二次Goldreich-Levin定理

Madhur Tulsiani, J. Wolf
{"title":"二次Goldreich-Levin定理","authors":"Madhur Tulsiani, J. Wolf","doi":"10.1137/12086827X","DOIUrl":null,"url":null,"abstract":"Decomposition theorems in classical Fourier analysis enable us to express a bounded function in terms of few linear phases with large Fourier coefficients plus a part that is pseudorandom with respect to linear phases. The Gold Reich-Levin algorithm can be viewed as an algorithmic analogue of such a decomposition as it gives a way to efficiently find the linear phases associated with large Fourier coefficients. In the study of & quot; quadratic Fourier analysis & quot;, higher-degree analogues of such decompositions have been developed in which the pseudorandomness property is stronger but the structured part correspondingly weaker. For example, it has previously been shown that it is possible to express a bounded function as a sum of a few quadratic phases plus a part that is small in the $U^3$ norm, defined by Gowers for the purpose of counting arithmetic progressions of length 4. We give a polynomial time algorithm for computing such a decomposition. A key part of the algorithm is a local self-correction procedure for Reed-Muller codes of order 2 (over $\\F_2^n$) for a function at distance $1/2-\\epsilon$ from a codeword. Given a function $f:\\F_2^n \\to \\{-1,1\\}$ at fractional Hamming distance $1/2-\\epsilon$ from a quadratic phase (which is a codeword of Reed-Muller code of order 2), we give an algorithm that runs in time polynomial in $n$ and finds a codeword at distance at most $1/2-\\eta$ for $\\eta = \\eta(\\epsilon)$. This is an algorithmic analogue of Samorodnitsky's result, which gave a tester for the above problem. To our knowledge, it represents the first instance of a correction procedure for any class of codes, beyond the list-decoding radius. In the process, we give algorithmic versions of results from additive combinatorics used in Samorodnitsky's proof and a refined version of the inverse theorem for the Gowers $U^3$ norm over $\\F_2^n$ or a function at distance 1/2 -- episilon from a codeword. Given a function f : $\\F_2^n$ right arrow { -- 1, 1} at fractional Hamming distance 1/2 -- epsilon \" from a quadratic phase (which is a codeword of Reed-Muller code of order 2), we give an algorithm that runs in time polynomial in n and finds a codeword at distance at most 1.2 -- n for n = n (epsilon). This is an algorithmic analogue of Samorodnitsky's result [17], which gave a tester for the above problem. To our knowledge, it represents the first instance of a correction procedure for any class of codes, beyond the list-decoding radius..","PeriodicalId":326048,"journal":{"name":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","volume":"72 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2011-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"23","resultStr":"{\"title\":\"Quadratic Goldreich-Levin Theorems\",\"authors\":\"Madhur Tulsiani, J. Wolf\",\"doi\":\"10.1137/12086827X\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Decomposition theorems in classical Fourier analysis enable us to express a bounded function in terms of few linear phases with large Fourier coefficients plus a part that is pseudorandom with respect to linear phases. The Gold Reich-Levin algorithm can be viewed as an algorithmic analogue of such a decomposition as it gives a way to efficiently find the linear phases associated with large Fourier coefficients. In the study of & quot; quadratic Fourier analysis & quot;, higher-degree analogues of such decompositions have been developed in which the pseudorandomness property is stronger but the structured part correspondingly weaker. For example, it has previously been shown that it is possible to express a bounded function as a sum of a few quadratic phases plus a part that is small in the $U^3$ norm, defined by Gowers for the purpose of counting arithmetic progressions of length 4. We give a polynomial time algorithm for computing such a decomposition. A key part of the algorithm is a local self-correction procedure for Reed-Muller codes of order 2 (over $\\\\F_2^n$) for a function at distance $1/2-\\\\epsilon$ from a codeword. Given a function $f:\\\\F_2^n \\\\to \\\\{-1,1\\\\}$ at fractional Hamming distance $1/2-\\\\epsilon$ from a quadratic phase (which is a codeword of Reed-Muller code of order 2), we give an algorithm that runs in time polynomial in $n$ and finds a codeword at distance at most $1/2-\\\\eta$ for $\\\\eta = \\\\eta(\\\\epsilon)$. This is an algorithmic analogue of Samorodnitsky's result, which gave a tester for the above problem. To our knowledge, it represents the first instance of a correction procedure for any class of codes, beyond the list-decoding radius. In the process, we give algorithmic versions of results from additive combinatorics used in Samorodnitsky's proof and a refined version of the inverse theorem for the Gowers $U^3$ norm over $\\\\F_2^n$ or a function at distance 1/2 -- episilon from a codeword. Given a function f : $\\\\F_2^n$ right arrow { -- 1, 1} at fractional Hamming distance 1/2 -- epsilon \\\" from a quadratic phase (which is a codeword of Reed-Muller code of order 2), we give an algorithm that runs in time polynomial in n and finds a codeword at distance at most 1.2 -- n for n = n (epsilon). This is an algorithmic analogue of Samorodnitsky's result [17], which gave a tester for the above problem. To our knowledge, it represents the first instance of a correction procedure for any class of codes, beyond the list-decoding radius..\",\"PeriodicalId\":326048,\"journal\":{\"name\":\"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science\",\"volume\":\"72 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-05-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"23\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1137/12086827X\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE 52nd Annual Symposium on Foundations of Computer Science","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1137/12086827X","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 23

