Skip to main content

Showing 1–44 of 44 results for author: Tal, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2407.03919  [pdf, other

    cs.CV

    MedRAT: Unpaired Medical Report Generation via Auxiliary Tasks

    Authors: Elad Hirsch, Gefen Dawidowicz, Ayellet Tal

    Abstract: Medical report generation from X-ray images is a challenging task, particularly in an unpaired setting where paired image-report data is unavailable for training. To address this challenge, we propose a novel model that leverages the available information in two distinct datasets, one comprising reports and the other consisting of images. The core idea of our model revolves around the notion that… ▽ More

    Submitted 22 July, 2024; v1 submitted 4 July, 2024; originally announced July 2024.

  2. arXiv:2403.13444  [pdf, other

    cs.CV

    MedCycle: Unpaired Medical Report Generation via Cycle-Consistency

    Authors: Elad Hirsch, Gefen Dawidowicz, Ayellet Tal

    Abstract: Generating medical reports for X-ray images presents a significant challenge, particularly in unpaired scenarios where access to paired image-report data for training is unavailable. Previous works have typically learned a joint embedding space for images and reports, necessitating a specific labeling schema for both. We introduce an innovative approach that eliminates the need for consistent labe… ▽ More

    Submitted 21 March, 2024; v1 submitted 20 March, 2024; originally announced March 2024.

  3. arXiv:2311.16057  [pdf, ps, other

    quant-ph cs.CC cs.DS

    The Power of Adaptivity in Quantum Query Algorithms

    Authors: Uma Girish, Makrand Sinha, Avishay Tal, Kewen Wu

    Abstract: Motivated by limitations on the depth of near-term quantum devices, we study the depth-computation trade-off in the query model, where the depth corresponds to the number of adaptive query rounds and the computation per layer corresponds to the number of parallel queries per round. We achieve the strongest known separation between quantum algorithms with $r$ versus $r-1$ rounds of adaptivity. We d… ▽ More

    Submitted 7 December, 2023; v1 submitted 27 November, 2023; originally announced November 2023.

    Comments: 35 pages, 9 figures

  4. arXiv:2310.08070  [pdf, ps, other

    cs.LG cs.CC

    Tight Time-Space Lower Bounds for Constant-Pass Learning

    Authors: Xin Lyu, Avishay Tal, Hongxun Wu, Junzhao Yang

    Abstract: In his breakthrough paper, Raz showed that any parity learning algorithm requires either quadratic memory or an exponential number of samples [FOCS'16, JACM'19]. A line of work that followed extended this result to a large class of learning problems. Until recently, all these results considered learning in the streaming model, where each sample is drawn independently, and the learner is allowed a… ▽ More

    Submitted 12 October, 2023; originally announced October 2023.

    Comments: To appear at FOCS 2023

  5. arXiv:2309.04607  [pdf

    cs.CL cs.AI

    Linking Symptom Inventories using Semantic Textual Similarity

    Authors: Eamonn Kennedy, Shashank Vadlamani, Hannah M Lindsey, Kelly S Peterson, Kristen Dams OConnor, Kenton Murray, Ronak Agarwal, Houshang H Amiri, Raeda K Andersen, Talin Babikian, David A Baron, Erin D Bigler, Karen Caeyenberghs, Lisa Delano-Wood, Seth G Disner, Ekaterina Dobryakova, Blessen C Eapen, Rachel M Edelstein, Carrie Esopenko, Helen M Genova, Elbert Geuze, Naomi J Goodrich-Hunsaker, Jordan Grafman, Asta K Haberg, Cooper B Hodges , et al. (57 additional authors not shown)

    Abstract: An extensive library of symptom inventories has been developed over time to measure clinical symptoms, but this variety has led to several long standing issues. Most notably, results drawn from different settings and studies are not comparable, which limits reproducibility. Here, we present an artificial intelligence (AI) approach using semantic textual similarity (STS) to link symptoms and scores… ▽ More

    Submitted 8 September, 2023; originally announced September 2023.

