[图书][B] Analysis of boolean functions
R O'Donnell - 2014 - books.google.com
Boolean functions are perhaps the most basic objects of study in theoretical computer
science. They also arise in other areas of mathematics, including combinatorics, statistical …
science. They also arise in other areas of mathematics, including combinatorics, statistical …
Optimal inapproximability results for MAX-CUT and other 2-variable CSPs?
In this paper we show a reduction from the Unique Games problem to the problem of
approximating MAX-CUT to within a factor of GW+ϵ for all ϵ>0; here GW≈.878567 denotes …
approximating MAX-CUT to within a factor of GW+ϵ for all ϵ>0; here GW≈.878567 denotes …
Noise stability of functions with low influences: invariance and optimality
E Mossel, R O'Donnell… - 46th Annual IEEE …, 2005 - ieeexplore.ieee.org
In this paper, we study functions with low influences on product probability spaces. The
analysis of Boolean functions f {-1, 1}/sup n//spl rarr/{-1, 1} with low influences has become a …
analysis of Boolean functions f {-1, 1}/sup n//spl rarr/{-1, 1} with low influences has become a …
Common information, noise stability, and their extensions
Common information is ubiquitous in information theory and related areas such as
theoretical computer science and discrete probability. However, because there are multiple …
theoretical computer science and discrete probability. However, because there are multiple …
Lower bounds on locality sensitive hashing
R Motwani, A Naor, R Panigrahi - Proceedings of the twenty-second …, 2006 - dl.acm.org
Given a metric space (X, dX), c≥ 1, r> 0, and p, q≡[0, 1], a distribution over map**s H:
X→ N is called a (r, cr, p, q)-sensitive hash family if any two points in X at distance at most r …
X→ N is called a (r, cr, p, q)-sensitive hash family if any two points in X at distance at most r …
Monotone circuit lower bounds from resolution
For any unsatisfiable CNF formula F that is hard to refute in the Resolution proof system, we
show that a gadget-composed version of F is hard to refute in any proof system whose lines …
show that a gadget-composed version of F is hard to refute in any proof system whose lines …
Breaking the multicommodity flow barrier for O (√ log n)-approximations to sparsest cut
J Sherman - 2009 50th Annual IEEE Symposium on …, 2009 - ieeexplore.ieee.org
This paper ties the line of work on algorithms that find an O (¿(log n))-approximation to the
SPARSEST CUT together with the line of work on algorithms that run in subquadratic time by …
SPARSEST CUT together with the line of work on algorithms that run in subquadratic time by …
On reverse hypercontractivity
We study the notion of reverse hypercontractivity. We show that reverse hypercontractive
inequalities are implied by standard hypercontractive inequalities as well as by the modified …
inequalities are implied by standard hypercontractive inequalities as well as by the modified …
Expanders-how to find them, and what to find in them.
M Krivelevich - BCC, 2019 - books.google.com
Abstract A graph G=(V, E) is called an expander if every vertex subset U of size up to| V|/2
has an external neighborhood whose size is comparable to| U|. Expanders have been a …
has an external neighborhood whose size is comparable to| U|. Expanders have been a …
Concentration without independence via information measures
AR Esposito, M Mondelli - IEEE Transactions on Information …, 2024 - ieeexplore.ieee.org
We propose a novel approach to concentration for non-independent random variables. The
main idea is to “pretend” that the random variables are independent and pay a multiplicative …
main idea is to “pretend” that the random variables are independent and pay a multiplicative …