A Pseudorandom Generator for Functions of Low-Degree Polynomial Threshold Functions
Abstract
Developing explicit pseudorandom generators (PRGs) for prominent categories of Boolean functions is a key focus in computational complexity theory. In this paper, we investigate the PRGs against the functions of degree- polynomial threshold functions (PTFs) over Gaussian space. Our main result is an explicit construction of PRG with seed length that can fool any function of degree- PTFs with probability at least . More specifically, we show that the summation of independent -moment-matching Gaussian vectors -fools functions of degree- PTFs, where and . The PRG is then obtained by applying an appropriate discretization to Gaussian vectors with bounded independence.
Keywords and phrases:
Pseudorandom generators, polynomial threshold functionsCategory:
Track A: Algorithms, Complexity and GamesCopyright and License:
![[Uncaptioned image]](x1.png)
2012 ACM Subject Classification:
Theory of computation Pseudorandomness and derandomizationFunding:
PY and MZ were supported by National Natural Science Foundation of China (Grant Nos. 62332009 and 12347104), Innovation Program for Quantum Science and Technology (Grant No. 2021ZD0302901), NSFC/RGC Joint Research Scheme (Grant No. 12461160276), Natural Science Foundation of Jiangsu Province (Grant No. BK20243060), and New Cornerstone Science Foundation.Editors:
Keren Censor-Hillel, Fabrizio Grandoni, Joël Ouaknine, and Gabriele PuppisSeries and Publisher:

1 Introduction
In computational complexity theory, derandomization is a powerful technique that aims to reduce randomness in algorithms without sacrificing efficiency or accuracy. A versatile approach for derandomization is to design explicit pseudorandom generators (PRGs) for notable families of Boolean functions. A PRG for a family of Boolean functions is able to consume few random bits and produce a distribution over high-dimensional vectors, which is indistinguishable from a target distribution, such as the uniform distribution over Boolean cube, by any function in the family. In this paper, we concern ourselves with the Gaussian distribution over . Formally,
Definition 1.
Let be a family of Boolean functions. A function is a pseudorandom generator for with error over Gaussian distribution if for any ,
We call the seed length of . We also say -fools over the Gaussian distribution.
There has been a considerable amount of research developing PRGs for various Boolean function families, including halfspaces, polynomial threshold functions and intersections of halfspaces. Let be the function such that iff . A halfspace is a Boolean function of the form for some . Halfspaces are a fundamental class of Boolean functions which have found significant applications in machine learning, complexity theory, theory of approximation and more. A very successful series of work produced PRGs that -fools halfspaces with seed length poly-logarithmic in and over both Boolean space [28, 5, 21, 7] and Gaussian space [19]. Polynomial threshold functions (PTFs) are functions of the form where is a polynomial. We call is a degree- PTF if is a degree- polynomial. PTFs are natural generalization for halfspaces since a halfspace is a degree- PTF. An explicit PRG that -fools PTFs over Boolean space has been achieved with seed length [21]. As for Gaussian space, a sequence of work [6, 12, 13, 14, 21, 15, 16, 24, 17] succeeds in giving a PRG with seed length polynomial in , and [24, 17]. Another extension for halfspaces is intersections of halfspaces which are polytopes with facets. A line of work [8, 9, 27, 4, 25] results in PRGs with seed length polynomial in , and over Boolean space [25] and over Gaussian space [4].
Considering the prosperity of PRGs for these functions families, we commence designing PRGs for functions of degree- polynomial threshold functions.
Definition 2.
We say a function is a function of degree- PTFs if there exist polynomials of degree and a Boolean function such that
This family consumes all three function families we discussed above. For example, it includes intersections of halfspaces by setting and . The research on PRGs for functions of PTFs is driven by several motivations beyond its fundamental role in derandomization tasks. For instance, the collection of satisfying assignments of an intersection of degree- PTFs corresponds to the feasible solutions set of an -integer quadratic programing [22] with constraints. The investigation into the structure of these sets has been a central focus of extensive research in areas including learning theory, counting, optimization, and combinatorics.