  6. arXiv:2308.13270  [pdf, other

    cs.CV

    A Game of Bundle Adjustment -- Learning Efficient Convergence

    Authors: Amir Belder, Refael Vivanti, Ayellet Tal

    Abstract: Bundle adjustment is the common way to solve localization and mapping. It is an iterative process in which a system of non-linear equations is solved using two optimization methods, weighted by a damping factor. In the classic approach, the latter is chosen heuristically by the Levenberg-Marquardt algorithm on each iteration. This might take many iterations, making the process computationally expe… ▽ More

    Submitted 25 August, 2023; originally announced August 2023.

  7. arXiv:2308.06985  [pdf, other

    cs.CV

    PatchContrast: Self-Supervised Pre-training for 3D Object Detection

    Authors: Oren Shrout, Ori Nitzan, Yizhak Ben-Shabat, Ayellet Tal

    Abstract: Accurately detecting objects in the environment is a key challenge for autonomous vehicles. However, obtaining annotated data for detection is expensive and time-consuming. We introduce PatchContrast, a novel self-supervised point cloud pre-training framework for 3D object detection. We propose to utilize two levels of abstraction to learn discriminative representation from unlabeled data: proposa… ▽ More

    Submitted 14 August, 2023; originally announced August 2023.

  8. arXiv:2307.13926  [pdf, ps, other

    cs.CC cs.DM

    Fourier Growth of Communication Protocols for XOR Functions

    Authors: Uma Girish, Makrand Sinha, Avishay Tal, Kewen Wu

    Abstract: The level-$k$ $\ell_1$-Fourier weight of a Boolean function refers to the sum of absolute values of its level-$k$ Fourier coefficients. Fourier growth refers to the growth of these weights as $k$ grows. It has been extensively studied for various computational models, and bounds on the Fourier growth, even for the first few levels, have proven useful in learning theory, circuit lower bounds, pseud… ▽ More

    Submitted 25 July, 2023; originally announced July 2023.

    Comments: 64 pages

  9. arXiv:2305.17695  [pdf, other

    cs.CV

    k-NNN: Nearest Neighbors of Neighbors for Anomaly Detection

    Authors: Ori Nizan, Ayellet Tal

    Abstract: Anomaly detection aims at identifying images that deviate significantly from the norm. We focus on algorithms that embed the normal training examples in space and when given a test image, detect anomalies based on the features distance to the k-nearest training neighbors. We propose a new operator that takes into account the varying structure & importance of the features in the embedding space. In… ▽ More

    Submitted 28 May, 2023; originally announced May 2023.

  10. arXiv:2304.12853  [pdf, other

    cs.NI cs.CR cs.LG

    Adaptive Services Function Chain Orchestration For Digital Health Twin Use Cases: Heuristic-boosted Q-Learning Approach

    Authors: Jamila Alsayed Kassem, Li Zhong, Arie Taal, Paola Grosso

    Abstract: Digital Twin (DT) is a prominent technology to utilise and deploy within the healthcare sector. Yet, the main challenges facing such applications are: Strict health data-sharing policies, high-performance network requirements, and possible infrastructure resource limitations. In this paper, we address all the challenges by provisioning adaptive Virtual Network Functions (VNFs) to enforce security… ▽ More

    Submitted 25 April, 2023; originally announced April 2023.

