-
Quartic quantum speedups for planted inference
Authors:
Alexander Schmidhuber,
Ryan O'Donnell,
Robin Kothari,
Ryan Babbush
Abstract:
We describe a quantum algorithm for the Planted Noisy $k$XOR problem (also known as sparse Learning Parity with Noise) that achieves a nearly quartic ($4$th power) speedup over the best known classical algorithm while also only using logarithmically many qubits. Our work generalizes and simplifies prior work of Hastings, by building on his quantum algorithm for the Tensor Principal Component Analy…
▽ More
We describe a quantum algorithm for the Planted Noisy $k$XOR problem (also known as sparse Learning Parity with Noise) that achieves a nearly quartic ($4$th power) speedup over the best known classical algorithm while also only using logarithmically many qubits. Our work generalizes and simplifies prior work of Hastings, by building on his quantum algorithm for the Tensor Principal Component Analysis (PCA) problem. We achieve our quantum speedup using a general framework based on the Kikuchi Method (recovering the quartic speedup for Tensor PCA), and we anticipate it will yield similar speedups for further planted inference problems. These speedups rely on the fact that planted inference problems naturally instantiate the Guided Sparse Hamiltonian problem. Since the Planted Noisy $k$XOR problem has been used as a component of certain cryptographic constructions, our work suggests that some of these are susceptible to super-quadratic quantum attacks.
△ Less
Submitted 27 June, 2024;
originally announced June 2024.
-
Pseudorandom Permutations from Random Reversible Circuits
Authors:
William He,
Ryan O'Donnell
Abstract:
We study pseudorandomness properties of permutations on $\{0,1\}^n$ computed by random circuits made from reversible $3$-bit gates (permutations on $\{0,1\}^3$). Our main result is that a random circuit of depth $n \cdot \tilde{O}(k^2)$, with each layer consisting of $\approx n/3$ random gates in a fixed nearest-neighbor architecture, yields almost $k$-wise independent permutations. The main techn…
▽ More
We study pseudorandomness properties of permutations on $\{0,1\}^n$ computed by random circuits made from reversible $3$-bit gates (permutations on $\{0,1\}^3$). Our main result is that a random circuit of depth $n \cdot \tilde{O}(k^2)$, with each layer consisting of $\approx n/3$ random gates in a fixed nearest-neighbor architecture, yields almost $k$-wise independent permutations. The main technical component is showing that the Markov chain on $k$-tuples of $n$-bit strings induced by a single random $3$-bit nearest-neighbor gate has spectral gap at least $1/n \cdot \tilde{O}(k)$. This improves on the original work of Gowers [Gowers96], who showed a gap of $1/\mathrm{poly}(n,k)$ for one random gate (with non-neighboring inputs); and, on subsequent work [HMMR05,BH08] improving the gap to $Ω(1/n^2k)$ in the same setting.
From the perspective of cryptography, our result can be seen as a particularly simple/practical block cipher construction that gives provable statistical security against attackers with access to $k$~input-output pairs within few rounds. We also show that the Luby--Rackoff construction of pseudorandom permutations from pseudorandom functions can be implemented with reversible circuits. From this, we make progress on the complexity of the Minimum Reversible Circuit Size Problem (MRCSP), showing that block ciphers of fixed polynomial size are computationally secure against arbitrary polynomial-time adversaries, assuming the existence of one-way functions (OWFs).
△ Less
Submitted 3 July, 2024; v1 submitted 22 April, 2024;
originally announced April 2024.
-
Explicit orthogonal and unitary designs
Authors:
Ryan O'Donnell,
Rocco A. Servedio,
Pedro Paredes
Abstract:
We give a strongly explicit construction of $\varepsilon$-approximate $k$-designs for the orthogonal group $\mathrm{O}(N)$ and the unitary group $\mathrm{U}(N)$, for $N=2^n$. Our designs are of cardinality $\mathrm{poly}(N^k/\varepsilon)$ (equivalently, they have seed length $O(nk + \log(1/\varepsilon)))$; up to the polynomial, this matches the number of design elements used by the construction co…
▽ More
We give a strongly explicit construction of $\varepsilon$-approximate $k$-designs for the orthogonal group $\mathrm{O}(N)$ and the unitary group $\mathrm{U}(N)$, for $N=2^n$. Our designs are of cardinality $\mathrm{poly}(N^k/\varepsilon)$ (equivalently, they have seed length $O(nk + \log(1/\varepsilon)))$; up to the polynomial, this matches the number of design elements used by the construction consisting of completely random matrices.
△ Less
Submitted 20 October, 2023;
originally announced October 2023.
-
Quantum chi-squared tomography and mutual information testing
Authors:
Steven T. Flammia,
Ryan O'Donnell
Abstract:
For quantum state tomography on rank-$r$ dimension-$d$ states, we show that $\widetilde{O}(r^{.5}d^{1.5}/ε) \leq \widetilde{O}(d^2/ε)$ copies suffice for accuracy~$ε$ with respect to (Bures) $χ^2$-divergence, and $\widetilde{O}(rd/ε)$ copies suffice for accuracy~$ε$ with respect to quantum relative entropy. The best previous bound was $\widetilde{O}(rd/ε) \leq \widetilde{O}(d^2/ε)$ with respect to…
▽ More
For quantum state tomography on rank-$r$ dimension-$d$ states, we show that $\widetilde{O}(r^{.5}d^{1.5}/ε) \leq \widetilde{O}(d^2/ε)$ copies suffice for accuracy~$ε$ with respect to (Bures) $χ^2$-divergence, and $\widetilde{O}(rd/ε)$ copies suffice for accuracy~$ε$ with respect to quantum relative entropy. The best previous bound was $\widetilde{O}(rd/ε) \leq \widetilde{O}(d^2/ε)$ with respect to infidelity; our results are an improvement since infidelity is bounded above by both the relative entropy and the $χ^2$-divergence. For algorithms that are required to use single-copy measurements, we show that $\widetilde{O}(r^{1.5} d^{1.5}/ε) \leq \widetilde{O}(d^3/ε)$ copies suffice for $χ^2$-divergence, and $\widetilde{O}(r^{2} d/ε)$ suffice for relative entropy.
Using this tomography algorithm, we show that $\widetilde{O}(d^{2.5}/ε)$ copies of a $d\times d$-dimensional bipartite state suffice to test if it has quantum mutual information~$0$ or at least~$ε$. As a corollary, we also improve the best known sample complexity for the \emph{classical} version of mutual information testing to $\widetilde{O}(d/ε)$.
△ Less
Submitted 12 June, 2024; v1 submitted 29 May, 2023;
originally announced May 2023.
-
Query-optimal estimation of unitary channels in diamond distance
Authors:
Jeongwan Haah,
Robin Kothari,
Ryan O'Donnell,
Ewin Tang
Abstract:
We consider process tomography for unitary quantum channels. Given access to an unknown unitary channel acting on a $\textsf{d}$-dimensional qudit, we aim to output a classical description of a unitary that is $\varepsilon$-close to the unknown unitary in diamond norm. We design an algorithm achieving error $\varepsilon$ using $O(\textsf{d}^2/\varepsilon)$ applications of the unknown channel and o…
▽ More
We consider process tomography for unitary quantum channels. Given access to an unknown unitary channel acting on a $\textsf{d}$-dimensional qudit, we aim to output a classical description of a unitary that is $\varepsilon$-close to the unknown unitary in diamond norm. We design an algorithm achieving error $\varepsilon$ using $O(\textsf{d}^2/\varepsilon)$ applications of the unknown channel and only one qudit. This improves over prior results, which use $O(\textsf{d}^3/\varepsilon^2)$ [via standard process tomography] or $O(\textsf{d}^{2.5}/\varepsilon)$ [Yang, Renner, and Chiribella, PRL 2020] applications. To show this result, we introduce a simple technique to "bootstrap" an algorithm that can produce constant-error estimates to one that can produce $\varepsilon$-error estimates with the Heisenberg scaling. Finally, we prove a complementary lower bound showing that estimation requires $Ω(\textsf{d}^2/\varepsilon)$ applications, even with access to the inverse or controlled versions of the unknown unitary. This shows that our algorithm has both optimal query complexity and optimal space complexity.
△ Less
Submitted 27 February, 2023;
originally announced February 2023.
-
Mean estimation when you have the source code; or, quantum Monte Carlo methods
Authors:
Robin Kothari,
Ryan O'Donnell
Abstract:
Suppose $\boldsymbol{y}$ is a real random variable, and one is given access to ``the code'' that generates it (for example, a randomized or quantum circuit whose output is $\boldsymbol{y}$). We give a quantum procedure that runs the code $O(n)$ times and returns an estimate $\widehat{\boldsymbolμ}$ for $μ= \mathrm{E}[\boldsymbol{y}]$ that with high probability satisfies…
▽ More
Suppose $\boldsymbol{y}$ is a real random variable, and one is given access to ``the code'' that generates it (for example, a randomized or quantum circuit whose output is $\boldsymbol{y}$). We give a quantum procedure that runs the code $O(n)$ times and returns an estimate $\widehat{\boldsymbolμ}$ for $μ= \mathrm{E}[\boldsymbol{y}]$ that with high probability satisfies $|\widehat{\boldsymbolμ} - μ| \leq σ/n$, where $σ= \mathrm{stddev}[\boldsymbol{y}]$. This dependence on $n$ is optimal for quantum algorithms. One may compare with classical algorithms, which can only achieve the quadratically worse $|\widehat{\boldsymbolμ} - μ| \leq σ/\sqrt{n}$. Our method improves upon previous works, which either made additional assumptions about $\boldsymbol{y}$, and/or assumed the algorithm knew an a priori bound on $σ$, and/or used additional logarithmic factors beyond $O(n)$. The central subroutine for our result is essentially Grover's algorithm but with complex phases.ally Grover's algorithm but with complex phases.
△ Less
Submitted 16 August, 2022;
originally announced August 2022.
