-
Truly Low-Space Element Distinctness and Subset Sum via Pseudorandom Hash Functions
Authors:
Lijie Chen,
Ce **,
R. Ryan Williams,
Hongxun Wu
Abstract:
We consider low-space algorithms for the classic Element Distinctness problem: given an array of $n$ input integers with $O(\log n)$ bit-length, decide whether or not all elements are pairwise distinct. Beame, Clifford, and Machmouchi [FOCS 2013] gave an $\tilde O(n^{1.5})$-time randomized algorithm for Element Distinctness using only $O(\log n)$ bits of working space. However, their algorithm ass…
▽ More
We consider low-space algorithms for the classic Element Distinctness problem: given an array of $n$ input integers with $O(\log n)$ bit-length, decide whether or not all elements are pairwise distinct. Beame, Clifford, and Machmouchi [FOCS 2013] gave an $\tilde O(n^{1.5})$-time randomized algorithm for Element Distinctness using only $O(\log n)$ bits of working space. However, their algorithm assumes a random oracle (in particular, read-only random access to polynomially many random bits), and it was asked as an open question whether this assumption can be removed.
In this paper, we positively answer this question by giving an $\tilde O(n^{1.5})$-time randomized algorithm using $O(\log ^3 n\log \log n)$ bits of space, with one-way access to random bits. As a corollary, we also obtain a $\operatorname{\mathrm{poly}}(n)$-space $O^*(2^{0.86n})$-time randomized algorithm for the Subset Sum problem, removing the random oracles required in the algorithm of Bansal, Garg, Nederlof, and Vyas [STOC 2017].
The main technique underlying our results is a pseudorandom hash family based on iterative restrictions, which can fool the cycle-finding procedure in the algorithms of Beame et al. and Bansal et al.
△ Less
Submitted 2 November, 2021;
originally announced November 2021.
-
Dissolving yourself in connection to others: shared experiences of ego attenuation and connectedness during group VR experiences can be comparable to psychedelics
Authors:
David R. Glowacki,
Rhoslyn Roebuck Williams,
Olivia M. Maynard,
James E. Pike,
Rachel Freire,
Mark D. Wonnacott,
Mike Chatziapostolou
Abstract:
With a growing body of research highlighting the therapeutic potential of experiential phenomenology which diminishes egoic identity and increases one's sense of connectedness, there is significant interest in how to elicit such 'self-transcendent experiences' (STEs) in laboratory contexts. Psychedelic drugs (YDs) have proven particularly effective in this respect, producing subjective phenomenolo…
▽ More
With a growing body of research highlighting the therapeutic potential of experiential phenomenology which diminishes egoic identity and increases one's sense of connectedness, there is significant interest in how to elicit such 'self-transcendent experiences' (STEs) in laboratory contexts. Psychedelic drugs (YDs) have proven particularly effective in this respect, producing subjective phenomenology which reliably elicits intense STEs. With virtual reality (VR) emerging as a powerful tool for constructing new perceptual environments, we describe a VR framework called 'Isness-distributed' (Isness-D) which harnesses the unique affordances of distributed multi-person VR to blur conventional self-other boundaries. Within Isness-D, groups of participants co-habit a shared virtual space, collectively experiencing their bodies as luminous energetic essences with diffuse spatial boundaries. It enables moments of 'energetic coalescence', a new class of embodied phenomenological intersubjective experience where bodies can fluidly merge, enabling participants to have an experience of including multiple others within their self-representation. To evaluate Isness-D, we adopted a citizen science approach, coordinating an international network of Isness-D 'nodes'. We analyzed the results (N = 58) using 4 different self-report scales previously applied to analyze subjective YD phenomenology (the inclusion of community in self scale, ego-dissolution inventory, communitas scale, and the MEQ30 mystical experience questionnaire). Despite the complexities associated with a distributed experiment like this, the Isness-D scores on all 4 scales were statistically indistinguishable from recently published YD studies, demonstrating that distributed VR can be used to design intersubjective STEs where people dissolve their sense of self in the connection to others.