  11. arXiv:2303.11755  [pdf, other

    cs.CV

    LIMITR: Leveraging Local Information for Medical Image-Text Representation

    Authors: Gefen Dawidowicz, Elad Hirsch, Ayellet Tal

    Abstract: Medical imaging analysis plays a critical role in the diagnosis and treatment of various medical conditions. This paper focuses on chest X-ray images and their corresponding radiological reports. It presents a new model that learns a joint X-ray image & report representation. The model is based on a novel alignment scheme between the visual data and the text, which takes into account both local an… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

  12. arXiv:2212.00879  [pdf, other

    quant-ph cs.CC cs.CR

    Quantum Cryptography in Algorithmica

    Authors: William Kretschmer, Luowen Qian, Makrand Sinha, Avishay Tal

    Abstract: We construct a classical oracle relative to which $\mathsf{P} = \mathsf{NP}$ yet single-copy secure pseudorandom quantum states exist. In the language of Impagliazzo's five worlds, this is a construction of pseudorandom states in "Algorithmica," and hence shows that in a black-box setting, quantum cryptography based on pseudorandom states is possible even if one-way functions do not exist. As a co… ▽ More

    Submitted 2 May, 2023; v1 submitted 1 December, 2022; originally announced December 2022.

    Comments: 35 pages. V2: minor writing improvements

  13. arXiv:2211.14835  [pdf, other

    cs.CV

    CLID: Controlled-Length Image Descriptions with Limited Data

    Authors: Elad Hirsch, Ayellet Tal

    Abstract: Controllable image captioning models generate human-like image descriptions, enabling some kind of control over the generated captions. This paper focuses on controlling the caption length, i.e. a short and concise description or a long and detailed one. Since existing image captioning datasets contain mostly short captions, generating long captions is challenging. To address the shortage of long… ▽ More

    Submitted 21 January, 2024; v1 submitted 27 November, 2022; originally announced November 2022.

  14. arXiv:2211.09480  [pdf, other

    cs.CV

    ArcAid: Analysis of Archaeological Artifacts using Drawings

    Authors: Offry Hayon, Stefan Münger, Ilan Shimshoni, Ayellet Tal

    Abstract: Archaeology is an intriguing domain for computer vision. It suffers not only from shortage in (labeled) data, but also from highly-challenging data, which is often extremely abraded and damaged. This paper proposes a novel semi-supervised model for classification and retrieval of images of archaeological artifacts. This model utilizes unique data that exists in the domain -- manual drawings made b… ▽ More

    Submitted 20 January, 2024; v1 submitted 17 November, 2022; originally announced November 2022.

    Comments: 8 pages, 9 figures

  15. arXiv:2208.08780  [pdf, other

    cs.CV

    GraVoS: Voxel Selection for 3D Point-Cloud Detection

    Authors: Oren Shrout, Yizhak Ben-Shabat, Ayellet Tal

    Abstract: 3D object detection within large 3D scenes is challenging not only due to the sparsity and irregularity of 3D point clouds, but also due to both the extreme foreground-background scene imbalance and class imbalance. A common approach is to add ground-truth objects from other scenes. Differently, we propose to modify the scenes by removing elements (voxels), rather than adding ones. Our approach se… ▽ More

    Submitted 14 March, 2024; v1 submitted 18 August, 2022; originally announced August 2022.

    Comments: CVPR 2023

  16. Random Walks for Adversarial Meshes

    Authors: Amir Belder, Gal Yefet, Ran Ben Izhak, Ayellet Tal

    Abstract: A polygonal mesh is the most-commonly used representation of surfaces in computer graphics. Therefore, it is not surprising that a number of mesh classification networks have recently been proposed. However, while adversarial attacks are wildly researched in 2D, the field of adversarial meshes is under explored. This paper proposes a novel, unified, and general adversarial attack, which leads to m… ▽ More

    Submitted 26 May, 2022; v1 submitted 15 February, 2022; originally announced February 2022.

  17. CloudWalker: Random walks for 3D point cloud shape analysis

    Authors: Adi Mesika, Yizhak Ben-Shabat, Ayellet Tal

    Abstract: Point clouds are gaining prominence as a method for representing 3D shapes, but their irregular structure poses a challenge for deep learning methods. In this paper we propose CloudWalker, a novel method for learning 3D shapes using random walks. Previous works attempt to adapt Convolutional Neural Networks (CNNs) or impose a grid or mesh structure to 3D point clouds. This work presents a differen… ▽ More

    Submitted 17 May, 2023; v1 submitted 2 December, 2021; originally announced December 2021.