-
High-Dimensional Expanders from Chevalley Groups
Authors:
Ryan O'Donnell,
Kevin Pratt
Abstract:
Let $Φ$ be an irreducible root system (other than $G_2$) of rank at least $2$, let $\mathbb{F}$ be a finite field with $p = \operatorname{char} \mathbb{F} > 3$, and let $\mathrm{G}(Φ,\mathbb{F})$ be the corresponding Chevalley group. We describe a strongly explicit high-dimensional expander (HDX) family of dimension $\mathrm{rank}(Φ)$, where $\mathrm{G}(Φ,\mathbb{F})$ acts simply transitively on t…
▽ More
Let $Φ$ be an irreducible root system (other than $G_2$) of rank at least $2$, let $\mathbb{F}$ be a finite field with $p = \operatorname{char} \mathbb{F} > 3$, and let $\mathrm{G}(Φ,\mathbb{F})$ be the corresponding Chevalley group. We describe a strongly explicit high-dimensional expander (HDX) family of dimension $\mathrm{rank}(Φ)$, where $\mathrm{G}(Φ,\mathbb{F})$ acts simply transitively on the top-dimensional faces; these are $λ$-spectral HDXs with $λ\to 0$ as $p \to \infty$. This generalizes a construction of Kaufman and Oppenheim (STOC 2018), which corresponds to the case $Φ= A_d$. Our work gives three new families of spectral HDXs of any dimension $\ge 2$, and four exceptional constructions of dimension $4$, $6$, $7$, and $8$.
△ Less
Submitted 7 March, 2022;
originally announced March 2022.
-
Explicit Abelian Lifts and Quantum LDPC Codes
Authors:
Fernando Granha Jeronimo,
Tushant Mittal,
Ryan O'Donnell,
Pedro Paredes,
Madhur Tulsiani
Abstract:
For an abelian group $H$ acting on the set $[\ell]$, an $(H,\ell)$-lift of a graph $G_0$ is a graph obtained by replacing each vertex by $\ell$ copies, and each edge by a matching corresponding to the action of an element of $H$.
In this work, we show the following explicit constructions of expanders obtained via abelian lifts. For every (transitive) abelian group $H \leqslant \text{Sym}(\ell)$,…
▽ More
For an abelian group $H$ acting on the set $[\ell]$, an $(H,\ell)$-lift of a graph $G_0$ is a graph obtained by replacing each vertex by $\ell$ copies, and each edge by a matching corresponding to the action of an element of $H$.
In this work, we show the following explicit constructions of expanders obtained via abelian lifts. For every (transitive) abelian group $H \leqslant \text{Sym}(\ell)$, constant degree $d \ge 3$ and $ε> 0$, we construct explicit $d$-regular expander graphs $G$ obtained from an $(H,\ell)$-lift of a (suitable) base $n$-vertex expander $G_0$ with the following parameters:
(i) $λ(G) \le 2\sqrt{d-1} + ε$, for any lift size $\ell \le 2^{n^δ}$ where $δ=δ(d,ε)$,
(ii) $λ(G) \le ε\cdot d$, for any lift size $\ell \le 2^{n^{δ_0}}$ for a fixed $δ_0 > 0$, when $d \ge d_0(ε)$, or
(iii) $λ(G) \le \widetilde{O}(\sqrt{d})$, for lift size ``exactly'' $\ell = 2^{Θ(n)}$.
As corollaries, we obtain explicit quantum lifted product codes of Panteleev and Kalachev of almost linear distance (and also in a wide range of parameters) and explicit classical quasi-cyclic LDPC codes with wide range of circulant sizes.
Items $(i)$ and $(ii)$ above are obtained by extending the techniques of Mohanty, O'Donnell and Paredes [STOC 2020] for $2$-lifts to much larger abelian lift sizes (as a byproduct simplifying their construction). This is done by providing a new encoding of special walks arising in the trace power method, carefully "compressing'" depth-first search traversals. Result $(iii)$ is via a simpler proof of Agarwal et al. [SIAM J. Discrete Math 2019] at the expense of polylog factors in the expansion.
△ Less
Submitted 2 December, 2021;
originally announced December 2021.
-
Causal KL: Evaluating Causal Discovery
Authors:
Rodney T. O'Donnell,
Kevin B. Korb,
Lloyd Allison
Abstract:
The two most commonly used criteria for assessing causal model discovery with artificial data are edit-distance and Kullback-Leibler divergence, measured from the true model to the learned model. Both of these metrics maximally reward the true model. However, we argue that they are both insufficiently discriminating in judging the relative merits of false models. Edit distance, for example, fails…
▽ More
The two most commonly used criteria for assessing causal model discovery with artificial data are edit-distance and Kullback-Leibler divergence, measured from the true model to the learned model. Both of these metrics maximally reward the true model. However, we argue that they are both insufficiently discriminating in judging the relative merits of false models. Edit distance, for example, fails to distinguish between strong and weak probabilistic dependencies. KL divergence, on the other hand, rewards equally all statistically equivalent models, regardless of their different causal claims. We propose an augmented KL divergence, which we call Causal KL (CKL), which takes into account causal relationships which distinguish between observationally equivalent models. Results are presented for three variants of CKL, showing that Causal KL works well in practice.
△ Less
Submitted 10 November, 2021;
originally announced November 2021.
-
Optimizing Strongly Interacting Fermionic Hamiltonians
Authors:
Matthew B. Hastings,
Ryan O'Donnell
Abstract:
The fundamental problem in much of physics and quantum chemistry is to optimize a low-degree polynomial in certain anticommuting variables. Being a quantum mechanical problem, in many cases we do not know an efficient classical witness to the optimum, or even to an approximation of the optimum. One prominent exception is when the optimum is described by a so-called "Gaussian state", also called a…
▽ More
The fundamental problem in much of physics and quantum chemistry is to optimize a low-degree polynomial in certain anticommuting variables. Being a quantum mechanical problem, in many cases we do not know an efficient classical witness to the optimum, or even to an approximation of the optimum. One prominent exception is when the optimum is described by a so-called "Gaussian state", also called a free fermion state. In this work we are interested in the complexity of this optimization problem when no good Gaussian state exists. Our primary testbed is the Sachdev--Ye--Kitaev (SYK) model of random degree-$q$ polynomials, a model of great current interest in condensed matter physics and string theory, and one which has remarkable properties from a computational complexity standpoint. Among other results, we give an efficient classical certification algorithm for upper-bounding the largest eigenvalue in the $q=4$ SYK model, and an efficient quantum certification algorithm for lower-bounding this largest eigenvalue; both algorithms achieve constant-factor approximations with high probability.
△ Less
Submitted 17 August, 2023; v1 submitted 20 October, 2021;
originally announced October 2021.
-
The SDP value of random 2CSPs
Authors:
Amulya Musipatla,
Ryan O'Donnell,
Tselil Schramm,
Xinyu Wu
Abstract:
We consider a very wide class of models for sparse random Boolean 2CSPs; equivalently, degree-2 optimization problems over~$\{\pm 1\}^n$. For each model $\mathcal{M}$, we identify the "high-probability value"~$s^*_{\mathcal{M}}$ of the natural SDP relaxation (equivalently, the quantum value). That is, for all $\varepsilon > 0$ we show that the SDP optimum of a random $n$-variable instance is (when…
▽ More
We consider a very wide class of models for sparse random Boolean 2CSPs; equivalently, degree-2 optimization problems over~$\{\pm 1\}^n$. For each model $\mathcal{M}$, we identify the "high-probability value"~$s^*_{\mathcal{M}}$ of the natural SDP relaxation (equivalently, the quantum value). That is, for all $\varepsilon > 0$ we show that the SDP optimum of a random $n$-variable instance is (when normalized by~$n$) in the range $(s^*_{\mathcal{M}}-\varepsilon, s^*_{\mathcal{M}}+\varepsilon)$ with high probability. Our class of models includes non-regular CSPs, and ones where the SDP relaxation value is strictly smaller than the spectral relaxation value.
△ Less
Submitted 2 August, 2021;
originally announced August 2021.
-
Analysis of Boolean Functions
Authors:
Ryan O'Donnell
Abstract:
The subject of this textbook is the analysis of Boolean functions. Roughly speaking, this refers to studying Boolean functions $f : \{0,1\}^n \to \{0,1\}$ via their Fourier expansion and other analytic means. Boolean functions are perhaps the most basic object of study in theoretical computer science, and Fourier analysis has become an indispensable tool in the field. The topic has also played a k…
▽ More
The subject of this textbook is the analysis of Boolean functions. Roughly speaking, this refers to studying Boolean functions $f : \{0,1\}^n \to \{0,1\}$ via their Fourier expansion and other analytic means. Boolean functions are perhaps the most basic object of study in theoretical computer science, and Fourier analysis has become an indispensable tool in the field. The topic has also played a key role in several other areas of mathematics, from combinatorics, random graph theory, and statistical physics, to Gaussian geometry, metric/Banach spaces, and social choice theory.
The intent of this book is both to develop the foundations of the field and to give a wide (though far from exhaustive) overview of its applications. Each chapter ends with a "highlight" showing the power of analysis of Boolean functions in different subject areas: property testing, social choice, cryptography, circuit complexity, learning theory, pseudorandomness, hardness of approximation, concrete complexity, and random graph theory.
The book can be used as a reference for working researchers or as the basis of a one-semester graduate-level course. The author has twice taught such a course at Carnegie Mellon University, attended mainly by graduate students in computer science and mathematics but also by advanced undergraduates, postdocs, and researchers in adjacent fields. In both years most of Chapters 1-5 and 7 were covered, along with parts of Chapters 6, 8, 9, and 11, and some additional material on additive combinatorics. Nearly 500 exercises are provided at the ends of the book's chapters.
△ Less
Submitted 21 May, 2021;
originally announced May 2021.
