-
Quantum Time-Space Tradeoffs for Matrix Problems
Authors:
Paul Beame,
Niels Kornerup,
Michael Whitmeyer
Abstract:
We consider the time and space required for quantum computers to solve a wide variety of problems involving matrices, many of which have only been analyzed classically in prior work. Our main results show that for a range of linear algebra problems -- including matrix-vector product, matrix inversion, matrix multiplication and powering -- existing classical time-space tradeoffs, several of which a…
▽ More
We consider the time and space required for quantum computers to solve a wide variety of problems involving matrices, many of which have only been analyzed classically in prior work. Our main results show that for a range of linear algebra problems -- including matrix-vector product, matrix inversion, matrix multiplication and powering -- existing classical time-space tradeoffs, several of which are tight for every space bound, also apply to quantum algorithms. For example, for almost all matrices $A$, including the discrete Fourier transform (DFT) matrix, we prove that quantum circuits with at most $T$ input queries and $S$ qubits of memory require $T=Ω(n^2/S)$ to compute matrix-vector product $Ax$ for $x \in \{0,1\}^n$. We similarly prove that matrix multiplication for $n\times n$ binary matrices requires $T=Ω(n^3 / \sqrt{S})$. Because many of our lower bounds match deterministic algorithms with the same time and space complexity, we show that quantum computers cannot provide any asymptotic advantage for these problems with any space bound. We obtain matching lower bounds for the stronger notion of quantum cumulative memory complexity -- the sum of the space per layer of a circuit.
We also consider Boolean (i.e. AND-OR) matrix multiplication and matrix-vector products, improving the previous quantum time-space tradeoff lower bounds for $n\times n$ Boolean matrix multiplication to $T=Ω(n^{2.5}/S^{1/4})$ from $T=Ω(n^{2.5}/S^{1/2})$.
Our improved lower bound for Boolean matrix multiplication is based on a new coloring argument that extracts more from the strong direct product theorem used in prior work. Our tight lower bounds for linear algebra problems require adding a new bucketing method to the recording-query technique of Zhandry that lets us apply classical arguments to upper bound the success probability of quantum circuits.
△ Less
Submitted 12 February, 2024; v1 submitted 10 January, 2024;
originally announced January 2024.
-
On the Rational Degree of Boolean Functions and Applications
Authors:
Vishnu Iyer,
Siddhartha Jain,
Matt Kovacs-Deak,
Vinayak M. Kumar,
Luke Schaeffer,
Daochen Wang,
Michael Whitmeyer
Abstract:
We study a natural complexity measure of Boolean functions known as the (exact) rational degree. For total functions $f$, it is conjectured that $\mathrm{rdeg}(f)$ is polynomially related to $\mathrm{deg}(f)$, where $\mathrm{deg}(f)$ is the Fourier degree. Towards this conjecture, we show that symmetric functions have rational degree at least $\mathrm{deg}(f)/2$ and monotone functions have rationa…
▽ More
We study a natural complexity measure of Boolean functions known as the (exact) rational degree. For total functions $f$, it is conjectured that $\mathrm{rdeg}(f)$ is polynomially related to $\mathrm{deg}(f)$, where $\mathrm{deg}(f)$ is the Fourier degree. Towards this conjecture, we show that symmetric functions have rational degree at least $\mathrm{deg}(f)/2$ and monotone functions have rational degree at least $\sqrt{\mathrm{deg}(f)}$. We observe that both of these lower bounds are tight. In addition, we show that all read-once depth-$d$ Boolean formulae have rational degree at least $Ω(\mathrm{deg}(f)^{1/d})$. Furthermore, we show that almost every Boolean function on $n$ variables has rational degree at least $n/2 - O(\sqrt{n})$.
In contrast to total functions, we exhibit partial functions that witness unbounded separations between rational and approximate degree, in both directions. As a consequence, we show that for quantum computers, post-selection and bounded-error are incomparable resources in the black-box model.
△ Less
Submitted 11 October, 2023;
originally announced October 2023.
-
Searching for Regularity in Bounded Functions
Authors:
Siddharth Iyer,
Michael Whitmeyer
Abstract:
Given a function $f$ on $\mathbb{F}_2^n$, we study the following problem. What is the largest affine subspace $\mathcal{U}$ such that when restricted to $\mathcal{U}$, all the non-trivial Fourier coefficients of $f$ are very small?
For the natural class of bounded Fourier degree $d$ functions $f:\mathbb{F}_2^n \to [-1,1]$, we show that there exists an affine subspace of dimension at least…
▽ More
Given a function $f$ on $\mathbb{F}_2^n$, we study the following problem. What is the largest affine subspace $\mathcal{U}$ such that when restricted to $\mathcal{U}$, all the non-trivial Fourier coefficients of $f$ are very small?
