-
Online Locality Meets Distributed Quantum Computing
Authors:
Amirreza Akbari,
Xavier Coiteux-Roy,
Francesco d'Amore,
François Le Gall,
Henrik Lievonen,
Darya Melnyk,
Augusto Modanese,
Shreyas Pai,
Marc-Olivier Renou,
Václav Rozhoň,
Jukka Suomela
Abstract:
We extend the theory of locally checkable labeling problems (LCLs) from the classical LOCAL model to a number of other models that have been studied recently, including the quantum-LOCAL model, finitely-dependent processes, non-signaling model, dynamic-LOCAL model, and online-LOCAL model [e.g. STOC 2024, ICALP 2023].
First, we demonstrate the advantage that finitely-dependent processes have over…
▽ More
We extend the theory of locally checkable labeling problems (LCLs) from the classical LOCAL model to a number of other models that have been studied recently, including the quantum-LOCAL model, finitely-dependent processes, non-signaling model, dynamic-LOCAL model, and online-LOCAL model [e.g. STOC 2024, ICALP 2023].
First, we demonstrate the advantage that finitely-dependent processes have over the classical LOCAL model. We show that all LCL problems solvable with locality $O(\log^\star n)$ in the LOCAL model admit a finitely-dependent distribution (with constant locality). In particular, this gives a finitely-dependent coloring for regular trees, answering an open question by Holroyd [2023]. This also introduces a new formal barrier for understanding the distributed quantum advantage: it is not possible to exclude quantum advantage for any LCL in the $Θ(\log^\star n)$ complexity class by using non-signaling arguments.
Second, we put limits on the capabilities of all of these models. To this end, we introduce a model called randomized online-LOCAL, which is strong enough to simulate e.g. SLOCAL and dynamic-LOCAL, and we show that it is also strong enough to simulate any non-signaling distribution and hence any quantum-LOCAL algorithm. We prove the following result for rooted trees: if we can solve an LCL problem with locality $o(\log \log n)$ in the randomized online-LOCAL model, we can solve it with locality $O(\log^\star n)$ in the classical deterministic LOCAL model.
Put together, these results show that in rooted trees the set of LCLs that can be solved with locality $O(\log^\star n)$ is the same across all these models: classical deterministic and randomized LOCAL, quantum-LOCAL, non-signaling model, dynamic-LOCAL, and deterministic and randomized online-LOCAL.
△ Less
Submitted 9 April, 2024; v1 submitted 4 March, 2024;
originally announced March 2024.
-
Polynomially Over-Parameterized Convolutional Neural Networks Contain Structured Strong Winning Lottery Tickets
Authors:
Arthur da Cunha,
Francesco d'Amore,
Emanuele Natale
Abstract:
The Strong Lottery Ticket Hypothesis (SLTH) states that randomly-initialised neural networks likely contain subnetworks that perform well without any training. Although unstructured pruning has been extensively studied in this context, its structured counterpart, which can deliver significant computational and memory efficiency gains, has been largely unexplored. One of the main reasons for this g…
▽ More
The Strong Lottery Ticket Hypothesis (SLTH) states that randomly-initialised neural networks likely contain subnetworks that perform well without any training. Although unstructured pruning has been extensively studied in this context, its structured counterpart, which can deliver significant computational and memory efficiency gains, has been largely unexplored. One of the main reasons for this gap is the limitations of the underlying mathematical tools used in formal analyses of the SLTH. In this paper, we overcome these limitations: we leverage recent advances in the multidimensional generalisation of the Random Subset-Sum Problem and obtain a variant that admits the stochastic dependencies that arise when addressing structured pruning in the SLTH. We apply this result to prove, for a wide class of random Convolutional Neural Networks, the existence of structured subnetworks that can approximate any sufficiently smaller network.
This result provides the first sub-exponential bound around the SLTH for structured pruning, opening up new avenues for further research on the hypothesis and contributing to the understanding of the role of over-parameterization in deep learning.
△ Less
Submitted 16 November, 2023;
originally announced November 2023.