    Journal ref: Computers & Graphics Volume 106, August 2022, Pages 110-118

  18. arXiv:2106.00287  [pdf, ps, other

    cs.DS cs.CC

    Junta Distance Approximation with Sub-Exponential Queries

    Authors: Vishnu Iyer, Avishay Tal, Michael Whitmeyer

    Abstract: Leveraging tools of De, Mossel, and Neeman [FOCS, 2019], we show two different results pertaining to the \emph{tolerant testing} of juntas. Given black-box access to a Boolean function $f:\{\pm1\}^{n} \to \{\pm1\}$, we give a $poly(k, \frac{1}{\varepsilon})$ query algorithm that distinguishes between functions that are $γ$-close to $k$-juntas and $(γ+\varepsilon)$-far from $k'$-juntas, where… ▽ More

    Submitted 1 June, 2021; originally announced June 2021.

    Comments: To appear in CCC 2021

  19. arXiv:2104.11571  [pdf, other

    cs.CV

    AttWalk: Attentive Cross-Walks for Deep Mesh Analysis

    Authors: Ran Ben Izhak, Alon Lahav, Ayellet Tal

    Abstract: Mesh representation by random walks has been shown to benefit deep learning. Randomness is indeed a powerful concept. However, it comes with a price: some walks might wander around non-characteristic regions of the mesh, which might be harmful to shape analysis, especially when only a few walks are utilized. We propose a novel walk-attention mechanism that leverages the fact that multiple walks ar… ▽ More

    Submitted 23 April, 2021; originally announced April 2021.

    Comments: 8 pages, 5 figures

  20. arXiv:2104.09807  [pdf, other

    cs.CV cs.LG

    Visual Navigation with Spatial Attention

    Authors: Bar Mayo, Tamir Hazan, Ayellet Tal

    Abstract: This work focuses on object goal visual navigation, aiming at finding the location of an object from a given class, where in each step the agent is provided with an egocentric RGB image of the scene. We propose to learn the agent's policy using a reinforcement learning algorithm. Our key contribution is a novel attention probability model for visual navigation tasks. This attention encodes semanti… ▽ More

    Submitted 20 April, 2021; originally announced April 2021.

  21. arXiv:2104.05658  [pdf, other

    cs.CY cs.AI

    Towards Algorithmic Transparency: A Diversity Perspective

    Authors: Fausto Giunchiglia, Jahna Otterbacher, Styliani Kleanthous, Khuyagbaatar Batsuren, Veronika Bogin, Tsvi Kuflik, Avital Shulner Tal

    Abstract: As the role of algorithmic systems and processes increases in society, so does the risk of bias, which can result in discrimination against individuals and social groups. Research on algorithmic bias has exploded in recent years, highlighting both the problems of bias, and the potential solutions, in terms of algorithmic transparency (AT). Transparency is important for facilitating fairness manage… ▽ More

    Submitted 12 April, 2021; originally announced April 2021.

  22. arXiv:2103.16953  [pdf, other

    cs.CY

    Mitigating Bias in Algorithmic Systems -- A Fish-Eye View

    Authors: Kalia Orphanou, Jahna Otterbacher, Styliani Kleanthous, Khuyagbaatar Batsuren, Fausto Giunchiglia, Veronika Bogina, Avital Shulner Tal, AlanHartman, Tsvi Kuflik

    Abstract: Mitigating bias in algorithmic systems is a critical issue drawing attention across communities within the information and computer sciences. Given the complexity of the problem and the involvement of multiple stakeholders -- including developers, end-users, and third parties -- there is a need to understand the landscape of the sources of bias, and the solutions being proposed to address them, fr… ▽ More

    Submitted 20 February, 2022; v1 submitted 31 March, 2021; originally announced March 2021.