For the natural class of bounded Fourier degree $d$ functions $f:\mathbb{F}_2^n \to [-1,1]$, we show that there exists an affine subspace of dimension at least $ \tildeΩ(n^{1/d!}k^{-2})$, wherein all of $f$'s nontrivial Fourier coefficients become smaller than $ 2^{-k}$. To complement this result, we show the existence of degree $d$ functions with coefficients larger than $2^{-d\log n}$ when restricted to any affine subspace of dimension larger than $Ω(dn^{1/(d-1)})$. In addition, we give explicit examples of functions with analogous but weaker properties.
Along the way, we provide multiple characterizations of the Fourier coefficients of functions restricted to subspaces of $\mathbb{F}_2^n$ that may be useful in other contexts. Finally, we highlight applications and connections of our results to parity kill number and affine dispersers.
△ Less
Submitted 3 May, 2023; v1 submitted 27 July, 2022;
originally announced July 2022.
-
Junta Distance Approximation with Sub-Exponential Queries
Authors:
Vishnu Iyer,
Avishay Tal,
Michael Whitmeyer
Abstract:
Leveraging tools of De, Mossel, and Neeman [FOCS, 2019], we show two different results pertaining to the \emph{tolerant testing} of juntas. Given black-box access to a Boolean function $f:\{\pm1\}^{n} \to \{\pm1\}$, we give a $poly(k, \frac{1}{\varepsilon})$ query algorithm that distinguishes between functions that are $γ$-close to $k$-juntas and $(γ+\varepsilon)$-far from $k'$-juntas, where…
▽ More
Leveraging tools of De, Mossel, and Neeman [FOCS, 2019], we show two different results pertaining to the \emph{tolerant testing} of juntas. Given black-box access to a Boolean function $f:\{\pm1\}^{n} \to \{\pm1\}$, we give a $poly(k, \frac{1}{\varepsilon})$ query algorithm that distinguishes between functions that are $γ$-close to $k$-juntas and $(γ+\varepsilon)$-far from $k'$-juntas, where $k' = O(\frac{k}{\varepsilon^2})$.
In the non-relaxed setting, we extend our ideas to give a $2^{\tilde{O}(\sqrt{k/\varepsilon})}$ (adaptive) query algorithm that distinguishes between functions that are $γ$-close to $k$-juntas and $(γ+\varepsilon)$-far from $k$-juntas. To the best of our knowledge, this is the first subexponential-in-$k$ query algorithm for approximating the distance of $f$ to being a $k$-junta (previous results of Blais, Canonne, Eden, Levi, and Ron [SODA, 2018] and De, Mossel, and Neeman [FOCS, 2019] required exponentially many queries in $k$).
Our techniques are Fourier analytical and make use of the notion of "normalized influences" that was introduced by Talagrand [AoP, 1994].
△ Less
Submitted 1 June, 2021;
originally announced June 2021.
-
Algorithmic Discrepancy Minimization
Authors:
Michael Whitmeyer,
Jonathan Liu
Abstract:
This report will be a literature review on a result in algorithmic discrepancy theory. We will begin by providing a quick overview on discrepancy theory and some major results in the field, and then focus on an important result by Shachar Lovett and Raghu Meka. We restate the main algorithm and ideas of the paper, and rewrite proofs for some of the major results in the paper.
This report will be a literature review on a result in algorithmic discrepancy theory. We will begin by providing a quick overview on discrepancy theory and some major results in the field, and then focus on an important result by Shachar Lovett and Raghu Meka. We restate the main algorithm and ideas of the paper, and rewrite proofs for some of the major results in the paper.
△ Less
Submitted 17 November, 2019;
originally announced November 2019.
-
Pay Attention: Leveraging Sequence Models to Predict the Useful Life of Batteries
Authors:
Samuel Paradis,
Michael Whitmeyer
Abstract:
We use data on 124 batteries released by Stanford University to first try to solve the binary classification problem of determining if a battery is "good" or "bad" given only the first 5 cycles of data (i.e., will it last longer than a certain threshold of cycles), as well as the prediction problem of determining the exact number of cycles a battery will last given the first 100 cycles of data. We…
▽ More
We use data on 124 batteries released by Stanford University to first try to solve the binary classification problem of determining if a battery is "good" or "bad" given only the first 5 cycles of data (i.e., will it last longer than a certain threshold of cycles), as well as the prediction problem of determining the exact number of cycles a battery will last given the first 100 cycles of data. We approach the problem from a purely data-driven standpoint, ho** to use deep learning to learn the patterns in the sequences of data that the Stanford team engineered by hand. For both problems, we used a similar deep network design, that included an optional 1-D convolution, LSTMs, an optional Attention layer, followed by fully connected layers to produce our output. For the classification task, we were able to achieve very competitive results, with validation accuracies above 90%, and a test accuracy of 95%, compared to the 97.5% test accuracy of the current leading model. For the prediction task, we were also able to achieve competitive results, with a test MAPE error of 12.5% as compared with a 9.1% MAPE error achieved by the current leading model (Severson et al. 2019).