△ Less
Submitted 17 May, 2021;
originally announced May 2021.
-
Time-Space Lower Bounds for Simulating Proof Systems with Quantum and Randomized Verifiers
Authors:
Abhijit S. Mudigonda,
R. Ryan Williams
Abstract:
A line of work initiated by Fortnow in 1997 has proven model-independent time-space lower bounds for the $\mathsf{SAT}$ problem and related problems within the polynomial-time hierarchy. For example, for the $\mathsf{SAT}$ problem, the state-of-the-art is that the problem cannot be solved by random-access machines in $n^c$ time and $n^{o(1)}$ space simultaneously for…
▽ More
A line of work initiated by Fortnow in 1997 has proven model-independent time-space lower bounds for the $\mathsf{SAT}$ problem and related problems within the polynomial-time hierarchy. For example, for the $\mathsf{SAT}$ problem, the state-of-the-art is that the problem cannot be solved by random-access machines in $n^c$ time and $n^{o(1)}$ space simultaneously for $c < 2\cos(\fracπ{7}) \approx 1.801$.
We extend this lower bound approach to the quantum and randomized domains. Combining Grover's algorithm with components from $\mathsf{SAT}$ time-space lower bounds, we show that there are problems verifiable in $O(n)$ time with quantum Merlin-Arthur protocols that cannot be solved in $n^c$ time and $n^{o(1)}$ space simultaneously for $c < \frac{3+\sqrt{3}}{2} \approx 2.366$, a super-quadratic time lower bound. This result and the prior work on $\mathsf{SAT}$ can both be viewed as consequences of a more general formula for time lower bounds against small-space algorithms, whose asymptotics we study in full.
We also show lower bounds against randomized algorithms: there are problems verifiable in $O(n)$ time with (classical) Merlin-Arthur protocols that cannot be solved in $n^c$ randomized time and $n^{o(1)}$ space simultaneously for $c < 1.465$, improving a result of Diehl. For quantum Merlin-Arthur protocols, the lower bound in this setting can be improved to $c < 1.5$.
△ Less
Submitted 28 January, 2021; v1 submitted 1 December, 2020;
originally announced December 2020.
-
Subtle Sensing: Detecting Differences in the Flexibility of Virtually Simulated Molecular Objects
Authors:
Rhoslyn Roebuck Williams,
Xan Varcoe,
Becca R. Glowacki,
Ella M. Gale,
Alexander Jamieson-Binnie,
David R. Glowacki
Abstract:
During VR demos we have performed over last few years, many participants (in the absence of any haptic feedback) have commented on their perceived ability to 'feel' differences between simulated molecular objects. The mechanisms for such 'feeling' are not entirely clear: observing from outside VR, one can see that there is nothing physical for participants to 'feel'. Here we outline exploratory us…
▽ More
During VR demos we have performed over last few years, many participants (in the absence of any haptic feedback) have commented on their perceived ability to 'feel' differences between simulated molecular objects. The mechanisms for such 'feeling' are not entirely clear: observing from outside VR, one can see that there is nothing physical for participants to 'feel'. Here we outline exploratory user studies designed to evaluate the extent to which participants can distinguish quantitative differences in the flexibility of VR-simulated molecular objects. The results suggest that an individual's capacity to detect differences in molecular flexibility is enhanced when they can interact with and manipulate the molecules, as opposed to merely observing the same interaction. Building on these results, we intend to carry out further studies investigating humans' ability to sense quantitative properties of VR simulations without haptic technology.
△ Less
Submitted 7 May, 2020;
originally announced May 2020.