-
Designing AI-based Conversational Agent for Diabetes Care in a Multilingual Context
Authors:
Thuy-Trinh Nguyen,
Kellie Sim,
Anthony To Yiu Kuen,
Ronald R. O'donnell,
Suan Tee Lim,
Wenru Wang,
Hoang D. Nguyen
Abstract:
Conversational agents (CAs) represent an emerging research field in health information systems, where there are great potentials in empowering patients with timely information and natural language interfaces. Nevertheless, there have been limited attempts in establishing prescriptive knowledge on designing CAs in the healthcare domain in general, and diabetes care specifically. In this paper, we c…
▽ More
Conversational agents (CAs) represent an emerging research field in health information systems, where there are great potentials in empowering patients with timely information and natural language interfaces. Nevertheless, there have been limited attempts in establishing prescriptive knowledge on designing CAs in the healthcare domain in general, and diabetes care specifically. In this paper, we conducted a Design Science Research project and proposed three design principles for designing health-related CAs that embark on artificial intelligence (AI) to address the limitations of existing solutions. Further, we instantiated the proposed design and developed AMANDA - an AI-based multilingual CA in diabetes care with state-of-the-art technologies for natural-sounding localised accent. We employed mean opinion scores and system usability scale to evaluate AMANDA's speech quality and usability, respectively. This paper provides practitioners with a blueprint for designing CAs in diabetes care with concrete design guidelines that can be extended into other healthcare domains.
△ Less
Submitted 19 May, 2021;
originally announced May 2021.
-
Fooling Gaussian PTFs via Local Hyperconcentration
Authors:
Ryan O'Donnell,
Rocco A. Servedio,
Li-Yang Tan,
Daniel Kane
Abstract:
We give a pseudorandom generator that fools degree-$d$ polynomial threshold functions over $n$-dimensional Gaussian space with seed length $\mathrm{poly}(d)\cdot \log n$. All previous generators had a seed length with at least a $2^d$ dependence on $d$.
The key new ingredient is a Local Hyperconcentration Theorem, which shows that every degree-$d$ Gaussian polynomial is hyperconcentrated almost…
▽ More
We give a pseudorandom generator that fools degree-$d$ polynomial threshold functions over $n$-dimensional Gaussian space with seed length $\mathrm{poly}(d)\cdot \log n$. All previous generators had a seed length with at least a $2^d$ dependence on $d$.
The key new ingredient is a Local Hyperconcentration Theorem, which shows that every degree-$d$ Gaussian polynomial is hyperconcentrated almost everywhere at scale $d^{-O(1)}$.
△ Less
Submitted 9 February, 2022; v1 submitted 13 March, 2021;
originally announced March 2021.
-
Toward Instance-Optimal State Certification With Incoherent Measurements
Authors:
Sitan Chen,
Jerry Li,
Ryan O'Donnell
Abstract:
We revisit the basic problem of quantum state certification: given copies of unknown mixed state $ρ\in\mathbb{C}^{d\times d}$ and the description of a mixed state $σ$, decide whether $σ= ρ$ or $\|σ- ρ\|_{\mathsf{tr}} \ge ε$. When $σ$ is maximally mixed, this is mixedness testing, and it is known that $Ω(d^{Θ(1)}/ε^2)$ copies are necessary, where the exact exponent depends on the type of measuremen…
▽ More
We revisit the basic problem of quantum state certification: given copies of unknown mixed state $ρ\in\mathbb{C}^{d\times d}$ and the description of a mixed state $σ$, decide whether $σ= ρ$ or $\|σ- ρ\|_{\mathsf{tr}} \ge ε$. When $σ$ is maximally mixed, this is mixedness testing, and it is known that $Ω(d^{Θ(1)}/ε^2)$ copies are necessary, where the exact exponent depends on the type of measurements the learner can make [OW15, BCL20], and in many of these settings there is a matching upper bound [OW15, BOW19, BCL20].
Can one avoid this $d^{Θ(1)}$ dependence for certain kinds of mixed states $σ$, e.g. ones which are approximately low rank? More ambitiously, does there exist a simple functional $f:\mathbb{C}^{d\times d}\to\mathbb{R}_{\ge 0}$ for which one can show that $Θ(f(σ)/ε^2)$ copies are necessary and sufficient for state certification with respect to any $σ$? Such instance-optimal bounds are known in the context of classical distribution testing, e.g. [VV17].
Here we give the first bounds of this nature for the quantum setting, showing (up to log factors) that the copy complexity for state certification using nonadaptive incoherent measurements is essentially given by the copy complexity for mixedness testing times the fidelity between $σ$ and the maximally mixed state. Surprisingly, our bound differs substantially from instance optimal bounds for the classical problem, demonstrating a qualitative difference between the two settings.
△ Less
Submitted 10 November, 2021; v1 submitted 25 February, 2021;
originally announced February 2021.
-
Improved quantum data analysis
Authors:
Costin Bădescu,
Ryan O'Donnell
Abstract:
We provide more sample-efficient versions of some basic routines in quantum data analysis, along with simpler proofs. Particularly, we give a quantum "Threshold Search" algorithm that requires only $O((\log^2 m)/ε^2)$ samples of a $d$-dimensional state $ρ$. That is, given observables $0 \le A_1, A_2, ..., A_m \le 1$ such that $\mathrm{tr}(ρA_i) \ge 1/2$ for at least one $i$, the algorithm finds…
▽ More
We provide more sample-efficient versions of some basic routines in quantum data analysis, along with simpler proofs. Particularly, we give a quantum "Threshold Search" algorithm that requires only $O((\log^2 m)/ε^2)$ samples of a $d$-dimensional state $ρ$. That is, given observables $0 \le A_1, A_2, ..., A_m \le 1$ such that $\mathrm{tr}(ρA_i) \ge 1/2$ for at least one $i$, the algorithm finds $j$ with $\mathrm{tr}(ρA_j) \ge 1/2-ε$. As a consequence, we obtain a Shadow Tomography algorithm requiring only $\tilde{O}((\log^2 m)(\log d)/ε^4)$ samples, which simultaneously achieves the best known dependence on each parameter $m$, $d$, $ε$. This yields the same sample complexity for quantum Hypothesis Selection among $m$ states; we also give an alternative Hypothesis Selection method using $\tilde{O}((\log^3 m)/ε^2)$ samples.
△ Less
Submitted 15 March, 2024; v1 submitted 21 November, 2020;
originally announced November 2020.
-
Fiber Bundle Codes: Breaking the $N^{1/2} \operatorname{polylog}(N)$ Barrier for Quantum LDPC Codes
Authors:
Matthew B. Hastings,
Jeongwan Haah,
Ryan O'Donnell
Abstract:
We present a quantum LDPC code family that has distance $Ω(N^{3/5}/\operatorname{polylog}(N))$ and $\tildeΘ(N^{3/5})$ logical qubits. This is the first quantum LDPC code construction which achieves distance greater than $N^{1/2} \operatorname{polylog}(N)$. The construction is based on generalizing the homological product of codes to a fiber bundle.
We present a quantum LDPC code family that has distance $Ω(N^{3/5}/\operatorname{polylog}(N))$ and $\tildeΘ(N^{3/5})$ logical qubits. This is the first quantum LDPC code construction which achieves distance greater than $N^{1/2} \operatorname{polylog}(N)$. The construction is based on generalizing the homological product of codes to a fiber bundle.
△ Less
Submitted 26 October, 2020; v1 submitted 8 September, 2020;
originally announced September 2020.
-
Explicit near-fully X-Ramanujan graphs
Authors:
Ryan O'Donnell,
Xinyu Wu
Abstract:
Let $p(Y_1, \dots, Y_d, Z_1, \dots, Z_e)$ be a self-adjoint noncommutative polynomial, with coefficients from $\mathbb{C}^{r \times r}$, in the indeterminates $Y_1, \dots, Y_d$ (considered to be self-adjoint), the indeterminates $Z_1, \dots, Z_e$, and their adjoints $Z_1^*, \dots, Z_e^*$. Suppose $Y_1, \dots, Y_d$ are replaced by independent random $n \times n$ matching matrices, and…
▽ More
Let $p(Y_1, \dots, Y_d, Z_1, \dots, Z_e)$ be a self-adjoint noncommutative polynomial, with coefficients from $\mathbb{C}^{r \times r}$, in the indeterminates $Y_1, \dots, Y_d$ (considered to be self-adjoint), the indeterminates $Z_1, \dots, Z_e$, and their adjoints $Z_1^*, \dots, Z_e^*$. Suppose $Y_1, \dots, Y_d$ are replaced by independent random $n \times n$ matching matrices, and $Z_1, \dots, Z_e$ are replaced by independent random $n \times n$ permutation matrices. Assuming for simplicity that $p$'s coefficients are $0$-$1$ matrices, the result can be thought of as a kind of random $rn$-vertex graph $G$. As $n \to \infty$, there will be a natural limiting infinite graph $X$ that covers any finite outcome for $G$. A recent landmark result of Bordenave and Collins shows that for any $\varepsilon > 0$, with high probability the spectrum of a random $G$ will be $\varepsilon$-close in Hausdorff distance to the spectrum of $X$ (once the suitably defined "trivial" eigenvalues are excluded). We say that $G$ is "$\varepsilon$-near fully $X$-Ramanujan". Our work has two contributions: First we study and clarify the class of infinite graphs $X$ that can arise in this way. Second, we derandomize the Bordenave-Collins result: for any $X$, we provide explicit, arbitrarily large graphs $G$ that are covered by $X$ and that have (nontrivial) spectrum at Hausdorff distance at most $\varepsilon$ from that of $X$. This significantly generalizes the recent work of Mohanty et al., which provided explicit near-Ramanujan graphs for every degree $d$ (meaning $d$-regular graphs with all nontrivial eigenvalues bounded in magnitude by $2\sqrt{d-1} + \varepsilon$). As an application of our main technical theorem, we are also able to determine the "eigenvalue relaxation value" for a wide class of average-case degree-$2$ constraint satisfaction problems.
△ Less
Submitted 5 September, 2020;
originally announced September 2020.
-
Explicit near-Ramanujan graphs of every degree
Authors:
Sidhanth Mohanty,
Ryan O'Donnell,
Pedro Paredes
Abstract:
For every constant $d \geq 3$ and $ε> 0$, we give a deterministic $\mathrm{poly}(n)$-time algorithm that outputs a $d$-regular graph on $Θ(n)$ vertices that is $ε$-near-Ramanujan; i.e., its eigenvalues are bounded in magnitude by $2\sqrt{d-1} + ε$ (excluding the single trivial eigenvalue of~$d$).
