Yuval Dagan, Yuval Filmus, Ariel Gabizon and Shay Moran, Twenty (simple) questions, STOC 2017, Invited to HALG 2018

detailsabstractBibTeX
## BibTeX

arXivconferencetalksfull version

@inproceedings{DFGM2017,

author = {Yuval Dagan and Yuval Filmus and Ariel Gabizon and Shay Moran},

title = {Twenty (simple) questions},

booktitle = {49th ACM Symposium on Theory of Computing (STOC 2017)},

year = {2017}

}

copy to clipboard
author = {Yuval Dagan and Yuval Filmus and Ariel Gabizon and Shay Moran},

title = {Twenty (simple) questions},

booktitle = {49th ACM Symposium on Theory of Computing (STOC 2017)},

year = {2017}

}

Given a distribution $\mu$, the goal of the distributional 20 questions game is to construct a strategy that identifies an unknown element drawn from $\mu$ using as little yes/no queries on average. Huffman’s algorithm constructs an optimal strategy, but the questions one has to ask can be arbitrary.

Given a parameter $n$, we ask how large a set of questions $Q$ needs to be so that for each distribution supported on $[n]$ there is a good strategy which uses only questions from $Q$.

Our first major result is that a linear number of questions (corresponding to binary comparison search trees) suffices to recover the $H(\mu)+1$ performance of Huffman’s algorithm. As a corollary, we deduce that the number of questions needed to guarantee a cost of at most $H(\mu)+r$ (for integer $r$) is asymptotic to $rn^{1/r}$.

Our second major result is that (roughly) $1.25^n$ questions are sufficient to match the performance of Huffman’s algorithm exactly, and this is tight for infinitely many $n$.

We also determine the number of questions sufficient to match the performance of Huffman’s algorithm up to $r$ to be $\Theta(n^{\Theta(1/r)})$.

The second part has appeared been published in Combinatorica. We hope to publish the first part at some point at an information theory journal.

The full version incorporates a third part (since relegated to a different paper), in which we show that the set of questions used to obtain the bound $H(\mu)+1$ performs better when the maximal probability of $\mu$ is small, bounding the performance between 0.5011 and 0.58607.

The full version also contains an extensive literature review, as well as many open questions.

See also follow-up work which addresses two of the open questions raised in the paper.

Yuval Filmus, An orthogonal basis for functions over a slice of the Boolean cube, Electronic Journal of Combinatorics

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{Filmus2016a,

author = {Yuval Filmus},

title = {Orthogonal basis for functions over a slice of the

{B}oolean hypercube},

journal = {Electronic Journal of Combinatorics},

volume = {23},

number = {1},

year = {2016},

pages = {P1.23}

}

copy to clipboard
author = {Yuval Filmus},

title = {Orthogonal basis for functions over a slice of the

{B}oolean hypercube},

journal = {Electronic Journal of Combinatorics},

volume = {23},

number = {1},

year = {2016},

pages = {P1.23}

}

The Johnson and Kneser are graphs defined on the $k$-sets of $[n]$, a vertex set known as a *slice of the Boolean cube*. Two sets are connected in the Johnson graph if they have Hamming distance two, and in the Kneser graph if they are disjoint. Both graphs belong to the Bose–Mesner algebra of the Johnson association scheme; this just means that whether an edge connects two sets $S,T$ depends only on $|S \cap T|$.

All graphs belonging to the Bose–Mesner algebra have the same eigenspaces, and these are well-known, arising from certain representations of the symmetric group. The multiplicity of the $k$th eigenspace is rather large, ${n \choose k} – {n \choose k-1}$. As far as we can tell, prior to our work no explicit orthogonal basis for these eigenspace has been exhibited.

We present a simple orthogonal basis for the eigenspaces of the Bose–Mesner algebra of the Johnson association scheme, arising from Young’s orthogonal basis for the symmetric group. Our presentation is completely elementary and makes no mention of the symmetric group.

As an application, we restate Wimmer’s proof of Friedgut’s theorem for the slice. The original proof makes heavy use of computations over the symmetric group. We are able to do these computations directly in the slice using our basis.

**Update:** Qing Xiang and his student Rafael Plaza pointed out that the same basis has been constructed by Murali K. Srinivasan in his paper Symmetric chains, Gelfand–Tsetlin chains, and the Terwilliger algebra of the binary Hamming scheme.

**Another update:** The proof of Theorem 3.1 was clarified according to suggestions of Bruno Loff. See also this writeup for another approach, relying on the work of Murali K. Srinivasan mentioned above.

Yuval Filmus and Justin Ward, A tight combinatorial algorithm for submodular maximization subject to a matroid constraint, FOCS 2012, SICOMP

detailsabstractBibTeX
## BibTeX

arXivjournaltalksextended versionexposition

@inproceedings{FW2012b,

author = {Yuval Filmus and Justin Ward},

title = {A tight combinatorial algorithm for submodular maximization

subject to a matroid constraint},

booktitle = {53rd Annual {IEEE} Symposium on Foundations of Computer Science ({FOCS} 2012)},

year = {2012},

pages = {659--668}

}

@article{FW2014,

author = {Yuval Filmus and Justin Ward},

title = {Monotone submodular maximization over a matroid via non-oblivious local search},

journal = {SIAM Journal on Computing},

volume = {43},

issue = {2},

year = {2014},

pages = {514--542}

}

copy to clipboard
author = {Yuval Filmus and Justin Ward},

title = {A tight combinatorial algorithm for submodular maximization

subject to a matroid constraint},

booktitle = {53rd Annual {IEEE} Symposium on Foundations of Computer Science ({FOCS} 2012)},

year = {2012},

pages = {659--668}

}

@article{FW2014,

author = {Yuval Filmus and Justin Ward},

title = {Monotone submodular maximization over a matroid via non-oblivious local search},

journal = {SIAM Journal on Computing},

volume = {43},

issue = {2},

year = {2014},

pages = {514--542}

}

We present an optimal, combinatorial $1-1/e$ approximation algorithm for monotone submodular optimization over a matroid constraint. Compared to the continuous greedy algorithm due to Calinescu, Chekuri, Pál and Vondrák, our algorithm is extremely simple and requires no rounding. It consists of the greedy algorithm followed by local search. Both phases are run not on the actual objective function, but on a related auxiliary potential function, which is also monotone submodular.

In our previous work on maximum coverage (the preceding paper), the potential function gives more weight to elements covered multiple times. We generalize this approach from coverage functions to arbitrary monotone submodular functions. When the objective function is a coverage function, both definitions of the potential function coincide.

Our approach generalizes to the case where the monotone submodular function has restricted curvature. For any curvature $c$, we adapt our algorithm to produce a $(1-e^{-c})/c$ approximation. This matches results of Vondrák, who has shown that the continuous greedy algorithm produces a $(1-e^{-c})/c$ approximation when the objective function has curvature $c$ with respect to the optimum, and proved that achieving any better approximation ratio is impossible in the value oracle model.

The paper exists in several different versions:

- The conference version only contains the case $c=1$.
- The arXiv version contains the result for general $c$. A similar account can be found in Ward’s thesis.
- The journal version contains a significantly simplified proof of the result for general $c$.
- The extended version includes slightly better approximation ratios for bounded matroid rank, and an improved version of the continuous greedy algorithm.
- The exposition gives a simplified exposition of the main part of the analysis, following ideas of Moran Feldman.

The journal version supersedes the preceding versions.

Yuval Filmus, Spectral methods in extremal combinatorics, PhD thesis, CMS Doctoral Prize

detailsabstractBibTeX
## BibTeX

slides

@phdthesis{Filmus2013,

author = {Yuval Filmus},

title = {Spectral methods in extremal combinatorics},

school = {University of Toronto},

year = {2013}

}

copy to clipboard
author = {Yuval Filmus},

title = {Spectral methods in extremal combinatorics},

school = {University of Toronto},

year = {2013}

}

Extremal combinatorics studies how large a collection of objects can be if it satisfies a given set of restrictions. Inspired by a classical theorem due to Erdős, Ko and Rado, Sominovits and Sós posed the following problem: determine how large a collection of graphs on the vertex set $\{1,\ldots,n\}$ can be, if the intersection of any two of them contains a triangle. They conjectured that the largest possible collection, containing $1/8$ of all graphs, consists of all graphs containing a fixed triangle (a *triangle-star*). The first major contribution of the thesis is a confirmation of this conjecture. This result first appeared in our paper Triangle-intersecting families of graphs with David Ellis and Ehud Friedgut.

We prove the Simonovits–Sós conjecture in the following strong form: the only triangle-intersecting families of the maximal measure $1/8$ are triangle-stars (*uniqueness*), and every triangle-intersecting family of measure $1/8-\epsilon$ is $O(\epsilon)$-close to a triangle-star (*stability*). Our proof uses spectral methods (Hoffman’s bound).

In order to prove the stability part of our theorem, we utilize a structure theorem for Boolean functions on $\{0,1\}^m$ whose Fourier expansion is concentrated on the first $t+1$ levels, due to Kindler and Safra. The second major contribution of this thesis consists of two analogs of this theorem for Boolean functions on $S_m$ whose Fourier expansion is concentrated on the first two levels. These results appear in our papers A quasi-stability result for dictatorships in $S_n$ and A stability results for balanced dictatorships in $S_n$, both with David Ellis and Ehud Friedgut.

In the same way that the Kindler–Safra theorem is useful for studying triangle-intersecting families, our structure theorems are useful for studying intersecting families of permutations, which are families in which any two permutations agree on the image of at least one point. Using one of our theorems, we give a simple proof of the following result of Ellis, Friedgut and Pilpel: an intersecting family of permutations on $S_m$ of size $(1-\epsilon)(m-1)!$ is $O(\epsilon)$-close to a double coset, a family which consists of all permutations sending some point $i$ to some point $j$.

The thesis includes a detailed exposition of Friedgut’s paper On the measure of intersecting families, uniqueness and stability, a proof of the Ahlswede–Khachatrian theorem in the $\mu_p$ setting, and a gentle introduction to the representation theory of $S_n$ from the point of view of class functions.

Yuval Filmus, Spectral methods for intersection problems, Depth oral paper

A survey of Friedgut’s research program in extremal combinatorics. Friedgut uses spectral methods — Hoffman’s eigenvalue bound — to obtain tight bounds on measures of intersecting families. His method has the advantage of implying *stability*: families of near-maximal measure are similar to families of maximal measure.

Results surveyed:

- Color-agreeing families of sets (Alon, Dinur, Friedgut, Sudakov).
- Triangle-intersecting families of graphs (Ellis, Filmus, Friedgut).
- Intersecting families of sets (Friedgut).
- Intersecting families of permutations (Ellis, Friedgut, Pilpel).

Yuval Filmus, Bandwidth approximation of a restricted family of trees, Master's thesis

detailsabstractBibTeX
## BibTeX

slides

@mastersthesis{Filmus2002,

author = {Yuval Filmus},

title = {Bandwidth approximation of a restricted family of trees},

school = {Weizmann institute of science},

year = {2002}

}

copy to clipboard
author = {Yuval Filmus},

title = {Bandwidth approximation of a restricted family of trees},

school = {Weizmann institute of science},

year = {2002}

}

We consider the NP-complete optimization problem *Bandwidth*. Anupam Gupta gave an $O(\log^{2.5} n)$ approximation algorithm for trees, and showed that his algorithm has an approximation ratio of $O(\log n)$ on *caterpillars*, trees composed of a central path and paths emanating from it. We show that the same approximation ratio is obtained on trees composed of a central path and caterpillars emanating from it.

Our result relies on the following lemma.

**Definition.** A sequence $a_1,\ldots,a_n$ has *thickness* $\Theta$ if the sum of any $d$ consecutive elements is at most $d\Theta$, for $1 \leq d \leq n$.

**Lemma.** If a sequence has thickness $\Theta$, then the sequence obtained by ordering the elements in non-decreasing order also has thickness $\Theta$.

Irit Dinur, Yuval Filmus and Prahladh Harsha, Sparse juntas on the biased hypercube, Manuscript

detailsabstractBibTeX
## BibTeX

arXiveccc

@misc{DFH2023+,

author = {Irit Dinur and Yuval Filmus and Prahladh Harsha},

title = {Sparse juntas on the biased hypercube},

year = {2023+}

}

copy to clipboard
author = {Irit Dinur and Yuval Filmus and Prahladh Harsha},

title = {Sparse juntas on the biased hypercube},

year = {2023+}

}

We give a structure theorem for Boolean functions on the biased hypercube which are $\epsilon$-close to degree $d$ in $L_2$, showing that they are close to *sparse juntas*.

Our structure theorem implies that such functions are $O(\epsilon^{C_d} + p)$-close to constant functions. We pinpoint the exact value of the constant $C_d$.

This paper improves on our previous work in several ways:

- The main theorem now includes a true “if and only if” condition, in the style of the sharp FKN theorem on the symmetric group.
- In the monotone case, we provide a theorem in which the approximating function is a monotone DNF.
- We find the optimal value of $C_d$, proving matching upper and lower bounds.

The previous work applied in the more general $A$-valued setting. The proof in this work applies in that setting as well, but we only formulated it in the Boolean setting. The missing piece is the $A$-valued Kindler–Safra theorem, which follows in a black-box function from the usual Kindler–Safra theorem, as outlined in the previous version.

Yuval Filmus, Junta threshold for low degree Boolean functions on the slice, Elec. J. Comb.

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{F23,

title = {Junta threshold for low degree {B}oolean functions on the slice},

author = {Yuval Filmus},

year = {2023},

journal = {Elec. J. Comb.},

volume = {30},

number = {1}

}

copy to clipboard
title = {Junta threshold for low degree {B}oolean functions on the slice},

author = {Yuval Filmus},

year = {2023},

journal = {Elec. J. Comb.},

volume = {30},

number = {1}

}

We show that a Boolean degree $d$ function on the slice ${[n]} \choose k$ is a junta if $k \geq 2d$, and that this bound is sharp. We prove a similar result for $A$-valued degree $d$ functions for arbitrary finite $A$, and for functions on an infinite analog of the slice.

One of the questions left open is the *restriction threshold*, which is the minimal $k$ which guarantees (for large enough $n$) that an $A$-valued degree $d$ function on ${[n]} \choose k$ is the restriction of an $A$-valued degree $d$ function on $\{0,1\}^n$. The paper gives an example in which the restriction threshold is larger than the junta threshold, and conjectures that the two coincide when $A = \{0,1\}$. This short note (joint with Antoine Vinciguerra) confirms this conjecture for all $A$ which are arithmetic progressions (and in particular, for $A = \{0,1\}$).

Yuval Filmus and Nathan Lindzey, Harmonic polynomials on perfect matchings, FPSAC 2022

detailsabstractBibTeX
## BibTeX

conference

@inproceedings{FL22,

title = {Harmonic polynomials on perfect matchings},

author = {Yuval Filmus and Nathan Lindzey},

booktitle = {The 34th international conference on. Formal Power Series and Algebraic Combinatorics (FPSAC'22)},

year = {2022}

}

copy to clipboard
title = {Harmonic polynomials on perfect matchings},

author = {Yuval Filmus and Nathan Lindzey},

booktitle = {The 34th international conference on. Formal Power Series and Algebraic Combinatorics (FPSAC'22)},

year = {2022}

}

Every function on the Boolean cube $\{0,1\}^n$ has a unique presentations as a multilinear polynomial. This fails on the $(n,k)$ slice: for example, the multilinear polynomial $\sum_{i=1}^n x_i – k$ vanishes on the entire slice. An old result of Dunkl shows that functions on the slice can be presented uniquely as multilinear polynomials of degree at most $\min(k,n-k)$ satisfying an additional condition known as *harmonicity*: the sum of all partial derivatives is zero. An example of such a polynomial is $x_i – x_j$, and in fact the polynomials $x_i – x_j$ form a *multiplicative basis* for all harmonic multilinear polynomials.

We extend these results to the symmetric group and to the perfect matching scheme (the case of the multislice will be tackled in future work). In both cases, we extend the notion of *harmonic* to obtain a unique presentation theorem. In the case of the symmetric group, we also describe an explicit multiplicative basis.

Yuval Filmus, FKN theorems for the biased cube and the slice, Manuscript

detailsabstractBibTeX
## BibTeX

@misc{Filmus2021exposition,

title = {{FKN} theorems for the biased cube and the slice},

author = {Yuval Filmus},

howpublished = {Manuscript},

year = {2021}

}

copy to clipboard
title = {{FKN} theorems for the biased cube and the slice},

author = {Yuval Filmus},

howpublished = {Manuscript},

year = {2021}

}

The classical Friedgut–Kalai–Naor theorem describes the structure of linear functions on the Boolean cube which are almost Boolean. We describe extensions of this theorem to functions on the biased Boolean cube and on the slice, simplifying our earlier work.

Yuval Filmus, Boolean functions on $S_n$ which are nearly linear, Discrete Analysis 2021:25

detailsabstractBibTeX
## BibTeX

arXivjournaltalks

@article{Filmus2021,

title = {Boolean functions on {$S_n$} which are nearly linear},

author = {Yuval Filmus},

journal = {Discrete Analysis},

year = {2021},

pages = {25:1--25:27}

}

copy to clipboard
title = {Boolean functions on {$S_n$} which are nearly linear},

author = {Yuval Filmus},

journal = {Discrete Analysis},

year = {2021},

pages = {25:1--25:27}

}

We show that a function $f\colon S_n \to \{0,1\}$ which is close to degree 1 is close to a union of an almost-disjoint family of cosets. Our characterization is tight: any union of an almost-disjoint family of cosets is close to degree 1. This improves on our earlier work with David Ellis and Ehud Friedgut.

We complement this result, which is about the $L_2$ metric, with similar results in the $L_0$ and $L_\infty$ metrics.

Gilad Chase, Yuval Filmus, Dor Minzer, Elchanan Mossel, and Nitin Saurabh, Approximate polymorphisms, STOC 2022

detailsabstractBibTeX
## BibTeX

arXivconference

@inproceedings{CFMMS2022,

author = {Gilad Chase and Yuval Filmus and Dor Minzer and Elchanan Mossel and Nitin Saurabh},

title = {Approximate polymorphisms},

booktitle = {STOC'22},

year = {2022}

}

copy to clipboard
author = {Gilad Chase and Yuval Filmus and Dor Minzer and Elchanan Mossel and Nitin Saurabh},

title = {Approximate polymorphisms},

booktitle = {STOC'22},

year = {2022}

}

A function $f\colon \{0,1\}^n \to \{0,1\}$ is a polymorphism of $g\colon \{0,1\}^m \to \{0,1\}$ if $f \circ g^n = g \circ f^m$. For example, $f$ is a polymorphism of $g(x,y) = x \oplus y$ if $f(x \oplus y) = f(x) \oplus f(y)$. Dokow and Holzman determined all polymorphisms of $g$ for arbitrary $g$.

What happens if $f$ only satisfies $f \circ g^n = g \circ f^m$ for most inputs? Extending earlier work on the case $g = \mathsf{AND}$, we show that in most cases, $f$ must be close to an exact polymorphism. When $g = \mathsf{NAND}$ or $g = \mathsf{NOR}$, we show that $f$ must be close to $\mathsf{AND}$ or $\mathsf{OR}$ (respectively).

We also discuss the list-decoding regime, showing that for each $g \neq \mathsf{XOR},\mathsf{NXOR}$ there is a constant $s_g < 1$ such that if $f \circ g^n = g \circ f^m$ holds with probability above $s_g$, then $f$ correlates with some low-degree character. When $g = \mathsf{AND}$, we determine the optimal value of $s_g$ to be roughly 0.815.

Yuval Filmus, Guy Kindler, Noam Lifshitz and Dor Minzer, Hypercontractivity on the symmetric group, Forum of Mathematics, Sigma

detailsabstractBibTeX
## BibTeX

arXivjournal

@paper{FKLM24,

author = {Yuval Filmus and Guy Kindler and Noam Lifshitz and Dor Minzer},

title = {Hypercontractivity on the symmetric group},

journal = {Forum of Mathematics, Sigma},

pages ={e6},

doi = {10.1017/fms.2023.118},

year = {2024}

}

copy to clipboard
author = {Yuval Filmus and Guy Kindler and Noam Lifshitz and Dor Minzer},

title = {Hypercontractivity on the symmetric group},

journal = {Forum of Mathematics, Sigma},

pages ={e6},

doi = {10.1017/fms.2023.118},

year = {2024}

}

Hypercontractivity is the secret sauce in Boolean function analysis. Yet it many domains, hypercontractivity is useless for general functions. In recent work, Keevash, Lifshitz, Long and Mintzer showed that in such cases, hypercontractivity does hold for *global* functions, which are functions whose expectation doesn’t change significantly when restricting to subdomains of small codimension.

In this work, we extend this theory to functions on the symmetric group. As applications, we bound the size of global, product-free sets in the alternative group (via a level $k$ inequality), and prove a robust version of Kruskal–Katona.

Neta Dafni, Yuval Filmus, Noam Lifshitz, Nathan Lindzey and Marc Vinyals, Complexity measures on symmetric group and beyond, ITCS 2021

detailsabstractBibTeX
## BibTeX

arXivconferencetalks

@inproceedings{DFLLV2021,

author = {Neta Dafni and Yuval Filmus and Noam Lifshitz and Nathan Lindzey and Marc Vinyals},

title = {Complexity measures on symmetric group and beyond},

booktitle = {12th Innovations in Theoretical Computer Science Conference (ITCS 2021)},

year = {2021}}

copy to clipboard
author = {Neta Dafni and Yuval Filmus and Noam Lifshitz and Nathan Lindzey and Marc Vinyals},

title = {Complexity measures on symmetric group and beyond},

booktitle = {12th Innovations in Theoretical Computer Science Conference (ITCS 2021)},

year = {2021}}

We extend the theory of complexity measures of functions beyond the Boolean cube, to domains such as the symmetric group. We show that complexity measures such as degree, approximate degree, decision tree complexity, certificate complexity, block sensitivity and sensitivity are all polynomially related for many of these domains.

In addition, we characterize Boolean degree 1 functions on the perfect matching scheme, and simplify the proof of uniqueness for $t$-intersecting families of permutations and perfect matchings.

Irit Dinur, Yuval Filmus and Prahladh Harsha, Low degree almost Boolean functions are sparse juntas, Preliminary version in SODA'19

detailsabstractBibTeX
## BibTeX

arXiveccc

@inproceedings{DFH2019,

author = {Irit Dinur and Yuval Filmus and Prahladh Harsha},

title = {Analyzing boolean functions on the biased hypercube via higher-dimensional agreement tests},

booktitle = {ACM-SIAM Symposium on Discrete Algorithms (SODA19)},

year = {2019}

}

@misc{DFH2020+,

author = {Irit Dinur and Yuval Filmus and Prahladh Harsha},

title = {Low degree almost {B}oolean functions are sparse juntas},

year = {2020+}

}

copy to clipboard
author = {Irit Dinur and Yuval Filmus and Prahladh Harsha},

title = {Analyzing boolean functions on the biased hypercube via higher-dimensional agreement tests},

booktitle = {ACM-SIAM Symposium on Discrete Algorithms (SODA19)},

year = {2019}

}

@misc{DFH2020+,

author = {Irit Dinur and Yuval Filmus and Prahladh Harsha},

title = {Low degree almost {B}oolean functions are sparse juntas},

year = {2020+}

}

The Kindler–Safra theorem states that a constant degree almost Boolean function on $\{0,1\}^n$ is close to a junta. The theorem holds with respect to the $\mu_p$ measure whenever $p$ is bounded away from 0 and 1. When $p$ is very small, new phenomena emerge. For example, the sum of $\epsilon/p$ coordinates is $O(\epsilon^2)$-close to Boolean, yet is not close to a junta. My paper Friedgut–Kalai–Naor theorem for slices of the Boolean cube shows that this is essentially the only example in degree 1.

In this paper we generalize the Kindler–Safra theorem to the small $p$ regime. We show that a constant degree almost Boolean function is close to a constant degree *sparse junta*, a sparse polynomial having the property that on a random input, with high probability only a constant number of monomials are non-zero. As an application, we prove a large deviation bound, and show that constant degree Boolean functions are almost constant (though sparse juntas approximate them even better). Finally, we use our ideas to provide a new proof of the classical Kindler–Safra theorem.

A preliminary version of this work appeared in SODA’19. Unfortunately, that version relied on an agreement theorem whose proof contains a mistake (since corrected). The current version no longer relies on that agreement theorem. Instead, it employs a self-contained junta agreement theorem, following a suggestion of Dor Minzer.

This version is superseded by this new version.

Yuval Filmus, Noam Lifshitz, Dor Minzer and Elchanan Mossel, AND testing and robust judgement aggregation, STOC 2020

detailsabstractBibTeX
## BibTeX

arXivtalksvideoslidessimplified version

@inproceedings{FLMM2020,

author = {Yuval Filmus and Noam Lifshitz and Dor Minzer and Elchanan Mossel},

title = {{AND} testing and robust judgement aggregation},

booktitle = {52nd ACM Symposium on Theory of Computing (STOC'20)},

year = {2020}

}

copy to clipboard
author = {Yuval Filmus and Noam Lifshitz and Dor Minzer and Elchanan Mossel},

title = {{AND} testing and robust judgement aggregation},

booktitle = {52nd ACM Symposium on Theory of Computing (STOC'20)},

year = {2020}

}

If an $n$-bit Boolean function $f$ satisfies $f(x \land y) = f(x) \land f(y)$ then it is either constant or an AND. Nehama showed that if this equation holds most of the time, then $f$ is close to a constant or an AND. However, his bounds deteriorate with $n$.

We give a bound which is independent of $n$. This can be seen as a one-sided version of linearity testing, that should perhaps be called *oligarchy testing*.

Yuval Filmus and Ferdinand Ihringer, Boolean constant degree functions on the slice are juntas, Discrete Mathematics

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{FI2019b,

author = {Yuval Filmus and Ferdinand Ihringer},

title = {Boolean constant degree functions on the slice are juntas},

journal = {Discrete Mathematics},

volume = {342},

number = {12},

pages = {111614},

year = {2019}

}

copy to clipboard
author = {Yuval Filmus and Ferdinand Ihringer},

title = {Boolean constant degree functions on the slice are juntas},

journal = {Discrete Mathematics},

volume = {342},

number = {12},

pages = {111614},

year = {2019}

}

A classical result of Nisan and Szegedy states that a Boolean degree $d$ function is a junta depending on at most $d2^{d-1}$ coordinates. We extend this result to the slice.

Yuval Filmus, FKN theorem for the multislice, with applications, CPC

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{Filmus2020,

author = {Yuval Filmus},

title = {{FKN} theorem for the multislice, with applications},

journal = {Combinatorics, Probability and Counting},

volume = {29},

number = {2},

year = {2020},

pages = {200--212}

}

copy to clipboard
author = {Yuval Filmus},

title = {{FKN} theorem for the multislice, with applications},

journal = {Combinatorics, Probability and Counting},

volume = {29},

number = {2},

year = {2020},

pages = {200--212}

}

The multislice is a generalization of the slice to several colors.

We prove a Friedgut–Kalai–Naor theorem for balanced multislices. Our proof is inductive, and uses as a base case our Friedgut–Kalai–Naor theorem for balanced slices.

As an application, we prove stability versions of the edge-isoperimetric inequality for the multislices for settings of parameters in which the optimal set depends on a single coordinate.

Yuval Filmus, Lianna Hambardzumyan, Hamed Hatami, Pooya Hatami and David Zuckerman, Biasing Boolean functions and collective coin-flipping protocols over arbitrary product distributions, ICALP 2019

detailsabstractBibTeX
## BibTeX

arXivecccconference

@inproceedings{FHHHZ2019,

author = {Yuval Filmus and Lianna Hambardzumyan and Hamed Hatami and Pooya Hatami and David Zuckerman},

title = {Biasing {B}oolean Functions and Collective Coin-Flipping Protocols over Arbitrary Product Distributions},

booktitle = {46th International Colloquium on Automata, Languages and Programming (ICALP'19)},

year = {2019}

}

copy to clipboard
author = {Yuval Filmus and Lianna Hambardzumyan and Hamed Hatami and Pooya Hatami and David Zuckerman},

title = {Biasing {B}oolean Functions and Collective Coin-Flipping Protocols over Arbitrary Product Distributions},

booktitle = {46th International Colloquium on Automata, Languages and Programming (ICALP'19)},

year = {2019}

}

The KKL theorem shows that every Boolean function can be biased by a coalition of $o(n)$ players. Russel, Saks and Zuckerman extended this result to multiround protocols having $o(\log^*n)$ rounds.

We extend both results to *arbitrary* product distributions on the Boolean hypercube.

The KKL theorem fails for highly biased coordinates. Indeed, such distributions exhibit qualitatively different behavior. Whether unbiased functions can be biased both ways with respect to the uniform distribution, the same doesn’t hold for highly biased distributions (for example, consider the OR function with respect to $\mu_p$ for $p=1/n$). This especially complicated the inductive step in the multiround setting. Our proof uses a novel boosting argument to overcome this difficulty.

Irit Dinur, Yotam Dikstein, Yuval Filmus and Prahladh Harsha, Boolean function analysis on high-dimensional expanders, RANDOM'18; Combinatorica

detailsabstractBibTeX
## BibTeX

arXivecccvideo (Max Hopkins)

@inproceedings{DDFH2018,

author = {Yotam Dikstein and Irit Dinur and Yuval Filmus and Prahladh Harsha},

title = {Boolean function analysis on high-dimensional expanders},

booktitle = {22nd International Conference on Randomization and Computation (RANDOM'2018)},

year = {2018}

}

@article{DDFH2023+,

author = {Yotam Dikstein and Irit Dinur and Yuval Filmus and Prahladh Harsha},

title = {Boolean function analysis on high-dimensional expanders},

journal = {Combinatorica},

year = {2023+}

}

copy to clipboard
author = {Yotam Dikstein and Irit Dinur and Yuval Filmus and Prahladh Harsha},

title = {Boolean function analysis on high-dimensional expanders},

booktitle = {22nd International Conference on Randomization and Computation (RANDOM'2018)},

year = {2018}

}

@article{DDFH2023+,

author = {Yotam Dikstein and Irit Dinur and Yuval Filmus and Prahladh Harsha},

title = {Boolean function analysis on high-dimensional expanders},

journal = {Combinatorica},

year = {2023+}

}

We initiate the study of Boolean function analysis on high-dimensional expanders, and more generally, on weighted simplicial complexes.

We identify a linear-algebraic condition under which there is a notion of *Fourier expansion* for functions on the facets of the complex, a notion similar to the unique harmonic multilinear expansion for functions on the *slice* or *Johnson scheme*, and sharing many of its properties.

We prove a rudimentary FKN theorem for high-dimensional expanders, utilizing a recent agreement theorem of Dinur and Kaufman.

Our work also gives a novel definition of high-dimensional expansion. We also generalize this notion (work in progress) to the Grassmann scheme.

Yuval Filmus and Elchanan Mossel, Harmonicity and invariance on slices of the Boolean cube, CCC 2016, PTRF

detailsabstractBibTeX
## BibTeX

arXivjournal

@inproceedings{FM2016,

author = {Yuval Filmus and Elchanan Mossel},

title = {Harmonicity and invariance on slices of the {B}oolean cube},

booktitle = {31st Computational Complexity Conference},

year = {2016}

}

@article{FM2019,

author = {Yuval Filmus and Elchanan Mossel},

title = {Harmonicity and invariance on slices of the {B}oolean cube},

journal = {Probability Theory and Related Fields},

volume = {175},

number = {3--4},

pages = {721--782},

year = {2019}

}

copy to clipboard
author = {Yuval Filmus and Elchanan Mossel},

title = {Harmonicity and invariance on slices of the {B}oolean cube},

booktitle = {31st Computational Complexity Conference},

year = {2016}

}

@article{FM2019,

author = {Yuval Filmus and Elchanan Mossel},

title = {Harmonicity and invariance on slices of the {B}oolean cube},

journal = {Probability Theory and Related Fields},

volume = {175},

number = {3--4},

pages = {721--782},

year = {2019}

}

The classical invariance principle of Mossel, O’Donnell and Oleszkiewicz states that the distribution of low-degree, low-influence multilinear polynomials under a product distrribution essentially depends only on the first two moments of this distribution.

In recent work with Kindler and Wimmer, we extended this to harmonic multilinear polynomials on the slice. In that work we proved invariance with respect to the following three distributions: the uniform distribution on a slice, the matching skewed distribution on the Boolean cube, and the corresponding Gaussian slice (or Gaussian space; the distributions are the same). That invariance principle requires the function to have low degree and low influences.

While the condition of low influences is necessary when comparing discrete distributions to Gaussian space (consider the polynomial $x_1$), such a condition is no longer necessary when comparing the uniform distribution on a slice to the matching skewed distribution on the Boolean cube. In this paper we prove an invariance principle for these two distributions without any condition on the influences. Using the classical invariance principle, we can easily derive the more general invariance principle that we had proved with Kindler and Wimmer. Our new proof is completely different, and uses a martingale approach.

Complementing the invariance principle, we reprove several properties of harmonic multilinear polynomials. While most of these properties have been proven earlier in my paper using an explicit orthogonal basis for the slice, the proofs appearing in this paper are much simpler and do not require the basis. We hope that the new proofs are easier to generalize to other settings.

Yuval Filmus, Ryan O'Donnell and Xinyu Wu, A log-Sobolev inequality for the multislice, with applications, ITCS 2019, Electronic Journal of Probability

detailsabstractBibTeX
## BibTeX

arXivjournal

@inproceedings{FOW2019,

author = {Yuval Filmus and Ryan O'Donnell and Xinyu Wu},

title = {A log-{S}obolev inequality for the multislice, with applications},

booktitle = {Proceedings of the 10th Innovations in Theoretical Computer Science conference (ITCS'19)},

year = {2019}

}

@ARTICLE{FiODWu2022,

AUTHOR = {Yuval Filmus and Ryan O'Donnell and Xinyu Wu},

TITLE = {Log-{S}obolev inequality for the multislice, with applications},

JOURNAL = {Electron. J. Probab.},

FJOURNAL = {Electronic Journal of Probability},

YEAR = {2022},

VOLUME = {27},

PNO = {33},

PAGES = {1-30},

ISSN = {1083-6489},

DOI = {10.1214/22-EJP749},

SICI = {1083-6489(2022)27:33<1:LSIFTM>2.0.CO;2-3},

}

copy to clipboard
author = {Yuval Filmus and Ryan O'Donnell and Xinyu Wu},

title = {A log-{S}obolev inequality for the multislice, with applications},

booktitle = {Proceedings of the 10th Innovations in Theoretical Computer Science conference (ITCS'19)},

year = {2019}

}

@ARTICLE{FiODWu2022,

AUTHOR = {Yuval Filmus and Ryan O'Donnell and Xinyu Wu},

TITLE = {Log-{S}obolev inequality for the multislice, with applications},

JOURNAL = {Electron. J. Probab.},

FJOURNAL = {Electronic Journal of Probability},

YEAR = {2022},

VOLUME = {27},

PNO = {33},

PAGES = {1-30},

ISSN = {1083-6489},

DOI = {10.1214/22-EJP749},

SICI = {1083-6489(2022)27:33<1:LSIFTM>2.0.CO;2-3},

}

The *multislice* is a generalization of the slice. Whereas the slice consists of all vectors in $\{0,1\}^n$ of fixed Hamming weight, the multislice consists of all vectors in $[\ell]^n$ of fixed histogram.

The log-Sobolev inequality is a fundamental inequality in Boolean Function Analysis, equivalent to hypercontractivity. Lee and Yau determined (up to a constant factor) the optimal constant in the log-Sobolev inequality for the slice. We give a clear exposition of their argument, and extend it to the multislice.

As applications, we derive versions of the Kahn–Kalai–Linial, Friedgut’s junta, Kruskal–Katona, and Nisan–Szegedy theorems.

Our log-Sobolev inequality is tight only for constant $\ell$. Justin Salez has since proved a tight log-Sobolev inequality for all multislices.

Yuval Filmus and Ferdinand Ihringer, Boolean degree 1 functions on some classical association schemes, JCTA

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{FI2019a,

author = {Yuval Filmus and Ferdinand Ihringer},

title = {Boolean degree 1 functions on some classical association schemes},

journal = {Journal of Combinatorial Theory, Series A},

volume = {162},

pages = {241--270},

year = {2019}

}

copy to clipboard
author = {Yuval Filmus and Ferdinand Ihringer},

title = {Boolean degree 1 functions on some classical association schemes},

journal = {Journal of Combinatorial Theory, Series A},

volume = {162},

pages = {241--270},

year = {2019}

}

An elementary result states that a Boolean degree 1 function on the hypercube is a dictator, and a similar result holds on the slice and on the symmetric group (a non-trivial result due to Ellis, Friedgut and Pilpel).

We explore this question on other domains. Our major result is a characterization of all Boolean degree 1 functions on the Grassmann scheme for $q=2,3,4,5$. A Boolean degree 1 function on these domains is either the indicator of a point, the indicator of a hyperplane, a combination of both, or the complement of one of the previous functions.

Yuval Filmus, Guy Kindler, Elchanan Mossel and Karl Wimmer, Invariance principle on the slice, CCC 2016, TOCT

detailsabstractBibTeX
## BibTeX

arXiv

@inproceedings{FKMW2016,

author = {Yuval Filmus and Guy Kindler and Elchanan Mossel and Karl Wimmer},

title = {Invariance principle on the slice},

booktitle = {31st Computational Complexity Conference},

year = {2016}

}

@article{FKMW2018,

author = {Yuval Filmus and Guy Kindler and Elchanan Mossel and Karl Wimmer},

title = {Invariance principle on the slice},

journal = {ACM Transactions on Computation Theory},

volume = {10},

number = {3},

year = {2018},

pages = {11}

}

copy to clipboard
author = {Yuval Filmus and Guy Kindler and Elchanan Mossel and Karl Wimmer},

title = {Invariance principle on the slice},

booktitle = {31st Computational Complexity Conference},

year = {2016}

}

@article{FKMW2018,

author = {Yuval Filmus and Guy Kindler and Elchanan Mossel and Karl Wimmer},

title = {Invariance principle on the slice},

journal = {ACM Transactions on Computation Theory},

volume = {10},

number = {3},

year = {2018},

pages = {11}

}

The classical invariance principle of Mossel, O’Donnell and Oleszkiewicz states that the distribution of low-degree, low-influence multilinear polynomials under Bernoulli random variables is similar to their distribution under Gaussian random variables with the same expectation and variance.

We prove an invariance principle for functions on the slice (all vectors in the Boolean cube having a fixed Hamming weight). The main difficulty is that the variables are no longer independent.

As corollaries, we prove a version of *majority is stablest*, a *Bourgain tail bound*, and a weak version of the *Kindler–Safra theorem*. The Kindler–Safra theorem implies a stability result for *t*-intersecting families along the lines of Friedgut.

In follow-up work, we improve the invariance principle by removing the condition of low influences (when appropriate).

Yuval Filmus, Friedgut–Kalai–Naor theorem for slices of the Boolean cube, Chicago Journal of Theoretical Computer Science

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{Filmus2016b,

author = {Yuval Filmus},

title = {Friedgut--{K}alai--{N}aor theorem for slices of the {B}oolean cube},

journal = {Chicago Journal of Theoretical Computer Science},

year = {2016},

pages = {14:1--14:17}

}

copy to clipboard
author = {Yuval Filmus},

title = {Friedgut--{K}alai--{N}aor theorem for slices of the {B}oolean cube},

journal = {Chicago Journal of Theoretical Computer Science},

year = {2016},

pages = {14:1--14:17}

}

The Friedgut–Kalai–Naor theorem is a fundamental result in the analysis of Boolean function. It states that if a Boolean function $f$ is close to an affine function, then $f$ is close to an affine *Boolean* function, which must depend on at most one coordinate. We prove an analog of this theorem for slices of the Boolean cube (a slice consists of all vectors having a given Hamming weight). In the small error regime, our theorem shows that $f$ is close to a function depending on at most one coordinate, and in general we show that $f$ or its negation is close to a *maximum* of a small number of coordinates (this corresponds to a union of *stars*, families consisting of all elements containing some fixed element).

See also our later simplified account.

Yuval Filmus, An orthogonal basis for functions over a slice of the Boolean cube, Electronic Journal of Combinatorics

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{Filmus2016a,

author = {Yuval Filmus},

title = {Orthogonal basis for functions over a slice of the

{B}oolean hypercube},

journal = {Electronic Journal of Combinatorics},

volume = {23},

number = {1},

year = {2016},

pages = {P1.23}

}

copy to clipboard
author = {Yuval Filmus},

title = {Orthogonal basis for functions over a slice of the

{B}oolean hypercube},

journal = {Electronic Journal of Combinatorics},

volume = {23},

number = {1},

year = {2016},

pages = {P1.23}

}

The Johnson and Kneser are graphs defined on the $k$-sets of $[n]$, a vertex set known as a *slice of the Boolean cube*. Two sets are connected in the Johnson graph if they have Hamming distance two, and in the Kneser graph if they are disjoint. Both graphs belong to the Bose–Mesner algebra of the Johnson association scheme; this just means that whether an edge connects two sets $S,T$ depends only on $|S \cap T|$.

All graphs belonging to the Bose–Mesner algebra have the same eigenspaces, and these are well-known, arising from certain representations of the symmetric group. The multiplicity of the $k$th eigenspace is rather large, ${n \choose k} – {n \choose k-1}$. As far as we can tell, prior to our work no explicit orthogonal basis for these eigenspace has been exhibited.

We present a simple orthogonal basis for the eigenspaces of the Bose–Mesner algebra of the Johnson association scheme, arising from Young’s orthogonal basis for the symmetric group. Our presentation is completely elementary and makes no mention of the symmetric group.

As an application, we restate Wimmer’s proof of Friedgut’s theorem for the slice. The original proof makes heavy use of computations over the symmetric group. We are able to do these computations directly in the slice using our basis.

**Update:** Qing Xiang and his student Rafael Plaza pointed out that the same basis has been constructed by Murali K. Srinivasan in his paper Symmetric chains, Gelfand–Tsetlin chains, and the Terwilliger algebra of the binary Hamming scheme.

**Another update:** The proof of Theorem 3.1 was clarified according to suggestions of Bruno Loff. See also this writeup for another approach, relying on the work of Murali K. Srinivasan mentioned above.

David Ellis, Yuval Filmus and Ehud Friedgut, Low-degree Boolean functions on $S_n$, with an application to isoperimetry, Forum of Mathematics, Sigma, Volume 5, 2017

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{EFF3,

author = {David Ellis and Yuval Filmus and Ehud Friedgut},

title = {Low-degree {B}oolean functions on {$S_n$}, with an application to isoperimetry},

journal = {Forum of Mathematics, Sigma},

volume = {5},

publisher = {Cambridge University Press},

DOI = {10.1017/fms.2017.24},

year = {2017}

}

copy to clipboard
author = {David Ellis and Yuval Filmus and Ehud Friedgut},

title = {Low-degree {B}oolean functions on {$S_n$}, with an application to isoperimetry},

journal = {Forum of Mathematics, Sigma},

volume = {5},

publisher = {Cambridge University Press},

DOI = {10.1017/fms.2017.24},

year = {2017}

}

We prove that Boolean functions on $S_n$ whose Fourier transform is highly concentrated on irreducible representations indexed by partitions of $n$ whose largest part has size at least $n-t$ are close to being unions of cosets of stabilizers of $t$-tuples. We also obtain an edge-isoperimetric inequality for the transposition graph on $S_n$ which is asymptotically sharp for sets of measure $1/\mathit{poly}(n)$. We then combine both results to obtain a best-possible edge-isoperimetric inequality for sets of size $(n-t)!$ where $n$ is large compared to $t$, confirming a conjecture of Ben-Efraim in these cases.

Yuval Filmus, Hamed Hatami, Nathan Keller and Noam Lifshitz, On the sum of $L_1$ influences of bounded functions, Israel Journal of Mathematics, Volume 214, Issue 1, 2016, pp. 167–192

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{FHKL2016,

author = {Yuval Filmus and Hamed Hatami and Nathan Keller and Noam Lifshitz},

title = {Bounds on the sum of {L1} influences},

journal = {Israel Journal of Matematics},

volume = {214},

number = {1},

year = {2016},

pages = {167--192}

}

copy to clipboard
author = {Yuval Filmus and Hamed Hatami and Nathan Keller and Noam Lifshitz},

title = {Bounds on the sum of {L1} influences},

journal = {Israel Journal of Matematics},

volume = {214},

number = {1},

year = {2016},

pages = {167--192}

}

It is well-known that if $f$ is a Boolean function of degree $d$ then its total influence is bounded by $d$. There are several ways of extending the definition of influence for non-Boolean functions. The usual way is to define the influence of the $i$th variable as the $L_2$ norm of the discrete derivative in direction $i$. Under this definition, the total influence of a *bounded* function (bounded by 1 in magnitude) is still upper-bounded by the degree.

Aaronson and Ambainis asked whether total $L_1$ influence can be bounded polynomially by the degree, and this was answered affirmatively by Bačkurs and Bavarian, who showed an upper bound of $O(d^3)$ for general functions, and $O(d^2)$ for homogeneous functions. We improve their results by giving an upper bound of $d^2$ in the general case and $O(d\log d)$ in the homogenous case. Our proofs are also much simpler. We also give an almost optimal bound for monotone functions, $d/2\pi + o(d)$.

David Ellis, Yuval Filmus and Ehud Friedgut, A stability result for balanced dictatorships in $S_n$, Random Structures and Algorithms, Volume 46, Issue 3, 2015, pp. 494–530

detailsabstractBibTeX
## BibTeX

arXivjournaltalk

@article{EFF2,

author = {David Ellis and Yuval Filmus and Ehud Friedgut},

title = {A stability result for balanced dictatorships in {$S_n$}},

journal = {Random Structures and Algorithms},

volume = {46},

number = {3},

year = {2015},

pages = {494--530}

}

copy to clipboard
author = {David Ellis and Yuval Filmus and Ehud Friedgut},

title = {A stability result for balanced dictatorships in {$S_n$}},

journal = {Random Structures and Algorithms},

volume = {46},

number = {3},

year = {2015},

pages = {494--530}

}

We prove that a balanced Boolean function on $S_n$ whose Fourier transform is highly concentrated on the first two irreducible representations of $S_n$ is close in structure to a dictatorship, a function which is determined by the image or pre-image of a single element. As a corollary, we obtain a stability result concerning extremal isoperimetric sets in the Cayley graph on $S_n$ generated by the transpositions.

Our proof works in the case where the expectation of the function is bounded away from 0 and 1. In contrast, the preceding paper deals with Boolean functions of expectation $O(1/n)$ whose Fourier transform is highly concentrated on the first two irreducible representations of $S_n$. These need not be close to dictatorships; rather, they must be close to a union of a constant number of cosets of point-stabilizers.

David Ellis, Yuval Filmus and Ehud Friedgut, A quasi-stability result for dictatorships in $S_n$, Combinatorica, Volume 35, Issue 5, 2015, pages 573–618

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{EFF1,

author = {David Ellis and Yuval Filmus and Ehud Friedgut},

title = {A quasi-stability result for dictatorships in {$S_n$}},

journal = {Combinatorica},

volume = {35},

number = {5},

pages = {573--618},

year = {2015}

}

copy to clipboard
author = {David Ellis and Yuval Filmus and Ehud Friedgut},

title = {A quasi-stability result for dictatorships in {$S_n$}},

journal = {Combinatorica},

volume = {35},

number = {5},

pages = {573--618},

year = {2015}

}

We prove that Boolean functions on $S_n$ whose Fourier transform is highly concentrated on the first two irreducible representations of $S_n$ are close to being unions of cosets of point-stabilizers. We use this to give a natural proof of a stability result on intersecting families of permutations, originally conjectured by Cameron and Ku, and first proved by David Ellis. We also use it to prove a ‘quasi-stability’ result for an edge-isoperimetric inequality in the transposition graph on $S_n$, namely that subsets of $S_n$ with small edge-boundary in the transposition graph are close to being unions of cosets of point-stabilizers.

Yuval Filmus, Hamed Hatami, Kaave Hosseini, Esty Kelman, A generalization of the Kelley–Meka theorem to binary systems of linear forms

detailsabstractBibTeX
## BibTeX

arXiv

@misc{FHHK23,

title = {A generalization of the {K}elley--{M}eka theorem to binary systems of linear forms},

author = {Yuval Filmus and Hamed Hatami and Kaave Hosseini and Esty Kelman},

howpublished = {arXiv:2311.12248},

year = {2023}}

copy to clipboard
title = {A generalization of the {K}elley--{M}eka theorem to binary systems of linear forms},

author = {Yuval Filmus and Hamed Hatami and Kaave Hosseini and Esty Kelman},

howpublished = {arXiv:2311.12248},

year = {2023}}

Kelley and Meka recently proved strong bounds on the size of subsets of $\mathbb{Z}_N$ or $\mathbb{F}_q^n$ that do not contain 3-term arithmetic progression. We use their techniques to prove similar bounds for subsets of $\mathbb{F}_q^n$ that do not contain non-degenerate instances of affine binary linear systems whose underlying graph is 2-degenerate.

We show that if a subset of $\mathbb{F}_q^n$ contains an atypical number of instances of an affine binary linear 2-degenerate system, then it has a constant density increment inside an affine subspace of polylogarithmic codimension. We give a counterexample showing that this kind of result does not hold for linear systems whose true complexity exceeds 1.

Using the same techniques, we obtain a counting lemma for sparse quasirandom graphs, improving on the classical result of Chung, Graham, and Wilson (Combinatorica 1989), which is only nontrivial for dense graphs.

Gilad Chase and Yuval Filmus, Generalized polymorphisms, MSc thesis of Gilad Chase

detailsabstractBibTeX
## BibTeX

arXiv

@misc{ChaseFilmus23+,

title = {Generalized polymorphisms},

author = {Gilad Chase and Yuval Filmus},

howpublished = {Online manuscript},

year = {2023+}

}

copy to clipboard
title = {Generalized polymorphisms},

author = {Gilad Chase and Yuval Filmus},

howpublished = {Online manuscript},

year = {2023+}

}

A function $f\colon \{0,1\}^n \to \{0,1\}$ is a *polymorphism* of a predicate $P \subseteq \{0,1\}^m$ if whenever $x^{(1)},\dots,x^{(n)} \in P$, then also $f(x^{(1)},\dots,x^{(n)}) = (f(x^{(1)}_1,\dots,x^{(n)}_1),\dots,f(x^{(1)}_m,\dots,x^{(n)}_m)) \in P$. Predicates and their polymorphisms are classified by Post’s lattice.

A special case of this framework is the *truth-functional setting*, in which $P = \{(x,y) : y = g(x)\}$, for some function $g\colon \{0,1\}^{m-1} \to \{0,1\}$. Stated differently (and switching from $m-1$ to $m$), a function $f$ is a polymorphism of $g$ if for every $n \times m$ array filled with $0,1$ entries, the following two operations always give the same result:

- compute $g$ on each row and apply $f$, in symbols $f \circ g$;
- compute $f$ on each column and apply $g$, in symbols $g \circ f$.

It is known that the only “polymorphic pairs” $f,g$ are ANDs, ORs and XORs. A similar result holds if we allow $f$ to depend on the column, that is, there are $m+1$ many different $f$’s (the extra one appears when first computing $g$ on each row). In symbols, we can express this as $f_0 \circ g = g \circ (f_1,\dots,f_m)$.

In this work, we solve the more general problem in which both $f$ depends on the column and $g$ depends on the row: $f_0 \circ (g_1,\dots,g_n) = g_0 \circ (f_1,\dots,f_m)$. The space of solutions becomes substantially more complicated. To prove the characterization, we think of both sides of the identity as functions from $\{0,1\}^{nm} \to \{0,1\}$, and consider their Fourier expansions, which must coincide.

Yuval Filmus, Edward Hirsch, Sascha Kurz, Ferdinand Ihringer, Artur Riazanov, Alexander Smal, Marc Vinyals, Irreducible subcube partitions, Elec. J. Comb.

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{FHKIRSV23,

title = {Irreducible subcube partitions},

author = {Yuval Filmus and Edward Hirsch and Sascha Kurz and Ferdinand Ihringer and Artur Riazanov and Alexander Smal and Marc Vinyals},

journal = {Elec. J. Comb.},

volume = {30},

number = {3},

pages = {P3.29},

date = {2023}

}

copy to clipboard
title = {Irreducible subcube partitions},

author = {Yuval Filmus and Edward Hirsch and Sascha Kurz and Ferdinand Ihringer and Artur Riazanov and Alexander Smal and Marc Vinyals},

journal = {Elec. J. Comb.},

volume = {30},

number = {3},

pages = {P3.29},

date = {2023}

}

We consider partitions of $\{0,1\}^n$ into subcubes, giving several examples of constructions which are *irreducible* in the sense that no nontrivial subpartition is a partition of a subcube. Our work leaves many interesting questions open.

The work is part of a three paper series. The first part is about partitions of $\mathbb{F}_q^n$ into affine subspaces, and the third part is about relations to proof complexity.

John Bamberg, Yuval Filmus, Ferdinand Ihringer, and Sascha Kurz, Affine vector space partitions, Designs, Codes and Cryptography

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{BFIK23,

title = {Affine vector space partitions},

author = {John Bamberg and Yuval Filmus and Ferdinand Ihringer and Sascha Kurz},

journal = {Designs, Codes and Cryptography},

date = {2023}

}

copy to clipboard
title = {Affine vector space partitions},

author = {John Bamberg and Yuval Filmus and Ferdinand Ihringer and Sascha Kurz},

journal = {Designs, Codes and Cryptography},

date = {2023}

}

We consider partitions of $\mathbb{F}_q^n$ into affine subspaces, giving several examples of constructions which are *irreducible* in the sense that no nontrivial subpartition is a partition of an affine subspace. Our work leaves many interesting questions open.

The work is part of a three paper series. The second part is about partitions of $\{0,1\}^n$ into subcubes, and the third part is about relations to proof complexity.

Gilad Chase, Neta Dafni, Yuval Filmus and Nathan Lindzey, Uniqueness for 2-intersecting families of permutations and perfect matchings, Submitted

detailsabstractBibTeX
## BibTeX

arXiv

@misc{CDFL22,

title = {Uniqueness for 2-Intersecting Families of Permutations and Perfect Matchings},

author = {Gilad Chase and Neta Dafni and Yuval Filmus and Nathan Lindzey},

howpublished = {Manuscript},

year = {2022}

}

copy to clipboard
title = {Uniqueness for 2-Intersecting Families of Permutations and Perfect Matchings},

author = {Gilad Chase and Neta Dafni and Yuval Filmus and Nathan Lindzey},

howpublished = {Manuscript},

year = {2022}

}

We characterize the largest $2$-intersecting families of permutations of $\{1,2,\ldots,n\}$ and of perfect matchings of the complete graph $K_{2n}$ for all $n \geq 2$: the consist, respectively, of all permutations mapping $i_1$ to $j_1$ and $i_2 \neq i_1$ to $j_2 \neq j_1$, and of all perfect matchings containing two fixed edges.

The characterization uses techniques from our work Complexity measures on symmetric group and beyond, and answers open questions in Meagher and Razafimahatratra, 2-intersecting permutations and Fallat, Meagher and Shirazi, The Erdős–Ko–Rado theorem for 2-intersecting families of perfect matchings.

Yuval Filmus and Nathan Lindzey, Simple algebraic proofs of uniqueness for Erdős-Ko-Rado theorems, Manuscript

detailsabstractBibTeX
## BibTeX

arXiv

@misc{FL22,

title = {Simple algebraic proofs of uniqueness for {E}rd{H{o}}s--{K}o--{R}ado theorems},

author = {Yuval Filmus and Nathan Lindzey},

howpublished = {Manuscript},

year = {2022}

}

copy to clipboard
title = {Simple algebraic proofs of uniqueness for {E}rd{H{o}}s--{K}o--{R}ado theorems},

author = {Yuval Filmus and Nathan Lindzey},

howpublished = {Manuscript},

year = {2022}

}

We give simpler algebraic proofs of uniqueness for several Erdős-Ko-Rado results, i.e., that the canonically intersecting families are the only largest intersecting families. Using these techniques, we characterize the largest partially 2-intersecting families of perfect hypermatchings, resolving a recent conjecture of Meagher, Shirazi, and Stevens.

Yuval Filmus and Idan Mehalel, Optimal sets of questions for Twenty Questions, Accepted to SIDMA

detailsabstractBibTeX
## BibTeX

arXiv

@article{FilmusMehalel2023+,

author = {Yuval Filmus and Idan Mehalel},

title = {Optimal sets of questions for {T}wenty {Q}uestions},

journal = {SIAM J. Discrete Math},

year = {2023+}

}

copy to clipboard
author = {Yuval Filmus and Idan Mehalel},

title = {Optimal sets of questions for {T}wenty {Q}uestions},

journal = {SIAM J. Discrete Math},

year = {2023+}

}

In the Twenty Questions game, Bob picks a number $x$ according to a distribution $\mu$, and Alice, who known $\mu$, attempts to find $x$ by asking Bob Yes/No questions, which Bob answers truthfully. Alice’s goal is to minimize the expected number of questions. The optimal strategy for the game is given by a Huffman code.

A set of questions is *optimal* if using only questions from this set, for every $\mu$ there exists a strategy for Alice with the optimal expected number of questions. In previous work, we have shown that for every $n$ there is an optimal set of questions of size roughly $1.25^n$, and moreover, this is optimal for infinitely many $n$ (up to subexponential factors), namely, $n \approx 1.25 \cdot 2^m$.

In this paper, we prove that the optimal number of questions for $n$ of the form $\beta \cdot 2^m$ (where $\beta \in [1,2)$ is $2^{-G(\beta)n}$ (up to subexponential factors), where $G(\beta)$ is an explicit function which is strictly larger than $-\log_2 1.25$ for all $\beta \neq 1.25$.

We also extend the entire setup to $d$-ary questions, showing that the analog of the magic constant $1.25$ in this case is $1 + (d-1)/d^{d/(d-1)}$.

Yuval Filmus, Konstantin Golubev and Noam Lifshitz, High-dimensional Hoffman bound and extremal combinatorics, Alg. Comb.

detailsabstractBibTeX
## BibTeX

arXivjournaltalk

@article{FGL2021,

author = {Yuval Filmus and Konstantin Golubev and Noam Lifshitz},

title = {High dimensional {H}offman bound and applications in extremal combinatorics},

journal = {Algebraic Combinatorics},

volume = {4},

number = {6},

pages = {1005--1026},

year = {2021}

}

copy to clipboard
author = {Yuval Filmus and Konstantin Golubev and Noam Lifshitz},

title = {High dimensional {H}offman bound and applications in extremal combinatorics},

journal = {Algebraic Combinatorics},

volume = {4},

number = {6},

pages = {1005--1026},

year = {2021}

}

We generalize the Hoffman bound to simplicial complexes. We demonstrate our result by giving spectral proofs for Mantel’s theorem and for an optimal bound on $s$-wise intersecting families due to Frankl and Tokushige. As a new application, we give tight bounds on a question of Frankl about hypergraphs without extended triangles.

Yuval Dagan, Yuval Filmus, Daniel Kane and Shay Moran, The entropy of lies: playing twenty questions with a liar, ITCS 2021

detailsabstractBibTeX
## BibTeX

arXivconference

@inproceedings{DFKM2018,

author = {Yuval Dagan and Yuval Filmus Daniel Kane and Shay Moran},

title = {The entropy of lies: playing twenty questions with a liar},

booktitle = {12th Innovations in Theoretical Computer Science Conference (ITCS 2021)},

year = {2021}

}

copy to clipboard
author = {Yuval Dagan and Yuval Filmus Daniel Kane and Shay Moran},

title = {The entropy of lies: playing twenty questions with a liar},

booktitle = {12th Innovations in Theoretical Computer Science Conference (ITCS 2021)},

year = {2021}

}

In the classical twenty questions game, Bob guesses an element from 1 to $n$, and Alice’s goal is to find the element using as few Yes/No questions as possible.

The game becomes more interesting when Bob chooses the element according to a distribution $\mu$ known to both players, and Alice attempts to minimize the expected number of questions. The optimal strategy is given by a Huffman code.

Rényi and Ulam asked what happens when Bob is allowed to lie. Of the several different ways of quantifying lies, we consider the setting in which Bob is allowed to lie at most $k$ times.

Rivest et al. showed that in the setting of the classical twenty questions game, allowing Bob to lie a fixed number of times requires Alice to ask $\log\log n$ additional questions per lie.

We extend the result of Rivest et al. to the distributional setting, in which the penalty is $H_2(\mu)$ per lie, where $H_2(\mu)=\sum_x \mu(x) \log\log (1/\mu(x))$.

As an application, we extend the result of Moran and Yehudayoff about distributional sorting to the setting of lies.

Yuval Filmus, More complete intersection theorems, Disc. Math. vol. 342(10), 128–142, 2019

detailsabstractBibTeX
## BibTeX

journal

@article{Filmus2019,

author = {Yuval Filmus},

title = {More complete intersection theorems},

journal = {Discrete Mathematics},

year = {2019},

month = 1,

volume = {342},

number = {1},

pages = {128--142}

}

copy to clipboard
author = {Yuval Filmus},

title = {More complete intersection theorems},

journal = {Discrete Mathematics},

year = {2019},

month = 1,

volume = {342},

number = {1},

pages = {128--142}

}

We extend the weighted Ahlswede–Khachatrian theorem to several new settings.

First, we extend the theorem to families on infinitely many points, showing that for most settings of the parameters, no new behavior is encountered.

Second, we extend the theorem to the Hamming scheme $\mathbb{Z}_m^n$, in which a family is $t$-intersecting if any two vectors have $t$ coordinates on which the values differ by less than $s$ (this corresponds to $p=s/m$).

Third, we extend the theorem to the continuous analog of the Hamming scheme, a power of the unit circle, in which a family is $t$-intersecting if any two vectors have $t$ coordinates on which the values differ by less than $p$.

Yuval Dagan, Yuval Filmus, Ariel Gabizon and Shay Moran, Twenty (short) questions, Combinatorica

detailsabstractBibTeX
## BibTeX

journal

@article{DFGM2019,

author = {Yuval Dagan and Yuval Filmus and Ariel Gabizon and Shay Moran},

title = {Twenty (short) questions},

journal = {Combinatorica},

volume = {39},

number = {3},

pages = {597--626},

year = {2019}

}

copy to clipboard
author = {Yuval Dagan and Yuval Filmus and Ariel Gabizon and Shay Moran},

title = {Twenty (short) questions},

journal = {Combinatorica},

volume = {39},

number = {3},

pages = {597--626},

year = {2019}

}

A *dyadic* distribution is one in which all probabilities are negative powers of 2. If $\mu$ is a dyadic distribution on a finite domain, then Huffman’s algorithm produces a code whose average codeword length is $H(\mu)$. We can interpret this code as a decision tree.

A dyadic distribution can have many different optimal decision trees. We are interested in the following question: given $n$, what is the smallest list of queries that suffices to implement optimal decision trees for *all* dyadic distributions on $n$ elements?

We show that $1.25^{n+o(1)}$ queries suffice, and moreover, $1.25^{n-o(1)}$ queries are necessary for infinitely many $n$.

We also discuss how the number of queries scales as we allow slight deviations from optimality.

This paper is extracted from a longer STOC paper.

Stijn Cambie, Bogdan Chronomaz, Zeev Dvir, Yuval Filmus and Shay Moran, A Sauer–Shelah–Perles lemma for lattices, Electronic Journal of Combinatorics

detailsabstractBibTeX
## BibTeX

arXivjournaltalk

@article{CCDFM2020,

author = {Stijn Cambie and Bogdan Chornomaz and Zeev Dvir and Yuval Filmus and Shay Moran},

title = {A {S}auer--{S}helah--{P}erles Lemma for Lattices},

journal = {Electronic Journal of Combinatorics},

volume = {27},

number = {4},

pages = {P4.19},

year = {2020}

}

copy to clipboard
author = {Stijn Cambie and Bogdan Chornomaz and Zeev Dvir and Yuval Filmus and Shay Moran},

title = {A {S}auer--{S}helah--{P}erles Lemma for Lattices},

journal = {Electronic Journal of Combinatorics},

volume = {27},

number = {4},

pages = {P4.19},

year = {2020}

}

We extend the classical Sauer–Shelah–Perles lemma to lattices, using an argument which also appears in an unpublished monograph of Babai and Frankl on the linear algebra method in combinatorics.

The basic argument works only for lattices with nonvanishing Möbius function, but we are able to extend it to a slightly wider class of lattices.

The Sauer–Shelah–Perles lemma (in the strong form due to Pajor) fails for lattices with an induced copy of the lattice $0<1<2$. We conjecture that this is the only obstruction.

Yuval Filmus, A comment on Intersecting families of permutations, Manuscript

detailsabstractBibTeX
## BibTeX

arXiv

@misc{Filmus2017,

author = {Yuval Filmus},

title = {A comment on Intersecting Families of Permutations},

howpublished = {arXiv:1706.10146},

year = {2017}

}

copy to clipboard
author = {Yuval Filmus},

title = {A comment on Intersecting Families of Permutations},

howpublished = {arXiv:1706.10146},

year = {2017}

}

In a groundbreaking paper, Ellis, Friedgut and Pilpel showed that $t$-intersecting families of permutations contain at most $(n-t)!$ permutations, for large enough $n$. They also identified the extremal families: they are all $t$-cosets.

Unfortunately, Section 5 of the paper, which identifies the extremal families, is wrong. Fortunately, the identification follows from a different paper of Ellis, which is already mentioned in the original paper. A different proof follows from our work on complexity measures on the symmetric group.

Yuval Filmus, The weighted complete intersection theorem, JCTA, Volume 151, 2017, pp. 84–101

detailsabstractBibTeX
## BibTeX

arXivjournalfull version

@article{Filmus2017,

author = {Yuval Filmus},

title = {The weighted complete intersection theorem},

journal = {Journal of Combinatorial Theory, Series A},

volume = {151},

pages = {84--101},

year = {2017}

}

copy to clipboard
author = {Yuval Filmus},

title = {The weighted complete intersection theorem},

journal = {Journal of Combinatorial Theory, Series A},

volume = {151},

pages = {84--101},

year = {2017}

}

We provide a complete proof of the Ahlswede–Khachatrian theorem in the $\mu_p$ setting: for all values of $n,t,p$, we determine the maximum $\mu_p$-measure of a $t$-intersecting family on $n$ points, and describe all optimal families (except for a few exceptional parameter settings). Our proof is based on several different articles of Ahlswede and Khachatrian.

The full version below includes more details, as well as some follow-up work.

Yuval Dagan, Yuval Filmus and Shay Moran, Comparison and equality queries achieve optimal redundancy, Manuscript

Suppose that an element $x$ is sampled according to a known distribution $\mu$. Gilbert and Moore showed how to find $x$ using $H(\mu)+2$ comparison queries (in expectation).

In contrast, the classical Shannon–Fano code can recover $x$ using only $H(\mu)+1$ queries, but these queries can be arbitrary. Can we recover this result using a more restricted set of queries?

In this paper we show that by allowing equality queries, we can recover the performance of the Shannon–Fano code. We also determine the optimal number of queries needed to guarantee that $x$ can be recovered using $H(\mu)+r$ queries, for arbitrary $r\geq 1$. (Smaller $r$ cannot be achieved in general.)

This manuscript forms the first part of our more extensive STOC paper.

Yuval Dagan, Yuval Filmus and Shay Moran, Asymptotic redundancy and prolixity, Manuscript

Given a distribution $\mu$ and a set of queries $Q$ (for example, all comparison queries), the cost of $Q$ on $\mu$ is the average depth of a decision tree that locates an item in the support of $\mu$ using only queries from $Q$.

The cost of any set of queries on $\mu$ is always at least the entropy $H(\mu)$, and the *redundancy* of $Q$ is the maximal gap between the cost of $Q$ on a distribution and its entropy.

The *prolixity* of a set of queries is defined in the same way, with the entropy replaced by the cost of the optimal *unrestricted* decision tree.

The redundancy and prolixity of a set of queries is often achieved on degenerate distributions which have very low entropy, and this suggests studying their *asymptotic* variants, in which we consider distributions whose min-entropy tends to infinity.

Gallager showed that the asymptotic redundancy of *unrestricted* decision trees is 0.086.

We obtain bounds, and in some case determine, the non-asymptotic and asymptotic redundancy and prolixity of several sets of queries, including comparison queries, comparison and equality queries, and interval queries.

The results in this paper are extracted from the full version of our STOC paper.

Yuval Dagan, Yuval Filmus, Ariel Gabizon and Shay Moran, Twenty (simple) questions, STOC 2017, Invited to HALG 2018

detailsabstractBibTeX
## BibTeX

arXivconferencetalksfull version

@inproceedings{DFGM2017,

author = {Yuval Dagan and Yuval Filmus and Ariel Gabizon and Shay Moran},

title = {Twenty (simple) questions},

booktitle = {49th ACM Symposium on Theory of Computing (STOC 2017)},

year = {2017}

}

copy to clipboard
author = {Yuval Dagan and Yuval Filmus and Ariel Gabizon and Shay Moran},

title = {Twenty (simple) questions},

booktitle = {49th ACM Symposium on Theory of Computing (STOC 2017)},

year = {2017}

}

Given a distribution $\mu$, the goal of the distributional 20 questions game is to construct a strategy that identifies an unknown element drawn from $\mu$ using as little yes/no queries on average. Huffman’s algorithm constructs an optimal strategy, but the questions one has to ask can be arbitrary.

Given a parameter $n$, we ask how large a set of questions $Q$ needs to be so that for each distribution supported on $[n]$ there is a good strategy which uses only questions from $Q$.

Our first major result is that a linear number of questions (corresponding to binary comparison search trees) suffices to recover the $H(\mu)+1$ performance of Huffman’s algorithm. As a corollary, we deduce that the number of questions needed to guarantee a cost of at most $H(\mu)+r$ (for integer $r$) is asymptotic to $rn^{1/r}$.

Our second major result is that (roughly) $1.25^n$ questions are sufficient to match the performance of Huffman’s algorithm exactly, and this is tight for infinitely many $n$.

We also determine the number of questions sufficient to match the performance of Huffman’s algorithm up to $r$ to be $\Theta(n^{\Theta(1/r)})$.

The second part has appeared been published in Combinatorica. We hope to publish the first part at some point at an information theory journal.

The full version incorporates a third part (since relegated to a different paper), in which we show that the set of questions used to obtain the bound $H(\mu)+1$ performs better when the maximal probability of $\mu$ is small, bounding the performance between 0.5011 and 0.58607.

The full version also contains an extensive literature review, as well as many open questions.

See also follow-up work which addresses two of the open questions raised in the paper.

David Ellis, Yuval Filmus and Ehud Friedgut, Triangle-intersecting families of graphs, Journal of the European Mathematical Society, Volume 14, Issue 3, 2012, pp. 841–885

detailsabstractBibTeX
## BibTeX

arXivjournaltalks

@article{EFF2012,

author = {David Ellis and Yuval Filmus and Ehud Friedgut},

title = {Triangle-intersecting families of graphs},

journal = {Journal of the European Mathematical Society},

volume = {14},

number = {3},

year = {2012},

pages = {841--885}

}

copy to clipboard
author = {David Ellis and Yuval Filmus and Ehud Friedgut},

title = {Triangle-intersecting families of graphs},

journal = {Journal of the European Mathematical Society},

volume = {14},

number = {3},

year = {2012},

pages = {841--885}

}

A family of graphs is said to be triangle-intersecting if the intersection of any two graphs in the family contains a triangle. A conjecture of Simonovits and Sós from 1976 states that the largest triangle-intersecting families of graphs on a fixed set of $n$ vertices are those obtained by fixing a specific triangle and taking all graphs containing it, resulting in a family containing 1/8 of all graphs.. We prove this conjecture and some generalizations (for example, we prove that the same is true of odd-cycle-intersecting families, and we obtain best possible bounds on the size of the family under different, not necessarily uniform, measures). We also obtain stability results, showing that almost-largest triangle-intersecting families have approximately the same structure.

The arXiv version corrects a mistake in the proof of the stability part of Corollary 2.3. The original proof assumed that the approximating family $G$ is odd-cycle-agreeing, and deduced that $G$ must be a triangle-junta from uniqueness. However, showing that $G$ is odd-cycle-agreeing requires a separate argument, found in the new version.

An alternative presentation of the results in this paper can be found in my PhD thesis.

Yuval Filmus, The carromboard problem, Manuscript

Snepscheut came up with the following puzzle. There is a table with four coins at the center of the four sides. The goal is to get all of the coins in the same orientation, that is, all heads or all tails. You never get to see the coins (you are blindfolded), but you can turn one or two of them. Prior to each move, the table is rotated by an arbitrary, unknown multiple of 90 degrees. How many moves do you need to reach the goal?

Dĳkstra generalized the solution to $2^n$ sides. We consider an even more general problem, in which the table has $n$ sides, and the coins have $m$ “states” which are modified by addition modulo $m$ (more generally, one could think of a finite Abelian group for the state of the coins). We show that:

- The puzzle is solvable if and only if either $n=1$, $m=1$, or $n$ and $m$ are powers of the same prime.
- When m is prime, we explicitly describe all minimum-length solutions.

For similar results and more, see Rotating-table games and derivatives of words by Bar Yehuda, Etzion and Moran.

Gilad Chase, Yuval Filmus, Dor Minzer, Elchanan Mossel, and Nitin Saurabh, Approximate polymorphisms, STOC 2022

detailsabstractBibTeX
## BibTeX

arXivconference

@inproceedings{CFMMS2022,

author = {Gilad Chase and Yuval Filmus and Dor Minzer and Elchanan Mossel and Nitin Saurabh},

title = {Approximate polymorphisms},

booktitle = {STOC'22},

year = {2022}

}

copy to clipboard
author = {Gilad Chase and Yuval Filmus and Dor Minzer and Elchanan Mossel and Nitin Saurabh},

title = {Approximate polymorphisms},

booktitle = {STOC'22},

year = {2022}

}

A function $f\colon \{0,1\}^n \to \{0,1\}$ is a polymorphism of $g\colon \{0,1\}^m \to \{0,1\}$ if $f \circ g^n = g \circ f^m$. For example, $f$ is a polymorphism of $g(x,y) = x \oplus y$ if $f(x \oplus y) = f(x) \oplus f(y)$. Dokow and Holzman determined all polymorphisms of $g$ for arbitrary $g$.

What happens if $f$ only satisfies $f \circ g^n = g \circ f^m$ for most inputs? Extending earlier work on the case $g = \mathsf{AND}$, we show that in most cases, $f$ must be close to an exact polymorphism. When $g = \mathsf{NAND}$ or $g = \mathsf{NOR}$, we show that $f$ must be close to $\mathsf{AND}$ or $\mathsf{OR}$ (respectively).

We also discuss the list-decoding regime, showing that for each $g \neq \mathsf{XOR},\mathsf{NXOR}$ there is a constant $s_g < 1$ such that if $f \circ g^n = g \circ f^m$ holds with probability above $s_g$, then $f$ correlates with some low-degree character. When $g = \mathsf{AND}$, we determine the optimal value of $s_g$ to be roughly 0.815.

Yuval Filmus, Noam Lifshitz, Dor Minzer and Elchanan Mossel, AND testing and robust judgement aggregation, STOC 2020

detailsabstractBibTeX
## BibTeX

arXivtalksvideoslidessimplified version

@inproceedings{FLMM2020,

author = {Yuval Filmus and Noam Lifshitz and Dor Minzer and Elchanan Mossel},

title = {{AND} testing and robust judgement aggregation},

booktitle = {52nd ACM Symposium on Theory of Computing (STOC'20)},

year = {2020}

}

copy to clipboard
author = {Yuval Filmus and Noam Lifshitz and Dor Minzer and Elchanan Mossel},

title = {{AND} testing and robust judgement aggregation},

booktitle = {52nd ACM Symposium on Theory of Computing (STOC'20)},

year = {2020}

}

If an $n$-bit Boolean function $f$ satisfies $f(x \land y) = f(x) \land f(y)$ then it is either constant or an AND. Nehama showed that if this equation holds most of the time, then $f$ is close to a constant or an AND. However, his bounds deteriorate with $n$.

We give a bound which is independent of $n$. This can be seen as a one-sided version of linearity testing, that should perhaps be called *oligarchy testing*.

Irit Dinur, Yuval Filmus and Prahladh Harsha, Agreement tests on graphs and hypergraphs, Preliminary version in SODA'19

detailsabstractBibTeX
## BibTeX

arXivecccconference

@misc{DFH2020+,

author = {Irit Dinur and Yuval Filmus and Prahladh Harsha},

title = {Agreement tests on graphs and hypergraphs},

year = {2020+},

}

@inproceedings{DFH2019,

author = {Irit Dinur and Yuval Filmus and Prahladh Harsha},

title = {Analyzing boolean functions on the biased hypercube via higher-dimensional agreement tests},

booktitle = {ACM-SIAM Symposium on Discrete Algorithms (SODA19)},

year = {2019}

}

copy to clipboard
author = {Irit Dinur and Yuval Filmus and Prahladh Harsha},

title = {Agreement tests on graphs and hypergraphs},

year = {2020+},

}

@inproceedings{DFH2019,

author = {Irit Dinur and Yuval Filmus and Prahladh Harsha},

title = {Analyzing boolean functions on the biased hypercube via higher-dimensional agreement tests},

booktitle = {ACM-SIAM Symposium on Discrete Algorithms (SODA19)},

year = {2019}

}

In the classical agreement test, we are given a black box which accepts a subset $S$ of $\{1,\ldots,n\}$ of size $k$, and outputs a binary vector of length $k$. The task is to determine whether the answers of the black box correspond to a global binary vector of length $n$. Dinur and Steurer showed that this property can be tested by picking two sets $S_1,S_2$ with intersection $k/2$, and comparing the answers of the black box on their intersection.

In this paper we generalize the results of Dinur and Steurer to the high-dimensional case, in which the black box outputs a bit for any $d$-tuple of coordinates, and the task is to determine whether the answers of the black box correspond to a 2-coloring of the complete $d$-uniform hypergraph on $n$ vertices. We show that for any constant $d$, the test proposed by Dinur and Steurer generalizes to this setting as well.

At the heart of our proof is a new hypergraph pruning lemma of independent interest. The lemma states that given a probability $p$, any $d$-uniform hypergraph $H$ can be pruned to a subhypergraph $H’$ such that $q_{=1}(H’)=\Omega(q_{>0}(G))$, where $q_{=1}(H’)$ is the probability that the subhypergraph of $H’$ induced by a random subset of the vertices chosen according to $\mu_p$ contains exactly one hyperedge, and $q_{>0}(H)$ is defined analogously. Crucially, the hidden constant depends on $d$ but not on $p$.

In the companion work Low degree almost Boolean functions are sparse juntas, we apply the new agreement test to prove a Kindler–Safra theorem for the biased Boolean cube. The merged version of both papers also contains another application: a generalization of the low degree test for the biased Boolean cube.

**The conference version contains a mistake, which we have since corrected.**

Andrej Bogdanov, Krishnamoorthy Dinesh, Yuval Filmus, Yuval Ishai, Avi Kaplan, Sruthi Sekar, Bounded simultaneous messages, FSTTCS 2023

detailsabstractBibTeX
## BibTeX

arXivconference

@inproceedings{BDFIKS23,

title = {Bounded simultaneous messages},

author = {Andrej Bogdanov and Krishnamoorthy Dinesh and Yuval Filmus and Yuval Ishai and Avi Kaplan and Sruthi Sekar},

booktitle = {FSTTCS'23},

year = {2023},

pages = {23:1--23:17},

doi = {10.4230/LIPIcs.FSTTCS.2023.23}

}

copy to clipboard
title = {Bounded simultaneous messages},

author = {Andrej Bogdanov and Krishnamoorthy Dinesh and Yuval Filmus and Yuval Ishai and Avi Kaplan and Sruthi Sekar},

booktitle = {FSTTCS'23},

year = {2023},

pages = {23:1--23:17},

doi = {10.4230/LIPIcs.FSTTCS.2023.23}

}

We consider the following question of bounded simultaneous messages (BSM) protocols: Can computationally unbounded Alice and Bob evaluate a function $f(x,y)$ of their inputs by sending polynomial-size messages to a computationally bounded Carol? The special case where $f$ is the mod-2 inner-product function and Carol is bounded to $\mathsf{AC}^0$ has been studied in previous works. The general question can be broadly motivated by applications in which distributed computation is more costly than local computation, including secure two-party computation.

In this work, we initiate a more systematic study of the BSM model, with different functions $f$ and computational bounds on Carol. In particular, we give evidence against the existence of BSM protocols with polynomial-size Carol for naturally distributed variants of NP-complete languages.

Yuval Filmus, Itai Leigh, Artur Riazanov, and Dmitry Sokolov, Sampling and certifying symmetric functions, RANDOM 2023

detailsabstractBibTeX
## BibTeX

arXivecccconferenceexposition (sampling)exposition (certifying)

@InProceedings{FLRS23,

author = {Filmus, Yuval and Leigh, Itai and Riazanov, Artur and Sokolov, Dmitry},

title = {Sampling and Certifying Symmetric Functions},

booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2023)},

pages = {36:1--36:21},

series = {Leibniz International Proceedings in Informatics (LIPIcs)},

ISBN = {978-3-95977-296-9},

ISSN = {1868-8969},

year = {2023},

volume = {275},

editor = {Megow, Nicole and Smith, Adam},

publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},

address = {Dagstuhl, Germany},

URL = {https://drops.dagstuhl.de/opus/volltexte/2023/18861},

URN = {urn:nbn:de:0030-drops-188611},

doi = {10.4230/LIPIcs.APPROX/RANDOM.2023.36},

annote = {Keywords: sampling, lower bounds, robust sunflowers, decision trees, switching networks}

}

copy to clipboard
author = {Filmus, Yuval and Leigh, Itai and Riazanov, Artur and Sokolov, Dmitry},

title = {Sampling and Certifying Symmetric Functions},

booktitle = {Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX/RANDOM 2023)},

pages = {36:1--36:21},

series = {Leibniz International Proceedings in Informatics (LIPIcs)},

ISBN = {978-3-95977-296-9},

ISSN = {1868-8969},

year = {2023},

volume = {275},

editor = {Megow, Nicole and Smith, Adam},

publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},

address = {Dagstuhl, Germany},

URL = {https://drops.dagstuhl.de/opus/volltexte/2023/18861},

URN = {urn:nbn:de:0030-drops-188611},

doi = {10.4230/LIPIcs.APPROX/RANDOM.2023.36},

annote = {Keywords: sampling, lower bounds, robust sunflowers, decision trees, switching networks}

}

Viola considered the complexity of (approximately) sampling from a given distribution. We consider the uniform distribution over vectors in $\{0,1\}^n$ of weight $k$. We show that when $k$ is constant, any approximate sampler must have locality $\tilde\Omega(\log n)$, almost matching the upper bound $O(\log n)$.

Beyersdorff et al. considered the complexity of generating from a given set. One natural example is the set of vectors in $\{0,1\}^n$ with a majority of ones. They gave a “proof system” with locality $O(\log^2 n)$, and proved a lower bound of $\Omega(\log^* n)$. We improve the lower bound to $\Omega(\sqrt{\log n})$.

Andrej Bogdanov, K. Dinesh, Yuval Filmus, Yuval Ishai, Avi Kaplan, and Akshay Srinivasan, Bounded indistinguishability for simple sources, ITCS 2022

detailsabstractBibTeX
## BibTeX

ecccconference

@inproceedings{BDFIKS22,

author = {Andrej Bogdanov and Krishnamoorthy Dinesh and Yuval Filmus and Yuval Ishai and Avi Kaplan and Akshayaram Srinivasan},

title = {Bounded indistinguishability for simple sources},

booktitle = {13th Innovations in Theoretical Computer Science (ITCS 2022)},

year = {2022}

}

copy to clipboard
author = {Andrej Bogdanov and Krishnamoorthy Dinesh and Yuval Filmus and Yuval Ishai and Avi Kaplan and Akshayaram Srinivasan},

title = {Bounded indistinguishability for simple sources},

booktitle = {13th Innovations in Theoretical Computer Science (ITCS 2022)},

year = {2022}

}

Braverman’s celebrated theorem states that $\mathsf{polylog}(n)$-independent sources fool $\mathsf{AC^0}$. In contrast, since the approximate degree of $\mathsf{OR}$ is $\Theta(\sqrt{n})$, we can construct $\Theta(\sqrt{n})$-indistinguishable sources which can be told apart by $\mathsf{OR}$.

In this work, we attempt to bridge this gap by considering what happens when the $k$-indistinguishable sources are *simple*: have low degree over $\mathbb{F}_2$, or can be sampled in low depth.

Our main positive result constructs $\Theta(\sqrt{n})$-indistinguishable sources distinguishable by $\mathsf{OR}$ which are samplable (a) by polynomial size decision tree (and so by DNFs/CNFs), and (b) by polynomials of degree $O(\log n)$.

In contrast, we show that $O(1)$-indistinguishable sources of constant degree do fool $\mathsf{OR}$, and $O(\log^{10}(n/\epsilon))$-indistinguishable quadratic sources $\epsilon$-fool unambiguous DNFs, *even if only one of the two sources is simple*. We also show that $O(\log\log(n/\epsilon))$-indistinguishable depth 1 sources are $\epsilon$-close in statistical distance.

Yuval Filmus, Or Meir and Avishay Tal, Shrinkage under random projections and cubic formula lower bounds for AC^0, ITCS 2021, Theory of Computing

detailsabstractBibTeX
## BibTeX

arXivecccconference

@inproceedings{FMT2021,

title = {Shrinkage under random projections and cubic formula lower bounds for {$mathit{AC}^0$}},

author = {Yuval Filmus and Or Meir and Avishay Tal},

booktitle = {12th Innovations in Theoretical Computer Science Conference (ITCS 2021)},

year = {2021},

doi = {10.4230/LIPIcs.ITCS.2021.89}}

@article{FMT2023,

title = {Shrinkage under random projections, and cubic formula lower bounds for {$mathit{AC}^0$}},

author = {Yuval Filmus and Or Meir and Avishay Tal},

journal = {Theory of Computing},

volume = {19},

pages = {7:1--7:51},

year = {2023},

doi = {10.4086/toc.2023.v019a007}}

copy to clipboard
title = {Shrinkage under random projections and cubic formula lower bounds for {$mathit{AC}^0$}},

author = {Yuval Filmus and Or Meir and Avishay Tal},

booktitle = {12th Innovations in Theoretical Computer Science Conference (ITCS 2021)},

year = {2021},

doi = {10.4230/LIPIcs.ITCS.2021.89}}

@article{FMT2023,

title = {Shrinkage under random projections, and cubic formula lower bounds for {$mathit{AC}^0$}},

author = {Yuval Filmus and Or Meir and Avishay Tal},

journal = {Theory of Computing},

volume = {19},

pages = {7:1--7:51},

year = {2023},

doi = {10.4086/toc.2023.v019a007}}

Lower bounds on concrete functions are very hard to prove. The best known lower bound on the circuit complexity of *any* concrete function is only linear. In contrast, we have a nearly cubic bound on the formula complexity of a concrete function, namely Andreev’s function. This lower bound is proved via shrinkage, and was first obtained in this strong form by Håstad. Later on, Avishay Tal reproved the result using different techniques, shaving some lower order factors.

Shrinkage is the phenomenon in which a de Morgan formula shrinks by a factor of $O(p^2)$ (in expectation and with high probability) when subjected to a random restriction which leaves only a $p$-fraction of its values alive. In this regard, shrinkage is similar to the switching lemma, which is about simplification of DNFs and CNFs. However, in contrast to the switching lemma, which is known to hold for a variety of distributions, shrinkage has only been considered for standard random restrictions.

In this paper we prove a more general switching lemma, which works for two types of random projections (generalizing random restrictions) which we call *fixing* and *hiding*. As an application, we prove a (nearly) cubic formula lower bound for an Andreev-like function in $\mathsf{AC^0}$. Using a different kind of random restriction is necessary in this case, since standard random restrictions are known to drastically simplify functions in $\mathsf{AC^0}$, by the switching lemma. Our proof closely follows Håstad’s, and could serve as an exposition of his proof.

Irit Dinur, Yuval Filmus, Prahladh Harsha and Madhur Tulsiani, Explicit and structured sum of squares lower bounds from high-dimensional expanders, ITCS 2021

detailsabstractBibTeX
## BibTeX

arXivecccconferenceexposition

@inproceedings{DFHT2021,

title = {Explicit and structured sum of squares lower bounds from high-dimensional expanders},

author = {Irit Dinur and Yuval Filmus and Prahladh Harsha and Madhur Tulsiani},

booktitle = {12th Innovations in Theoretical Computer Science Conference (ITCS 2021)},

year = {2021}

}

copy to clipboard
title = {Explicit and structured sum of squares lower bounds from high-dimensional expanders},

author = {Irit Dinur and Yuval Filmus and Prahladh Harsha and Madhur Tulsiani},

booktitle = {12th Innovations in Theoretical Computer Science Conference (ITCS 2021)},

year = {2021}

}

We construct an explicit family of 3XOR instances which are hard for $O(\sqrt{\log n})$ levels of Sum-of-Squares. Our constructions are based on the LSV complexes, and rely on two of their crucial properties: cosystolic expansion and local nonpositive curvature (via Gromov’s filling inequality, which generalizes the isoperimetric inequality in $\mathbb{R}^n$)).

In contrast to many other constructions, our variables correspond to *edges* in the complex. Curiously, Alev, Jeronimo and Tulsiani showed that if variables correspond to vertices, then instances based on high-dimensional expanders are easy.

Using a different chain complex, Max Hopkins and Ting–Chun Lin were able to produce an instance which is hard for $\Omega(n)$ levels.

Yuval Filmus, Yuval Ishai, Avi Kaplan and Guy Kindler, Limits of preprocessing, CCC 2020

detailsabstractBibTeX
## BibTeX

conference

@InProceedings{FIKK2020,

author = {Yuval Filmus and Yuval Ishai and Avi Kaplan and Guy Kindler},

title = {{Limits of Preprocessing}},

booktitle = {35th Computational Complexity Conference (CCC 2020)},

pages = {17:1--17:22},

series = {Leibniz International Proceedings in Informatics (LIPIcs)},

ISBN = {978-3-95977-156-6},

ISSN = {1868-8969},

year = {2020},

volume = {169},

editor = {Shubhangi Saraf},

publisher = {Schloss Dagstuhl--Leibniz-Zentrum f{\"u}r Informatik},

address = {Dagstuhl, Germany},

URL = {https://drops.dagstuhl.de/opus/volltexte/2020/12569},

URN = {urn:nbn:de:0030-drops-125697},

doi = {10.4230/LIPIcs.CCC.2020.17},

annote = {Keywords: circuit, communication complexity, IPPP, preprocessing, PRF, simultaneous messages}

}

copy to clipboard
author = {Yuval Filmus and Yuval Ishai and Avi Kaplan and Guy Kindler},

title = {{Limits of Preprocessing}},

booktitle = {35th Computational Complexity Conference (CCC 2020)},

pages = {17:1--17:22},

series = {Leibniz International Proceedings in Informatics (LIPIcs)},

ISBN = {978-3-95977-156-6},

ISSN = {1868-8969},

year = {2020},

volume = {169},

editor = {Shubhangi Saraf},

publisher = {Schloss Dagstuhl--Leibniz-Zentrum f{\"u}r Informatik},

address = {Dagstuhl, Germany},

URL = {https://drops.dagstuhl.de/opus/volltexte/2020/12569},

URN = {urn:nbn:de:0030-drops-125697},

doi = {10.4230/LIPIcs.CCC.2020.17},

annote = {Keywords: circuit, communication complexity, IPPP, preprocessing, PRF, simultaneous messages}

}

It is well-known that $\mathsf{AC^0}$ circuits cannot compute inner product (since parity is hard for $\mathsf{AC^0}$).

What if we allow each of the parties to preprocess their input?

If we could show that bounded depth circuits of quasipolynomial size cannot computer inner product even with arbitrary polynomial length preprocessing, then this would imply that inner product is outside the polynomial hierarchy of communication complexity ($\mathsf{PH^{cc}}$).

We show that $\mathsf{AC^0}$^{ }circuits cannot compute inner product even if one party has unlimited preprocessing, and the other one is limited to preprocessing of length $n+n/\log^{\omega(1)} n$.

Our lower bound also applies to pseudorandom functions.

In ongoing work, we extend these results to correlation bounds.

Andris Ambainis, Yuval Filmus and François Le Gall, Fast matrix multiplication: limitations of the Coppersmith–Winograd method, STOC 2015

detailsabstractBibTeX
## BibTeX

arXiveccctalksslides

@inproceedings{AFLG2015,

author = {Ambainis, Andris and Filmus, Yuval and Le Gall, Franc{c}ois},

title = {Fast matrix multiplication: limitations of the {C}oppersmith--{W}inograd method},

booktitle = {47th Annual Symposium on the Theory of Computing ({STOC} 2015)},

year = {2015},

pages = {585--593}

}

copy to clipboard
author = {Ambainis, Andris and Filmus, Yuval and Le Gall, Franc{c}ois},

title = {Fast matrix multiplication: limitations of the {C}oppersmith--{W}inograd method},

booktitle = {47th Annual Symposium on the Theory of Computing ({STOC} 2015)},

year = {2015},

pages = {585--593}

}

Coppersmith and Winograd gave an $O(n^{2.376})$ algorithm for matrix multiplication in 1990. Their algorithm relies on an identity known as the Coppersmith–Winograd identity. Analyzing the identity as-is using Strassen’s laser method and an ingenious construction, Coppersmith and Winograd obtained an $O(n^{2.388})$ algorithm. The tensor square of the basic identity leads to the improved algorithm.

Recently there has been a surge of activity in the area. Stothers, Vassilevska-Williams and Le Gall studied higher and higher tensor powers of the basic identity, culminating in Le Gall’s $O(n^{2.3728639})$ algorithm. How far can this approach go?

We describe a framework, *laser method with merging*, which encompasses all the algorithms just described, and is at once more general and amenable to analysis. We show that taking the $N$th tensor power for an arbitrary $N$ cannot obtain an algorithm with running time $O(n^{2.3725})$ for the exact identity used in state-of-the-art algorithms.

Yuval Filmus, Toniann Pitassi, Robert Robere and Stephen A. Cook, Average case lower bounds for monotone switching networks, FOCS 2013

detailsabstractBibTeX
## BibTeX

ecccextended abstract

@inproceedings{FPRC2013,

author = {Yuval Filmus and Toniann Pitassi and Robert Robere and

Stephen A. Cook},

title = {Average case lower bounds for monotone switching networks},

booktitle = {The 54th Annual Symposium on Foundations of Computer

Science ({FOCS} 2013)},

pages = {598--607},

year = {2013}

}

copy to clipboard
author = {Yuval Filmus and Toniann Pitassi and Robert Robere and

Stephen A. Cook},

title = {Average case lower bounds for monotone switching networks},

booktitle = {The 54th Annual Symposium on Foundations of Computer

Science ({FOCS} 2013)},

pages = {598--607},

year = {2013}

}

An approximate computation of a Boolean function *f* by a circuit or switching network *M* is a computation in which *M* computes *f* correctly on the majority of the inputs (rather than on all of them). Besides being interesting in their own right, lower bounds for approximate computation have proved useful in many subareas of complexity theory such as cryptography and derandomization. Lower bounds for approximate computation are also known as *correlation bounds* or *average case hardness*.

We obtain the first average case monotone depth lower bounds for a function in monotone $\mathsf{P}$. We tolerate errors up to $1/2 – 1/n^{1/3-\delta}$. Specifically, we prove average case exponential lower bounds on the size of monotone switching networks for the GEN function. As a corollary, we establish that for every $i$ there are functions that can be computed with no error in monotone $\mathsf{NC}^{i+1}$ but that cannot be computed without large error by monotone circuits in $\mathsf{NC}^i$. We provide a similar separation between monotone $\mathsf{NC}$ and monotone $\mathsf{P}$.

Our proof extends and simplifies the Fourier-analytic technique due to Potechin and further developed by Chan and Potechin.

As a corollary of our main lower bound, we prove that the communication complexity approach for monotone depth lower bounds does not naturally generalize to the average case setting.

Stephen A. Cook, Yuval Filmus and Dai Lê, The complexity of the comparator circuit value problem, TOCT

detailsabstractBibTeX
## BibTeX

arXivposter

@article{CFL2014,

author = {Stephen A. Cook and Yuval Filmus and Dai L\^e},

title = {The complexity of the comparator circuit value problem},

journal = {ACM Transactions on Computation Theory},

volume = {6},

number = {4},

articleno = {15},

pages = {15:1--15:44},

year = {2014}

}

copy to clipboard
author = {Stephen A. Cook and Yuval Filmus and Dai L\^e},

title = {The complexity of the comparator circuit value problem},

journal = {ACM Transactions on Computation Theory},

volume = {6},

number = {4},

articleno = {15},

pages = {15:1--15:44},

year = {2014}

}

In 1990 Subramanian defined the complexity class $\mathsf{CC}$ as the set of problems log-space reducible to the comparator circuit value problem (CCV). He and Mayr showed that $\mathsf{NL}\subseteq \mathsf{CC}\subseteq \mathsf{P}$, and proved that in addition to CCV several other problems are complete for $\mathsf{CC}$, including the stable marriage problem, and finding the lexicographically first maximal matching in a bipartite graph. Although the class has not received much attention since then, we are interested in $\mathsf{CC}$ because we conjecture that it is incomparable with the parallel class $\mathsf{NC}$ which also satisfies $\mathsf{NL}\subseteq \mathsf{NC}\subseteq \mathsf{P}$; this implies that $\mathsf{CC}$-complete problems don’t have an efficient polylog time parallel algorithm. We provide evidence for our conjecture by giving oracle settings in which relativized $\mathsf{CC}$ and relativized $\mathsf{NC}$ are incomparable.

