offord problem. Israel J. Math. (To appear). http://arxiv.org/abs/0902.1538.Google ScholarGoogle Scholar
  4. Kevin P. Costello, Terence Tao, and Van Vu. 2006. Random symmetric matrices are almost surely nonsingular. Duke Math. J. 135, 2, 395--413.Google ScholarGoogle ScholarCross RefCross Ref
  5. Paul Erdos. 1945. On a lemma of littlewood and offord. Bull. Amer. Math. Soc. 51, 898--902.Google ScholarGoogle ScholarCross RefCross Ref
  6. Frederic Green. 2004. The correlation between parity and quadratic polynomials mod 3. J. Comput. Syst. Sci. 69, 1, 28--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. John Littlewood and Albert Offord. 1943. On the number of real roots of a random algebraic equation. III. Rec. Math. Mat. Sbornik N. S. 12, 277--286.Google ScholarGoogle Scholar
  8. Saburo Muroga, Iwao Toda, and Satoru Takasu. 1961. Theory of majority decision elements. J. Franklin Inst. 271, 376--418.Google ScholarGoogle ScholarCross RefCross Ref
  9. Saburo Muroga. 1971. Threshold Logic and its Applications. Wiley-Interscience, New York.Google ScholarGoogle Scholar
  10. Hoi H. Nguyen and Van Vu. 2013. Small ball probability, inverse theorems, and applications. In Erdos Centennial, Springer.Google ScholarGoogle Scholar
  11. Alexander A. Sherstov. 2008. Communication lower bounds using dual polynomials. Bull. Euro. Assoc. Theor. Comput. Sci. 95, 59--93.Google ScholarGoogle Scholar
  12. Rocco A. Servedio and Emanuele Viola. 2012. On a special case of rigidity. http://www.ccs.neu.edu/home/viola/.Google ScholarGoogle Scholar
  13. Leslie G. Valiant. 1977. Graph-theoretic arguments in low-level complexity. In Proceedings of the 6th Symposium on Mathematical Foundations of Computer Science. Lecture Notes in Computer Science, vol. 53, Springer, 162--176.Google ScholarGoogle Scholar
  14. Emanuele Viola. 2009. On the power of small-depth computation. Foundat. Trends Theor. Comput. Sci. 5, 1, 1--72. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Real Advantage

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Computation Theory
        ACM Transactions on Computation Theory  Volume 5, Issue 4
        November 2013
        103 pages
        ISSN:1942-3454
        EISSN:1942-3462
        DOI:10.1145/2539126
        Issue’s Table of Contents

        Copyright © 2013 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 November 2013
        • Revised: 1 June 2013
        • Accepted: 1 June 2013
        • Received: 1 November 2012
        Published in toct Volume 5, Issue 4

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader