{"@context":"https:\/\/schema.org\/","@type":"ScholarlyArticle","@id":"#article7623","name":"Two Sides of the Coin Problem","abstract":"In the coin problem, one is given n independent flips of a coin that has bias b > 0 towards either Head or Tail. The goal is to decide which side the coin is biased towards, with high confidence. An optimal strategy for solving the coin problem is to apply the majority function on the n samples. This simple strategy works as long as b > c(1\/sqrt n) for some constant c. However, computing majority is an impossible task for several natural computational models, such as bounded width read once branching programs and AC^0 circuits.\r\n\r\nBrody and Verbin proved that a length n, width w read once branching program cannot solve the coin problem for b < O(1\/(log n)^w). This result was tightened by Steinberger to O(1\/(log n)^(w-2)). The coin problem in the model of AC^0 circuits was first studied by Shaltiel and Viola, and later by Aaronson who proved that a depth d size s Boolean circuit cannot solve the coin problem for b < O(1\/(log s)^(d+2)).\r\n\r\nThis work has two contributions:\r\n\r\n1. We strengthen Steinberger's result and show that any Santha-Vazirani source with bias b < O(1\/(log n)^(w-2)) fools length n, width w read once branching programs. In other words, the strong independence assumption in the coin problem is completely redundant in the model of read once branching programs, assuming the bias remains small. That is, the exact same result holds for a much more general class of sources.\r\n\r\n2. We tighten Aaronson's result and show that a depth d, size s Boolean circuit cannot solve the coin problem for b < O(1\/(log s)^(d-1)). Moreover, our proof technique is different and we believe that it is simpler and more natural.","keywords":["bounded depth circuits","read once branching programs","Santha-Vazirani sources","the coin problem"],"author":[{"@type":"Person","name":"Cohen, Gil","givenName":"Gil","familyName":"Cohen"},{"@type":"Person","name":"Ganor, Anat","givenName":"Anat","familyName":"Ganor"},{"@type":"Person","name":"Raz, Ran","givenName":"Ran","familyName":"Raz"}],"position":42,"pageStart":618,"pageEnd":629,"dateCreated":"2014-09-04","datePublished":"2014-09-04","isAccessibleForFree":true,"license":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode","copyrightHolder":[{"@type":"Person","name":"Cohen, Gil","givenName":"Gil","familyName":"Cohen"},{"@type":"Person","name":"Ganor, Anat","givenName":"Anat","familyName":"Ganor"},{"@type":"Person","name":"Raz, Ran","givenName":"Ran","familyName":"Raz"}],"copyrightYear":"2014","accessMode":"textual","accessModeSufficient":"textual","creativeWorkStatus":"Published","inLanguage":"en-US","sameAs":"https:\/\/doi.org\/10.4230\/LIPIcs.APPROX-RANDOM.2014.618","publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","isPartOf":{"@type":"PublicationVolume","@id":"#volume6231","volumeNumber":28,"name":"Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques (APPROX\/RANDOM 2014)","dateCreated":"2014-09-04","datePublished":"2014-09-04","editor":[{"@type":"Person","name":"Jansen, Klaus","givenName":"Klaus","familyName":"Jansen"},{"@type":"Person","name":"Rolim, Jos\u00e9","givenName":"Jos\u00e9","familyName":"Rolim"},{"@type":"Person","name":"Devanur, Nikhil R.","givenName":"Nikhil R.","familyName":"Devanur"},{"@type":"Person","name":"Moore, Cristopher","givenName":"Cristopher","familyName":"Moore"}],"isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#article7623","isPartOf":{"@type":"Periodical","@id":"#series116","name":"Leibniz International Proceedings in Informatics","issn":"1868-8969","isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#volume6231"}}}