-
No distributed quantum advantage for approximate graph coloring
Authors:
Xavier Coiteux-Roy,
Francesco d'Amore,
Rishikesh Gajjala,
Fabian Kuhn,
François Le Gall,
Henrik Lievonen,
Augusto Modanese,
Marc-Olivier Renou,
Gustav Schmid,
Jukka Suomela
Abstract:
We give an almost complete characterization of the hardness of $c$-coloring $χ$-chromatic graphs with distributed algorithms, for a wide range of models of distributed computing. In particular, we show that these problems do not admit any distributed quantum advantage. To do that: 1) We give a new distributed algorithm that finds a $c$-coloring in $χ$-chromatic graphs in…
▽ More
We give an almost complete characterization of the hardness of $c$-coloring $χ$-chromatic graphs with distributed algorithms, for a wide range of models of distributed computing. In particular, we show that these problems do not admit any distributed quantum advantage. To do that: 1) We give a new distributed algorithm that finds a $c$-coloring in $χ$-chromatic graphs in $\tilde{\mathcal{O}}(n^{\frac{1}α})$ rounds, with $α= \bigl\lfloor\frac{c-1}{χ- 1}\bigr\rfloor$. 2) We prove that any distributed algorithm for this problem requires $Ω(n^{\frac{1}α})$ rounds.
Our upper bound holds in the classical, deterministic LOCAL model, while the near-matching lower bound holds in the non-signaling model. This model, introduced by Arfaoui and Fraigniaud in 2014, captures all models of distributed graph algorithms that obey physical causality; this includes not only classical deterministic LOCAL and randomized LOCAL but also quantum-LOCAL, even with a pre-shared quantum state.
We also show that similar arguments can be used to prove that, e.g., 3-coloring 2-dimensional grids or $c$-coloring trees remain hard problems even for the non-signaling model, and in particular do not admit any quantum advantage. Our lower-bound arguments are purely graph-theoretic at heart; no background on quantum information theory is needed to establish the proofs.
△ Less
Submitted 22 March, 2024; v1 submitted 18 July, 2023;
originally announced July 2023.
-
Distributed derandomization revisited
Authors:
Sameep Dahal,
Francesco d'Amore,
Henrik Lievonen,
Timothé Picavet,
Jukka Suomela
Abstract:
One of the cornerstones of the distributed complexity theory is the derandomization result by Chang, Kopelowitz, and Pettie [FOCS 2016]: any randomized LOCAL algorithm that solves a locally checkable labeling problem (LCL) can be derandomized with at most exponential overhead. The original proof assumes that the number of random bits is bounded by some function of the input size. We give a new, si…
▽ More
One of the cornerstones of the distributed complexity theory is the derandomization result by Chang, Kopelowitz, and Pettie [FOCS 2016]: any randomized LOCAL algorithm that solves a locally checkable labeling problem (LCL) can be derandomized with at most exponential overhead. The original proof assumes that the number of random bits is bounded by some function of the input size. We give a new, simple proof that does not make any such assumptions-it holds even if the randomized algorithm uses infinitely many bits. While at it, we also broaden the scope of the result so that it is directly applicable far beyond LCL problems.
△ Less
Submitted 15 May, 2023; v1 submitted 12 May, 2023;
originally announced May 2023.
-
On the Multidimensional Random Subset Sum Problem
Authors:
Luca Becchetti,
Arthur Carvalho Walraven da Cunha,
Andrea Clementi,
Francesco d'Amore,
Hicham Lesfari,
Emanuele Natale,
Luca Trevisan
Abstract:
In the Random Subset Sum Problem, given $n$ i.i.d. random variables $X_1, ..., X_n$, we wish to approximate any point $z \in [-1,1]$ as the sum of a suitable subset $X_{i_1(z)}, ..., X_{i_s(z)}$ of them, up to error $\varepsilon$. Despite its simple statement, this problem is of fundamental interest to both theoretical computer science and statistical mechanics. More recently, it gained renewed at…
▽ More
In the Random Subset Sum Problem, given $n$ i.i.d. random variables $X_1, ..., X_n$, we wish to approximate any point $z \in [-1,1]$ as the sum of a suitable subset $X_{i_1(z)}, ..., X_{i_s(z)}$ of them, up to error $\varepsilon$. Despite its simple statement, this problem is of fundamental interest to both theoretical computer science and statistical mechanics. More recently, it gained renewed attention for its implications in the theory of Artificial Neural Networks. An obvious multidimensional generalisation of the problem is to consider $n$ i.i.d. $d$-dimensional random vectors, with the objective of approximating every point $\mathbf{z} \in [-1,1]^d$. In 1998, G. S. Lueker showed that, in the one-dimensional setting, $n=\mathcal{O}(\log \frac 1\varepsilon)$ samples guarantee the approximation property with high probability.In this work, we prove that, in $d$ dimensions, $n = \mathcal{O}(d^3\log \frac 1\varepsilon \cdot (\log \frac 1\varepsilon + \log d))$ samples suffice for the approximation property to hold with high probability. As an application highlighting the potential interest of this result, we prove that a recently proposed neural network model exhibits universality: with high probability, the model can approximate any neural network within a polynomial overhead in the number of parameters.
△ Less
Submitted 17 November, 2022; v1 submitted 28 July, 2022;
originally announced July 2022.
-
Quality increases as the error rate decreases
Authors:
Fabrizio d'Amore
Abstract:
In this paper we propose an approach to the design of processes and software that aims at decreasing human and software errors, that so frequently happen, making affected people using and wasting a lot of time for the need of fixing the errors. We base our statements on the natural relationship between quality and error rate, increasing the latter as the error rate decreases. We try to classify er…
▽ More
In this paper we propose an approach to the design of processes and software that aims at decreasing human and software errors, that so frequently happen, making affected people using and wasting a lot of time for the need of fixing the errors. We base our statements on the natural relationship between quality and error rate, increasing the latter as the error rate decreases. We try to classify errors into several types and address techniques to reduce the likelihood of making mistakes, depending on the type of error.
We focus on this approach related to organization, management and software design that will allow to be more effective and efficient in this period where mankind has been affected by a severe pandemic and where we need to be more efficient and effective in all processes, aiming at an industrial renaissance which we know to be not too far and easily reachable once the path to follow has been characterized, also in the light of the experience.
△ Less
Submitted 1 July, 2022;
originally announced July 2022.
-
Source Code Anti-Plagiarism: a C# Implementation using the Routing Approach
Authors:
Fabrizio d'Amore,
Lorenzo Zarfati
Abstract:
Despite the approaches proposed so far, software plagiarism is still a problem which has not been solved entirely yet. The approach introduced throughout this paper is about a source code anti-plagiarism technique which aims at rendering the source code incomprehensible to a possible plagiarist and at the same time preventing source code modifications. The proposal is based on the concept of Route…
▽ More
Despite the approaches proposed so far, software plagiarism is still a problem which has not been solved entirely yet. The approach introduced throughout this paper is about a source code anti-plagiarism technique which aims at rendering the source code incomprehensible to a possible plagiarist and at the same time preventing source code modifications. The proposal is based on the concept of Router and makes use of both symmetric encryption and cryptographic hashing functions to provide such guarantees.
△ Less
Submitted 6 January, 2022;
originally announced January 2022.
-
Planning with Biological Neurons and Synapses
Authors:
Francesco d'Amore,
Daniel Mitropolsky,
Pierluigi Crescenzi,
Emanuele Natale,
Christos H. Papadimitriou
Abstract:
We revisit the planning problem in the blocks world, and we implement a known heuristic for this task. Importantly, our implementation is biologically plausible, in the sense that it is carried out exclusively through the spiking of neurons. Even though much has been accomplished in the blocks world over the past five decades, we believe that this is the first algorithm of its kind. The input is a…
▽ More
We revisit the planning problem in the blocks world, and we implement a known heuristic for this task. Importantly, our implementation is biologically plausible, in the sense that it is carried out exclusively through the spiking of neurons. Even though much has been accomplished in the blocks world over the past five decades, we believe that this is the first algorithm of its kind. The input is a sequence of symbols encoding an initial set of block stacks as well as a target set, and the output is a sequence of motion commands such as "put the top block in stack 1 on the table". The program is written in the Assembly Calculus, a recently proposed computational framework meant to model computation in the brain by bridging the gap between neural activity and cognitive function. Its elementary objects are assemblies of neurons (stable sets of neurons whose simultaneous firing signifies that the subject is thinking of an object, concept, word, etc.), its commands include project and merge, and its execution model is based on widely accepted tenets of neuroscience. A program in this framework essentially sets up a dynamical system of neurons and synapses that eventually, with high probability, accomplishes the task. The purpose of this work is to establish empirically that reasonably large programs in the Assembly Calculus can execute correctly and reliably; and that rather realistic -- if idealized -- higher cognitive functions, such as planning in the blocks world, can be implemented successfully by such programs.
△ Less
Submitted 16 December, 2021; v1 submitted 15 December, 2021;
originally announced December 2021.
