-
On the Probabilistic Degrees of Symmetric Boolean functions
Authors:
Srikanth Srinivasan,
Utkarsh Tripathi,
S. Venkitesh
Abstract:
The probabilistic degree of a Boolean function $f:\{0,1\}^n\rightarrow \{0,1\}$ is defined to be the smallest $d$ such that there is a random polynomial $\mathbf{P}$ of degree at most $d$ that agrees with $f$ at each point with high probability. Introduced by Razborov (1987), upper and lower bounds on probabilistic degrees of Boolean functions --- specifically symmetric Boolean functions --- have…
▽ More
The probabilistic degree of a Boolean function $f:\{0,1\}^n\rightarrow \{0,1\}$ is defined to be the smallest $d$ such that there is a random polynomial $\mathbf{P}$ of degree at most $d$ that agrees with $f$ at each point with high probability. Introduced by Razborov (1987), upper and lower bounds on probabilistic degrees of Boolean functions --- specifically symmetric Boolean functions --- have been used to prove explicit lower bounds, design pseudorandom generators, and devise algorithms for combinatorial problems.
In this paper, we characterize the probabilistic degrees of all symmetric Boolean functions up to polylogarithmic factors over all fields of fixed characteristic (positive or zero).
△ Less
Submitted 6 October, 2019;
originally announced October 2019.
-
Decoding Downset codes over a finite grid
Authors:
Srikanth Srinivasan,
Utkarsh Tripathi,
S. Venkitesh
Abstract:
In a recent paper, Kim and Kopparty (Theory of Computing, 2017) gave a deterministic algorithm for the unique decoding problem for polynomials of bounded total degree over a general grid. We show that their algorithm can be adapted to solve the unique decoding problem for the general family of Downset codes. Here, a downset code is specified by a family D of monomials closed under taking factors:…
▽ More
In a recent paper, Kim and Kopparty (Theory of Computing, 2017) gave a deterministic algorithm for the unique decoding problem for polynomials of bounded total degree over a general grid. We show that their algorithm can be adapted to solve the unique decoding problem for the general family of Downset codes. Here, a downset code is specified by a family D of monomials closed under taking factors: the corresponding code is the space of evaluations of all polynomials that can be written as linear combinations of monomials from D.
△ Less
Submitted 20 August, 2019;
originally announced August 2019.
-
Fully Automated Image De-fencing using Conditional Generative Adversarial Networks
Authors:
Divyanshu Gupta,
Shorya Jain,
Utkarsh Tripathi,
Pratik Chattopadhyay,
Lipo Wang
Abstract:
Image de-fencing is one of the important aspects of recreational photography in which the objective is to remove the fence texture present in an image and generate an aesthetically pleasing version of the same image without the fence texture. In this paper, we aim to develop an automated and effective technique for fence removal and image reconstruction using conditional Generative Adversarial Net…
▽ More
Image de-fencing is one of the important aspects of recreational photography in which the objective is to remove the fence texture present in an image and generate an aesthetically pleasing version of the same image without the fence texture. In this paper, we aim to develop an automated and effective technique for fence removal and image reconstruction using conditional Generative Adversarial Networks (cGANs). These networks have been successfully applied in several domains of Computer Vision focusing on image generation and rendering. Our initial approach is based on a two-stage architecture involving two cGANs that generate the fence mask and the inpainted image, respectively. Training of these networks is carried out independently and, during evaluation, the input image is passed through the two generators in succession to obtain the de-fenced image. The results obtained from this approach are satisfactory, but the response time is long since the image has to pass through two sets of convolution layers. To reduce the response time, we propose a second approach involving only a single cGAN architecture that is trained using the ground-truth of fenced de-fenced image pairs along with the edge map of the fenced image produced by the Canny Filter. Incorporation of the edge map helps the network to precisely detect the edges present in the input image, and also imparts it an ability to carry out high quality de-fencing in an efficient manner, even in the presence of a fewer number of layers as compared to the two-stage network. Qualitative and quantitative experimental results reported in the manuscript reveal that the de-fenced images generated by the single-stage de-fencing network have similar visual quality to those produced by the two-stage network. Comparative performance analysis also emphasizes the effectiveness of our approach over state-of-the-art image de-fencing techniques.
△ Less
Submitted 19 August, 2019;
originally announced August 2019.
-
A Fixed-Depth Size-Hierarchy Theorem for AC$^0[\oplus]$ via the Coin Problem
Authors:
Nutan Limaye,
Karteek Sreenivasaiah,
Srikanth Srinivasan,
Utkarsh Tripathi,
S. Venkitesh
Abstract:
We prove the first Fixed-depth Size-hierarchy Theorem for uniform AC$^0[\oplus]$ circuits; in particular, for fixed $d$, the class $\mathcal{C}_{d,k}$ of uniform AC$^0[\oplus]$ formulas of depth $d$ and size $n^k$ form an infinite hierarchy. For this, we find the first class of explicit functions giving (up to polynomial factor) matching upper and lower bounds for AC$^0[\oplus]$ formulas, derived…
▽ More
We prove the first Fixed-depth Size-hierarchy Theorem for uniform AC$^0[\oplus]$ circuits; in particular, for fixed $d$, the class $\mathcal{C}_{d,k}$ of uniform AC$^0[\oplus]$ formulas of depth $d$ and size $n^k$ form an infinite hierarchy. For this, we find the first class of explicit functions giving (up to polynomial factor) matching upper and lower bounds for AC$^0[\oplus]$ formulas, derived from the $δ$-Coin Problem, the computational problem of distinguishing between coins that are heads with probability $(1+δ)/2$ or $(1-δ)/2,$ where $δ$ is a parameter going to $0$. We study this problem's complexity and make progress on both upper bounds and lower bounds.
Upper bounds. We find explicit monotone AC$^0$ formulas solving the $δ$-coin problem, having depth $d$, size $\exp(O(d(1/δ)^{1/(d-1)}))$, and sample complexity poly$(1/δ)$, for constant $d\ge2$. This matches previous upper bounds of O'Donnell and Wimmer (ICALP 2007) and Amano (ICALP 2009) in terms of size and improves the sample complexity.
Lower bounds. The upper bounds are nearly tight even for the stronger model of AC$^0[\oplus]$ formulas (which allow NOT and Parity gates): any AC$^0[\oplus]$ formula solving the $δ$-coin problem must have size $\exp(Ω(d(1/δ)^{1/(d-1)})).$ This strengthens a result of Cohen, Ganor and Raz (APPROX-RANDOM 2014), who prove a similar result for AC$^0$, and a result of Shaltiel and Viola (SICOMP 2010), who give a superpolynomially weaker (still exponential) lower bound.
The upper bound is a derandomization involving a use of Janson's inequality (as far as we know, the first such use of the inequality) and classical combinatorial designs. For the lower bound, we prove an optimal (up to constant factor) degree lower bound for multivariate polynomials over $\mathbb{F}_2$ solving the $δ$-coin problem, which may be of independent interest.
△ Less
Submitted 20 February, 2019; v1 submitted 11 September, 2018;
originally announced September 2018.