A Lower Bound on the Trace Norm of Boolean Matrices and Its Applications
Abstract
We present a simple method based on a variant of Hölder’s inequality to lower-bound the trace norm of Boolean matrices. As the main result, we obtain an exponential separation between the randomized decision tree depth and the spectral norm (i.e. the Fourier -norm) of a Boolean function. This answers an open question of Cheung, Hatami, Hosseini and Shirley (CCC 2023). As immediate consequences, we obtain the following results.
-
We give an exponential separation between the logarithm of the randomized and the deterministic parity decision tree size. This is in sharp contrast with the standard binary decision tree setting where the logarithms of randomized and deterministic decision tree size are essentially polynomially related, as shown recently by Chattopadhyay, Dahiya, Mande, Radhakrishnan, and Sanyal (STOC 2023).
-
We give an exponential separation between the approximate and the exact spectral norm for Boolean functions.
-
We give an exponential separation for XOR functions between the deterministic communication complexity with oracle access to Equality function () and randomized communication complexity. Previously, such a separation was known for general Boolean matrices by Chattopadhyay, Lovett, and Vinyals (CCC 2019) using the Integer Inner Product (IIP) function.
-
Finally, our method gives an elementary and short proof for the mentioned exponential lower bound of Chattopadhyay, Lovett, and Vinyals for Integer Inner Product (IIP).
Keywords and phrases:
Boolean function complexity, parity decision trees, randomized communication complexityFunding:
Hamed Hatami: Supported by an NSERC grant.Copyright and License:
![[Uncaptioned image]](x1.png)
2012 ACM Subject Classification:
Theory of computation Communication complexity ; Theory of computation Oracles and decision treesEditors:
Raghu MekaSeries and Publisher:

1 Introduction
We start by recalling two fundamental notions related to the complexities of Boolean functions: the randomized parity decision tree complexity and the spectral norms.
A parity decision tree (PDT) for a Boolean function is similar to a standard decision tree with the following strengthened query power. Instead of a single variable, each internal node can query the parity (sum over ) of any subset of variables, e.g., . The parity decision tree complexity of , denoted by , is the smallest depth of a PDT that outputs the correct value of on every input . A randomized parity decision tree (RPDT) of depth at most is a probability distribution over PDTs of depth at most . It computes with error if, for every input , the RPDT outputs with probability at least . The randomized parity decision tree complexity, denoted by , is the smallest depth of an RPDT computing with error .
Parity decision trees are closely related to the Fourier expansions of Boolean functions. The spectral norm (also known as algebra norm) of a function , denoted by , is the sum of the absolute values of the Fourier coefficients.
It is easy to see from the Fourier expansion of a PDT that every Boolean function satisfies . The randomized counterpart of this inequality does not hold as illustrated by , the indicator function of the standard basis vectors : as observed in [14], , but . Nonetheless, this still leaves the possibility of open, where hides polylogarithmic dependencies on . Cheung et al. [8] specifically asked whether such a relation could hold, which if confirmed, would have established the stronger lower bound on .
The main result of this work gives an example in which is exponential in , answering the question by [8] in the negative.
Theorem 1 (Main theorem).
There exists a function with
In the converse direction, the quadratic gap holds for every Boolean function (see e.g. [14, Lemma 2.7]). Chattopadhyay, Mande, and Sherif [5] proved that the sink function SINK satisfies . This result and Theorem 1 together demonstrate that the measures and are not polynomially related in both ways.
The proof technique used in the main theorem involves an application of Hölder’s inequality with carefully-chosen parameters (see Section 3) that allow for a combinatorial interpretation of the problem. This framework is useful not only for the question considered above but also in communication complexity, where we will use the Hölder’s inequality technique to simplify the proofs of existing lower bounds. For the rest of this section, we will discuss applications of both the proof technique and of the main theorem itself.
1.1 Communication Complexity: The Power of Oracle Access to Equality
Arguably the most well-known communication problem is the Equality function eq, in which the two parties compare if their inputs are identical. In the model of public-coin randomized communication, two parties are given a publicly accessible random string and are allowed to make errors with probability bounded away from . It is an elementary result that has a randomized protocol requiring only bits of communication, while any deterministic protocol of eq requires bits of communication.
