{"@context":"https:\/\/schema.org\/","@type":"ScholarlyArticle","@id":"#article6663","name":"Evasiveness and the Distribution of Prime Numbers","abstract":"A Boolean function on $N$ variables is called \\emph{evasive} if its decision-tree complexity is $N$. A sequence $B_n$ of Boolean functions is \\emph{eventually evasive} if $B_n$ is evasive for all sufficiently large $n$.\r\n\r\nWe confirm the eventual evasiveness of several classes of monotone graph properties under widely accepted number theoretic hypotheses. In particular we show that Chowla's conjecture on Dirichlet primes implies that (a) for any graph $H$, ``forbidden subgraph $H$'' is eventually evasive and (b) all nontrivial monotone properties of graphs with $\\le n^{3\/2-\\epsilon}$ edges are eventually evasive. ($n$ is the number of vertices.)\r\n\r\nWhile Chowla's conjecture is not known to follow from the Extended Riemann Hypothesis (ERH, the Riemann Hypothesis for Dirichlet's $L$ functions), we show (b) with the bound $O(n^{5\/4-\\epsilon})$ under ERH.\r\n\r\nWe also prove unconditional results: (a$'$) for any graph $H$, the query complexity of ``forbidden subgraph $H$'' is $\\binom{n}{2} - O(1)$; (b$'$) for some constant $c>0$, all nontrivial monotone properties of graphs with $\\le cn\\log n+O(1)$ edges are eventually evasive. \r\n\r\nEven these weaker, unconditional results rely on deep results from number theory such as Vinogradov's theorem on the Goldbach conjecture. \r\n\r\nOur technical contribution consists in connecting the topological framework of Kahn, Saks, and Sturtevant (1984), as further developed by Chakrabarti, Khot, and Shi (2002), with a deeper analysis of the orbital structure of permutation groups and their connection to the distribution of prime numbers. Our unconditional results include stronger versions and generalizations of some result of Chakrabarti et al.","keywords":["Decision tree complexity","evasiveness","graph property","group action","Dirichlet primes","Extended Riemann Hypothesis"],"author":[{"@type":"Person","name":"Babai, L\u00e1szl\u00f3","givenName":"L\u00e1szl\u00f3","familyName":"Babai"},{"@type":"Person","name":"Banerjee, Anandam","givenName":"Anandam","familyName":"Banerjee"},{"@type":"Person","name":"Kulkarni, Raghav","givenName":"Raghav","familyName":"Kulkarni"},{"@type":"Person","name":"Naik, Vipul","givenName":"Vipul","familyName":"Naik"}],"position":8,"pageStart":71,"pageEnd":82,"dateCreated":"2010-03-09","datePublished":"2010-03-09","isAccessibleForFree":true,"license":"https:\/\/creativecommons.org\/licenses\/by-nd\/3.0\/legalcode","copyrightHolder":[{"@type":"Person","name":"Babai, L\u00e1szl\u00f3","givenName":"L\u00e1szl\u00f3","familyName":"Babai"},{"@type":"Person","name":"Banerjee, Anandam","givenName":"Anandam","familyName":"Banerjee"},{"@type":"Person","name":"Kulkarni, Raghav","givenName":"Raghav","familyName":"Kulkarni"},{"@type":"Person","name":"Naik, Vipul","givenName":"Vipul","familyName":"Naik"}],"copyrightYear":"2010","accessMode":"textual","accessModeSufficient":"textual","creativeWorkStatus":"Published","inLanguage":"en-US","sameAs":"https:\/\/doi.org\/10.4230\/LIPIcs.STACS.2010.2445","publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","isPartOf":{"@type":"PublicationVolume","@id":"#volume6208","volumeNumber":5,"name":"27th International Symposium on Theoretical Aspects of Computer Science","dateCreated":"2010-03-09","datePublished":"2010-03-09","editor":[{"@type":"Person","name":"Marion, Jean-Yves","givenName":"Jean-Yves","familyName":"Marion"},{"@type":"Person","name":"Schwentick, Thomas","givenName":"Thomas","familyName":"Schwentick"}],"isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#article6663","isPartOf":{"@type":"Periodical","@id":"#series116","name":"Leibniz International Proceedings in Informatics","issn":"1868-8969","isAccessibleForFree":true,"publisher":"Schloss Dagstuhl \u2013 Leibniz-Zentrum f\u00fcr Informatik","hasPart":"#volume6208"}}}