    ACM Class: K.4.0; A.1

  23. arXiv:2103.11604  [pdf, ps, other

    cs.CC cs.DM

    Fourier Growth of Parity Decision Trees

    Authors: Uma Girish, Avishay Tal, Kewen Wu

    Abstract: We prove that for every parity decision tree of depth $d$ on $n$ variables, the sum of absolute values of Fourier coefficients at level $\ell$ is at most $d^{\ell/2} \cdot O(\ell \cdot \log(n))^\ell$. Our result is nearly tight for small values of $\ell$ and extends a previous Fourier bound for standard decision trees by Sherstov, Storozhenko, and Wu (STOC, 2021). As an application of our Fourie… ▽ More

    Submitted 13 May, 2021; v1 submitted 22 March, 2021; originally announced March 2021.

    Comments: 36 pages, 1 figure

  24. arXiv:2012.02210  [pdf, ps, other

    cs.CC

    Shrinkage under Random Projections, and Cubic Formula Lower Bounds for $\mathbf{AC}^0$

    Authors: Yuval Filmus, Or Meir, Avishay Tal

    Abstract: Håstad showed that any De Morgan formula (composed of AND, OR and NOT gates) shrinks by a factor of $O(p^{2})$ under a random restriction that leaves each variable alive independently with probability $p$ [SICOMP, 1998]. Using this result, he gave an $\widetildeΩ(n^{3})$ formula size lower bound for the Andreev function, which, up to lower order improvements, remains the state-of-the-art lower bou… ▽ More

    Submitted 29 December, 2020; v1 submitted 3 December, 2020; originally announced December 2020.

    Comments: Full version of ITCS 2021 paper, 42 pages

  25. arXiv:2010.12629  [pdf, other

    quant-ph cs.CC

    Degree vs. Approximate Degree and Quantum Implications of Huang's Sensitivity Theorem

    Authors: Scott Aaronson, Shalev Ben-David, Robin Kothari, Shravas Rao, Avishay Tal

    Abstract: Based on the recent breakthrough of Huang (2019), we show that for any total Boolean function $f$, $\bullet \quad \mathrm{deg}(f) = O(\widetilde{\mathrm{deg}}(f)^2)$: The degree of $f$ is at most quadratic in the approximate degree of $f$. This is optimal as witnessed by the OR function. $\bullet \quad \mathrm{D}(f) = O(\mathrm{Q}(f)^4)$: The deterministic query complexity of $f$ is at most qu… ▽ More

    Submitted 23 October, 2020; originally announced October 2020.

    Comments: This subsumes an earlier preprint by a subset of the authors (arXiv:2004.13231)

  26. arXiv:2006.05353  [pdf, other

    cs.CV cs.CG cs.LG

    MeshWalker: Deep Mesh Understanding by Random Walks

    Authors: Alon Lahav, Ayellet Tal

    Abstract: Most attempts to represent 3D shapes for deep learning have focused on volumetric grids, multi-view images and point clouds. In this paper we look at the most popular representation of 3D shapes in computer graphics - a triangular mesh - and ask how it can be utilized within deep learning. The few attempts to answer this question propose to adapt convolutions & pooling to suit Convolutional Neural… ▽ More

    Submitted 10 December, 2020; v1 submitted 9 June, 2020; originally announced June 2020.

  27. arXiv:2005.08772  [pdf, other

    cs.CV

    Color Visual Illusions: A Statistics-based Computational Model

    Authors: Elad Hirsch, Ayellet Tal

    Abstract: Visual illusions may be explained by the likelihood of patches in real-world images, as argued by input-driven paradigms in Neuro-Science. However, neither the data nor the tools existed in the past to extensively support these explanations. The era of big data opens a new opportunity to study input-driven approaches. We introduce a tool that computes the likelihood of patches, given a large datas… ▽ More

    Submitted 22 October, 2020; v1 submitted 18 May, 2020; originally announced May 2020.