A natural question would be whether Equality fully captures the power of randomness in communication. A formal formulation of the question is to compare the relative power of randomized protocols and deterministic protocols with oracle access to Equality or, in short, protocols. A protocol performs communications as usual; in addition, the parties are given access to an oracle that computes Equality function, and each oracle call is charged at a cost of one bit. The seminal work by Chattopadhyay, Lovett and Vinyals [4] considered this question and proved an exponential separation between the complexity and randomized communication complexity (denoted as R) of the Integer Inner Product function (IIP) in dimension at least .
For a chosen dimension and parameter , the Boolean matrix is defined by
For this communication problem, each player holds a -bit input. As we only consider the case when , we treat as a -bit communication problem.
Chattopadhyay, Lovett, and Vinyals presented a (one-way) randomized protocol for of cost . For the lower bound, they introduced a lower bound technique which we call relative area method (see Theorem 13), and showed that no protocol could compute the function with fewer than bits of communication.
Theorem 2 ([4]).
For constant , and .
In a subsequent work, Cheung et al. [8] obtained a strengthening of Theorem 2 via a different approach of spectral methods. It was shown in [14] that
(1) |
for any boolean matrix , where is the normalized trace norm of with the normalization factor from the matrix dimensions (see Definition 10 for the precise definition).
Cheung et al. [8] observed that for , the matrix contains a point-line incidence matrix as a submatrix. The matrix is defined on the domains , and the entries of are given by
They proved that the normalized trace norm of is exponential in , which shows that . Since communication complexity does not increase under restriction, this subsequently implies Theorem 2.
Theorem 3 ([8]).
The Boolean matrix satisfies . Consequently, for ,
A common shortcoming of both proofs of Theorem 2 in [4, 8] is their highly technical nature. In Section 4, we give a considerably simplified proof – with improved linear factor on – based on the Hölder’s inequality technique. Here, we consider a different submatrix of , which is the point-line incidence system that proves the optimality of Szemerédi–Trotter theorem. We will provide the precise definition of in Section 4.
Theorem 4 (Improved version of Theorem 3).
The Boolean matrix satisfies . Consequently, for ,
Nondeterministic communication
When analyzing the power of Equality in communication, another model of interest is nondeterministic protocols with oracle access to Equality, or for short. For the precise definition of the model, we refer readers to [19]. and its relationships with related models have been studied previously, both implicitly in [12] and explicitly in [19]. In the latter work, Pitassi, Shirley and Shraibman analyzed the relative area method used by [4] to lower bound and showed that the same technique is applicable to complexity as well. It is not clear that the lower bound technique of [8] on the complexity of works for , so prior to this work it was open whether is hard for . We observe that the analysis in Theorem 4 can be adapted to the relative area method, and therefore yields an almost linear lower bound on for every .
Theorem 5.
For constant ,
As far as we know, this method cannot be improved to give a linear lower bound on . We leave resolving this logarithmic gap as an open question.
xor-lifts
A related open problem posed in [8] is whether an exponential separation of and holds for an xor-lift. For a Boolean function , the xor-lift is defined by for each . It can be verified that is not an xor-lift, so the -vs-R separation for the xor-lift case was open.
The matrix class of xor-lifts is interesting in complexity theory since many complexity measures of the matrix can be related (or even equated) to complexity measures of the Boolean function . Indeed, the query-to-communication connections allow us to translate the separation question to a purely query-complexity setting. For any Boolean function , the inequality
(2) |
is evident from the standard simulation of a randomized parity decision tree by a communication protocol. A result of [10] shows that
(3) |
Immediate from Equations 1, 2, and 3, we obtain the exponential -vs-R separation for xor-lifts from Theorem 1.
Corollary 6.
There exists a Boolean function such that its xor-lift satisfies and .