-
Phase Transition of the 3-Majority Dynamics with Uniform Communication Noise
Authors:
Francesco d'Amore,
Isabella Ziccardi
Abstract:
Communication noise is a common feature in several real-world scenarios where systems of agents need to communicate in order to pursue some collective task. In particular, many biologically inspired systems that try to achieve agreements on some opinion must implement resilient dynamics that are not strongly affected by noisy communications. In this work, we study the popular 3-Majority dynamics,…
▽ More
Communication noise is a common feature in several real-world scenarios where systems of agents need to communicate in order to pursue some collective task. In particular, many biologically inspired systems that try to achieve agreements on some opinion must implement resilient dynamics that are not strongly affected by noisy communications. In this work, we study the popular 3-Majority dynamics, an opinion dynamics which has been proved to be an efficient protocol for the majority consensus problem, in which we introduce a simple feature of uniform communication noise, following (d'Amore et al. 2020). We prove that in the fully connected communication network of n agents and in the binary opinion case, the process induced by the 3-Majority dynamics exhibits a phase transition. For a noise probability $p < 1/3$, the dynamics reaches in logarithmic time an almost-consensus metastable phase which lasts for a polynomial number of rounds with high probability. Furthermore, departing from previous analyses, we further characterize this phase by showing that there exists an attractive equilibrium value $s_{\text{eq}} \in [n]$ for the bias of the system, i.e. the difference between the majority community size and the minority one. Moreover, the agreement opinion turns out to be the initial majority one if the bias towards it is of magnitude $Ω(\sqrt{n\log n})$ in the initial configuration. If, instead, $p > 1/3$, no form of consensus is possible, and any information regarding the initial majority opinion is lost in logarithmic time with high probability. Despite more communications per-round are allowed, the 3-Majority dynamics surprisingly turns out to be less resilient to noise than the Undecided-State dynamics (d'Amore et al. 2020), whose noise threshold value is $p = 1/2$.
△ Less
Submitted 13 December, 2021; v1 submitted 7 December, 2021;
originally announced December 2021.
-
Traitor-Proof PDF Watermarking
Authors:
Fabrizio d'Amore,
Alessandro Serpi
Abstract:
This paper presents a traitor-tracing technique based on the watermarking of digital documents (\pdf{} files in particular). The watermarking algorithm uses a chain of three separate techniques that work in synergy. The embedded payload can withstand a wide range of attacks and cannot be removed without invalidating the credibility of the document. We will present an implementation of the approach…
▽ More
This paper presents a traitor-tracing technique based on the watermarking of digital documents (\pdf{} files in particular). The watermarking algorithm uses a chain of three separate techniques that work in synergy. The embedded payload can withstand a wide range of attacks and cannot be removed without invalidating the credibility of the document. We will present an implementation of the approach and discuss its limitations with respect to documents that can be watermarked and quality of the watermarked documents. We will also analyse two payload alternatives and how the encryption scheme may alleviate the chilling effect on whistle-blowing.
△ Less
Submitted 20 September, 2021;
originally announced September 2021.
-
Phase Transition of a Non-Linear Opinion Dynamics with Noisy Interactions
Authors:
Francesco d'Amore,
Andrea Clementi,
Emanuele Natale
Abstract:
In several real \emph{Multi-Agent Systems} (MAS), it has been observed that only weaker forms of\emph{metastable consensus} are achieved, in which a large majority of agents agree on some opinion while other opinions continue to be supported by a (small) minority of agents. In this work, we take a step towards the investigation of metastable consensus for complex (non-linear) \emph{opinion dyn…
▽ More
In several real \emph{Multi-Agent Systems} (MAS), it has been observed that only weaker forms of\emph{metastable consensus} are achieved, in which a large majority of agents agree on some opinion while other opinions continue to be supported by a (small) minority of agents. In this work, we take a step towards the investigation of metastable consensus for complex (non-linear) \emph{opinion dynamics} by considering the famous \undecided dynamics in the binary setting, which is known to reach consensus exponentially faster than the \voter dynamics. We propose a simple form of uniform noise in which each message can change to another one with probability $p$ and we prove that the persistence of a \emph{metastable consensus} undergoes a \emph{phase transition} for $p=\frac 16$. In detail, below this threshold, we prove the system reaches with high probability a metastable regime where a large majority of agents keeps supporting the same opinion for polynomial time. Moreover, this opinion turns out to be the initial majority opinion, whenever the initial bias is slightly larger than its standard deviation.On the contrary, above the threshold, we show that the information about the initial majority opinion is "lost" within logarithmic time even when the initial bias is maximum.Interestingly, using a simple coupling argument, we show the equivalence between our noisy model above and the model where a subset of agents behave in a \emph{stubborn} way.