In this work, we consider building explicit PRGs for functions of degree- PTFs over Gaussian space. Before presenting our main result, we briefly revisit relevant prior work on fooling functions of halfspaces.
Reference | Function Family | Seed Length | ||||
[8] | Monotone functions of halfspaces | |||||
[9] | Intersections of -regular halfspaces |
|
||||
[27] | Intersections of weight- halfspaces | |||||
[25] | Intersections of halfspaces |
|
||||
[4] |
|
|
||||
[6] | Intersections of degree- PTFs |
1.1 Prior Work
The related work is summarized in Table 1. Gopalan, O’Donnell, Wu and Zuckerman [8] constructed PRGs for monotone functions of halfspaces. They modified the PRG for halfspaces in [21] and showed the modified PRG -fools any monotone function of halfspaces over a broad class of product distributions with seed length . When any , the seed length can be further improved to .
Harsha, Klivans and Meka [9] considered designing PRGs for intersections of regular halfspaces (i.e., halspaces with low influence). A halfspace is -regular if . They gave an explicit PRG construction for intersections of -regular halfspaces over proper and hypercontractive distributions with seed length when is no more than a threshold. Their proof is based on developing an invariance principle for intersections of regular halfspaces via a generalization of the well-known Lindeberg method [20] and an anti-concentration result of polytopes in Gaussian space from [18].
By extending the approach of [9] and combing the results on bounded independence fooling CNF formulas [1, 26], Servedio and Tan [27] designed an explicit PRG that -fools intersections of weight- halfspaces over Boolean space with seed length. A halfspace is said to be weight- if each is an integer in .
As for intersections of general halfspaces, O’Donnell, Servedio and Tan [25] gave a PRG construction over Boolean space with a polylogarithmic seed length dependence on and . Their proof involves a novel invariance principle for intersections of arbitrary halfspaces and a Littlewood–Offord style anticoncentration inequality for polytopes over Boolean space.
Concurrently, Chattopadhyay, De and Servedio [4] proposed a simple PRG that -fools intersections of general halfspaces over Gaussian space, building upon the concept of Johnson-Lindenstrauss transform [10, 11]. The seed length is . Additionally, they show that the same PRG with seed length is able to fool arbitrary functions of halfspaces.
Speaking of fooling functions of PTFs, the study by Diakonikolas, Kane and Nelson [6] stands out as the sole work that constructs a PRG for intersections of degree- PTFs. Their PRG is specific to degree with a seed length.
1.2 Main Result
In this work, we investigate the PRGs fooling any function of low-degree PTFs. The main result is the following.
Theorem 3 (Informal version of Theorem 20).
There exists an explicit PRG -fools any function of degree- PTFs over Gaussian space with seed length .
The proof is inspired by the PRG proposed in [13] and the work [17]. This theorem follows from two components.
(1) Bounded independence fools functions of degree- PTFs
Consider the continuous random vector where is a -wise independent standard Gaussian vector of length . Every is a standard Gaussian variable and for any degree- polynomial , . We will prove that
Theorem 4.
(Informal version of Theorem 16) With and , the distribution of -fools any function of degree- PTFs over Gaussian space.
The prior work [17] shows that bounded independence fools a single low-degree polynomial threshold function. This generalizes their work to the case of functions of low-degree PTFs.
(2) Discretization of bounded independence Gaussians
An explicit PRG construction requires a discrete approximation to Gaussian vectors with bounded independence. The idea is to use a finite entropy random variable to approximate . Previous work [13] uses the idea that a single Gaussian variable can be produced by two uniform random variables in through the Box–Muller transform [2]. Therefore bounded independence Gaussian variables can be generated by using bounded independence uniform random variables. Then by truncating these uniform random variables to a sufficient precision, we obtain vectors that serve as a discrete approximation of . We prove that also fools functions of degree- PTFs as long as is a good approximation to .
Lemma 5 (Informal version of Lemma 19).
If and are sufficiently close with high probability, then also fools functions of degree- PTFs.