1.2 Query Complexity: The Power of Randomness
Understanding the power of randomized versus deterministic algorithms is a fundamental problem in complexity theory. Depending on the computational model, this problem varies from fully resolved to forbiddingly out of reach. In the standard decision tree model, it is well known that randomness does not significantly reduce the number of queries. One early result in complexity theory by Nisan [18] showed that a randomized decision tree of depth computing a Boolean function can be simulated by a deterministic decision tree of depth at most . On the other end of the spectrum, the randomized-versus-deterministic problem remains overwhelmingly difficult for Turing Machines.
A generic framework to study the relative powers of two computation models is to study the relations of the complexity classes defined by suitable complexity measures. For the sake of comparisons between measures, we consider the complexity measures normalized to the range . Given a complexity measure for a deterministic computation model, P is defined to be the class of functions (more accurately, sequences of functions ) such that . We define the class BPP similarly for the randomized counterpart of . The inclusion for every measure is obvious, so the randomized-versus-deterministic problem amounts to whether the classes P and BPP are equal.
We consider the two natural measures for trees, namely depth and logarithmic size (for normalization purposes) and four types of decision trees: (standard) decision tree (DT), parity decision tree (PDT), randomized decision tree (RDT), and randomized parity decision tree (RPDT). This branches into eight complexity measures in concern, and we define the other six measures , , , , and in an analogous manner to and . Based on the type of queries equipped and the complexity measure, the P-vs-BPP question branches into four pairs for comparison.
Standard decision trees
Parity decision trees
In the depth setting, the two classes P and BPP are strongly separated by the simple function of OR. It is well-known that the OR function on bits satisfies but , which provides the optimal separation and hence in this setting.
Note that however , so OR does not attest a separation between P and BPP in the size setting. Indeed, previous to this work the P-vs-BPP question was unknown in the size setting. As mentioned that for every function , an immediate corollary of Theorem 1 implies that in the size setting for parity decision trees.
Corollary 7.
There is a function such that , but .
In fact, the randomized parity decision tree in our construction is non-adaptive and has a one-sided error, hence we obtain the stronger separation 111RP denotes the class of functions computable by RPDT with constant one-sided error and poly-logarithmic costs in the size setting parity decision tree size model. It remains an interesting open problem to determine whether a separation of -vs- for and is possible, as in the case of depth illustrated by the OR function.
Question 8.
Is there a boolean function such that , but , or even ?
1.3 Fourier Analysis: Approximate versus Exact Spectral Norms
The notion of approximate norms is customary in complexity theory as complexity measures for models with error tolerance. The approximate spectral norm of a function with error , denoted as 222We adopt this function-like notation to emphasize that approximate spectral norm is not a norm despite what the name suggests, is the minimum for some function such that . As in the case of other complexity measures, we adopt the canonical choice when referring to constant error. Spectral norm and approximate spectral norm of a Boolean function are fundamental parameters that find applications in many areas such as learning theory [17], complexity theory [21, 22, 23, 1], communication complexity [23, 14, 8], Fourier analysis [23, 11] and additive combinatorics [13, 20, 9].
It is natural to ask whether the spectral norm of a Boolean function is upper bounded by its approximate spectral norm. Towards answering this question, Cheung et al. [9] observed that if is the indicator function of -bit strings of Hamming-weight 1, then but . Nevertheless, this separation does not rule out the possibility of polynomial relations with dependency on such as . Using the result by [14] that for any Boolean function , Theorem 1 immediately rules out the possibility of polynomial dependency.
Corollary 9.
There exists a function such that but .
2 Preliminaries
For a positive integer , we denote . All logarithms in this paper are base 2.
We denote the indicator function of a predicate as and the indicator function of a set as . For a random variable and a set , we write to indicate that is uniformly sampled from . Throughout this work, we adopt the standard big-O notations in computer science.
2.1 Schatten norms
For a vector and , we denote the -norm of as . For a matrix , the singular values of are the square roots of the eigenvalues of , which we denote by . The central matrix norms in this paper are Schatten -norm, which is defined as
for , and . Put differently, Schatten -norm of a matrix is the norm of the vector . One property of Schatten norms inherited from norms is the monotonicity of Schatten -norm in : for .
The Schatten 1-norm, 2-norm and -norm are frequently used and are commonly known as trace norm, Frobenius norm, and spectral norm respectively:
For applications in theoretical computer science, it is more convenient to work with the normalized trace norm as a complexity measure.