We give several alternative definitions of $\mathsf{CC}$, including (among others) the class of problems computed by uniform polynomial-size families of comparator circuits supplied with copies of the input and its negation, the class of problems $\mathsf{AC^0}$-reducible to CCV, and the class of problems computed by uniform $\mathsf{AC^0}$ circuits with CCV gates. We also give a machine model for $\mathsf{CC}$ which corresponds to its characterizations as log-space uniform polynomial-size families of comparator circuits. The various characterizations show that $\mathsf{CC}$ is a robust class. Our techniques also show that the corresponding function class FCC is closed under composition. The main technical tool we employ is universal comparator circuits.

Other results include a simpler proof of $\mathsf{NL}\subseteq \mathsf{CC}$, a more careful analysis showing that the lexicographically first maximal matching problem and its variants are $\mathsf{CC}$-complete under $\mathsf{AC^0}$ many-one reductions, and an explanation of the relation between the Gale–Shapley algorithm and Subramanian’s algorithm for stable marriage.

This paper continues previous work of Cook, Lê and Ye which focused on Cook–Nguyen style uniform proof complexity, answering several open questions raised in that paper.

The preprint contains more results than the arXiv version, and the presentation is different.

Arkadev Chattopadhyay, Yuval Filmus, Sajin Koroth, Or Meir and Toni Pitassi, Query-to-communication lifting for BPP using inner product, ICALP'19, SICOMP

detailsabstractBibTeX
## BibTeX

arXivecccjournalconference

@inproceedings{CFKMP2019,

title = {Query-to-communication lifting for {BPP} using inner product},

author = {Arkadev Chattopadhyay and Yuval Filmus and Sajin Koroth and Or Meir and Toniann Pitassi},

booktitle = {46th International Colloquium on Automata, Languages and Programming (ICALP'19)},

year = {2019}

}

@article{CFKMP2021,

title = {Query-to-communication lifting for {BPP} using inner product},

author = {Arkadev Chattopadhyay and Yuval Filmus and Sajin Koroth and Or Meir and Toniann Pitassi},

journal = {SIAM J. Comp.},

volume = {50},

number = {1},

pages = {171--210},

year = {2021}

}

copy to clipboard
title = {Query-to-communication lifting for {BPP} using inner product},

author = {Arkadev Chattopadhyay and Yuval Filmus and Sajin Koroth and Or Meir and Toniann Pitassi},

booktitle = {46th International Colloquium on Automata, Languages and Programming (ICALP'19)},

year = {2019}

}

@article{CFKMP2021,

title = {Query-to-communication lifting for {BPP} using inner product},

author = {Arkadev Chattopadhyay and Yuval Filmus and Sajin Koroth and Or Meir and Toniann Pitassi},

journal = {SIAM J. Comp.},

volume = {50},

number = {1},

pages = {171--210},

year = {2021}

}

We prove a query-to-communication lifting theorem in both the deterministic and randomized settings, using inner product as the lifting gadget.

Our result improves on the lifting theorem of Göös, Pitassi and Watson for randomized protocols, which used the indexing gadget.

Moreover, we reprove the lifting theorem of Chattopadhyay, Koucký, Loff and Mukhopadhyay for deterministic protocols using inner product.

Whereas Chattopadhyay et al. proved their result using *thickness* as the pseudorandomness notion (following the seminal work of Raz and McKenzie), we are able to use *blockwise min-entropy*, the same pseudorandomness notion used by Göös et al. to prove their randomized lifting theorem.

Yuval Dagan, Yuval Filmus, Hamed Hatami and Yaqiao Li, Trading information complexity for error, CCC 2017, Theory of Computing

detailsabstractBibTeX
## BibTeX

arXivecccjournal

@inproceedings{DFHL2017,

author = {Yuval Dagan and Yuval Filmus and Hamed Hatami and Yaqiao Li},

title = {Trading information complexity for error},

booktitle = {32nd Conference on Computational Complexity (CCC 2017)},

year = {2017}

}

@article{DFHL2018,

author = {Yuval Dagan and Yuval Filmus and Hamed Hatami and Yaqiao Li},

title = {Trading information complexity for error},

journal = {Theory of Computing},

volume = {14},

pages = {6:1--73},

year = {2018}

}

copy to clipboard
author = {Yuval Dagan and Yuval Filmus and Hamed Hatami and Yaqiao Li},

title = {Trading information complexity for error},

booktitle = {32nd Conference on Computational Complexity (CCC 2017)},

year = {2017}

}

@article{DFHL2018,

author = {Yuval Dagan and Yuval Filmus and Hamed Hatami and Yaqiao Li},

title = {Trading information complexity for error},

journal = {Theory of Computing},

volume = {14},

pages = {6:1--73},

year = {2018}

}

We discuss the following general question: How does the information complexity of a function change if we allow non-negligible error?

Our answers have implications to the communication complexity of set disjointness with non-negligible error.

Yuval Filmus, Hamed Hatami, Yaqiao Li and Suzin You, Information complexity of the AND function in the two-party and multiparty settings, COCOON'17, Algorithmica

detailsabstractBibTeX
## BibTeX

arXiv

@inproceedings{FHLY2017,

author = {Yuval Filmus and Hamed Hatami and Yaqiao Li and Suzin You},

title = {Information complexity of the {AND} function in the two-party, and multiparty settings},

booktitle = {23rd annual international computing and combinatorics conference (COCOON'17)},

year = {2017}

}

@article{FHLY2019,

author = {Yuval Filmus and Hamed Hatami and Yaqiao Li and Suzin You},

title = {Information complexity of the {AND} function in the two-party, and multiparty settings},

journal = {Algorithmica},

volume = {81},

number = {11--12},

pages = {4200--4237},

year = {2019}

}

copy to clipboard
author = {Yuval Filmus and Hamed Hatami and Yaqiao Li and Suzin You},

title = {Information complexity of the {AND} function in the two-party, and multiparty settings},

booktitle = {23rd annual international computing and combinatorics conference (COCOON'17)},

year = {2017}

}

@article{FHLY2019,

author = {Yuval Filmus and Hamed Hatami and Yaqiao Li and Suzin You},

title = {Information complexity of the {AND} function in the two-party, and multiparty settings},

journal = {Algorithmica},

volume = {81},

number = {11--12},

pages = {4200--4237},

year = {2019}

}

We find the optimal protocol (from the point of view of information complexity) for the AND function in a multiparty setting, extending the buzzer protocol described by Braverman et al.

We also fill in some gaps in the arguments of Braverman et al.

Yuval Filmus, Edward A. Hirsch, Artur Riazanov, Alexander Smal and Marc Vinyals, Proving unsatisfiability with hitting formulas, ITCS 2024

detailsabstractBibTeX
## BibTeX

arXivconference

@InProceedings{filmus_et_al:LIPIcs.ITCS.2024.48,

author = {Filmus, Yuval and Hirsch, Edward A. and Riazanov, Artur and Smal, Alexander and Vinyals, Marc},

title = {{Proving Unsatisfiability with Hitting Formulas}},

booktitle = {15th Innovations in Theoretical Computer Science Conference (ITCS 2024)},

pages = {48:1--48:20},

series = {Leibniz International Proceedings in Informatics (LIPIcs)},

ISBN = {978-3-95977-309-6},

ISSN = {1868-8969},

year = {2024},

volume = {287},

editor = {Guruswami, Venkatesan},

publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},

address = {Dagstuhl, Germany},

URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2024.48},

URN = {urn:nbn:de:0030-drops-195762},

doi = {10.4230/LIPIcs.ITCS.2024.48},

annote = {Keywords: hitting formulas, polynomial identity testing, query complexity}

}

copy to clipboard
author = {Filmus, Yuval and Hirsch, Edward A. and Riazanov, Artur and Smal, Alexander and Vinyals, Marc},

title = {{Proving Unsatisfiability with Hitting Formulas}},

booktitle = {15th Innovations in Theoretical Computer Science Conference (ITCS 2024)},

pages = {48:1--48:20},

series = {Leibniz International Proceedings in Informatics (LIPIcs)},

ISBN = {978-3-95977-309-6},

ISSN = {1868-8969},

year = {2024},

volume = {287},

editor = {Guruswami, Venkatesan},

publisher = {Schloss Dagstuhl -- Leibniz-Zentrum f{\"u}r Informatik},

address = {Dagstuhl, Germany},

URL = {https://drops.dagstuhl.de/entities/document/10.4230/LIPIcs.ITCS.2024.48},

URN = {urn:nbn:de:0030-drops-195762},

doi = {10.4230/LIPIcs.ITCS.2024.48},

annote = {Keywords: hitting formulas, polynomial identity testing, query complexity}

}

Tree-like Resolution proves the unsatisfiability of a CNF $\varphi$ by giving a decision tree for the falsified clause problem. The leaves of the free form a partition of $\{0,1\}^n$ into “monochromatic” subcubes, each of which is a strengthening of a negation of a term of $\varphi$.

We consider the HITTING proof system, in which a CNF is refuted by giving a partition of $\{0,1\}^n$ into monochromatic subcubes, and analyze its relation to other proof systems. We also consider a linear analog of HITTING which is a generalization of Tree-like Resolution over linear forms.

The work is part of a three paper series. The first part is about partitions of $\mathbb{F}_q^n$ into affine subspaces, and the second part is about partitions of $\{0,1\}^n$ into subcubes.

Yuval Filmus, Meena Mahajan, Gaurav Sood and Marc Vinyals, MaxSAT Resolution and Subcube Sums, SAT 2020

detailsabstractBibTeX
## BibTeX

arXivecccjournal

@inproceedings{FMSV2020,

author = {Yuval Filmus and Meena Mahajan and Gaurav Sood and Marc Vinyals},

title = {{MaxSAT} Resolution and Subcube Sums},

booktitle = {SAT'20},

year = {2020}

}

@article{FMSV2023,

author = {Yuval Filmus and Meena Mahajan and Gaurav Sood and Marc Vinyals},

title = {{MaxSAT} Resolution and Subcube Sums},

journal = {Transactions on Computational Logic},

volume = {24},

number = {1},

year = {2023},

pages = {8:1--8:27}

}

copy to clipboard
author = {Yuval Filmus and Meena Mahajan and Gaurav Sood and Marc Vinyals},

title = {{MaxSAT} Resolution and Subcube Sums},

booktitle = {SAT'20},

year = {2020}

}

@article{FMSV2023,

author = {Yuval Filmus and Meena Mahajan and Gaurav Sood and Marc Vinyals},

title = {{MaxSAT} Resolution and Subcube Sums},

journal = {Transactions on Computational Logic},

volume = {24},

number = {1},

year = {2023},

pages = {8:1--8:27}

}

MaxSAT Resolution is a version of Resolution designed to solve the MaxSAT problem. However, it is also possible to use it as a refutation system.

We analyze MaxSAT Resolution (MaxRes), MaxRes with weakening (MaxResW), and a related proof system, SubCubeSums, which is a special case of Sherali–Adams:

- We show that Res
*p*-simulates MaxResW and that MaxResW*p*-simulates treelike Res, and separate MaxRes from TreeRes. - We show that SubCubeSums
*p*-simulates MaxResW and is not*p*-simulated by Res. - We show that Tseitin contradictions on expanders are hard for SubCubeSums and so for MaxResW. While it is already known that these contradictions are hard for Res, our proof is different. We hope that it could be used to separate Res and MaxResW.

Yuval Filmus, Another look at degree lower bounds for polynomial calculus, Theoretical Computer Science

detailsabstractBibTeX
## BibTeX

journal

@article{Filmus2019,

author = {Yuval Filmus},

title = {Another look at degree lower bounds for polynomial calculus},

journal = {Theoretical Computer Science},

volume = {796},

pages = {286--293},

year = {2019}

}

copy to clipboard
author = {Yuval Filmus},

title = {Another look at degree lower bounds for polynomial calculus},

journal = {Theoretical Computer Science},

volume = {796},

pages = {286--293},

year = {2019}

}

Alekhnovich and Razborov (*Lower bounds for polynomial calculus: non-binomial case*) gave a sophisticated degree lower bound for proofs in the polynomial calculus proof system. However, their proof is somewhat opaque. We present a different, more intuitive proof. We also adapt our proof to obtain related results of Galesi and Lauria.

Work done while visiting KTH in December 2012.

Yuval Filmus, Massimo Lauria, Mladen Mikša, Jakob Nordström and Marc Vinyals, From small space to small width in resolution, STACS 2014, TOCL

detailsabstractBibTeX
## BibTeX

journal

@inproceedings{FLMNV2014,

author = {Yuval Filmus and Massimo Lauria and Mladen Mik\v{s}a and

Jakob Nordstr\"om and Marc Vinyals},

title = {From small space to small width in resolution},

booktitle = {The 31st Symposium on Theoretical Aspects of Computer

Science ({STACS} 2014)},

year = {2014},

pages = {300--311}

}

@article{FLMNV2015,

author = {Yuval Filmus and Massimo Lauria and Mladen Mikv{s}a and

Jakob Nordstr"om and Marc Vinyals},

title = {From small space to small width in resolution},

journal = {ACM Transactions on Computational Logic},

volume = {16},

number = {4},

year = {2015},

pages = {28}

}

copy to clipboard
author = {Yuval Filmus and Massimo Lauria and Mladen Mik\v{s}a and

Jakob Nordstr\"om and Marc Vinyals},

title = {From small space to small width in resolution},

booktitle = {The 31st Symposium on Theoretical Aspects of Computer

Science ({STACS} 2014)},

year = {2014},

pages = {300--311}

}

@article{FLMNV2015,

author = {Yuval Filmus and Massimo Lauria and Mladen Mikv{s}a and

Jakob Nordstr"om and Marc Vinyals},

title = {From small space to small width in resolution},

journal = {ACM Transactions on Computational Logic},

volume = {16},

number = {4},

year = {2015},

pages = {28}

}

In 2003, Atserias and Dalmau resolved a major open question about the resolution proof system by establishing that the space complexity of formulas is always an upper bound on the width needed to refute them. Their proof is beautiful but somewhat mysterious in that it relies heavily on tools from finite model theory.

We give an alternative, completely elementary, proof that works by simple syntactic manipulations of resolution refutations. As a by-product, we develop a “black-box” technique for proving space lower bounds via a “static” complexity measure that works against any resolution refutation — previous techniques have been inherently adaptive.

We conclude by showing that the related question for polynomial calculus (i.e., whether space is an upper bound on degree) seems unlikely to be resolvable by similar methods.

Yuval Filmus, Massimo Lauria, Mladen Mikša, Jakob Nordström and Marc Vinyals, Towards an understanding of Polynomial Calculus: new separations and lower bounds, STACS 2013, Accepted to ToC

detailsabstractBibTeX
## BibTeX

conferenceconference preprint

@inproceedings{flmnv1,

author = {Yuval Filmus and Massimo Lauria and Mladen Mikv{s}a and Jakob Nordstr"om and Marc Vinyals},

title = {Towards an understanding of {P}olynomial {C}alculus: new separations and lower bounds},

booktitle={Automata, Languages, and Programming},

volume={7965},

series={Lecture Notes in Computer Science},

publisher={Springer Berlin Heidelberg},

year = {2013},

pages = {437--448}

}

@article{flmnv1-journal,

author = {Yuval Filmus and Massimo Lauria and Mladen Mikv{s}a and Jakob Nordstr"om and Marc Vinyals},

title = {Towards an understanding of {P}olynomial {C}alculus: new separations and lower bounds},

journal = {Theory of Computing},

year = {Accepted}

}

copy to clipboard
author = {Yuval Filmus and Massimo Lauria and Mladen Mikv{s}a and Jakob Nordstr"om and Marc Vinyals},

title = {Towards an understanding of {P}olynomial {C}alculus: new separations and lower bounds},

booktitle={Automata, Languages, and Programming},

volume={7965},

series={Lecture Notes in Computer Science},

publisher={Springer Berlin Heidelberg},

year = {2013},

pages = {437--448}

}

@article{flmnv1-journal,

author = {Yuval Filmus and Massimo Lauria and Mladen Mikv{s}a and Jakob Nordstr"om and Marc Vinyals},

title = {Towards an understanding of {P}olynomial {C}alculus: new separations and lower bounds},

journal = {Theory of Computing},

year = {Accepted}

}

During the last decade, an active line of research in proof complexity has been into the space complexity of proofs and how space is related to other measures. By now these aspects of resolution are fairly well understood, but many open problems remain for the related but stronger polynomial calculus (PC/PCR) proof system. For instance, the space complexity of many standard “benchmark formulas” is still open, as well as the relation of space to size and degree in PC/PCR.

We prove that if a formula requires large resolution width, then making XOR substitution yields a formula requiring large PCR space, providing some circumstantial evidence that degree might be a lower bound for space. More importantly, this immediately yields formulas that are very hard for space but very easy for size, exhibiting a size-space separation similar to what is known for resolution. Using related ideas, we show that if a graph has good expansion and in addition its edge set can be partitioned into short cycles, then the Tseitin formula over this graph requires large PCR space. In particular, Tseitin formulas over random 4-regular graphs almost surely require space at least $\Omega(\sqrt{n})$.

Our proofs use techniques recently introduced in [Bonacina-Galesi ’13]. Our final contribution, however, is to show that these techniques provably cannot yield non-constant space lower bounds for the functional pigeonhole principle, delineating the limitations of this framework and suggesting that we are still far from characterizing PC/PCR space.

Yuval Filmus, Pavel Hrubeš and Massimo Lauria, Semantic versus syntactic cutting planes, STACS 2016

detailsabstractBibTeX
## BibTeX

talk

@inproceedings{FHL2016,

author = {Yuval Filmus and Pavel Hrube\v{s} and Massimo Lauria},

title = {Semantic versus syntactic cutting planes},

booktitle = {33rd Symposium on Theoretical Aspects of Computer Science (STACS 2016)},

year = {2016}

}

copy to clipboard
author = {Yuval Filmus and Pavel Hrube\v{s} and Massimo Lauria},

title = {Semantic versus syntactic cutting planes},

booktitle = {33rd Symposium on Theoretical Aspects of Computer Science (STACS 2016)},

year = {2016}

}

Cutting planes is a proof system in which lines are linear inequalities. It has two main variants: syntactic cutting planes, in which specific derivation rules are given, and semantic cutting planes, in which any bounded fan-in derivation which is semantically correct (for all zero-one assignments to variables) is allowed. Only the syntactic version is a Cook–Reckhow proof system, since verifying a semantic cutting planes proof is coNP-complete.

Extending earlier work of Pudlák, we give an exponential lower bounds for semantic cutting planes.

We also show that semantic cutting planes is exponentially stronger than syntactic cutting planes, and exhibit two contradictory lines which take exponentially long to refute in syntactic cutting planes.

This work is a combination of two earlier preprints: a preprint of Pavel Hrubeš proving the exponential lower bound for semantic cutting planes, and a preprint of Massimo Lauria and myself proving the exponential separation between semantic and syntactic cutting planes.