For every constant $d \geq 3$ and $ε> 0$, we give a deterministic $\mathrm{poly}(n)$-time algorithm that outputs a $d$-regular graph on $Θ(n)$ vertices that is $ε$-near-Ramanujan; i.e., its eigenvalues are bounded in magnitude by $2\sqrt{d-1} + ε$ (excluding the single trivial eigenvalue of~$d$).
△ Less
Submitted 27 November, 2022; v1 submitted 16 September, 2019;
originally announced September 2019.
-
The SDP value for random two-eigenvalue CSPs
Authors:
Sidhanth Mohanty,
Ryan O'Donnell,
Pedro Paredes
Abstract:
We precisely determine the SDP value (equivalently, quantum value) of large random instances of certain kinds of constraint satisfaction problems, ``two-eigenvalue 2CSPs''. We show this SDP value coincides with the spectral relaxation value, possibly indicating a computational threshold. Our analysis extends the previously resolved cases of random regular $\mathsf{2XOR}$ and $\textsf{NAE-3SAT}$, a…
▽ More
We precisely determine the SDP value (equivalently, quantum value) of large random instances of certain kinds of constraint satisfaction problems, ``two-eigenvalue 2CSPs''. We show this SDP value coincides with the spectral relaxation value, possibly indicating a computational threshold. Our analysis extends the previously resolved cases of random regular $\mathsf{2XOR}$ and $\textsf{NAE-3SAT}$, and includes new cases such as random $\mathsf{Sort}_4$ (equivalently, $\mathsf{CHSH}$) and $\mathsf{Forrelation}$ CSPs. Our techniques include new generalizations of the nonbacktracking operator, the Ihara--Bass Formula, and the Friedman/Bordenave proof of Alon's Conjecture.
△ Less
Submitted 16 June, 2019;
originally announced June 2019.
-
$X$-Ramanujan Graphs
Authors:
Sidhanth Mohanty,
Ryan O'Donnell
Abstract:
Let $X$ be an infinite graph of bounded degree; e.g., the Cayley graph of a free product of finite groups. If $G$ is a finite graph covered by $X$, it is said to be $X$-Ramanujan if its second-largest eigenvalue $λ_2(G)$ is at most the spectral radius $ρ(X)$ of $X$, and more generally $k$-quasi-$X$-Ramanujan if $λ_k(G)$ is at most $ρ(X)$. In case $X$ is the infinite $Δ$-regular tree, this reduces…
▽ More
Let $X$ be an infinite graph of bounded degree; e.g., the Cayley graph of a free product of finite groups. If $G$ is a finite graph covered by $X$, it is said to be $X$-Ramanujan if its second-largest eigenvalue $λ_2(G)$ is at most the spectral radius $ρ(X)$ of $X$, and more generally $k$-quasi-$X$-Ramanujan if $λ_k(G)$ is at most $ρ(X)$. In case $X$ is the infinite $Δ$-regular tree, this reduces to the well known notion of a finite $Δ$-regular graph being Ramanujan. Inspired by the Interlacing Polynomials method of Marcus, Spielman, and Srivastava, we show the existence of infinitely many $k$-quasi-$X$-Ramanujan graphs for a variety of infinite $X$. In particular, $X$ need not be a tree; our analysis is applicable whenever $X$ is what we call an additive product graph. This additive product is a new construction of an infinite graph $\mathsf{AddProd}(A_1, \dots, A_c)$ from finite 'atom' graphs $A_1, \dots, A_c$ over a common vertex set. It generalizes the notion of the free product graph $A_1 * \cdots * A_c$ when the atoms $A_j$ are vertex-transitive, and it generalizes the notion of the universal covering tree when the atoms $A_j$ are single-edge graphs. Key to our analysis is a new graph polynomial $α(A_1, \dots, A_c;x)$ that we call the additive characteristic polynomial. It generalizes the well known matching polynomial $μ(G;x)$ in case the atoms $A_j$ are the single edges of $G$, and it generalizes the $r$-characteristic polynomial introduced in [Ravichandran'16, Leake-Ravichandran'18]. We show that $α(A_1, \dots, A_c;x)$ is real-rooted, and all of its roots have magnitude at most $ρ(\mathsf{AddProd}(A_1, \dots, A_c))$. This last fact is proven by generalizing Godsil's notion of treelike walks on a graph $G$ to a notion of freelike walks on a collection of atoms $A_1, \dots, A_c$.
△ Less
Submitted 10 April, 2019; v1 submitted 6 April, 2019;
originally announced April 2019.
-
Sherali--Adams Strikes Back
Authors:
Ryan O'Donnell,
Tselil Schramm
Abstract:
Let $G$ be any $n$-vertex graph whose random walk matrix has its nontrivial eigenvalues bounded in magnitude by $1/\sqrtΔ$ (for example, a random graph $G$ of average degree~$Θ(Δ)$ typically has this property). We show that the $\exp\Big(c \frac{\log n}{\log Δ}\Big)$-round Sherali--Adams linear programming hierarchy certifies that the maximum cut in such a~$G$ is at most $50.1\%$ (in fact, at most…
▽ More
Let $G$ be any $n$-vertex graph whose random walk matrix has its nontrivial eigenvalues bounded in magnitude by $1/\sqrtΔ$ (for example, a random graph $G$ of average degree~$Θ(Δ)$ typically has this property). We show that the $\exp\Big(c \frac{\log n}{\log Δ}\Big)$-round Sherali--Adams linear programming hierarchy certifies that the maximum cut in such a~$G$ is at most $50.1\%$ (in fact, at most $\tfrac12 + 2^{-Ω(c)}$). For example, in random graphs with $n^{1.01}$ edges, $O(1)$ rounds suffice; in random graphs with $n \cdot \text{polylog}(n)$ edges, $n^{O(1/\log \log n)} = n^{o(1)}$ rounds suffice.
Our results stand in contrast to the conventional beliefs that linear programming hierarchies perform poorly for \maxcut and other CSPs, and that eigenvalue/SDP methods are needed for effective refutation. Indeed, our results imply that constant-round Sherali--Adams can strongly refute random Boolean $k$-CSP instances with $n^{\lceil k/2 \rceil + δ}$ constraints; previously this had only been done with spectral algorithms or the SOS SDP hierarchy.
△ Less
Submitted 24 December, 2018;
originally announced December 2018.
-
Learning sparse mixtures of rankings from noisy information
Authors:
Anindya De,
Ryan O'Donnell,
Rocco Servedio
Abstract:
We study the problem of learning an unknown mixture of $k$ rankings over $n$ elements, given access to noisy samples drawn from the unknown mixture. We consider a range of different noise models, including natural variants of the "heat kernel" noise framework and the Mallows model. For each of these noise models we give an algorithm which, under mild assumptions, learns the unknown mixture to high…
▽ More
We study the problem of learning an unknown mixture of $k$ rankings over $n$ elements, given access to noisy samples drawn from the unknown mixture. We consider a range of different noise models, including natural variants of the "heat kernel" noise framework and the Mallows model. For each of these noise models we give an algorithm which, under mild assumptions, learns the unknown mixture to high accuracy and runs in $n^{O(\log k)}$ time. The best previous algorithms for closely related problems have running times which are exponential in $k$.
△ Less
Submitted 3 November, 2018;
originally announced November 2018.
-
A log-Sobolev inequality for the multislice, with applications
Authors:
Yuval Filmus,
Ryan O'Donnell,
Xinyu Wu
Abstract:
Let $κ\in \mathbb{N}_+^\ell$ satisfy $κ_1 + \dots + κ_\ell = n$ and let $\mathcal{U}_κ$ denote the "multislice" of all strings $u$ in $[\ell]^n$ having exactly $κ_i$ coordinates equal to $i$, for all $i \in [\ell]$. Consider the Markov chain on $\mathcal{U}_κ$, where a step is a random transposition of two coordinates of $u$. We show that the log-Sobolev constant $ρ_κ$ for the chain satisfies…
▽ More
Let $κ\in \mathbb{N}_+^\ell$ satisfy $κ_1 + \dots + κ_\ell = n$ and let $\mathcal{U}_κ$ denote the "multislice" of all strings $u$ in $[\ell]^n$ having exactly $κ_i$ coordinates equal to $i$, for all $i \in [\ell]$. Consider the Markov chain on $\mathcal{U}_κ$, where a step is a random transposition of two coordinates of $u$. We show that the log-Sobolev constant $ρ_κ$ for the chain satisfies $$(ρ_κ)^{-1} \leq n \sum_{i=1}^{\ell} \tfrac{1}{2} \log_2(4n/κ_i),$$ which is sharp up to constants whenever $\ell$ is constant. From this, we derive some consequences for small-set expansion and isoperimetry in the multislice, including a KKL Theorem, a Kruskal--Katona Theorem for the multislice, a Friedgut Junta Theorem, and a Nisan--Szegedy Theorem.
△ Less
Submitted 10 September, 2018;
originally announced September 2018.
-
SOS lower bounds with hard constraints: think global, act local
Authors:
Pravesh Kothari,
Ryan O'Donnell,
Tselil Schramm
Abstract:
Many previous Sum-of-Squares (SOS) lower bounds for CSPs had two deficiencies related to global constraints. First, they were not able to support a "cardinality constraint", as in, say, the Min-Bisection problem. Second, while the pseudoexpectation of the objective function was shown to have some value $β$, it did not necessarily actually "satisfy" the constraint "objective = $β$". In this paper w…
▽ More
Many previous Sum-of-Squares (SOS) lower bounds for CSPs had two deficiencies related to global constraints. First, they were not able to support a "cardinality constraint", as in, say, the Min-Bisection problem. Second, while the pseudoexpectation of the objective function was shown to have some value $β$, it did not necessarily actually "satisfy" the constraint "objective = $β$". In this paper we show how to remedy both deficiencies in the case of random CSPs, by translating \emph{global} constraints into \emph{local} constraints. Using these ideas, we also show that degree-$Ω(\sqrt{n})$ SOS does not provide a $(\frac{4}{3} - ε)$-approximation for Min-Bisection, and degree-$Ω(n)$ SOS does not provide a $(\frac{11}{12} + ε)$-approximation for Max-Bisection or a $(\frac{5}{4} - ε)$-approximation for Min-Bisection. No prior SOS lower bounds for these problems were known.