Definition 10 (Normalized trace norm).
For , the normalized trace norm of is
We remind readers that unlike essentially all other complexity measures and matrix norms used in this work, the normalized trace norm may increase upon restriction to a submatrix.
2.2 Fourier analysis of Boolean functions
This section gives a basic overview of Fourier analysis on the Boolean cube. For every , define the Fourier character as , where is the standard inner product over . For a function , its Fourier expansion is given by
(4) |
where the Fourier coefficient is defined as .
For a function and , the Fourier -norm is defined as
and . In other words, the Fourier -norm is the norm of the vector of Fourier coefficients. Fourier 1-norm is better known as the spectral norm of , i.e.
For an Abelian group, the convolution of two real-valued functions is a function defined to be
It is a standard fact in Fourier analysis that the Fourier transformation of convolution of two functions is the pointwise product of their respective Fourier transforms: .
Lastly, Parseval’s identity states that the squared Fourier 2-norm of a function is equal to its second moment (under uniform probability measure):
3 The Proof Framework
The key proof technique throughout this work is Hölder’s inequality with a nuanced choice of -norms. Hölder’s inequality states that for any satisfying ,
(5) |
for any real vectors . A generalization of Hölder’s inequality known as Littlewood’s inequality [15], which can be deduced from the standard Hölder’s inequality, relates the -norms of a function for some “interpolated” tuples of . The inequality states that for ,
(6) |
for any vector , where satisfies . As Schatten norms and Fourier norms are defined based on norms, the above inequality also holds with replacing the norms with these families of norms.
Setting the parameters (so that ) for Equation 6 yields the following lower bound for -norm (after some algebraic manipulations):
(7) |
As this is the sole parametrization of Hölder’s inequality that we employ, we colloquially refer to Equation 7 as “the Hölder’s inequality” in the rest of this work.
Among all the possible parametrizations for Littlewood’s inequality, the choice made in Equation 7 of is appealing because of the nice physical interpretations of 2-norm and 4-norm for Boolean matrices (the Schatten norms) and Boolean functions (the Fourier norms). One main inspiration of Equation 7 as a practical bound is the work of Chazelle and Lvov on hereditary discrepancy [7]. Chazelle and Lvov proved a hereditary discrepancy lower bound of a matrix in terms of its Schatten 2-norm and 4-norm, highlighting the combinatorial interpretations of these norms for Boolean matrices. In the next section, we illustrate the combinatorial perspective of Equation 7 with a simpler proof of Theorem 3.
4 Simplified Proof of Communication Complexity Lower Bounds
It is customary to associate a Boolean matrix with the biadjacency matrix of a bipartite graph . In view of this, the square of Schatten 2-norm i.e. Frobenius norm of is simply the number of edges of . The Schatten 4-norm of also admits a graph-theoretic interpretation:
In other words, is precisely the count of possibly degenerate 4-cycles in . This quantity becomes especially easy to evaluate when the underlying graph does not contain non-degenerate 4-cycles (-free), or equivalently, does not contain a all-one submatrix.
For a -free bipartite graph, all contributions to come from the counts of edges and paths of length 2. Furthermore, if is almost balanced in the sense that the average degree of is close to the maximum degree, Equation 7 indeed yields a non-trivial lower bound for :
Proposition 11.
Let be a -free bipartite graph with maximum degree . For , let be the degree of . If is the biadjacency matrix of , Then
Proof.
By Hölder’s inequality (Equation 7),
Since is -free, the expression of is simplified to
and the required bounds follow. Since every two distinct points define a unique line, the bipartite graph associated with any point-line incidence system (with no duplicated lines) is -free. From Proposition 11, one can readily derive an improved exponential normalized trace norm lower bound for PL using the same point-incidence submatrix in [8].
We prove a better bound by considering a point-line incidence system attributed to Paul Erdős (see [6, Lemma 6.25]). This point-line incidence system is constructed to show the tightness of the Szemerédi–Trotter incidence bound. Concretely, the matrix is defined as follows: the input domains are and , and the entries are given by
We first show that contains as a submatrix.
