Deterministic simulation in LOGSPACE
STOC '87 Proceedings of the nineteenth annual ACM symposium on Theory of computing
The computational complexity of universal hashing
Theoretical Computer Science - Special issue on structure in complexity theory
Constant depth circuits, Fourier transform, and learnability
Journal of the ACM (JACM)
Superconcentrators of depths 2 and 3; odd levels help (rarely)
Journal of Computer and System Sciences
Some combinatorial-algebraic problems from complexity theory
Discrete Mathematics - Special issue: trends in discrete mathematics
Eigenvalues and expansion of regular graphs
Journal of the ACM (JACM)
The average sensitivity of bounded-depth circuits
Information Processing Letters
Error correcting codes, perfect hashing circuits, and deterministic dynamic dictionaries
Proceedings of the ninth annual ACM-SIAM symposium on Discrete algorithms
Bounds for Dispersers, Extractors, and Depth-Two Superconcentrators
SIAM Journal on Discrete Mathematics
SIAM Journal on Computing
Lower Bounds for Constant Depth Circuits for Prefix Problems
Proceedings of the 10th Colloquium on Automata, Languages and Programming
On non-linear lower bounds in computational complexity
STOC '75 Proceedings of seventh annual ACM symposium on Theory of computing
Superconcentrators, generalizers and generalized connectors with limited depth
STOC '83 Proceedings of the fifteenth annual ACM symposium on Theory of computing
Expander-Based Constructions of Efficiently Decodable Codes
FOCS '01 Proceedings of the 42nd IEEE symposium on Foundations of Computer Science
Computationally efficient error-correcting codes and holographic proofs
Computationally efficient error-correcting codes and holographic proofs
The complexity of constructing pseudorandom generators from hard functions
Computational Complexity
Cryptography with constant computational overhead
STOC '08 Proceedings of the fortieth annual ACM symposium on Theory of computing
The bit extraction problem or t-resilient functions
SFCS '85 Proceedings of the 26th Annual Symposium on Foundations of Computer Science
The minimum distance of turbo-like codes
IEEE Transactions on Information Theory
Bounded-Depth Circuits Cannot Sample Good Codes
CCC '11 Proceedings of the 2011 IEEE 26th Annual Conference on Computational Complexity
Tradeoffs in depth-two superconcentrators
STACS'06 Proceedings of the 23rd Annual conference on Theoretical Aspects of Computer Science
Boolean Function Complexity: Advances and Frontiers
Boolean Function Complexity: Advances and Frontiers
Linear-time encodable and decodable error-correcting codes
IEEE Transactions on Information Theory - Part 1
Endcoding complexity versus minimum distance
IEEE Transactions on Information Theory
Construction of asymptotically good low-rate error-correcting codes through pseudo-random graphs
IEEE Transactions on Information Theory - Part 2
Hi-index | 0.00 |
We bound the minimum number w of wires needed to compute any (asymptotically good) error-correcting code C:{0,1}Ω(n) - {0,1}n with minimum distance Ω(n), using unbounded fan-in circuits of depth d with arbitrary gates. Our main results are: (1) If d=2 then w = Θ(n ({log n/ log log n})2). (2) If d=3 then w = Θ(n lg lg n). (3) If d=2k or d=2k+1 for some integer k ≥ 2 then w = Θ(n λk(n)), where λ1(n)=⌈ log n⌉, λi+1(n)= λi*(n), and the * operation gives how many times one has to iterate the function λi to reach a value at most 1 from the argument n. (4) If d=log* n then w=O(n). For depth d=2, our Ω(n (log n/log log n)2) lower bound gives the largest known lower bound for computing any linear map. Using a result by Ishai, Kushilevitz, Ostrovsky, and Sahai (2008), we also obtain similar bounds for computing pairwise-independent hash functions. Our lower bounds are based on a superconcentrator-like condition that the graphs of circuits computing good codes must satisfy. This condition is provably intermediate between superconcentrators and their weakenings considered before.