2 Preliminary
Basic Notation
For , denotes the set . For and , denotes the -th coordinate of , and . For , denotes the vector such that for all , and . For , . When it is clear from the context, we will use both subscript and superscript as indices.
Derivatives and Multidimensional Taylor Expansion
For a function and , we use to denote the partial derivative taken times in the -th coordinate and define . For and , we use to denote the partial derivative taken times in and times in . Using these notations, one has:
Theorem 6 (Multidimensional Taylor’s Theorem).
Let and be a function. Then for all ,
where for some .
Bump Function
Consider the bump function defined by It is well known that this function is infinitely differentiable and the derivatives are bounded.
Fact 7.
For all , .
Let be the smooth univariate function defined by It is easy to see is obtained from via translation, stretch, and concatenation. We have
Fact 8.
For all , .
Fact 9.
Let for some constant . Then we have that for all , .
We include the proof for the above three facts in Appendix A for self-containment.
Gaussian Space and the Gaussian Noise Operator
We denote by that is a random vector whose components are independent standard Gaussian variables (i.e., with mean and variance ). We say a random vector is a -wise independent standard Gaussian vector if every component of is a standard Gaussian variable and for all polynomials with degree at most . For a function on Gaussian space and , the -norm is denoted by For , the Gaussian noise operator is the operator on the space of functions defined by
The probabilists’ Hermite polynomials [23, Section 11] are defined by where . The univariate Hermite polynomials are defined by normalization: . For a multi-index , the (multivariate) Hermite polynomial is The degree of is . The Hermite polynomials form an orthonormal basis for the functions over Gaussian space: iff , and every degree- polynomial can be uniquely expanded as We can also expand the function in the Hermite basis in a manner similar to Taylor expansion.
Lemma 10 (Lemma 16 in [17]).
Suppose , we have where .
The function has the following expansion: The definition of can be extended to by its action on the Hermite polynomials: . We will use the following hypercontractive inequality:
Theorem 11.
Let and , .
For more details on analysis over Gaussian space, readers may refer to [23].
Low-Degree Polynomials
Low-degree polynomials are extensively studied in the literature. We list some results used in this paper. It is well-know that low-degree polynomials have the following anti-concentration property:
Lemma 12 (Theorem 8 in [3]).
Let be a polynomial of degree with . Then we have
Suppose is a low-degree polynomial, the following gives an estimation on the deviation of caused by a small perturbation.
Lemma 13 (Lemma 22 in [13]).
Let be a polynomial of degree with . Suppose be a vector with . Let be another vector such that . Then we have
The magnitudes of the derivatives of a low-degree polynomial are likely to grow at a moderate rate with high probability. Formally,
Lemma 14 (Lemma 6 in [17]).
Let be an arbitrary polynomial of degree and , the following holds with probability at least :
The following lemma gives quantitative bounds on how much the derivatives are concentrated around those of when .
Lemma 15 (Lemma 23 in [17]).
Let and be an arbitrary polynomial of degree and . For and ,
3 Fooling the Functions of PTFs via Bounded Independence
In this section, we show that a random Gaussian vector matching certain moments fools any function of low-degree polynomial threshold functions. Formally, we prove
Theorem 16.
Fix a small constant and let be an integer. Let be arbitrary polynomials of degree and be an arbitrary Boolean function. Define function
Let where is a -wise independent standard Gaussian vector of length and . Then, we have
The key idea in the proof of Theorem 16 is to analyze the derivatives of the disturbed function . We will see that once the derivatives of are well-controlled by its preceding order derivative at , is concentrated around for a random , and and share the same sign with high probability. Starting from this point, we use the mollifier introduced in [17]
(1) |
to judge whether the derivatives are all well-controlled for all polynomials. as long as a certain order of derivative that is not controlled by its preceding order derivative. Our proof consists of following steps:
-
Approximation using the mollifier : We first establish that
This approximation enables us to focus primarily on the analysis of in the subsequent steps.