Claim 12.
The matrix contains the matrix as a submatrix.
Proof.
The condition of incidence of can be rewritten as , which is an instance of integer inner product. For , the magnitude of each entry is bounded by , therefore is a submatrix of .
Proof of Theorem 4.
As noted above, is -free because no two distinct lines intersect at the same pair of points. For the matrix , each line is incident to exactly one point of the form for each . Therefore the bipartite graph defined by contains edges. Also, each point is incident to at most one line of the form for each , hence the maximum degree of the graph is . By Proposition 11,
By 12 and Equation 1, we obtain
As mentioned earlier, Chattopadhyay, Lovett, and Vinyals [4] proved a linear lower bound on for by a method different from the approach in [8] and this work. The method used in [4], the relative area method, considered a parametrized weighted sum of monochromatic rectangle partition of a Boolean matrix. The following lower bound is deduced from the communication complexity lower bound with more general oracle access.
Theorem 13 ([4, Lemmas 3.5 and 3.7]).
Suppose is a Boolean matrix with 1-entries, and the maximum area of any 1-monochromatic rectangle in is . For any constant ,
For the matrix , as observed in the proof of Theorem 4, and since is -free. Applying Theorem 13 with for some very small constant , we obtain a linear lower bound with a slightly inferior constant due to the slackness in . We can also use this technique to lower bound , which proves Theorem 5.
Theorem 14 ([19]).
Let be a Boolean matrix, be the number of 1-entries in and let be the size of the largest 1-monochromatic rectangle in . Then
Proof of Theorem 5.
As noted before, and . For , applying Theorem 14 gives
and therefore the same lower bound holds for for .
5 Proof of the Main Theorem
The Hölder’s inequality supplies a large lower bound on 1-norm in the scenario of large 2-norm and small 4-norm. The proof of Theorem 3 utilizes the -free property and sufficient edge density of PL to show the desired trace norm lower bound. We adopt the same strategy in exhibiting a function that the separation of randomized parity decision tree depth and spectral norm.
As in the matrix case, we begin by examining the physical interpretations of -norms in the Hölder’s inequality. A fundamental quantity in additive combinatorics known as the additive energy, coincides with the fourth power of Fourier 4-norm in Boolean function setting.
Definition 15 (Additive energy).
For over an Abelian group , the additive energy of is defined as
For a Boolean function , tt is straightforward to show that :
It is also direct from Parseval’s identity that . Therefore in the Boolean function setting, Equation 7 states that
(8) |
Emulating the approach in Section 4 to guarantee a small 4-norm, we consider a Boolean function that satisfies for any distinct as an analogue of -free bipartite graphs. For such a function, the additive energy of is lower than typical as only tuples of could contribute to . A function with this property is precisely the indicator function of a Sidon set.
Definition 16 (Sidon set).
For an Abelian group , a set is called a Sidon set if for every such that , then .
The indicator of a Sidon set emerges as a natural candidate function that attains the exponential spectral norm lower bound stated in Theorem 1. Indeed, one can show that the spectral norm of an indicator of a sufficiently big Sidon set is large.
Proposition 17.
Every Sidon set of a finite Abelian group satisfies .
Proof.
Since is a Sidon set, implies that or . Thus
Applying Hölder’s inequality (Equation 8) gives
By Cauchy-Schwarz inequality and Parseval identity, it is direct to check that for any set , the spectral norm of is at most . The above proposition shows that this upper bound is tight up to constant factor for a Sidon set.
By considering the possible sums of a pair of elements, it is easy to see that for a Sidon set , we have and hence . In the case of 333For clarity, in the rest of this section, we use the notation to refer to the additive group of size 2., a well-known construction of a Sidon set matching the size upper bound is the Bose–Chaudhuri–Hocquenghem (BCH) code [2, 16]. This code is constructed from polynomials over a finite field of characteristic .
Denote the characteristic-2 finite field of size . The elements of can be isomorphically identified with univariate -polynomials of degree at most , where multiplication is defined modulus a fixed irreducible polynomial of degree . Viewing as additive groups, is isomorphic to .