△ Less
Submitted 4 September, 2018;
originally announced September 2018.
-
Fooling Polytopes
Authors:
Ryan O'Donnell,
Rocco A. Servedio,
Li-Yang Tan
Abstract:
We give a pseudorandom generator that fools $m$-facet polytopes over $\{0,1\}^n$ with seed length $\mathrm{polylog}(m) \cdot \log n$. The previous best seed length had superlinear dependence on $m$. An immediate consequence is a deterministic quasipolynomial time algorithm for approximating the number of solutions to any $\{0,1\}$-integer program.
We give a pseudorandom generator that fools $m$-facet polytopes over $\{0,1\}^n$ with seed length $\mathrm{polylog}(m) \cdot \log n$. The previous best seed length had superlinear dependence on $m$. An immediate consequence is a deterministic quasipolynomial time algorithm for approximating the number of solutions to any $\{0,1\}$-integer program.
△ Less
Submitted 12 August, 2018;
originally announced August 2018.
-
On closeness to k-wise uniformity
Authors:
Ryan O'Donnell,
Yu Zhao
Abstract:
A probability distribution over {-1, 1}^n is (eps, k)-wise uniform if, roughly, it is eps-close to the uniform distribution when restricted to any k coordinates. We consider the problem of how far an (eps, k)-wise uniform distribution can be from any globally k-wise uniform distribution. We show that every (eps, k)-wise uniform distribution is O(n^(k/2) eps)-close to a k-wise uniform distribution…
▽ More
A probability distribution over {-1, 1}^n is (eps, k)-wise uniform if, roughly, it is eps-close to the uniform distribution when restricted to any k coordinates. We consider the problem of how far an (eps, k)-wise uniform distribution can be from any globally k-wise uniform distribution. We show that every (eps, k)-wise uniform distribution is O(n^(k/2) eps)-close to a k-wise uniform distribution in total variation distance. In addition, we show that this bound is optimal for all even k: we find an (eps, k)-wise uniform distribution that is Omega(n^(k/2) eps)-far from any k-wise uniform distribution in total variation distance. For k = 1, we get a better upper bound of O(eps), which is also optimal.
One application of our closeness result is to the sample complexity of testing whether a distribution is k-wise uniform or delta-far from k-wise uniform. We give an upper bound of O(n^k/delta^2) (or O(log n/delta^2) when k = 1) on the required samples. We show an improved upper bound of O~(n^(k/2)/delta^2) for the special case of testing fully uniform vs. delta-far from k-wise uniform. Finally, we complement this with a matching lower bound of Omega(n/delta^2) when k = 2.
Our results improve upon the best known bounds from [AAK+07], and have simpler proofs.
△ Less
Submitted 9 June, 2018;
originally announced June 2018.
-
The threshold for SDP-refutation of random regular NAE-3SAT
Authors:
Yash Deshpande,
Andrea Montanari,
Ryan O'Donnell,
Tselil Schramm,
Subhabrata Sen
Abstract:
Unlike its cousin 3SAT, the NAE-3SAT (not-all-equal-3SAT) problem has the property that spectral/SDP algorithms can efficiently refute random instances when the constraint density is a large constant (with high probability). But do these methods work immediately above the "satisfiability threshold", or is there still a range of constraint densities for which random NAE-3SAT instances are unsatisfi…
▽ More
Unlike its cousin 3SAT, the NAE-3SAT (not-all-equal-3SAT) problem has the property that spectral/SDP algorithms can efficiently refute random instances when the constraint density is a large constant (with high probability). But do these methods work immediately above the "satisfiability threshold", or is there still a range of constraint densities for which random NAE-3SAT instances are unsatisfiable but hard to refute?
We show that the latter situation prevails, at least in the context of random regular instances and SDP-based refutation. More precisely, whereas a random $d$-regular instance of NAE-3SAT is easily shown to be unsatisfiable (whp) once $d \geq 8$, we establish the following sharp threshold result regarding efficient refutation: If $d < 13.5$ then the basic SDP, even augmented with triangle inequalities, fails to refute satisfiability (whp), if $d > 13.5$ then even the most basic spectral algorithm refutes satisfiability~(whp).
△ Less
Submitted 14 April, 2018;
originally announced April 2018.
-
Quantum state certification
Authors:
Costin Bădescu,
Ryan O'Donnell,
John Wright
Abstract:
We consider the problem of quantum state certification, where one is given $n$ copies of an unknown $d$-dimensional quantum mixed state $ρ$, and one wants to test whether $ρ$ is equal to some known mixed state $σ$ or else is $ε$-far from $σ$. The goal is to use notably fewer copies than the $Ω(d^2)$ needed for full tomography on $ρ$ (i.e., density estimation). We give two robust state certificatio…
▽ More
We consider the problem of quantum state certification, where one is given $n$ copies of an unknown $d$-dimensional quantum mixed state $ρ$, and one wants to test whether $ρ$ is equal to some known mixed state $σ$ or else is $ε$-far from $σ$. The goal is to use notably fewer copies than the $Ω(d^2)$ needed for full tomography on $ρ$ (i.e., density estimation). We give two robust state certification algorithms: one with respect to fidelity using $n = O(d/ε)$ copies, and one with respect to trace distance using $n = O(d/ε^2)$ copies. The latter algorithm also applies when $σ$ is unknown as well. These copy complexities are optimal up to constant factors.
△ Less
Submitted 3 November, 2017; v1 submitted 20 August, 2017;
originally announced August 2017.
-
Sharp bounds for population recovery
Authors:
Anindya De,
Ryan O'Donnell,
Rocco Servedio
Abstract:
The population recovery problem is a basic problem in noisy unsupervised learning that has attracted significant research attention in recent years [WY12,DRWY12, MS13, BIMP13, LZ15,DST16]. A number of different variants of this problem have been studied, often under assumptions on the unknown distribution (such as that it has restricted support size). In this work we study the sample complexity an…
▽ More
The population recovery problem is a basic problem in noisy unsupervised learning that has attracted significant research attention in recent years [WY12,DRWY12, MS13, BIMP13, LZ15,DST16]. A number of different variants of this problem have been studied, often under assumptions on the unknown distribution (such as that it has restricted support size). In this work we study the sample complexity and algorithmic complexity of the most general version of the problem, under both bit-flip noise and erasure noise model. We give essentially matching upper and lower sample complexity bounds for both noise models, and efficient algorithms matching these sample complexity bounds up to polynomial factors.
△ Less
Submitted 4 March, 2017;
originally announced March 2017.
-
Sum of squares lower bounds for refuting any CSP
Authors:
Pravesh K. Kothari,
Ryuhei Mori,
Ryan O'Donnell,
David Witmer
Abstract:
Let $P:\{0,1\}^k \to \{0,1\}$ be a nontrivial $k$-ary predicate. Consider a random instance of the constraint satisfaction problem $\mathrm{CSP}(P)$ on $n$ variables with $Δn$ constraints, each being $P$ applied to $k$ randomly chosen literals. Provided the constraint density satisfies $Δ\gg 1$, such an instance is unsatisfiable with high probability. The \emph{refutation} problem is to efficientl…
▽ More
Let $P:\{0,1\}^k \to \{0,1\}$ be a nontrivial $k$-ary predicate. Consider a random instance of the constraint satisfaction problem $\mathrm{CSP}(P)$ on $n$ variables with $Δn$ constraints, each being $P$ applied to $k$ randomly chosen literals. Provided the constraint density satisfies $Δ\gg 1$, such an instance is unsatisfiable with high probability. The \emph{refutation} problem is to efficiently find a proof of unsatisfiability.
We show that whenever the predicate $P$ supports a $t$-\emph{wise uniform} probability distribution on its satisfying assignments, the sum of squares (SOS) algorithm of degree $d = Θ(\frac{n}{Δ^{2/(t-1)} \log Δ})$ (which runs in time $n^{O(d)}$) \emph{cannot} refute a random instance of $\mathrm{CSP}(P)$. In particular, the polynomial-time SOS algorithm requires $\widetildeΩ(n^{(t+1)/2})$ constraints to refute random instances of CSP$(P)$ when $P$ supports a $t$-wise uniform distribution on its satisfying assignments. Together with recent work of Lee et al. [LRS15], our result also implies that \emph{any} polynomial-size semidefinite programming relaxation for refutation requires at least $\widetildeΩ(n^{(t+1)/2})$ constraints.
Our results (which also extend with no change to CSPs over larger alphabets) subsume all previously known lower bounds for semialgebraic refutation of random CSPs. For every constraint predicate~$P$, they give a three-way hardness tradeoff between the density of constraints, the SOS degree (hence running time), and the strength of the refutation. By recent algorithmic results of Allen et al. [AOW15] and Raghavendra et al. [RRS16], this full three-way tradeoff is \emph{tight}, up to lower-order factors.
△ Less
Submitted 16 January, 2017;
originally announced January 2017.
-
Optimal mean-based algorithms for trace reconstruction
Authors:
Anindya De,
Ryan O'Donnell,
Rocco Servedio
Abstract:
In the (deletion-channel) trace reconstruction problem, there is an unknown $n$-bit source string $x$. An algorithm is given access to independent traces of $x$, where a trace is formed by deleting each bit of~$x$ independently with probability~$δ$. The goal of the algorithm is to recover~$x$ exactly (with high probability), while minimizing samples (number of traces) and running time.
Previousl…
▽ More
In the (deletion-channel) trace reconstruction problem, there is an unknown $n$-bit source string $x$. An algorithm is given access to independent traces of $x$, where a trace is formed by deleting each bit of~$x$ independently with probability~$δ$. The goal of the algorithm is to recover~$x$ exactly (with high probability), while minimizing samples (number of traces) and running time.
Previously, the best known algorithm for the trace reconstruction problem was due to Holenstein~et~al.; it uses $\exp(\tilde{O}(n^{1/2}))$ samples and running time for any fixed $0 < δ< 1$. It is also what we call a "mean-based algorithm", meaning that it only uses the empirical means of the individual bits of the traces. Holenstein~et~al.~also gave a lower bound, showing that any mean-based algorithm must use at least $n^{\tildeΩ(\log n)}$ samples.