△ Less
Submitted 5 October, 2019; v1 submitted 3 October, 2019;
originally announced October 2019.
-
Dynamic Competitive Persuasion
Authors:
Mark Whitmeyer
Abstract:
Two long-lived senders play a dynamic game of competitive persuasion. Each period, each provides information to a single short-lived receiver. When the senders also set prices, we unearth a folk theorem: if they are sufficiently patient, virtually any vector of feasible and individually rational payoffs can be sustained in a subgame perfect equilibrium. Without price-setting, there is a unique sub…
▽ More
Two long-lived senders play a dynamic game of competitive persuasion. Each period, each provides information to a single short-lived receiver. When the senders also set prices, we unearth a folk theorem: if they are sufficiently patient, virtually any vector of feasible and individually rational payoffs can be sustained in a subgame perfect equilibrium. Without price-setting, there is a unique subgame perfect equilibrium. In it, patient senders provide less information--maximally patient ones none.
△ Less
Submitted 24 December, 2023; v1 submitted 28 November, 2018;
originally announced November 2018.
-
Attraction versus Persuasion: Information Provision in Search Markets
Authors:
Pak Hung Au,
Mark Whitmeyer
Abstract:
We consider a model of oligopolistic competition in a market with search frictions, in which competing firms with products of unknown quality advertise how much information a consumer's visit will glean. In the unique symmetric equilibrium of this game, the countervailing incentives of attraction and persuasion yield a payoff function for each firm that is linear in the firm's realized effective v…
▽ More
We consider a model of oligopolistic competition in a market with search frictions, in which competing firms with products of unknown quality advertise how much information a consumer's visit will glean. In the unique symmetric equilibrium of this game, the countervailing incentives of attraction and persuasion yield a payoff function for each firm that is linear in the firm's realized effective value. If the expected quality of the products is sufficiently high (or competition is sufficiently fierce), this corresponds to full information--firms provide the first-best level of information. If not, this corresponds to information dispersion--firms randomize over signals.
△ Less
Submitted 25 May, 2022; v1 submitted 26 February, 2018;
originally announced February 2018.
-
A Game of Random Variables
Authors:
Artem Hulko,
Mark Whitmeyer
Abstract:
This paper analyzes a simple game with $n$ players. We fix a mean, $μ$, in the interval $[0, 1]$ and let each player choose any random variable distributed on that interval with the given mean. The winner of the zero-sum game is the player whose random variable has the highest realization. We show that the position of the mean within the interval is paramount. Remarkably, if the given mean is abov…
▽ More
This paper analyzes a simple game with $n$ players. We fix a mean, $μ$, in the interval $[0, 1]$ and let each player choose any random variable distributed on that interval with the given mean. The winner of the zero-sum game is the player whose random variable has the highest realization. We show that the position of the mean within the interval is paramount. Remarkably, if the given mean is above a crucial threshold then the unique equilibrium must contain a point mass on $1$. The cutoff is strictly decreasing in the number of players, $n$; and for fixed $μ$, as the number of players is increased, each player places more weight on $1$ at equilibrium. We characterize the equilibrium as the number of players goes to infinity.
△ Less
Submitted 23 April, 2018; v1 submitted 23 December, 2017;
originally announced December 2017.
-
A Game of Nontransitive Dice
Authors:
Artem Hulko,
Mark Whitmeyer
Abstract:
We consider a two player simultaneous-move game where the two players each select any permissible $n$-sided die for a fixed integer $n$. A player wins if the outcome of his roll is greater than that of his opponent. Remarkably, for $n>3$, there is a unique Nash Equilibrium in pure strategies. The unique Nash Equilibrium is for each player to throw the Standard $n$-sided die, where each side has a…
▽ More
We consider a two player simultaneous-move game where the two players each select any permissible $n$-sided die for a fixed integer $n$. A player wins if the outcome of his roll is greater than that of his opponent. Remarkably, for $n>3$, there is a unique Nash Equilibrium in pure strategies. The unique Nash Equilibrium is for each player to throw the Standard $n$-sided die, where each side has a different number. Our proof of uniqueness is constructive. We introduce an algorithm with which, for any nonstandard die, we may generate another die that beats it.
△ Less
Submitted 22 October, 2018; v1 submitted 2 June, 2017;
originally announced June 2017.