For where is a prime, the Sidon set construction in [2] is given by the tuples over all in a suitable subfield and a suitable exponent . For , the construction takes the form of , where for a set we define
For the sake of completeness, we include the proof for this specific construction.
Theorem 18 ([2]).
For every even number , the set is a Sidon set.
Proof.
Let and be two pairs with a prescribed sum . This means and , which implies that
Suppose i.e. , then . The same calculation concludes that and are the roots of the quadratic equation . Since a quadratic equation has at most two roots, is uniquely determined by and .
Theorem 18 allows us to construct a large Sidon set in . Since a subset of a Sidon set remains a Sidon set, it remains to select a suitably structured subset whose indicator function is computable with a short randomized parity decision tree. As mentioned earlier, every element in can be uniquely identified with a polynomial in of degree at most . For , denote the set of -polynomials of degree at most . We show that is the desired Sidon set.
Theorem 19.
Let for some , and . The Boolean function satisfies that and .
Proof.
Note that is a Sidon set of size . The spectral norm lower bound follows from Proposition 17. It remains to upper-bound the randomized parity decision tree complexity.
We first describe a randomized algorithm that computes . Suppose a pair with and is a given. To determine whether , we interpret as a polynomial in , where , and check whether . This can be accomplished using the standard randomized polynomial identity testing algorithm: pick a random and evaluate . The algorithm declares that “” if any of the evaluated values is non-zero, and declares “” otherwise.
Notice that this randomized algorithm has a one-sided error, as it always makes the correct declaration when (i.e. ). In the case of , since the polynomial has at most roots, the probability of error is at most .
Next, we convert the randomized algorithm into a randomized parity decision tree. For every , the set
is a linear subspace of co-dimension in , and each coset of takes a fixed value when evaluated at . Therefore, the value of is determined by deterministic linear queries to . Similarly, the value of is determined by deterministic linear queries to . Hence, we construct the randomized parity decision tree as follows: pick a random and make the parity queries that determine the values of , and the decision tree outputs whether and are equal.
5.1 Payley-Zygmud inequality and typical Fourier coefficients
Here instead of Hölder’s inequality, we use the Payley-Zygmund inequality to deduce a stronger conclusion than Proposition 17 which could be of independent interest. We show that for the indicator of a Sidon set, a constant fraction of the Fourier coefficients is large. We have shown that for a Sidon set in an Abelian group ,
Consider the random variable where is a character picked uniformly at random. The above bounds translate to and . By Paley-Zygmund inequality, we have for any ,
Taking for example, this gives
References
- [1] Nikhil Bansal and Makrand Sinha. k-forrelation optimally separates quantum and classical query complexity. In Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing, STOC 2021, pages 1303–1316, New York, NY, USA, 2021. Association for Computing Machinery. doi:10.1145/3406325.3451040.
- [2] R.C. Bose and D.K. Ray-Chaudhuri. On a class of error correcting binary group codes. Information and Control, 3(1):68–79, March 1960. doi:10.1016/s0019-9958(60)90287-4.
- [3] Arkadev Chattopadhyay, Yogesh Dahiya, Nikhil S. Mande, Jaikumar Radhakrishnan, and Swagato Sanyal. Randomized versus deterministic decision tree size. In Proceedings of the 55th Annual ACM Symposium on Theory of Computing, STOC ’23. ACM, June 2023. doi:10.1145/3564246.3585199.
- [4] Arkadev Chattopadhyay, Shachar Lovett, and Marc Vinyals. Equality alone does not simulate randomness. In 34th Computational Complexity Conference (CCC 2019), 2019. doi:10.4230/LIPICS.CCC.2019.14.
- [5] Arkadev Chattopadhyay, Nikhil S. Mande, and Suhail Sherif. The log-approximate-rank conjecture is false. J. ACM, 67(4):23:1–23:28, 2020. doi:10.1145/3396695.
- [6] Bernard Chazelle. The discrepancy method: randomness and complexity. Cambridge University Press, 2001.
- [7] Bernard Chazelle and Alexey Lvov. A trace bound for the hereditary discrepancy. In Proceedings of the sixteenth annual symposium on Computational geometry, pages 64–69, 2000. doi:10.1145/336154.336179.