△ Less
Submitted 15 May, 2020;
originally announced May 2020.
-
Search via Parallel Lévy Walks on $\mathbb{Z}^2$
Authors:
Andrea Clementi,
Francesco d'Amore,
George Giakkoupis,
Emanuele Natale
Abstract:
Motivated by the Lévy foraging hypothesis -- the premise that various animal species have adapted to follow Lévy walks to optimize their search efficiency -- we study the parallel hitting time of Lévy walks on the infinite two-dimensional grid. We consider $k$ independent discrete-time Lévy walks, with the same exponent $α\in(1,\infty)$, that start from the same node, and analyze the number of ste…
▽ More
Motivated by the Lévy foraging hypothesis -- the premise that various animal species have adapted to follow Lévy walks to optimize their search efficiency -- we study the parallel hitting time of Lévy walks on the infinite two-dimensional grid. We consider $k$ independent discrete-time Lévy walks, with the same exponent $α\in(1,\infty)$, that start from the same node, and analyze the number of steps until the first walk visits a given target at distance $\ell$. We show that for any choice of $k$ and $\ell$ from a large range, there is a unique optimal exponent $α_{k,\ell} \in (2,3)$, for which the hitting time is $\tilde O(\ell^2/k)$ w.h.p., while modifying the exponent by an $ε$ term increases the hitting time by a polynomial factor, or the walks fail to hit the target almost surely. Based on that, we propose a surprisingly simple and effective parallel search strategy, for the setting where $k$ and $\ell$ are unknown: the exponent of each Lévy walk is just chosen independently and uniformly at random from the interval $(2,3)$. This strategy achieves optimal search time (modulo polylogarithmic factors) among all possible algorithms (even centralized ones that know $k$). Our results should be contrasted with a line of previous work showing that the exponent $α= 2$ is optimal for various search problems. In our setting of $k$ parallel walks, we show that the optimal exponent depends on $k$ and $\ell$, and that randomizing the choice of the exponents works simultaneously for all $k$ and $\ell$.
△ Less
Submitted 7 March, 2024; v1 submitted 3 April, 2020;
originally announced April 2020.
-
Authentication as a service: Shamir Secret Sharing with byzantine components
Authors:
Andrea Bissoli,
Fabrizio d'Amore
Abstract:
We present a practical methodology for securing the password-based authentication scheme. We propose a solution based on the well-known (k,n) threshold scheme of Shamir for sharing a secret, where in our case the secret is the password itself and (k,n) threshold scheme means that n password-derived secrets (shares) are created and k less than n shares are necessary and sufficient for reconstructin…
▽ More
We present a practical methodology for securing the password-based authentication scheme. We propose a solution based on the well-known (k,n) threshold scheme of Shamir for sharing a secret, where in our case the secret is the password itself and (k,n) threshold scheme means that n password-derived secrets (shares) are created and k less than n shares are necessary and sufficient for reconstructing the password, while k-1 are not sufficient. The scheme is information-theoretic secure. Since each of the n shares is stored on a different host (shareholder), an attacker will need to compromise k different shareholders for obtaining an amount of data sufficient for reconstructing the secret. Furthermore, in order to be resistant to the compromising of the server (dealer) coordinating the shareholders we define a variant of the classic Shamir, where the Shamir's abscissae are unknown to dealer and shareholders, making the reconstruction impossible even in the case of dealer and shareholders compromised. In addition we use the Pedersen technique for allowing the verification of shares. For the described scenario we have designed two protocols: the registration (user's sign-up, to be carried out once), and authentication (user's login). We analyse several scenarios where dealer and/or shareholders are partially/totally compromised and confirm that none of them is enabling the attacker to break the authentication. Furthermore we focus on cases where one or more byzantine servers are presented, analysing the impact on the framework and show the adopted mechanisms to be safe against these kinds of attacks. We have developed a prototype demonstrating that our framework works correctly, effectively and efficiently. It provides a first feasibility study that will provide a base for structured and engineered cloud-based implementations aiming at providing an authentication-as-a-service.
△ Less
Submitted 19 June, 2018;
originally announced June 2018.