Yuval Filmus, Massimo Lauria, Jakob Nordström, Neil Thapen and Noga Zewi, Space complexity in polynomial calculus, CCC 2012, SICOMP

detailsabstractBibTeX
## BibTeX

ecccjournal

@inproceedings{FLNTZ2012,

author = {Yuval Filmus and Massimo Lauria and Jakob Nordstr\"om and

Neil Thapen and Noga Zewi},

title = {Space complexity in polynomial calculus},

booktitle = {The 27th Annual Conference on Computational Complexity ({CCC} 2012)},

year = {2012}

}

@article{FLNTZ2015,

author = {Yuval Filmus and Massimo Lauria and Jakob Nordstr\"om and

Neil Thapen and Noga Zewi},

title = {Space complexity in polynomial calculus},

journal = {SIAM J. Comput.},

volume = {44},

number = {4},

pages = {1119--1153},

year = {2015}

}

copy to clipboard
author = {Yuval Filmus and Massimo Lauria and Jakob Nordstr\"om and

Neil Thapen and Noga Zewi},

title = {Space complexity in polynomial calculus},

booktitle = {The 27th Annual Conference on Computational Complexity ({CCC} 2012)},

year = {2012}

}

@article{FLNTZ2015,

author = {Yuval Filmus and Massimo Lauria and Jakob Nordstr\"om and

Neil Thapen and Noga Zewi},

title = {Space complexity in polynomial calculus},

journal = {SIAM J. Comput.},

volume = {44},

number = {4},

pages = {1119--1153},

year = {2015}

}

During the last decade, an active line of research in proof complexity has been to study space complexity and time-space trade-offs for proofs. Besides being a natural complexity measure of intrinsic interest, space is also an important issue in SAT solving, and so research has mostly focused on weak systems that are used by SAT solvers.

There has been a relatively long sequence of papers on space in resolution, which is now reasonably well understood from this point of view. For other natural candidates to study, however, such as polynomial calculus or cutting planes, very little has been known. We are not aware of any nontrivial space lower bounds for cutting planes, and for polynomial calculus the only lower bound has been for CNF formulas of unbounded width in Alekhnovich et al., where the space lower bound is smaller than the initial width of the clauses in the formulas. Thus, in particular, it has been consistent with current knowledge that polynomial calculus could be able to refute any $k$-CNF formula in constant space.

We prove several new results on space in polynomial calculus (PC), and in the extended proof system polynomial calculus resolution (PCR) studied by Alekhnovich et al.:

- We prove an $\Omega(n)$ space lower bound in PC for the canonical 3-CNF version of the pigeonhole principle formulas with $m$ pigeons and $n$ holes, and show that this is tight.
- For PCR, we prove an $\Omega(n)$ space lower bound for a bitwise encoding of the functional pigeonhole principle. These formulas have width $O(\log n)$, and hence this is an exponential improvement over Alekhnovich et al. measured in the width of the formulas.
- We then present another encoding of the pigeonhole principle that has constant width, and prove an $\Omega(n)$ space lower bound in PCR for these formulas as well.
- Finally, we prove that any $k$-CNF formula can be refuted in PC in simultaneous exponential size and linear space (which holds for resolution and thus for PCR, but was not obviously the case for PC). We also characterize a natural class of CNF formulas for which the space complexity in resolution and PCR does not change when the formula is transformed into 3-CNF in the canonical way, something that we believe can be useful when proving PCR space lower bounds for other well-studied formula families in proof complexity.

Yuval Filmus, Toniann Pitassi and Rahul Santhanam, Exponential lower bounds for $\mathsf{AC^0}$-Frege imply superpolynomial Frege lower bounds, ICALP 2011, ToCT

detailsabstractBibTeX
## BibTeX

conferenceslides

@inproceedings{FPS2011,

author = {Yuval Filmus and Toniann Pitassi and Rahul Santhanam},

title = {Exponential lower bounds for {AC$^0$}-{F}rege imply

superpolynomial {F}rege lower bounds},

booktitle = {The 38th International Colloquium on Automata,

Languages and Programming ({ICALP} 2011)},

year = {2011},

pages = {618--629}

}

@article{FPS2015,

author = {Yuval Filmus and Toniann Pitassi and Rahul Santhanam},

title = {Exponential lower bounds for {AC$^0$}-{F}rege imply

superpolynomial {F}rege lower bounds},

journal = {ACM Trans. Comput. Th.},

volume = {7},

number = {2},

year = {2015},

pages = {article 5}

}

copy to clipboard
author = {Yuval Filmus and Toniann Pitassi and Rahul Santhanam},

title = {Exponential lower bounds for {AC$^0$}-{F}rege imply

superpolynomial {F}rege lower bounds},

booktitle = {The 38th International Colloquium on Automata,

Languages and Programming ({ICALP} 2011)},

year = {2011},

pages = {618--629}

}

@article{FPS2015,

author = {Yuval Filmus and Toniann Pitassi and Rahul Santhanam},

title = {Exponential lower bounds for {AC$^0$}-{F}rege imply

superpolynomial {F}rege lower bounds},

journal = {ACM Trans. Comput. Th.},

volume = {7},

number = {2},

year = {2015},

pages = {article 5}

}

We give a general transformation which turns polynomial-size Frege proofs to subexponential-size $\mathsf{AC^0}$-Frege proofs. This indicates that proving exponential lower bounds for $\mathsf{AC^0}$-Frege is hard, since it is a longstanding open problem to probe super-polynomial lower bounds for Frege. Our construction is optimal for tree-like proofs.

As a consequence of our main result, we are able to shed some light on the question of weak automatizability for bounded-depth Frege systems. First, we present a simpler proof of the results of Bonet et al. showing that under cryptographic assumptions, bounded-depth Frege proofs are not weakly automatizable. Second, we show that because our proof is more general, under the right cryptographic assumptions it could resolve the weak automatizatbility question for lower depth Frege systems.

The proceedings version contains several small mistakes, corrected in the preprint version. These mistakes slightly affect the constants in the main theorem.

Yuval Filmus, Yasushi Kawase, Yusuke Kobayashi and Yutaro Yamaguchi, Tight Approximation for Unconstrained XOS Maximization, Math of OR

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{FKKY2021,

title = {Tight Approximation for Unconstrained {XOS} Maximization},

author = {Yuval Filmus and Yasushi Kawase and Yusuke Kobayashi and Yutaro Yamaguchi},

journal = {Mathematics of Operations Research},

volume = {46},

number = {4},

year = {2021},

pages = {1599--1610}

}

copy to clipboard
title = {Tight Approximation for Unconstrained {XOS} Maximization},

author = {Yuval Filmus and Yasushi Kawase and Yusuke Kobayashi and Yutaro Yamaguchi},

journal = {Mathematics of Operations Research},

volume = {46},

number = {4},

year = {2021},

pages = {1599--1610}

}

We study the problem of maximizing *XOS functions*, which are functions that can be written as a maximum of linear functions. The number of linear functions is known as the *width*.

We show that the threshold inapproximability is $\Theta(n/\log n)$ in the general case, and $k-1$ for width $k$ XOS functions (where $k \geq 2$).

Niv Buchbinder, Moran Feldman, Yuval Filmus and Mohit Garg, Online submodular maximization: beating 1/2 made simple, IPCO 2019, Math Prog

detailsabstractBibTeX
## BibTeX

arXivjournal

@inproceedings{BFFG2019,

title = {Online submodular maximization: beating 1/2 made simple},

author = {Niv Buchbinder and Moran Feldman and Yuval Filmus and Mohit Garg},

booktitle = {20th Conference on Integer Programming and Combinatorial Optimization (IPCO'19)},

year = {2019}

}

@journal{BFFG2020,

title = {Online submodular maximization: beating 1/2 made simple},

author = {Niv Buchbinder and Moran Feldman and Yuval Filmus and Mohit Garg},

journal = {Mathematical Programming},

volume = {183},

pages = {149--169},

year = {2020}

}

copy to clipboard
title = {Online submodular maximization: beating 1/2 made simple},

author = {Niv Buchbinder and Moran Feldman and Yuval Filmus and Mohit Garg},

booktitle = {20th Conference on Integer Programming and Combinatorial Optimization (IPCO'19)},

year = {2019}

}

@journal{BFFG2020,

title = {Online submodular maximization: beating 1/2 made simple},

author = {Niv Buchbinder and Moran Feldman and Yuval Filmus and Mohit Garg},

journal = {Mathematical Programming},

volume = {183},

pages = {149--169},

year = {2020}

}

We analyze *random order greedy*, showing that its approximation ratio is at least 0.5096 for *any* number of parts.

Yuval Filmus, Random order greedy up to 4 parts, Manuscript

detailsabstractBibTeX
## BibTeX

@unpublished{Filmus2018,

title = {Random order greedy up to 4 parts},

author = {Yuval Filmus},

howpublished = {Manuscript},

year = {2018}

}

copy to clipboard
title = {Random order greedy up to 4 parts},

author = {Yuval Filmus},

howpublished = {Manuscript},

year = {2018}

}

We analyze *random order greedy*, a variant of the greedy algorithm for partition matroids, when the number of parts is small.

We show that the approximation ratio in the case of 2 parts is 2/3, and in the case of 3 parts is 7/12. We also give bounds on the approximation ratio in the case of 4 parts.

Yuval Filmus and Justin Ward, A tight combinatorial algorithm for submodular maximization subject to a matroid constraint, FOCS 2012, SICOMP

detailsabstractBibTeX
## BibTeX

arXivjournaltalksextended versionexposition

@inproceedings{FW2012b,

author = {Yuval Filmus and Justin Ward},

title = {A tight combinatorial algorithm for submodular maximization

subject to a matroid constraint},

booktitle = {53rd Annual {IEEE} Symposium on Foundations of Computer Science ({FOCS} 2012)},

year = {2012},

pages = {659--668}

}

@article{FW2014,

author = {Yuval Filmus and Justin Ward},

title = {Monotone submodular maximization over a matroid via non-oblivious local search},

journal = {SIAM Journal on Computing},

volume = {43},

issue = {2},

year = {2014},

pages = {514--542}

}

copy to clipboard
author = {Yuval Filmus and Justin Ward},

title = {A tight combinatorial algorithm for submodular maximization

subject to a matroid constraint},

booktitle = {53rd Annual {IEEE} Symposium on Foundations of Computer Science ({FOCS} 2012)},

year = {2012},

pages = {659--668}

}

@article{FW2014,

author = {Yuval Filmus and Justin Ward},

title = {Monotone submodular maximization over a matroid via non-oblivious local search},

journal = {SIAM Journal on Computing},

volume = {43},

issue = {2},

year = {2014},

pages = {514--542}

}

We present an optimal, combinatorial $1-1/e$ approximation algorithm for monotone submodular optimization over a matroid constraint. Compared to the continuous greedy algorithm due to Calinescu, Chekuri, Pál and Vondrák, our algorithm is extremely simple and requires no rounding. It consists of the greedy algorithm followed by local search. Both phases are run not on the actual objective function, but on a related auxiliary potential function, which is also monotone submodular.

In our previous work on maximum coverage (the preceding paper), the potential function gives more weight to elements covered multiple times. We generalize this approach from coverage functions to arbitrary monotone submodular functions. When the objective function is a coverage function, both definitions of the potential function coincide.

Our approach generalizes to the case where the monotone submodular function has restricted curvature. For any curvature $c$, we adapt our algorithm to produce a $(1-e^{-c})/c$ approximation. This matches results of Vondrák, who has shown that the continuous greedy algorithm produces a $(1-e^{-c})/c$ approximation when the objective function has curvature $c$ with respect to the optimum, and proved that achieving any better approximation ratio is impossible in the value oracle model.

The paper exists in several different versions:

- The conference version only contains the case $c=1$.
- The arXiv version contains the result for general $c$. A similar account can be found in Ward’s thesis.
- The journal version contains a significantly simplified proof of the result for general $c$.
- The extended version includes slightly better approximation ratios for bounded matroid rank, and an improved version of the continuous greedy algorithm.
- The exposition gives a simplified exposition of the main part of the analysis, following ideas of Moran Feldman.

The journal version supersedes the preceding versions.

Yuval Filmus and Justin Ward, Maximum coverage over a matroid, STACS 2012

detailsabstractBibTeX
## BibTeX

slides

@inproceedings{FW2012a,

author = {Yuval Filmus and Justin Ward},

title = {Maximum coverage over a matroid},

booktitle = {29th Symposium on Theoretical Aspects of Computer

Science ({STACS} 2012)},

year = {2012},

pages = {601--612}

}

copy to clipboard
author = {Yuval Filmus and Justin Ward},

title = {Maximum coverage over a matroid},

booktitle = {29th Symposium on Theoretical Aspects of Computer

Science ({STACS} 2012)},

year = {2012},

pages = {601--612}

}

We present an optimal, combinatorial $1-1/e$ approximation algorithm for Maximum Coverage over a matroid constraint, using non-oblivious local search. Calinescu, Chekuri, Pál and Vondrák have given an optimal $1-1/e$ approximation algorithm for the more general problem of monotone submodular maximization over a matroid constraint. The advantage of our algorithm is that it is entirely combinatorial, and in many circumstances also faster, as well as conceptually simpler.

Following previous work on satisfiability problems by Alimonti and by Khanna, Motwani, Sudan and Vazirani, our local search algorithm is *non-oblivious*. That is, our algorithm uses an auxiliary linear objective function to evaluate solutions. This function gives more weight to elements covered multiple times. We show that the locality ratio of the resulting local search procedure is at least $1-1/e$. Our local search procedure only considers improvements of size 1. In contrast, we show that oblivious local search, guided only by the problem’s objective function, achieves an approximation ratio of only $\frac{n-1}{2n-1-k}$ when improvements of size $k$ are considered.

In general, our local search algorithm could take an exponential amount of time to converge to an *exact* local optimum. We address this situation by using a combination of *approximate* local search and the same partial enumeration techniques used by Calinescu et al., resulting in a clear (1−1/*e*)-approximation algorithm running in polynomial time.

We obtained our auxiliary linear objective function using linear programming. This is detailed in Ward’s thesis.

Yuval Filmus, Bandwidth approximation of a restricted family of trees, Master's thesis

detailsabstractBibTeX
## BibTeX

slides

@mastersthesis{Filmus2002,

author = {Yuval Filmus},

title = {Bandwidth approximation of a restricted family of trees},

school = {Weizmann institute of science},

year = {2002}

}

copy to clipboard
author = {Yuval Filmus},

title = {Bandwidth approximation of a restricted family of trees},

school = {Weizmann institute of science},

year = {2002}

}

We consider the NP-complete optimization problem *Bandwidth*. Anupam Gupta gave an $O(\log^{2.5} n)$ approximation algorithm for trees, and showed that his algorithm has an approximation ratio of $O(\log n)$ on *caterpillars*, trees composed of a central path and paths emanating from it. We show that the same approximation ratio is obtained on trees composed of a central path and caterpillars emanating from it.

Our result relies on the following lemma.

**Definition.** A sequence $a_1,\ldots,a_n$ has *thickness* $\Theta$ if the sum of any $d$ consecutive elements is at most $d\Theta$, for $1 \leq d \leq n$.

**Lemma.** If a sequence has thickness $\Theta$, then the sequence obtained by ordering the elements in non-decreasing order also has thickness $\Theta$.

Gilad Chase and Yuval Filmus, Generalized polymorphisms, MSc thesis of Gilad Chase

detailsabstractBibTeX
## BibTeX

arXiv

@misc{ChaseFilmus23+,

title = {Generalized polymorphisms},

author = {Gilad Chase and Yuval Filmus},

howpublished = {Online manuscript},

year = {2023+}

}

copy to clipboard
title = {Generalized polymorphisms},

author = {Gilad Chase and Yuval Filmus},

howpublished = {Online manuscript},

year = {2023+}

}

A function $f\colon \{0,1\}^n \to \{0,1\}$ is a *polymorphism* of a predicate $P \subseteq \{0,1\}^m$ if whenever $x^{(1)},\dots,x^{(n)} \in P$, then also $f(x^{(1)},\dots,x^{(n)}) = (f(x^{(1)}_1,\dots,x^{(n)}_1),\dots,f(x^{(1)}_m,\dots,x^{(n)}_m)) \in P$. Predicates and their polymorphisms are classified by Post’s lattice.

A special case of this framework is the *truth-functional setting*, in which $P = \{(x,y) : y = g(x)\}$, for some function $g\colon \{0,1\}^{m-1} \to \{0,1\}$. Stated differently (and switching from $m-1$ to $m$), a function $f$ is a polymorphism of $g$ if for every $n \times m$ array filled with $0,1$ entries, the following two operations always give the same result:

- compute $g$ on each row and apply $f$, in symbols $f \circ g$;
- compute $f$ on each column and apply $g$, in symbols $g \circ f$.

It is known that the only “polymorphic pairs” $f,g$ are ANDs, ORs and XORs. A similar result holds if we allow $f$ to depend on the column, that is, there are $m+1$ many different $f$’s (the extra one appears when first computing $g$ on each row). In symbols, we can express this as $f_0 \circ g = g \circ (f_1,\dots,f_m)$.

In this work, we solve the more general problem in which both $f$ depends on the column and $g$ depends on the row: $f_0 \circ (g_1,\dots,g_n) = g_0 \circ (f_1,\dots,f_m)$. The space of solutions becomes substantially more complicated. To prove the characterization, we think of both sides of the identity as functions from $\{0,1\}^{nm} \to \{0,1\}$, and consider their Fourier expansions, which must coincide.

Yuval Filmus, Joel Oren and Kannan Soundararajan, Shapley values in random weighted voting games, Manuscript

detailsabstractBibTeX
## BibTeX

@unpublished{FOS2017,

author = {Yuval Filmus and Joel Oren and Kannan Soundararajan},

title = {Shapley values in weighted voting games with random weights},

note = {Manuscript},

year = {2017}

}

copy to clipboard
author = {Yuval Filmus and Joel Oren and Kannan Soundararajan},

title = {Shapley values in weighted voting games with random weights},

note = {Manuscript},

year = {2017}

}

We study the distribution of Shapley values in weighted voting games. The Shapley values measure the voting power collective decision making systems. While easy to estimate empirically given the parameters of a weighted voting game, the Shapley values are hard to reason about analytically.

We propose a probabilistic approach, in which the agent weights are drawn i.i.d. from some known exponentially decaying distribution. We provide a general closed-form characterization of the highest and lowest expected Shapley values in such a game, as a function of the parameters of the underlying distribution. To do so, we give a novel reinterpretation of the stochastic process that generates the Shapley variables as a renewal process. We demonstrate the use of our results on the uniform and exponential distributions.

Yuval Filmus, Joel Oren, Yair Zick and Yoram Bachrach, Power distribution in randomized weighted voting: the effects of the quota, IJCAI 2016 (first half), SAGT 2016, TOCS (second half)

detailsabstractBibTeX
## BibTeX

@inproceedings{BFOZ2016a,

author = {Yoram Bachrach and Yuval Filmus and Joel Oren and Yair Zick},

title = {A Characterization of Voting Power for Discrete Weight Distributions},

booktitle = {Proceedings of the 26th International Joint Conference on Artificial Intelligence ({IJCAI} 2016)},

year = {2016}

}

@inproceedings{BFOZ2016b,

author = {Yoram Bachrach and Yuval Filmus and Joel Oren and Yair Zick},

title = {Analyzing Power in Weighted Voting Games With Super-Increasing Weights},

booktitle = {Proceedings of the 9th International Symposium on Algorithmic Game Theory ({SAGT} 2016)},

year = {2016}

}

@article{BFOZ2019,

author = {Yoram Bachrach and Yuval Filmus and Joel Oren and Yair Zick},

title = {Analyzing Power in Weighted Voting Games With Super-Increasing Weights},

journal = {Theory of Computing Systems},

volume = {63},

number = {1},

pages = {150--174},

year = {2019}

}

copy to clipboard
author = {Yoram Bachrach and Yuval Filmus and Joel Oren and Yair Zick},

title = {A Characterization of Voting Power for Discrete Weight Distributions},

booktitle = {Proceedings of the 26th International Joint Conference on Artificial Intelligence ({IJCAI} 2016)},

year = {2016}

}

@inproceedings{BFOZ2016b,

author = {Yoram Bachrach and Yuval Filmus and Joel Oren and Yair Zick},

title = {Analyzing Power in Weighted Voting Games With Super-Increasing Weights},

booktitle = {Proceedings of the 9th International Symposium on Algorithmic Game Theory ({SAGT} 2016)},

year = {2016}

}

@article{BFOZ2019,

author = {Yoram Bachrach and Yuval Filmus and Joel Oren and Yair Zick},

title = {Analyzing Power in Weighted Voting Games With Super-Increasing Weights},

journal = {Theory of Computing Systems},

volume = {63},

number = {1},

pages = {150--174},

year = {2019}

}

We study the Shapley value in weighted voting games. The Shapley value has been used as an index for measuring the power of individual agents in decision-making bodies and political organizations, where decisions are made by a majority vote process. We characterize the impact of changing the quota (i.e., the minimum number of seats in the parliament that are required to form a coalition) on the Shapley values of the agents. Contrary to previous studies, which assumed that the agent weights (corresponding to the size of a caucus or a political party) are fixed, we analyze new domains in which the weights are stochastically generated, modeling, for example, elections processes.