- [8] Tsun-Ming Cheung, Hamed Hatami, Kaave Hosseini, and Morgan Shirley. Separation of the factorization norm and randomized communication complexity. In 38th Computational Complexity Conference (CCC 2023). Schloss Dagstuhl – Leibniz-Zentrum für Informatik, 2023. doi:10.4230/LIPICS.CCC.2023.1.
- [9] Tsun-Ming Cheung, Hamed Hatami, Rosie Zhao, and Itai Zilberstein. Boolean functions with small approximate spectral norm. Electron. Colloquium Comput. Complex., TR22-041, 2022. URL: https://eccc.weizmann.ac.il/report/2022/041, arXiv:TR22-041.
- [10] Kenneth R. Davidson and Allan P. Donsig. Norms of schur multipliers. Illinois Journal of Mathematics, 51(3), July 2007. doi:10.1215/ijm/1258131101.
- [11] Uma Girish, Avishay Tal, and Kewen Wu. Fourier Growth of Parity Decision Trees. In 36th Computational Complexity Conference (CCC 2021), volume 200 of Leibniz International Proceedings in Informatics (LIPIcs), pages 39:1–39:36, Dagstuhl, Germany, 2021. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2021.39.
- [12] Mika Göös, Toniann Pitassi, and Thomas Watson. The landscape of communication complexity classes. computational complexity, 27(2):245–304, June 2018. doi:10.1007/s00037-018-0166-6.
- [13] Ben Green and Tom Sanders. Boolean functions with small spectral norm. Geometric and Functional Analysis, 18(1):144–162, March 2008. doi:10.1007/s00039-008-0654-y.
- [14] Lianna Hambardzumyan, Hamed Hatami, and Pooya Hatami. Dimension-free bounds and structural results in communication complexity. Israel Journal of Mathematics, 253(2):555–616, 2023.
- [15] G H Hardy, J E Littlewood, and Georg Polya. Cambridge mathematical library: Inequalities. Cambridge University Press, Cambridge, England, February 1988.
- [16] Alexis Hocquenghem. Codes correcteurs d’erreurs. Chiffres, 2:147–156, 1959.
- [17] Eyal Kushilevitz and Yishay Mansour. Learning decision trees using the fourier spectrum. In Proceedings of the Twenty-Third Annual ACM Symposium on Theory of Computing, STOC ’91, pages 455–464, New York, NY, USA, 1991. Association for Computing Machinery. doi:10.1145/103418.103466.
- [18] Noam Nisan. Crew prams and decision trees. In Proceedings of the twenty-first annual ACM symposium on Theory of computing, pages 327–335, 1989. doi:10.1145/73007.73038.
- [19] Toniann Pitassi, Morgan Shirley, and Adi Shraibman. The strength of equality oracles in communication. In 14th Innovations in Theoretical Computer Science Conference (ITCS 2023), volume 251 of Leibniz International Proceedings in Informatics (LIPIcs), pages 89:1–89:19, Dagstuhl, Germany, 2023. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.ITCS.2023.89.
- [20] Tom Sanders. Boolean functions with small spectral norm, revisited. Math. Proc. Camb. Philos. Soc., 167(02):335–344, September 2019.
- [21] Amir Shpilka, Avishay Tal, and Ben lee Volk. On the structure of boolean functions with small spectral norm. Computational Complexity, 26(1):229–273, September 2017. doi:10.1007/s00037-015-0110-y.
- [22] Avishay Tal. Tight Bounds on the Fourier Spectrum of AC0. In 32nd Computational Complexity Conference (CCC 2017), volume 79 of Leibniz International Proceedings in Informatics (LIPIcs), pages 15:1–15:31, Dagstuhl, Germany, 2017. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2017.15.
- [23] Hing Yin Tsang, Chung Hoi Wong, Ning Xie, and Shengyu Zhang. Fourier sparsity, spectral norm, and the log-rank conjecture. In 2013 IEEE 54th Annual Symposium on Foundations of Computer Science, pages 658–667, 2013. doi:10.1109/FOCS.2013.76.