Almost optimal lower bounds for small depth circuits
STOC '86 Proceedings of the eighteenth annual ACM symposium on Theory of computing
Approximations of general independent distributions
STOC '92 Proceedings of the twenty-fourth annual ACM symposium on Theory of computing
Small-bias probability spaces: efficient constructions and applications
SIAM Journal on Computing
Constant depth circuits, Fourier transform, and learnability
Journal of the ACM (JACM)
An O(nlog log n) learning algorithm for DNF under the uniform distribution
Journal of Computer and System Sciences
Almost k-wise independence versus k-wise independence
Information Processing Letters
Minimum distance of error correcting codes versus encoding complexity, symmetry, and pseudorandomness
Polylogarithmic Independence Can Fool DNF Formulas
FOCS '07 Proceedings of the 48th Annual IEEE Symposium on Foundations of Computer Science
Deterministic simulation of probabilistic constant depth circuits
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
A Simple Proof of Bazzi’s Theorem
ACM Transactions on Computation Theory (TOCT)
Poly-logarithmic Independence Fools AC^0 Circuits
CCC '09 Proceedings of the 2009 24th Annual IEEE Conference on Computational Complexity
Almost k-wise independent sets establish hitting sets for width-3 1-branching programs
CSR'11 Proceedings of the 6th international conference on Computer science: theory and applications
The Fourier entropy-influence conjecture for certain classes of Boolean functions
ICALP'11 Proceedings of the 38th international colloquim conference on Automata, languages and programming - Volume Part I
A sufficient condition for sets hitting the class of read-once branching programs of width 3
SOFSEM'12 Proceedings of the 38th international conference on Current Trends in Theory and Practice of Computer Science
A composition theorem for the fourier entropy-influence conjecture
ICALP'13 Proceedings of the 40th international conference on Automata, Languages, and Programming - Volume Part I
Pseudorandom generators for combinatorial checkerboards
Computational Complexity
Hi-index | 0.00 |
We prove the existence of a poly(n,m)-time computable pseudorandom generator which "1/poly(n,m)-fools" DNFs with n variables and m terms, and has seed length O(log2nm ċ log log nm). Previously, the best pseudorandom generator for depth-2 circuits had seed length O(log3 nm), and was due to Bazzi (FOCS 2007). It follows from our proof that a 1/mÕ(log mn)-biased distribution 1/poly(nm)-fools DNFs with m terms and n variables. For inverse polynomial distinguishing probability this is nearly tight because we show that for every m, δ there is a 1/mΩ(log 1/δ)-biased distribution X and a DNF φ with m terms such that φ is not δ-fooled by X. For the case of read-once DNFs, we show that seed length O(log mn ċ log 1/δ) suffices, which is an improvement for large δ. It also follows from our proof that a 1/mO(log 1/δ)-biased distribution δ-fools all read-once DNF with m terms. We show that this result too is nearly tight, by constructing a 1/mΩ(log 1/δ)-biased distribution that does not δ-fool a certain m-term read-once DNF.