-
OMG-VR: Open-source Mudra Gloves for Manipulating Molecular Simulations in VR
Authors:
Rachel Freire,
Becca Rose Glowacki,
Rhoslyn Roebuck Williams,
Mark Wonnacott,
Alexander Jamieson-Binnie,
David R. Glowacki
Abstract:
As VR finds increasing application in scientific research domains like nanotechnology and biochemistry, we are beginning to better understand the domains in which it brings the most benefit, as well as the gestures and form factors that are most useful for specific applications. Here we describe Open-source Mudra Gloves for Virtual Reality (OMG-VR): etextile gloves designed to facilitate research…
▽ More
As VR finds increasing application in scientific research domains like nanotechnology and biochemistry, we are beginning to better understand the domains in which it brings the most benefit, as well as the gestures and form factors that are most useful for specific applications. Here we describe Open-source Mudra Gloves for Virtual Reality (OMG-VR): etextile gloves designed to facilitate research scientists and students carrying out detailed and complex manipulation of simulated 3d molecular objects in VR. The OMG-VR is designed to sense when a user pinches together their thumb and index finger, or thumb and middle finger, forming a "mudra" position. Tests show that they provide good positional tracking of the point at which a pinch takes place, require no calibration, and are sufficiently accurate and robust to enable scientists to accomplish a range of tasks that involve complex spatial manipulation of molecules. The open source design offers a promising alternative to existing controllers and more costly commercial VR data gloves.
△ Less
Submitted 5 May, 2020; v1 submitted 11 January, 2019;
originally announced January 2019.
-
Circuit Depth Reductions
Authors:
Alexander Golovnev,
Alexander S. Kulikov,
R. Ryan Williams
Abstract:
The best known size lower bounds against unrestricted circuits have remained around $3n$ for several decades. Moreover, the only known technique for proving lower bounds in this model, gate elimination, is inherently limited to proving lower bounds of less than $5n$. In this work, we propose a non-gate-elimination approach for obtaining circuit lower bounds, via certain depth-three lower bounds. W…
▽ More
The best known size lower bounds against unrestricted circuits have remained around $3n$ for several decades. Moreover, the only known technique for proving lower bounds in this model, gate elimination, is inherently limited to proving lower bounds of less than $5n$. In this work, we propose a non-gate-elimination approach for obtaining circuit lower bounds, via certain depth-three lower bounds. We prove that every (unbounded-depth) circuit of size $s$ can be expressed as an OR of $2^{s/3.9}$ $16$-CNFs. For DeMorgan formulas, the best known size lower bounds have been stuck at around $n^{3-o(1)}$ for decades. Under a plausible hypothesis about probabilistic polynomials, we show that $n^{4-\varepsilon}$-size DeMorgan formulas have $2^{n^{1-Ω(\varepsilon)}}$-size depth-3 circuits which are approximate sums of $n^{1-Ω(\varepsilon)}$-degree polynomials over ${\mathbb F}_2$. While these structural results do not immediately lead to new lower bounds, they do suggest new avenues of attack on these longstanding lower bound problems.
Our results complement the classical depth-$3$ reduction results of Valiant, which show that logarithmic-depth circuits of linear size can be computed by an OR of $2^{\varepsilon n}$ $n^δ$-CNFs, and slightly stronger results for series-parallel circuits. It is known that no purely graph-theoretic reduction could yield interesting depth-3 circuits from circuits of super-logarithmic depth. We overcome this limitation (for small-size circuits) by taking into account both the graph-theoretic and functional properties of circuits and formulas.
We show that improvements of the following pseudorandom constructions imply new circuit lower bounds: dispersers for varieties, correlation with constant degree polynomials, matrix rigidity, and hardness for depth-$3$ circuits with constant bottom fan-in.
△ Less
Submitted 7 December, 2020; v1 submitted 12 November, 2018;
originally announced November 2018.