In this paper we improve both of these results, obtaining matching upper and lower bounds for mean-based trace reconstruction. For any constant deletion rate $0 < δ< 1$, we give a mean-based algorithm that uses $\exp(O(n^{1/3}))$ time and traces; we also prove that any mean-based algorithm must use at least $\exp(Ω(n^{1/3}))$ traces. In fact, we obtain matching upper and lower bounds even for $δ$ subconstant and $ρ:= 1-δ$ subconstant: when $(\log^3 n)/n \ll δ\leq 1/2$ the bound is $\exp(-Θ(δn)^{1/3})$, and when $1/\sqrt{n} \ll ρ\leq 1/2$ the bound is $\exp(-Θ(n/ρ)^{1/3})$.
Our proofs involve estimates for the maxima of Littlewood polynomials on complex disks. We show that these techniques can also be used to perform trace reconstruction with random insertions and bit-flips in addition to deletions. We also find a surprising result: for deletion probabilities $δ> 1/2$, the presence of insertions can actually help with trace reconstruction.
△ Less
Submitted 9 December, 2016;
originally announced December 2016.
-
Efficient quantum tomography II
Authors:
Ryan O'Donnell,
John Wright
Abstract:
Following [OW16], we continue our analysis of: (1) "Quantum tomography", i.e., learning a quantum state, i.e., the quantum generalization of learning a discrete probability distribution; (2) The distribution of Young diagrams output by the RSK algorithm on random words. Regarding (2), we introduce two powerful new tools: (i) A precise upper bound on the expected length of the longest union of $k$…
▽ More
Following [OW16], we continue our analysis of: (1) "Quantum tomography", i.e., learning a quantum state, i.e., the quantum generalization of learning a discrete probability distribution; (2) The distribution of Young diagrams output by the RSK algorithm on random words. Regarding (2), we introduce two powerful new tools: (i) A precise upper bound on the expected length of the longest union of $k$ disjoint increasing subsequences in a random length-$n$ word with letter distribution $α_1 \geq α_2 \geq \cdots \geq α_d$; (ii) A new majorization property of the RSK algorithm that allows one to analyze the Young diagram formed by the lower rows $λ_k, λ_{k+1}, \dots$ of its output.
These tools allow us to prove several new theorems concerning the distribution of random Young diagrams in the nonasymptotic regime, giving concrete error bounds that are optimal, or nearly so, in all parameters. As one example, we give a fundamentally new proof of the fact that the expected length of the longest increasing sequence in a random length-$n$ permutation is bounded by $2\sqrt{n}$. This is the $k = 1$, $α_i \equiv \frac1d$, $d \to \infty$ special case of a much more general result we prove: the expected length of the $k$th Young diagram row produced by an $α$-random word is $α_k n \pm 2\sqrt{α_kd n}$.
From our new analyses of random Young diagrams we derive several new results in quantum tomography, including: (i) Learning the eigenvalues of an unknown state to $ε$-accuracy in Hellinger-squared, chi-squared, or KL distance, using $n = O(d^2/ε)$ copies; (ii) Learning the optimal rank-$k$ approximation of an unknown state to $ε$-fidelity (Hellinger-squared distance) using $n = \widetilde{O}(kd/ε)$ copies.
△ Less
Submitted 30 November, 2016;
originally announced December 2016.
-
Polynomial bounds for decoupling, with applications
Authors:
Ryan O'Donnell,
Yu Zhao
Abstract:
Let f(x) = f(x_1, ..., x_n) = \sum_{|S| <= k} a_S \prod_{i \in S} x_i be an n-variate real multilinear polynomial of degree at most k, where S \subseteq [n] = {1, 2, ..., n}. For its "one-block decoupled" version,
f~(y,z) = \sum_{|S| <= k} a_S \sum_{i \in S} y_i \prod_{j \in Sı} z_j,
we show tail-bound comparisons of the form
Pr[|f~(y,z)| > C_k t] <= D_k Pr[f(x) > t].
Our constants C_k, D_…
▽ More
Let f(x) = f(x_1, ..., x_n) = \sum_{|S| <= k} a_S \prod_{i \in S} x_i be an n-variate real multilinear polynomial of degree at most k, where S \subseteq [n] = {1, 2, ..., n}. For its "one-block decoupled" version,
f~(y,z) = \sum_{|S| <= k} a_S \sum_{i \in S} y_i \prod_{j \in Sı} z_j,
we show tail-bound comparisons of the form
Pr[|f~(y,z)| > C_k t] <= D_k Pr[f(x) > t].
Our constants C_k, D_k are significantly better than those known for "full decoupling". For example, when x, y, z are independent Gaussians we obtain C_k = D_k = O(k); when x, y, z, Rademacher random variables we obtain C_k = O(k^2), D_k = k^{O(k)}. By contrast, for full decoupling only C_k = D_k = k^{O(k)} is known in these settings.
We describe consequences of these results for query complexity (related to conjectures of Aaronson and Ambainis) and for analysis of Boolean functions (including an optimal sharpening of the DFKO Inequality).
△ Less
Submitted 4 December, 2015;
originally announced December 2015.
-
Efficient quantum tomography
Authors:
Ryan O'Donnell,
John Wright
Abstract:
In the quantum state tomography problem, one wishes to estimate an unknown $d$-dimensional mixed quantum state $ρ$, given few copies. We show that $O(d/ε)$ copies suffice to obtain an estimate $\hatρ$ that satisfies $\|\hatρ - ρ\|_F^2 \leq ε$ (with high probability). An immediate consequence is that $O(\mathrm{rank}(ρ) \cdot d/ε^2) \leq O(d^2/ε^2)$ copies suffice to obtain an $ε$-accurate estimate…
▽ More
In the quantum state tomography problem, one wishes to estimate an unknown $d$-dimensional mixed quantum state $ρ$, given few copies. We show that $O(d/ε)$ copies suffice to obtain an estimate $\hatρ$ that satisfies $\|\hatρ - ρ\|_F^2 \leq ε$ (with high probability). An immediate consequence is that $O(\mathrm{rank}(ρ) \cdot d/ε^2) \leq O(d^2/ε^2)$ copies suffice to obtain an $ε$-accurate estimate in the standard trace distance. This improves on the best known prior result of $O(d^3/ε^2)$ copies for full tomography, and even on the best known prior result of $O(d^2\log(d/ε)/ε^2)$ copies for spectrum estimation. Our result is the first to show that nontrivial tomography can be obtained using a number of copies that is just linear in the dimension.
Next, we generalize these results to show that one can perform efficient principal component analysis on $ρ$. Our main result is that $O(k d/ε^2)$ copies suffice to output a rank-$k$ approximation $\hatρ$ whose trace distance error is at most $ε$ more than that of the best rank-$k$ approximator to $ρ$. This subsumes our above trace distance tomography result and generalizes it to the case when $ρ$ is not guaranteed to be of low rank. A key part of the proof is the analogous generalization of our spectrum-learning results: we show that the largest $k$ eigenvalues of $ρ$ can be estimated to trace-distance error $ε$ using $O(k^2/ε^2)$ copies. In turn, this result relies on a new coupling theorem concerning the Robinson-Schensted-Knuth algorithm that should be of independent combinatorial interest.
△ Less
Submitted 12 September, 2015; v1 submitted 8 August, 2015;
originally announced August 2015.
-
Remarks on the Most Informative Function Conjecture at fixed mean
Authors:
Guy Kindler,
Ryan O'Donnell,
David Witmer
Abstract:
In 2013, Courtade and Kumar posed the following problem: Let $\boldsymbol{x} \sim \{\pm 1\}^n$ be uniformly random, and form $\boldsymbol{y} \sim \{\pm 1\}^n$ by negating each bit of $\boldsymbol{x}$ independently with probability $α$. Is it true that the mutual information $I(f(\boldsymbol{x}) \mathbin{;} \boldsymbol{y})$ is maximized among $f:\{\pm 1\}^n \to \{\pm 1\}$ by $f(x) = x_1$? We do not…
▽ More
In 2013, Courtade and Kumar posed the following problem: Let $\boldsymbol{x} \sim \{\pm 1\}^n$ be uniformly random, and form $\boldsymbol{y} \sim \{\pm 1\}^n$ by negating each bit of $\boldsymbol{x}$ independently with probability $α$. Is it true that the mutual information $I(f(\boldsymbol{x}) \mathbin{;} \boldsymbol{y})$ is maximized among $f:\{\pm 1\}^n \to \{\pm 1\}$ by $f(x) = x_1$? We do not resolve this problem. Instead, we make a couple of observations about the fixed-mean version of the conjecture. We show that Courtade and Kumar's stronger Lex Conjecture fails for small noise rates. We also prove a continuous version of the conjecture on the sphere and show that it implies the previously-known analogue for Gaussian space.
△ Less
Submitted 25 January, 2016; v1 submitted 10 June, 2015;
originally announced June 2015.
-
How to refute a random CSP
Authors:
Sarah R. Allen,
Ryan O'Donnell,
David Witmer
Abstract:
Let $P$ be a $k$-ary predicate over a finite alphabet. Consider a random CSP$(P)$ instance $I$ over $n$ variables with $m$ constraints. When $m \gg n$ the instance $I$ will be unsatisfiable with high probability, and we want to find a refutation - i.e., a certificate of unsatisfiability. When $P$ is the $3$-ary OR predicate, this is the well studied problem of refuting random $3$-SAT formulas, and…
▽ More
Let $P$ be a $k$-ary predicate over a finite alphabet. Consider a random CSP$(P)$ instance $I$ over $n$ variables with $m$ constraints. When $m \gg n$ the instance $I$ will be unsatisfiable with high probability, and we want to find a refutation - i.e., a certificate of unsatisfiability. When $P$ is the $3$-ary OR predicate, this is the well studied problem of refuting random $3$-SAT formulas, and an efficient algorithm is known only when $m \gg n^{3/2}$. Understanding the density required for refutation of other predicates is important in cryptography, proof complexity, and learning theory. Previously, it was known that for a $k$-ary predicate, having $m \gg n^{\lceil k/2 \rceil}$ constraints suffices for refutation. We give a criterion for predicates that often yields efficient refutation algorithms at much lower densities. Specifically, if $P$ fails to support a $t$-wise uniform distribution, then there is an efficient algorithm that refutes random CSP$(P)$ instances $I$ whp when $m \gg n^{t/2}$. Indeed, our algorithm will "somewhat strongly" refute $I$, certifying $\mathrm{Opt}(I) \leq 1-Ω_k(1)$, if $t = k$ then we get the strongest possible refutation, certifying $\mathrm{Opt}(I) \leq \mathrm{E}[P] + o(1)$. This last result is new even in the context of random $k$-SAT. Regarding the optimality of our $m \gg n^{t/2}$ requirement, prior work on SDP hierarchies has given some evidence that efficient refutation of random CSP$(P)$ may be impossible when $m \ll n^{t/2}$. Thus there is an indication our algorithm's dependence on $m$ is optimal for every $P$, at least in the context of SDP hierarchies. Along these lines, we show that our refutation algorithm can be carried out by the $O(1)$-round SOS SDP hierarchy. Finally, as an application of our result, we falsify assumptions used to show hardness-of-learning results in recent work of Daniely, Linial, and Shalev-Shwartz.