-
Hybrid argument: Let , where and . We will show
(2) Therefore by the triangle inequality, we have
To prove (2), we show for any fixed ,
This is done by a case analysis:
-
–
The derivatives of all polynomials are well-controlled at point . In this case, all and share the same sign with high probability. Thus, it is highly likely that and are nearly the same constant. It suffices to show fools the mollifier function .
-
–
At least one derivative is not controlled. In this case, we will show that and are with high probability. This implies that with overwhelming probability.
-
–
In the subsequent sections, Section 3.1 first demonstrates that is able to fool the mollifier function when is a well-behaved point. Section 3.2 shows the closeness of a single step in the hybrid argument. Lastly, we prove Theorem 16 using approximation and the hybrid argument in Section 3.3.
3.1 Fooling the Mollifier
We begin with proving that a -wise independent standard Gaussian vector fools the mollifier function . To achieve this, we utilize the Taylor expansion to expand the mollifier function up to a specified order. As a result, is decomposed into two parts: a degree- polynomial and a remainder term . We mainly show that is negligible under both pseudorandom distribution and true Gaussian distribution. This leads us to the conclusion that and . Furthermore, since has degree at most , it follows that . Thus, we conclude that .
Lemma 17.
Fix a small constant and let be an integer. Let be arbitrary polynomials of degree . Define for all . Suppose that a fix point satisfies for any and . Let be a -wise independent standard Gaussian vector of length . For , we have
where is defined in (1).
Proof.
Let and by the definition of function defined in (1),
Define variables and by letting and as functions of . Apparently, we have
Therefore, it is equivalent to prove
To this end, we expand into -th order using the Taylor expansion at some point : where is a polynomial of of degree at most and is the remainder. Since is -wise independent, we know . Therefore, it suffices to show and are bounded by .
More specifically, we choose to expand at points and via Theorem 6: where
and
for some on the line segment joining and . It is not hard to see that is a polynomial of of degree at most . For the remainder term , we will prove the following bound:
We now give bounds on . The same argument applies to as well. Fix a small constant . Let be the event that
Now let . Note that
Here, when event occurs and otherwise. Therefore, by the triangle inequality, we have
(Cauchy–Schwarz) |
We are next to bound Term .
Bounding Term 1.
If event occurs, we have
where the second inequality is from Fact 9, and the third one is true by the following facts:
-
, ,
-
and , since lies between and .
This gives us
Bounding Term 2.
Since
and
we have
(3) |
This gives us
where the second inequality is from Markov’s inequality, the third one is from Lemma 15 and the fourth one holds since satisfies for any and . For , we have Consequently, Therefore, we have
Bounding Term 3.
We next to upper bound . Note that
By generalized Hölder’s inequality, for
Note that for ,
where the first inequality is from , the second one is from Eq.(3) and the third inequality is from Lemma 15. Therefore,
Consequently,
For sufficiently small, we have
Thus, putting everything together, we have
We now regard as a function of , and from the above inequality we have
Similarly, the same argument applying on -wise independent Gaussian vector gives us
The lemma then follows from the fact that , since is a polynomial of of degree at most .
3.2 A Single Step in the Hybrids
In this section, we analyze one single step in the entire hybrid argument. We will show that for any , we have that for -wise independent Gaussian and true Gaussian .
Let . The proof proceeds through a case analysis based on the behavior of at the fixed point . Specifically, we define as well-behaved if for all and . In other words, for each function , its -th order derivatives are controlled by its -th order derivatives.
-
In the scenario where is not well-behaved, we can identify an and a such that with at least probability ,
Thus, it is highly probable that the mollifier function . So, the expectation of is no more that . The same argument works for as well.
-
For the case that is well-behaved, we will show that for all , and are nearly the same constant. This implies and are equal in most situations. Then it suffices to show fools the mollifier, as discussed in the previous section.
Lemma 18.
Fix a small constant and let be an integer. Let be arbitrary polynomials of degree and be an arbitrary Boolean function. Define function
Let be a -wise independent standard Gaussian vector of length . For any and
where is defined in (1).
Proof.