-
Limits on representing Boolean functions by linear combinations of simple functions: thresholds, ReLUs, and low-degree polynomials
Authors:
R. Ryan Williams
Abstract:
We consider the problem of representing Boolean functions exactly by "sparse" linear combinations (over $\mathbb{R}$) of functions from some "simple" class ${\cal C}$. In particular, given ${\cal C}$ we are interested in finding low-complexity functions lacking sparse representations. When ${\cal C}$ is the set of PARITY functions or the set of conjunctions, this sort of problem has a well-underst…
▽ More
We consider the problem of representing Boolean functions exactly by "sparse" linear combinations (over $\mathbb{R}$) of functions from some "simple" class ${\cal C}$. In particular, given ${\cal C}$ we are interested in finding low-complexity functions lacking sparse representations. When ${\cal C}$ is the set of PARITY functions or the set of conjunctions, this sort of problem has a well-understood answer, the problem becomes interesting when ${\cal C}$ is "overcomplete" and the set of functions is not linearly independent. We focus on the cases where ${\cal C}$ is the set of linear threshold functions, the set of rectified linear units (ReLUs), and the set of low-degree polynomials over a finite field, all of which are well-studied in different contexts.
We provide generic tools for proving lower bounds on representations of this kind. Applying these, we give several new lower bounds for "semi-explicit" Boolean functions. For example, we show there are functions in nondeterministic quasi-polynomial time that require super-polynomial size:
$\bullet$ Depth-two neural networks with sign activation function, a special case of depth-two threshold circuit lower bounds.
$\bullet$ Depth-two neural networks with ReLU activation function.
$\bullet$ $\mathbb{R}$-linear combinations of $O(1)$-degree $\mathbb{F}_p$-polynomials, for every prime $p$ (related to problems regarding Higher-Order "Uncertainty Principles"). We also obtain a function in $E^{NP}$ requiring $2^{Ω(n)}$ linear combinations.
$\bullet$ $\mathbb{R}$-linear combinations of $ACC \circ THR$ circuits of polynomial size (further generalizing the recent lower bounds of Murray and the author).
(The above is a shortened abstract. For the full abstract, see the paper.)
△ Less
Submitted 25 February, 2018;
originally announced February 2018.
-
Deterministic Time-Space Tradeoffs for k-SUM
Authors:
Andrea Lincoln,
Virginia Vassilevska Williams,
Joshua R. Wang,
R. Ryan Williams
Abstract:
Given a set of numbers, the $k$-SUM problem asks for a subset of $k$ numbers that sums to zero. When the numbers are integers, the time and space complexity of $k$-SUM is generally studied in the word-RAM model; when the numbers are reals, the complexity is studied in the real-RAM model, and space is measured by the number of reals held in memory at any point.
We present a time and space efficie…
▽ More
Given a set of numbers, the $k$-SUM problem asks for a subset of $k$ numbers that sums to zero. When the numbers are integers, the time and space complexity of $k$-SUM is generally studied in the word-RAM model; when the numbers are reals, the complexity is studied in the real-RAM model, and space is measured by the number of reals held in memory at any point.
We present a time and space efficient deterministic self-reduction for the $k$-SUM problem which holds for both models, and has many interesting consequences. To illustrate:
* $3$-SUM is in deterministic time $O(n^2 \lg\lg(n)/\lg(n))$ and space $O\left(\sqrt{\frac{n \lg(n)}{\lg\lg(n)}}\right)$. In general, any polylogarithmic-time improvement over quadratic time for $3$-SUM can be converted into an algorithm with an identical time improvement but low space complexity as well. * $3$-SUM is in deterministic time $O(n^2)$ and space $O(\sqrt n)$, derandomizing an algorithm of Wang.
* A popular conjecture states that 3-SUM requires $n^{2-o(1)}$ time on the word-RAM. We show that the 3-SUM Conjecture is in fact equivalent to the (seemingly weaker) conjecture that every $O(n^{.51})$-space algorithm for $3$-SUM requires at least $n^{2-o(1)}$ time on the word-RAM.
* For $k \ge 4$, $k$-SUM is in deterministic $O(n^{k - 2 + 2/k})$ time and $O(\sqrt{n})$ space.
△ Less
Submitted 24 May, 2016;
originally announced May 2016.