We examine a natural weight generation process: the Balls and Bins model, with uniform as well as exponentially decaying probabilities. We also analyze weights that admit a super-increasing sequence, answering several open questions pertaining to the Shapley values in such games.

Our results for the balls and bins model with exponentially decaying probabilities rely on a formula for the Shapley values of super-increasing sequences. Curiously, this formula gives rise to a continuous function reminiscent of Minkowski’s question mark function.

Yuval Filmus and Joel Oren, Efficient voting via the top-$k$ elicitation scheme: a probabilistic approach, EC 2014

detailsabstractBibTeX
## BibTeX

@inproceedings{FO2014,

author = {Yuval Filmus and Joel Oren},

title = {Efficient voting via the top-$k$ elicitation scheme: a

probabilistic approach},

booktitle = {Electronic Commerce (EC)},

year = {2014},

pages = {295--312}

}

copy to clipboard
author = {Yuval Filmus and Joel Oren},

title = {Efficient voting via the top-$k$ elicitation scheme: a

probabilistic approach},

booktitle = {Electronic Commerce (EC)},

year = {2014},

pages = {295--312}

}

Many voting rules require the voters to give a complete preference order over the candidates. This is cumbersome, leading to the notion of *top-$k$* *voting*, in which the voters only give the length-$k$ prefixes of their rankings. The question that we ask in this paper is: given a voting rule, for what value of $k$ is it possible to predict the overall winner given only the length-$k$ prefixes, with high probability, given enough voters?

We first consider the case of an *impartial culture*, in which the voters choose their preference profiles uniformly at random over all permutations. For positional scoring rules (like Borda) we give a nearly-tight threshold theorem for $k$. We also prove a strong, though non-optimal, lower bound for Copeland.

When the preference profiles are drawn from a biased distribution, such as the Mallows distribution, we show that the candidate toward which the distribution is biased wins the elections, for both positional scoring rules and Copeland, with high probability.

Finally, we consider adversarially-chosen preference distributions. We show that for positional scoring rules with geometrically decaying scores, $k = O(\log n)$ suffices to predict the winner with high probability.

Craig Boutilier, Yuval Filmus and Joel Oren, Efficient vote elicitation under candidate uncertainty, IJCAI 2013

detailsabstractBibTeX
## BibTeX

conference version

@inproceedings{BFO2013,

author = {Craig Boutilier and Yuval Filmus and Joel Oren},

title = {Efficient vote elicitation under candidate uncertainty},

booktitle = {23rd International Joint Conference on Artificial Intelligence

({IJCAI} 2013)},

year = {2013},

pages = {309--316}

}

copy to clipboard
author = {Craig Boutilier and Yuval Filmus and Joel Oren},

title = {Efficient vote elicitation under candidate uncertainty},

booktitle = {23rd International Joint Conference on Artificial Intelligence

({IJCAI} 2013)},

year = {2013},

pages = {309--316}

}

Top-$k$ voting is an especially natural form of partial vote elicitation in which only length-$k$ prefixes of rankings are elicited. We analyze the ability of top-$k$ vote elicitation to correctly determine true winners with high probability, given probabilistic models of voter preferences and candidate availability. We provide bounds on the minimal value of $k$ required to determine the correct winner under the plurality and Borda voting rules, considering both worst-case preference profiles and profiles drawn from the impartial culture and Mallows probabilistic models. We also derive conditions under which the special case of *zero elicitation* (i.e., $k=0$) produces the correct winner. We provide empirical results that confirm the value of top-$k$ voting.

The proof of Theorem 10 is incomplete, but the issue is fixed in subsequent work.

Allan Borodin, Yuval Filmus and Joel Oren, Threshold models for competitive influence in social networks, WINE 2010

detailsabstractBibTeX
## BibTeX

@inproceedings{BFO2010,

author = {Allan Borodin and Yuval Filmus and Joel Oren},

title = {Threshold models for competitive influence in social networks},

booktitle = {The 6th Workshop on Internet and Network Economics

({WINE} 2010)},

year = {2010},

pages = {539--550}

}

copy to clipboard
author = {Allan Borodin and Yuval Filmus and Joel Oren},

title = {Threshold models for competitive influence in social networks},

booktitle = {The 6th Workshop on Internet and Network Economics

({WINE} 2010)},

year = {2010},

pages = {539--550}

}

The problem of influence maximization deals with choosing the optimal set of nodes in a social networks so as to maximize the resulting spread of a technology (opinion, product ownership and so on), given a model of diffusion of influence in a network. A natural extension is a competitive setting, in which the goal is to maximize the spread of our technology in the presence of one or more competitors.

We suggest several natural extensions to the well-studied linear threshold model, showing that the original greedy approach cannot be used.

Furthermore, we show that for a broad family of competitive influence models, it is NP-hard to achieve an approximation that is better than a square root of the optimal solution; the same proof can also be applied to give a negative result for a conjecture in Carnes et al. about a general cascade model for competitive diffusion.

Finally, we suggest a natural model that is amenable to the greedy approach.

Yuval Filmus, Steve Hanneke, Idan Mehalel, Shay Moran, Bandit-feedback online multiclass classification: variants and tradeoffs

detailsabstractBibTeX
## BibTeX

arXiv

@misc{FHMM24,

title = {Bandit-feedback online multiclass classification: variants and tradeoffs},

author = {Yuval Filmus and Steve Hanneke and Idan Mehalel and Shay Moran},

year = {2024},

howpublished = {arXiv:2402.07453}

}

copy to clipboard
title = {Bandit-feedback online multiclass classification: variants and tradeoffs},

author = {Yuval Filmus and Steve Hanneke and Idan Mehalel and Shay Moran},

year = {2024},

howpublished = {arXiv:2402.07453}

}

Consider the domain of multiclass classification within the adversarial online setting. What is the price of relying on bandit feedback as opposed to full information? To what extent can an adaptive adversary amplify the loss compared to an oblivious one? To what extent can a randomized learner reduce the loss compared to a deterministic one? We study these questions in the mistake bound model and provide nearly tight answers.

We demonstrate that the optimal mistake bound under bandit feedback is at most $O(k)$ times higher than the optimal mistake bound in the full information case, where k represents the number of labels. This bound is tight and provides an answer to an open question previously posed and studied by Daniely and Helbertal [’13] and by Long [’17, ’20], who focused on deterministic learners.

Moreover, we present nearly optimal bounds of $\tilde\Theta(k)$ on the gap between randomized and deterministic learners, as well as between adaptive and oblivious adversaries in the bandit feedback setting. This stands in contrast to the full information scenario, where adaptive and oblivious adversaries are equivalent, and the gap in mistake bounds between randomized and deterministic learners is a constant multiplicative factor of 2.

In addition, our results imply that in some cases the optimal randomized mistake bound is approximately the square-root of its deterministic parallel. Previous results show that this is essentially the smallest it can get.

Yuval Filmus, Steve Hanneke, Idan Mehalel and Shay Moran, Optimal prediction using expert advice and randomized Littlestone dimension, Accepted to COLT

detailsabstractBibTeX
## BibTeX

arXiv

@inproceedings{FHMM23,

title = {Optimal prediction using expert advice and randomized {L}ittlestone dimension},

author = {Yuval Filmus and Steve Hanneke and Idan Mehalel and Shay Moran},

booktitle = {Conference on Learning Theory (COLT)},

year = {2023}

}

copy to clipboard
title = {Optimal prediction using expert advice and randomized {L}ittlestone dimension},

author = {Yuval Filmus and Steve Hanneke and Idan Mehalel and Shay Moran},

booktitle = {Conference on Learning Theory (COLT)},

year = {2023}

}

The Littlestone dimension of a hypothesis class captures the optimal mistake bound in online learning when the learner is deterministic.

In this work, we define a related parameter, the *randomized Littlestone dimension*, which captures the optimal mistake bound when the learner is randomized.

Using the new parameter, we prove nearly optimal bounds on prediction with expert advice when the learner is randomized, complementing past work on the deterministic setting.

Yuval Filmus, Idan Mehalel and Shay Moran, A resilient distributed boosting algorithm, ICML 2022

detailsabstractBibTeX
## BibTeX

@inproceedings{FMM22,

title = {A resilient distributed boosting algorithm},

author = {Yuval Filmus and Idan Mehalel and Shay Moran},

booktitle = {ICML'22},

year = {2022}

}

copy to clipboard
title = {A resilient distributed boosting algorithm},

author = {Yuval Filmus and Idan Mehalel and Shay Moran},

booktitle = {ICML'22},

year = {2022}

}

Given a learning task where the data is distributed among several parties, communication is one of the fundamental resources which the parties would like to minimize.

We present a distributed boosting algorithm which is resilient to a limited amount of noise.

Our algorithm is similar to classical boosting algorithms, although it is equipped with a new component, inspired by Impagliazzo’s hard-core lemma (Impagliazzo, 1995), adding a robustness quality to the algorithm.

We also complement this result by showing that resilience to any asymptotically larger noise is not achievable by a communication-efficient algorithm.

Yuval Filmus, Eldar Fischer, Johann A. Makowsky, Vsevolod Rakita, MC-finiteness of restricted set partition functions, Journal of Integer Sequences

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{FFMR23,

title = {MC-finiteness of restricted set partition functions},

author = {Yuval Filmus and Eldar Fischer and Johann A. Makowski and Vsevolod Rakita},

journal = {J. Integer. Seq.},

year = {2023+}}

copy to clipboard
title = {MC-finiteness of restricted set partition functions},

author = {Yuval Filmus and Eldar Fischer and Johann A. Makowski and Vsevolod Rakita},

journal = {J. Integer. Seq.},

year = {2023+}}

An integer sequence $(a_n)_{n \in \mathbb{N}}$ is *MC-finite* if for every $m \ge 1$, the sequence $a_n \bmod m$ is eventually periodic. We discuss two methods for proving MC-finiteness: exhibiting a suitable recurrence relation, and the Specker–Blatter theorem. We also give an interesting example of an integer sequence $a_n$ such that $a_n \bmod m$ is eventually periodic iff $m$ is odd, namely the sequence A086714.

Ofir Gordon, Yuval Filmus, Oren Salzman, Revisiting the Complexity Analysis of Conflict-Based Search: New Computational Techniques and Improved Bounds, SOCS 2021

detailsabstractBibTeX
## BibTeX

arXiv

@inproceedings{GFS21,

title = {Revisiting the Complexity Analysis of Conflict-Based Search: New Computational Techniques and Improved Bounds},

author = {Ofir Gordon and Yuval Filmus and Oren Salzman},

booktitle = {SOCS'21},

year = {2021}

}

copy to clipboard
title = {Revisiting the Complexity Analysis of Conflict-Based Search: New Computational Techniques and Improved Bounds},

author = {Ofir Gordon and Yuval Filmus and Oren Salzman},

booktitle = {SOCS'21},

year = {2021}

}

We analyze the complexity of Conflict-Based Search by setting up a bivariate recurrence and estimating its asymptotic rate of growth using the methods of Pemantle and Wilson.

Yuval Filmus, Asymptotic performance of the Grimmett–McDiarmid heuristic, Manuscript

detailsabstractBibTeX
## BibTeX

arXiv

@article{Filmus2020+,

author = {Yuval Filmus},

title = {Asymptotic performance of the {G}rimmett--{M}c{D}iarmid heuristic},

journal = {Manuscript}

}

copy to clipboard
author = {Yuval Filmus},

title = {Asymptotic performance of the {G}rimmett--{M}c{D}iarmid heuristic},

journal = {Manuscript}

}

In a paper on graph coloring, Grimmett and McDiarmid described a heuristic that finds a large clique in a $G(n,1/2)$ random graph. The heuristic simply scans the vertices in arbitrary order, adding any vertex adjacent to all vertices previously chosen.

Grimmett and McDiarmid showed that with high probability this produces a clique whose size is asymptotically $\log_2 n$, compared to the maximum clique whose size is asymptotically $2\log_2 n$.

We determine the asymptotic distribution of the size of the clique produced by the algorithm, which is obtained by taking the logarithm of an infinite sum of exponential random variables.

Prodinger mentions that the size of the clique has the same distribution as that of the Morris counter, analyzed by Flajolet. In particular, our formulas appear (in a different form) in Flajolet’s paper.

Edinah K. Gnang and Yuval Filmus, On the Bhattacharya–Mesner rank of third order hypermatrices, Linear Algebra and its Applications, Volume 588, 2020, pp. 391–418

detailsabstractBibTeX
## BibTeX

journal

@article{GF2020,

author = {Edinah K. Gnang and Yuval Filmus},

title = {On the {B}hattacharya--{M}esner rank of third order hypermatrices},

journal = {Linear Algebra and its Applications},

volume = {588},

year = {2020},

pages = {391--418}

}

copy to clipboard
author = {Edinah K. Gnang and Yuval Filmus},

title = {On the {B}hattacharya--{M}esner rank of third order hypermatrices},

journal = {Linear Algebra and its Applications},

volume = {588},

year = {2020},

pages = {391--418}

}

We study various aspects of the Bhattacharya–Mesner rank of third order hypermatrices.

Edinah K. Gnang and Yuval Filmus, On the spectra of direct sums and Kronecker product constructions, Linear Algebra and its Applications, Volume 519, 2017, pp. 238–277

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{GF2017,

author = {Edinah K. Gnang and Yuval Filmus},

title = {On the spectra of direct sums and {K}ronecker product constructions},

journal = {Linear Algebra and its Applications},

volume = {519},

pages = {238--277},

year = {2017}

}

copy to clipboard
author = {Edinah K. Gnang and Yuval Filmus},

title = {On the spectra of direct sums and {K}ronecker product constructions},

journal = {Linear Algebra and its Applications},

volume = {519},

pages = {238--277},

year = {2017}

}

We study the spectral theory of hypermatrices, initiated by Gnang, Elgammal and Retakh.

Here are some of our results:

- We show that Hadamard hypermatrices of side length 2 exist unless the order is an even number larger than 2.
- We determine the characteristic polynomial and hyperdeterminant of matrices of side length 2.
- We generalize the Rayleigh quotient to hypermatrices.

Yuval Filmus, Lower bounds for context-free grammars, Information Processing Letters, Volume 111, Issue 18, 2011, pp. 895–898

detailsabstractBibTeX
## BibTeX

journal

@article{Filmus2011,

author = {Yuval Filmus},

title = {Lower bounds for context-free grammars},

journal = {Information Processing Letters},

volume = {111},

issue = {18},

year = {2011},

pages = {895--898}

}

copy to clipboard
author = {Yuval Filmus},

title = {Lower bounds for context-free grammars},

journal = {Information Processing Letters},

volume = {111},

issue = {18},

year = {2011},

pages = {895--898}

}

Ellul, Krawetz, Shallit and Wang prove an exponential lower bound on the size of any context-free grammar generating the language of all permutations over some alphabet. We generalize their method and obtain exponential lower bounds for many other languages, among them the set of all squares of given length, and the set of all words containing each symbol at most twice.

The version below corrects two typos in the proof of Proposition 6: $w_1 \sim w_2$ should be $x(w_1) \sim x(w_2)$, and in the following sentence $N^{-1}(A)$ should be $x(N^{-1}(A))$; and a typo in the statement of Theorem 9: the exponent should be $t$ rather than $n$.

Yuval Filmus, Universal codes of the natural numbers, Logical Methods in Computer Science, Volume 9, Issue 3, 2013, Paper 7

detailsabstractBibTeX
## BibTeX

arXivjournal

@article{Filmus2013,

author = {Yuval Filmus},

title = {Universal codes of the natural numbers},

journal = {Logical Methods in Computer Science},

volume = {9},

issue = {3},

year = {2013},

pages = {paper 7}

}

copy to clipboard
author = {Yuval Filmus},

title = {Universal codes of the natural numbers},

journal = {Logical Methods in Computer Science},

volume = {9},

issue = {3},

year = {2013},

pages = {paper 7}

}

A code of the natural numbers is a uniquely-decodable binary code of the natural numbers with non-decreasing codeword lengths, which satisfies Kraft’s inequality tightly. We define a natural partial order on the set of codes, and show how to construct effectively a code better than a given sequence of codes, in a certain precise sense. As an application, we prove that the existence of a scale of codes (a well-ordered set of codes which contains a code better than any given code) is independent of ZFC.

Yuval Filmus, Inequalities on submodular functions via term rewriting, Information Processing Letters, Volume 113, Issue 13, 2013, pp. 457–464

detailsabstractBibTeX
## BibTeX

@article{Filmus2013,

author = {Yuval Filmus},

title = {Inequalities on submodular functions via term rewriting},

journal = {Information Processing Letters},

volume = {113},

issue = {13},

year = {2013},

pages = {457--464}

}

copy to clipboard
author = {Yuval Filmus},

title = {Inequalities on submodular functions via term rewriting},

journal = {Information Processing Letters},

volume = {113},

issue = {13},

year = {2013},

pages = {457--464}

}

We devise a method for proving inequalities on submodular functions, with a term rewriting flavor. Our method comprises of the following steps:

- Start with a linear combination $X$ of the values of the function.
- Define a set of simplification rules.
- Conclude that $X \ge Y$, where $Y$ is a linear combination of a small number of terms which cannot be simplified further.
- Calculate the coefficients of $Y$ by evaluating $X$ and $Y$ on functions on which the inequality is tight.

The crucial third step is non-constructive, since it uses compactness of the dual cone of submodular functions. Its proof uses the classical uncrossing technique with a quadratic potential function.

We prove several inequalities using our method, and use them to tightly analyze the performance of two natural (but non-optimal) algorithms for submodular maximization, the random set algorithm and local search.

Philip Bohannon, Nilesh Dalvi, Yuval Filmus, Nori Jacoby, Sathiya Keerthi and Alok Kirpal, Automatic web-scale information extraction, SIGMOD 2012

detailsabstractBibTeX
## BibTeX

conference

@inproceedings{BDFJKK2012,

author = {Philip Bohannon and Nilesh Dalvi and Yuval Filmus and Nori

Jacoby and Sathiya Keerthi and Alok Kirpal},

title = {Automatic web-scale information extraction},

booktitle = {Proceedings of the 2012 {ACM} {SIGMOD} International Conference on Management of Data},

year = {2012},

pages = {609--612}

}

copy to clipboard
author = {Philip Bohannon and Nilesh Dalvi and Yuval Filmus and Nori

Jacoby and Sathiya Keerthi and Alok Kirpal},

title = {Automatic web-scale information extraction},

booktitle = {Proceedings of the 2012 {ACM} {SIGMOD} International Conference on Management of Data},

year = {2012},

pages = {609--612}

}

In this demonstration, we showcase the technologies that we are building at Yahoo! for web-scale information extraction. Given any new website, containing semi-structured information about a pre-specified set of schemas, we show how to populate objects in the corresponding schema by automatically extracting information from the website.

Work done while I was a summer intern in Yahoo! Tel Aviv.