Let . Define is good if for any and , . We prove this lemma by considering is good or not.
We first consider that is not good. In this case, we will show holds with high probability. Consequently, is zero with high probability. To this end, it suffices to find an and a such that
We choose an arbitrary satisfying that there exists such that . Since is not good, we know such exists. And let be the largest such that holds. It is not hard to check
-
,
-
for .
We are next to prove the following inequalities hold with high probability,
-
(a)
-
(b)
It is easy to see and give us .
Showing (a).
By Markov’s inequality, we have
Here the second inequality is from Lemma 15. The third inequality uses the condition that for . Since , this probability is bounded by . Therefore, with probability at least ,
Moreover, we know . So, we have with probability at least ,
Showing (b).
Similarly, we have
Here the second inequality is from Lemma 15. The third inequality uses the condition that for . Since , this probability is bounded by . Therefore, with probability at least ,
Thus, combining (a) and (b), we have that with probability at least ,
and consequently . This gives us the bound on the following expectation
Since is -wise independent, the above argument still holds for . So,
Now suppose that is good. That is, for any and , . In this case, we will prove that the sign of is the same as the sign of with high probability over the random variable . Therefore, is almost like a constant, since the value of only depends on the signs of all . To show the signs of and are the same, it suffices to show . Let
Here, we expand according to Lemma 10. We have by applying hypercontractive inequality in Theorem 11,
In the last inequality, we use our assumption that . Since is sufficiently small, we have . Therefore, by Markov’s inequality, we have This means that with probability at least , we have and therefore Thus, with probability at least , the sign of is the same as the sign of . Then by a union bound,
Let be a constant. We have
The same argument applying on -wise independent Gaussian vector gives us
By Lemma 17, we know . Therefore, we have
3.3 Proof of Theorem 16
Proof of Theorem 16.
4 Discretization
To give an explicit construction of a PRG, we need a discretization of -wise independent Gaussian distributions. In this section, we show an algorithm which outputs vectors approximating , that is, is sufficiently small. Before that, we first prove that if and are close enough, then also fools any function of low-degree polynomial threshold functions.
Lemma 19.
Let , and be an integer. Let where is an -wise independent Gaussian vector of length for . Let be arbitrary polynomials of degree and be an arbitrary Boolean function. Define functions
Suppose that for any such function ,
Suppose that are random vectors of length and there is a joint distribution over and such that for each , .
Let and we have that for any such function
Proof.
Let and . We will prove that
-
(a)
,
-
(b)
.
Combing (a) and (b), we have
The other side can be obtained in a similar way by considering .
Proving (a).
Since is a function of degree- PTFs and fools such a function, we have Therefore, it suffices to prove that
Fix a set . Let and . We first show that
Let event denote that for all , and . By the tail bound of the standard Gaussian distribution, we have . We have
where the second inequality is by Lemma 13 and viewing as a degree function of variables.
Note that where denotes the length- string with ’s only at coordinates in . This can be further simplified in the form
with . So, we have
Proving (b).
Next we show and are close. Note that
where the inequality is from Lemma 12. Thus, we have
Furthermore, we know that
We now prove the main theorem for constructing an explicit pseudorandom generator. The idea is that a standard Gaussian variable can be generated using two uniform random variables through the Box–Muller transform [2]. Let where and are uniform in . Then is a Gaussian variable. Thus, if we truncate and to a certain precision and produce in a similar manner, approximates with high probability.
Theorem 20.
There exists an explicit PRG which -fools any functions of any degree- polynomial threshold functions over with seed length
Proof.
In Theorem 16, set parameter as and set as for some large constant . Then for where is a large constant, we have
Similar to the proof of Corollary 2 in [13], we can let generated by
where and are -wise independent uniform random vectors. Then let and be -bit approximations to and (i.e., round and to multipels of ), where is a large constant, and let
Letting , for the same reason as in the proof of Corollary 2 in [13], we have with probability at least . Then, by Lemma 19,
Note that can be generated by -wise independent random variables and taken uniformly from using randomness. Thus generating uses randomness.