△ Less
Submitted 27 July, 2015; v1 submitted 17 May, 2015;
originally announced May 2015.
-
Beating the random assignment on constraint satisfaction problems of bounded degree
Authors:
Boaz Barak,
Ankur Moitra,
Ryan O'Donnell,
Prasad Raghavendra,
Oded Regev,
David Steurer,
Luca Trevisan,
Aravindan Vijayaraghavan,
David Witmer,
John Wright
Abstract:
We show that for any odd $k$ and any instance of the Max-kXOR constraint satisfaction problem, there is an efficient algorithm that finds an assignment satisfying at least a $\frac{1}{2} + Ω(1/\sqrt{D})$ fraction of constraints, where $D$ is a bound on the number of constraints that each variable occurs in. This improves both qualitatively and quantitatively on the recent work of Farhi, Goldstone,…
▽ More
We show that for any odd $k$ and any instance of the Max-kXOR constraint satisfaction problem, there is an efficient algorithm that finds an assignment satisfying at least a $\frac{1}{2} + Ω(1/\sqrt{D})$ fraction of constraints, where $D$ is a bound on the number of constraints that each variable occurs in. This improves both qualitatively and quantitatively on the recent work of Farhi, Goldstone, and Gutmann (2014), which gave a \emph{quantum} algorithm to find an assignment satisfying a $\frac{1}{2} + Ω(D^{-3/4})$ fraction of the equations.
For arbitrary constraint satisfaction problems, we give a similar result for "triangle-free" instances; i.e., an efficient algorithm that finds an assignment satisfying at least a $μ+ Ω(1/\sqrt{D})$ fraction of constraints, where $μ$ is the fraction that would be satisfied by a uniformly random assignment.
△ Less
Submitted 11 August, 2015; v1 submitted 13 May, 2015;
originally announced May 2015.
-
Social choice, computational complexity, Gaussian geometry, and Boolean functions
Authors:
Ryan O'Donnell
Abstract:
We describe a web of connections between the following topics: the mathematical theory of voting and social choice; the computational complexity of the Maximum Cut problem; the Gaussian Isoperimetric Inequality and Borell's generalization thereof; the Hypercontractive Inequality of Bonami; and, the analysis of Boolean functions. A major theme is the technique of reducing inequalities about Gaussia…
▽ More
We describe a web of connections between the following topics: the mathematical theory of voting and social choice; the computational complexity of the Maximum Cut problem; the Gaussian Isoperimetric Inequality and Borell's generalization thereof; the Hypercontractive Inequality of Bonami; and, the analysis of Boolean functions. A major theme is the technique of reducing inequalities about Gaussian functions to inequalities about Boolean functions f : {-1,1}^n -> {-1,1}, and then using induction on n to further reduce to inequalities about functions f : {-1,1} -> {-1,1}. We especially highlight De, Mossel, and Neeman's recent use of this technique to prove the Majority Is Stablest Theorem and Borell's Isoperimetric Inequality simultaneously.
△ Less
Submitted 4 August, 2014; v1 submitted 29 July, 2014;
originally announced July 2014.
-
Conditioning and covariance on caterpillars
Authors:
Sarah R. Allen,
Ryan O'Donnell
Abstract:
Let $X_1, \dots, X_n$ be joint $\{ \pm 1\}$-valued random variables. It is known that conditioning on a random subset of $O(1/ε^2)$ of them reduces their average pairwise covariance to below $ε$ (in expectation). We conjecture that $O(1/ε^2)$ can be improved to $O(1/ε)$. The motivation for the problem and our conjectured improvement comes from the theory of global correlation rounding for convex r…
▽ More
Let $X_1, \dots, X_n$ be joint $\{ \pm 1\}$-valued random variables. It is known that conditioning on a random subset of $O(1/ε^2)$ of them reduces their average pairwise covariance to below $ε$ (in expectation). We conjecture that $O(1/ε^2)$ can be improved to $O(1/ε)$. The motivation for the problem and our conjectured improvement comes from the theory of global correlation rounding for convex relaxation hierarchies. We suggest attempting the conjecture in the case that $X_1, \dots, X_n$ are the leaves of an information flow tree. We prove the conjecture in the case that the information flow tree is a caterpillar graph (similar to a two-state hidden Markov model).
△ Less
Submitted 16 July, 2014;
originally announced July 2014.
-
Hardness of robust graph isomorphism, Lasserre gaps, and asymmetry of random graphs
Authors:
Ryan O'Donnell,
John Wright,
Chenggang Wu,
Yuan Zhou
Abstract:
Building on work of Cai, Fürer, and Immerman \cite{CFI92}, we show two hardness results for the Graph Isomorphism problem. First, we show that there are pairs of nonisomorphic $n$-vertex graphs $G$ and $H$ such that any sum-of-squares (SOS) proof of nonisomorphism requires degree $Ω(n)$. In other words, we show an $Ω(n)$-round integrality gap for the Lasserre SDP relaxation. In fact, we show this…
▽ More
Building on work of Cai, Fürer, and Immerman \cite{CFI92}, we show two hardness results for the Graph Isomorphism problem. First, we show that there are pairs of nonisomorphic $n$-vertex graphs $G$ and $H$ such that any sum-of-squares (SOS) proof of nonisomorphism requires degree $Ω(n)$. In other words, we show an $Ω(n)$-round integrality gap for the Lasserre SDP relaxation. In fact, we show this for pairs $G$ and $H$ which are not even $(1-10^{-14})$-isomorphic. (Here we say that two $n$-vertex, $m$-edge graphs $G$ and $H$ are $α$-isomorphic if there is a bijection between their vertices which preserves at least $αm$ edges.) Our second result is that under the {\sc R3XOR} Hypothesis \cite{Fei02} (and also any of a class of hypotheses which generalize the {\sc R3XOR} Hypothesis), the \emph{robust} Graph Isomorphism problem is hard. I.e.\ for every $ε> 0$, there is no efficient algorithm which can distinguish graph pairs which are $(1-ε)$-isomorphic from pairs which are not even $(1-ε_0)$-isomorphic for some universal constant $ε_0$. Along the way we prove a robust asymmetry result for random graphs and hypergraphs which may be of independent interest.
△ Less
Submitted 10 January, 2014;
originally announced January 2014.
-
A composition theorem for parity kill number
Authors:
Ryan O'Donnell,
Xiaorui Sun,
Li-Yang Tan,
John Wright,
Yu Zhao
Abstract:
In this work, we study the parity complexity measures ${\mathsf{C}^{\oplus}_{\min}}[f]$ and ${\mathsf{DT^{\oplus}}}[f]$. ${\mathsf{C}^{\oplus}_{\min}}[f]$ is the \emph{parity kill number} of $f$, the fewest number of parities on the input variables one has to fix in order to "kill" $f$, i.e. to make it constant. ${\mathsf{DT^{\oplus}}}[f]$ is the depth of the shortest \emph{parity decision tree} w…
▽ More
In this work, we study the parity complexity measures ${\mathsf{C}^{\oplus}_{\min}}[f]$ and ${\mathsf{DT^{\oplus}}}[f]$. ${\mathsf{C}^{\oplus}_{\min}}[f]$ is the \emph{parity kill number} of $f$, the fewest number of parities on the input variables one has to fix in order to "kill" $f$, i.e. to make it constant. ${\mathsf{DT^{\oplus}}}[f]$ is the depth of the shortest \emph{parity decision tree} which computes $f$. These complexity measures have in recent years become increasingly important in the fields of communication complexity \cite{ZS09, MO09, ZS10, TWXZ13} and pseudorandomness \cite{BK12, Sha11, CT13}.
Our main result is a composition theorem for ${\mathsf{C}^{\oplus}_{\min}}$. The $k$-th power of $f$, denoted $f^{\circ k}$, is the function which results from composing $f$ with itself $k$ times. We prove that if $f$ is not a parity function, then ${\mathsf{C}^{\oplus}_{\min}}[f^{\circ k}] \geq Ω({\mathsf{C}_{\min}}[f]^{k}).$ In other words, the parity kill number of $f$ is essentially supermultiplicative in the \emph{normal} kill number of $f$ (also known as the minimum certificate complexity).
As an application of our composition theorem, we show lower bounds on the parity complexity measures of $\mathsf{Sort}^{\circ k}$ and $\mathsf{HI}^{\circ k}$. Here $\mathsf{Sort}$ is the sort function due to Ambainis \cite{Amb06}, and $\mathsf{HI}$ is Kushilevitz's hemi-icosahedron function \cite{NW95}. In doing so, we disprove a conjecture of Montanaro and Osborne \cite{MO09} which had applications to communication complexity and computational learning theory. In addition, we give new lower bounds for conjectures of \cite{MO09,ZS10} and \cite{TWXZ13}.
△ Less
Submitted 7 December, 2013;
originally announced December 2013.