摘要

经典傅立叶分析中的分解定理使我们能够用几个具有大傅立叶系数的线性相加上相对于线性相的伪随机部分来表示有界函数。Gold Reich-Levin算法可以看作是这种分解的算法模拟,因为它提供了一种有效地找到与大傅立叶系数相关的线性相位的方法。在研究& quot;二次傅立叶分析& quot;,这种分解的高阶类似物已经发展起来,其中伪随机性更强,而结构部分相应较弱。例如,以前已经证明可以将有界函数表示为几个二次相加上U^3$范数中较小的部分的和,U^3$范数是由Gowers定义的,用于计数长度为4的等差数列。我们给出了计算这种分解的多项式时间算法。该算法的关键部分是对于距离码字$1/2- $ epsilon$的函数的2阶(/ $\F_2^n$) Reed-Muller码的局部自校正过程。给定函数$f:\F_2^n \到\{-1,1\}$在分数汉明距离$1/2-\epsilon$的二次相位(这是一个2阶Reed-Muller码字),我们给出了一个算法,该算法在$n$中以时间多项式运行,并在$\eta = \eta(\epsilon)$中找到距离不超过$1/2-\eta$的码字。这是Samorodnitsky的结果的算法模拟,它为上述问题提供了一个测试。据我们所知,它表示超出列表解码半径的任何类型的代码的纠正过程的第一个实例。在此过程中,我们给出了Samorodnitsky证明中使用的加性组合结果的算法版本,以及Gowers $U^3$范数在$\F_2^n$上或距码字1/2—episiln的函数的反定理的改进版本。给定函数f: $\F_2^n$右箭头{- 1,1}在分数汉明距离1/2—epsilon”处与二次相位(这是一个2阶Reed-Muller码字),我们给出了一个算法,该算法以n为时间多项式运行,并在n = n (epsilon)时找到距离不超过1.2—n的码字。这是Samorodnitsky的结果[17]的算法模拟,它为上述问题提供了一个测试。据我们所知,它代表了任何类型的代码的纠正过程的第一个实例,超出了列表解码半径。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Quadratic Goldreich-Levin Theorems
Decomposition theorems in classical Fourier analysis enable us to express a bounded function in terms of few linear phases with large Fourier coefficients plus a part that is pseudorandom with respect to linear phases. The Gold Reich-Levin algorithm can be viewed as an algorithmic analogue of such a decomposition as it gives a way to efficiently find the linear phases associated with large Fourier coefficients. In the study of & quot; quadratic Fourier analysis & quot;, higher-degree analogues of such decompositions have been developed in which the pseudorandomness property is stronger but the structured part correspondingly weaker. For example, it has previously been shown that it is possible to express a bounded function as a sum of a few quadratic phases plus a part that is small in the $U^3$ norm, defined by Gowers for the purpose of counting arithmetic progressions of length 4. We give a polynomial time algorithm for computing such a decomposition. A key part of the algorithm is a local self-correction procedure for Reed-Muller codes of order 2 (over $\F_2^n$) for a function at distance $1/2-\epsilon$ from a codeword. Given a function $f:\F_2^n \to \{-1,1\}$ at fractional Hamming distance $1/2-\epsilon$ from a quadratic phase (which is a codeword of Reed-Muller code of order 2), we give an algorithm that runs in time polynomial in $n$ and finds a codeword at distance at most $1/2-\eta$ for $\eta = \eta(\epsilon)$. This is an algorithmic analogue of Samorodnitsky's result, which gave a tester for the above problem. To our knowledge, it represents the first instance of a correction procedure for any class of codes, beyond the list-decoding radius. In the process, we give algorithmic versions of results from additive combinatorics used in Samorodnitsky's proof and a refined version of the inverse theorem for the Gowers $U^3$ norm over $\F_2^n$ or a function at distance 1/2 -- episilon from a codeword. Given a function f : $\F_2^n$ right arrow { -- 1, 1} at fractional Hamming distance 1/2 -- epsilon " from a quadratic phase (which is a codeword of Reed-Muller code of order 2), we give an algorithm that runs in time polynomial in n and finds a codeword at distance at most 1.2 -- n for n = n (epsilon). This is an algorithmic analogue of Samorodnitsky's result [17], which gave a tester for the above problem. To our knowledge, it represents the first instance of a correction procedure for any class of codes, beyond the list-decoding radius..
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A Randomized Rounding Approach to the Traveling Salesman Problem Welfare and Profit Maximization with Production Costs Which Networks are Least Susceptible to Cascading Failures? Computing Blindfolded: New Developments in Fully Homomorphic Encryption The 1D Area Law and the Complexity of Quantum States: A Combinatorial Approach
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1