References
- [1] Louay M. J. Bazzi. Polylogarithmic independence can fool DNF formulas. SIAM Journal on Computing, 38(6):2220–2272, 2009. doi:10.1137/070691954.
- [2] G. E. P. Box and Mervin E. Muller. A note on the generation of random normal deviates. The Annals of Mathematical Statistics, 29(2):610–611, 1958. doi:10.1214/aoms/1177706645.
- [3] Anthony Carbery and James Wright. Distributional and norm inequalities for polynomials over convex bodies in . Mathematical Research Letters, 8:233–248, 2001. doi:10.4310/MRL.2001.v8.n3.a1.
- [4] Eshan Chattopadhyay, Anindya De, and Rocco A. Servedio. Simple and efficient pseudorandom generators from Gaussian processes. In Proceedings of the 34th Computational Complexity Conference, Dagstuhl, DEU, 2020. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2019.4.
- [5] Ilias Diakonikolas, Parikshit Gopalan, Ragesh Jaiswal, Rocco A. Servedio, and Emanuele Viola. Bounded independence fools halfspaces. SIAM Journal on Computing, 39(8):3441–3462, 2010. doi:10.1137/100783030.
- [6] Ilias Diakonikolas, Daniel M. Kane, and Jelani Nelson. Bounded independence fools degree- threshold functions. In 2010 IEEE 51st Annual Symposium on Foundations of Computer Science, pages 11–20, 2010. doi:10.1109/FOCS.2010.8.
- [7] Parikshit Gopalan, Daniel M. Kane, and Raghu Meka. Pseudorandomness via the discrete fourier transform. SIAM Journal on Computing, 47(6):2451–2487, 2018. doi:10.1137/16M1062132.
- [8] Parikshit Gopalan, Ryan O’Donnell, Yi Wu, and David Zuckerman. Fooling functions of halfspaces under product distributions. In 2010 IEEE 25th Annual Conference on Computational Complexity, pages 223–234, 2010. doi:10.1109/CCC.2010.29.
- [9] Prahladh Harsha, Adam Klivans, and Raghu Meka. An invariance principle for polytopes. J. ACM, 59(6), 2013. doi:10.1145/2395116.2395118.
- [10] William B Johnson, Joram Lindenstrauss, and Gideon Schechtman. Extensions of Lipschitz maps into Banach spaces. Israel Journal of Mathematics, 54(2):129–138, 1986. doi:10.1007/BF02764938.
- [11] Daniel Kane, Raghu Meka, and Jelani Nelson. Almost optimal explicit johnson-lindenstrauss families. In Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques, pages 628–639, Berlin, Heidelberg, 2011. Springer Berlin Heidelberg. doi:10.1007/978-3-642-22935-0_53.
- [12] Daniel M. Kane. -independent Gaussians fool polynomial threshold functions. In 2011 IEEE 26th Annual Conference on Computational Complexity, pages 252–261, 2011. doi:10.1109/CCC.2011.13.
- [13] Daniel M. Kane. A small PRG for polynomial threshold functions of Gaussians. In Proceedings of the 2011 IEEE 52nd Annual Symposium on Foundations of Computer Science, pages 257–266, USA, 2011. IEEE Computer Society. doi:10.1109/FOCS.2011.16.
- [14] Daniel M. Kane. A structure theorem for poorly anticoncentrated Gaussian chaoses and applications to the study of polynomial threshold functions. In 2012 IEEE 53rd Annual Symposium on Foundations of Computer Science, pages 91–100, 2012. doi:10.1109/FOCS.2012.52.
- [15] Daniel M. Kane. A pseudorandom generator for polynomial threshold functions of Gaussian with subpolynomial seed length. In 2014 IEEE 29th Conference on Computational Complexity, pages 217–228, 2014. doi:10.1109/CCC.2014.30.
- [16] Daniel M. Kane. A Polylogarithmic PRG for Degree 2 Threshold Functions in the Gaussian Setting. In David Zuckerman, editor, 30th Conference on Computational Complexity (CCC 2015), volume 33 of Leibniz International Proceedings in Informatics (LIPIcs), pages 567–581, Dagstuhl, Germany, 2015. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2015.567.