-
A composition theorem for the Fourier Entropy-Influence conjecture
Authors:
Ryan O'Donnell,
Li-Yang Tan
Abstract:
The Fourier Entropy-Influence (FEI) conjecture of Friedgut and Kalai [FK96] seeks to relate two fundamental measures of Boolean function complexity: it states that $H[f] \leq C Inf[f]$ holds for every Boolean function $f$, where $H[f]$ denotes the spectral entropy of $f$, $Inf[f]$ is its total influence, and $C > 0$ is a universal constant. Despite significant interest in the conjecture it has onl…
▽ More
The Fourier Entropy-Influence (FEI) conjecture of Friedgut and Kalai [FK96] seeks to relate two fundamental measures of Boolean function complexity: it states that $H[f] \leq C Inf[f]$ holds for every Boolean function $f$, where $H[f]$ denotes the spectral entropy of $f$, $Inf[f]$ is its total influence, and $C > 0$ is a universal constant. Despite significant interest in the conjecture it has only been shown to hold for a few classes of Boolean functions.
Our main result is a composition theorem for the FEI conjecture. We show that if $g_1,...,g_k$ are functions over disjoint sets of variables satisfying the conjecture, and if the Fourier transform of $F$ taken with respect to the product distribution with biases $E[g_1],...,E[g_k]$ satisfies the conjecture, then their composition $F(g_1(x^1),...,g_k(x^k))$ satisfies the conjecture. As an application we show that the FEI conjecture holds for read-once formulas over arbitrary gates of bounded arity, extending a recent result [OWZ11] which proved it for read-once decision trees. Our techniques also yield an explicit function with the largest known ratio of $C \geq 6.278$ between $H[f]$ and $Inf[f]$, improving on the previous lower bound of 4.615.
△ Less
Submitted 4 April, 2013;
originally announced April 2013.
-
Hypercontractive inequalities via SOS, and the Frankl--Rödl graph
Authors:
Manuel Kauers,
Ryan O'Donnell,
Li-Yang Tan,
Yuan Zhou
Abstract:
Our main result is a formulation and proof of the reverse hypercontractive inequality in the sum-of-squares (SOS) proof system. As a consequence we show that for any constant $0 < γ\leq 1/4$, the SOS/Lasserre SDP hierarchy at degree $4\lceil \frac{1}{4γ}\rceil$ certifies the statement "the maximum independent set in the Frankl--Rödl graph $\mathrm{FR}^{n}_γ$ has fractional size~$o(1)$". Here…
▽ More
Our main result is a formulation and proof of the reverse hypercontractive inequality in the sum-of-squares (SOS) proof system. As a consequence we show that for any constant $0 < γ\leq 1/4$, the SOS/Lasserre SDP hierarchy at degree $4\lceil \frac{1}{4γ}\rceil$ certifies the statement "the maximum independent set in the Frankl--Rödl graph $\mathrm{FR}^{n}_γ$ has fractional size~$o(1)$". Here $\mathrm{FR}^{n}_γ = (V,E)$ is the graph with $V = \{0,1\}^n$ and $(x,y) \in E$ whenever $Δ(x,y) = (1-γ)n$ (an even integer). In particular, we show the degree-$4$ SOS algorithm certifies the chromatic number lower bound "$χ(\mathrm{FR}^{n}_{1/4}) = ω(1)$", even though $\mathrm{FR}^{n}_{1/4}$ is the canonical integrality gap instance for which standard SDP relaxations cannot even certify "$χ(\mathrm{FR}^{n}_{1/4}) > 3$". Finally, we also give an SOS proof of (a generalization of) the sharp $(2,q)$-hypercontractive inequality for any even integer $q$.
△ Less
Submitted 1 March, 2016; v1 submitted 20 December, 2012;
originally announced December 2012.
-
Approximability and proof complexity
Authors:
Ryan O'Donnell,
Yuan Zhou
Abstract:
This work is concerned with the proof-complexity of certifying that optimization problems do \emph{not} have good solutions. Specifically we consider bounded-degree "Sum of Squares" (SOS) proofs, a powerful algebraic proof system introduced in 1999 by Grigoriev and Vorobjov. Work of Shor, Lasserre, and Parrilo shows that this proof system is automatizable using semidefinite programming (SDP), mean…
▽ More
This work is concerned with the proof-complexity of certifying that optimization problems do \emph{not} have good solutions. Specifically we consider bounded-degree "Sum of Squares" (SOS) proofs, a powerful algebraic proof system introduced in 1999 by Grigoriev and Vorobjov. Work of Shor, Lasserre, and Parrilo shows that this proof system is automatizable using semidefinite programming (SDP), meaning that any $n$-variable degree-$d$ proof can be found in time $n^{O(d)}$. Furthermore, the SDP is dual to the well-known Lasserre SDP hierarchy, meaning that the "$d/2$-round Lasserre value" of an optimization problem is equal to the best bound provable using a degree-$d$ SOS proof. These ideas were exploited in a recent paper by Barak et al.\ (STOC 2012) which shows that the known "hard instances" for the Unique-Games problem are in fact solved close to optimally by a constant level of the Lasserre SDP hierarchy.
We continue the study of the power of SOS proofs in the context of difficult optimization problems. In particular, we show that the Balanced-Separator integrality gap instances proposed by Devanur et al.\ can have their optimal value certified by a degree-4 SOS proof. The key ingredient is an SOS proof of the KKL Theorem. We also investigate the extent to which the Khot--Vishnoi Max-Cut integrality gap instances can have their optimum value certified by an SOS proof. We show they can be certified to within a factor .952 ($> .878$) using a constant-degree proof. These investigations also raise an interesting mathematical question: is there a constant-degree SOS proof of the Central Limit Theorem?
△ Less
Submitted 8 November, 2012;
originally announced November 2012.
-
New NP-hardness results for 3-Coloring and 2-to-1 Label Cover
Authors:
Per Austrin,
Ryan O'Donnell,
Li-Yang Tan,
John Wright
Abstract:
We show that given a 3-colorable graph, it is NP-hard to find a 3-coloring with $(16/17 + \eps)$ of the edges bichromatic. In a related result, we show that given a satisfiable instance of the 2-to-1 Label Cover problem, it is NP-hard to find a $(23/24 + \eps)$-satisfying assignment.
We show that given a 3-colorable graph, it is NP-hard to find a 3-coloring with $(16/17 + \eps)$ of the edges bichromatic. In a related result, we show that given a satisfiable instance of the 2-to-1 Label Cover problem, it is NP-hard to find a $(23/24 + \eps)$-satisfying assignment.
△ Less
Submitted 28 October, 2012; v1 submitted 20 October, 2012;
originally announced October 2012.
-
Open Problems in Analysis of Boolean Functions
Authors:
Ryan O'Donnell
Abstract:
A list of open problems in the field of analysis of boolean functions, compiled February 2012 for the Simons Symposium.
A list of open problems in the field of analysis of boolean functions, compiled February 2012 for the Simons Symposium.
△ Less
Submitted 28 April, 2012;
originally announced April 2012.
-
A new point of NP-hardness for 2-to-1 Label Cover
Authors:
Per Austrin,
Ryan O'Donnell,
John Wright
Abstract:
We show that given a satisfiable instance of the 2-to-1 Label Cover problem, it is NP-hard to find a $(23/24 + \eps)$-satisfying assignment.
We show that given a satisfiable instance of the 2-to-1 Label Cover problem, it is NP-hard to find a $(23/24 + \eps)$-satisfying assignment.
△ Less
Submitted 25 April, 2012;
originally announced April 2012.
-
Markov chain methods for small-set expansion
Authors:
Ryan O'Donnell,
David Witmer
Abstract:
Consider a finite irreducible Markov chain with invariant distribution $π$. We use the inner product induced by $π$ and the associated heat operator to simplify and generalize some results related to graph partitioning and the small-set expansion problem. For example, Steurer showed a tight connection between the number of small eigenvalues of a graph's Laplacian and the expansion of small sets in…
▽ More
Consider a finite irreducible Markov chain with invariant distribution $π$. We use the inner product induced by $π$ and the associated heat operator to simplify and generalize some results related to graph partitioning and the small-set expansion problem. For example, Steurer showed a tight connection between the number of small eigenvalues of a graph's Laplacian and the expansion of small sets in that graph. We give a simplified proof which generalizes to the nonregular, directed case. This result implies an approximation algorithm for an "analytic" version of the Small-Set Expansion Problem, which, in turn, immediately gives an approximation algorithm for Small-Set Expansion. We also give a simpler proof of a lower bound on the probability that a random walk stays within a set; this result was used in some recent works on finding small sparse cuts.
△ Less
Submitted 4 November, 2013; v1 submitted 20 April, 2012;
originally announced April 2012.
-
Pareto Optimal Solutions for Smoothed Analysts
Authors:
Ankur Moitra,
Ryan O'Donnell
Abstract:
Consider an optimization problem with $n$ binary variables and $d+1$ linear objective functions. Each valid solution $x \in \{0,1\}^n$ gives rise to an objective vector in $\R^{d+1}$, and one often wants to enumerate the Pareto optima among them. In the worst case there may be exponentially many Pareto optima; however, it was recently shown that in (a generalization of) the smoothed analysis frame…
▽ More
Consider an optimization problem with $n$ binary variables and $d+1$ linear objective functions. Each valid solution $x \in \{0,1\}^n$ gives rise to an objective vector in $\R^{d+1}$, and one often wants to enumerate the Pareto optima among them. In the worst case there may be exponentially many Pareto optima; however, it was recently shown that in (a generalization of) the smoothed analysis framework, the expected number is polynomial in $n$. Unfortunately, the bound obtained had a rather bad dependence on $d$; roughly $n^{d^d}$. In this paper we show a significantly improved bound of $n^{2d}$.
Our proof is based on analyzing two algorithms. The first algorithm, on input a Pareto optimal $x$, outputs a "testimony" containing clues about $x$'s objective vector, $x$'s coordinates, and the region of space $B$ in which $x$'s objective vector lies. The second algorithm can be regarded as a {\em speculative} execution of the first -- it can uniquely reconstruct $x$ from the testimony's clues and just \emph{some} of the probability space's outcomes. The remainder of the probability space's outcomes are just enough to bound the probability that $x$'s objective vector falls into the region $B$.
△ Less
Submitted 9 November, 2010;
originally announced November 2010.