- [17] Zander Kelley and Raghu Meka. Random restrictions and PRGs for PTFs in Gaussian space. In Shachar Lovett, editor, 37th Computational Complexity Conference (CCC 2022), volume 234 of Leibniz International Proceedings in Informatics (LIPIcs), pages 21:1–21:24, Dagstuhl, Germany, 2022. Schloss Dagstuhl – Leibniz-Zentrum für Informatik. doi:10.4230/LIPIcs.CCC.2022.21.
- [18] Adam R. Klivans, Ryan O’Donnell, and Rocco A. Servedio. Learning geometric concepts via Gaussian surface area. In 2008 49th Annual IEEE Symposium on Foundations of Computer Science, pages 541–550, 2008. doi:10.1109/FOCS.2008.64.
- [19] Pravesh K. Kothari and Raghu Meka. Almost optimal pseudorandom generators for spherical caps: extended abstract. In Proceedings of the Forty-Seventh Annual ACM Symposium on Theory of Computing, pages 247–256, New York, NY, USA, 2015. Association for Computing Machinery. doi:10.1145/2746539.2746611.
- [20] J. W. Lindeberg. Eine neue herleitung des exponentialgesetzes in der wahrscheinlichkeitsrechnung. Mathematische Zeitschrift, 15:211–225, 1922. doi:10.1007/BF01494395.
- [21] Raghu Meka and David Zuckerman. Pseudorandom generators for polynomial threshold functions. SIAM Journal on Computing, 42(3):1275–1301, 2013. doi:10.1137/100811623.
- [22] Jorge Nocedal and Stephen J. Wright, editors. Quadratic Programming, pages 438–486. Springer New York, New York, NY, 1999. doi:10.1007/0-387-22742-3_16.
- [23] Ryan O’Donnell. Analysis of boolean functions. Cambridge University Press, 2014. doi:10.1017/CBO9781139814782.
- [24] Ryan O’Donnell, Rocco A. Servedio, and Li-Yang Tan. Fooling Gaussian PTFs via local hyperconcentration. In Proceedings of the 52nd Annual ACM SIGACT Symposium on Theory of Computing, pages 1170–1183, New York, NY, USA, 2020. Association for Computing Machinery. doi:10.1145/3357713.3384281.
- [25] Ryan O’Donnell, Rocco A. Servedio, and Li-Yang Tan. Fooling polytopes. J. ACM, 69(2), January 2022. doi:10.1145/3460532.
- [26] Alexander Razborov. A simple proof of Bazzi’s theorem. ACM Trans. Comput. Theory, 1(1), February 2009. doi:10.1145/1490270.1490273.
- [27] R. A. Servedio and L. Tan. Fooling intersections of low-weight halfspaces. In 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS), pages 824–835, Los Alamitos, CA, USA, October 2017. IEEE Computer Society. doi:10.1109/FOCS.2017.81.
- [28] Rocco A. Servedio. Every linear threshold function has a low-weight approximator. In 21st Annual IEEE Conference on Computational Complexity (CCC’06), pages 18–32, 2006. doi:10.1109/CCC.2006.18.
Appendix A Facts about Bump Function
-
Fact 7
For all , .
Proof.
It is easy to check there exists a series of polynomials such that for
Besides, has the following recursion:
The degree of is at most . Therefore we have
Let for . We have by a simple calculation. Thus, we have that . We are left to bound .
Define be the sum of absolute values of all coefficients of the polynomial . Since , we know . By the recursion, we have
where the last inequality is from since the degree of is at most . So we know Therefore,
-
Fact 8
For all , .
Proof.
Directly from Fact 7 by observing that for and is constant elsewhere.
-
Fact 9
Let for some constant . Then we have that for all , .
Proof.
Let . Then by the generalized chain rule for the derivative of the composition of two functions (also known as Faà di Bruno’s formula), we have
Therefore