  28. Rigid Matrices From Rectangular PCPs

    Authors: Amey Bhangale, Prahladh Harsha, Orr Paradise, Avishay Tal

    Abstract: We introduce a variant of PCPs, that we refer to as rectangular PCPs, wherein proofs are thought of as square matrices, and the random coins used by the verifier can be partitioned into two disjoint sets, one determining the row of each query and the other determining the column. We construct PCPs that are efficient, short, smooth and (almost-)rectangular. As a key application, we show that proo… ▽ More

    Submitted 22 November, 2020; v1 submitted 6 May, 2020; originally announced May 2020.

    Comments: 36 pages, 3 figures

    Journal ref: In Proc. 61st FOCS, 2020

  29. arXiv:2004.13231  [pdf, other

    quant-ph cs.CC

    Quantum Implications of Huang's Sensitivity Theorem

    Authors: Scott Aaronson, Shalev Ben-David, Robin Kothari, Avishay Tal

    Abstract: Based on the recent breakthrough of Huang (2019), we show that for any total Boolean function $f$, the deterministic query complexity, $D(f)$, is at most quartic in the quantum query complexity, $Q(f)$: $D(f) = O(Q(f)^4)$. This matches the known separation (up to log factors) due to Ambainis, Balodis, Belovs, Lee, Santha, and Smotrovs (2017). We also use the result to resolve the quantum analogue… ▽ More

    Submitted 27 April, 2020; originally announced April 2020.

  30. arXiv:1912.12561  [pdf, ps, other

    quant-ph cs.CC

    Towards Optimal Separations between Quantum and Randomized Query Complexities

    Authors: Avishay Tal

    Abstract: The query model offers a concrete setting where quantum algorithms are provably superior to randomized algorithms. Beautiful results by Bernstein-Vazirani, Simon, Aaronson, and others presented partial Boolean functions that can be computed by quantum algorithms making much fewer queries compared to their randomized analogs. To date, separations of $O(1)$ vs. $\sqrt{N}$ between quantum and randomi… ▽ More

    Submitted 28 December, 2019; originally announced December 2019.

    Comments: 35 pages

  31. arXiv:1911.10538  [pdf, other

    cs.CV cs.LG

    Breaking the cycle -- Colleagues are all you need

    Authors: Ori Nizan, Ayellet Tal

    Abstract: This paper proposes a novel approach to performing image-to-image translation between unpaired domains. Rather than relying on a cycle constraint, our method takes advantage of collaboration between various GANs. This results in a multi-modal method, in which multiple optional and diverse images are produced for a given image. Our model addresses some of the shortcomings of classical GANs: (1) It… ▽ More

    Submitted 7 June, 2020; v1 submitted 24 November, 2019; originally announced November 2019.

  32. arXiv:1911.02218  [pdf, ps, other

    quant-ph cs.CC

    Quantum versus Randomized Communication Complexity, with Efficient Players

    Authors: Uma Girish, Ran Raz, Avishay Tal

    Abstract: We study a new type of separation between quantum and classical communication complexity which is obtained using quantum protocols where all parties are efficient, in the sense that they can be implemented by small quantum circuits with oracle access to their inputs. More precisely, we give an explicit partial Boolean function that can be computed in the quantum-simultaneous-with-entanglement mode… ▽ More

    Submitted 6 November, 2019; originally announced November 2019.

  33. Exponential separation between shallow quantum circuits and unbounded fan-in shallow classical circuits

    Authors: Adam Bene Watts, Robin Kothari, Luke Schaeffer, Avishay Tal

    Abstract: Recently, Bravyi, Gosset, and König (Science, 2018) exhibited a search problem called the 2D Hidden Linear Function (2D HLF) problem that can be solved exactly by a constant-depth quantum circuit using bounded fan-in gates (or QNC^0 circuits), but cannot be solved by any constant-depth classical circuit using bounded fan-in AND, OR, and NOT gates (or NC^0 circuits). In other words, they exhibited… ▽ More

    Submitted 20 June, 2019; originally announced June 2019.

    Journal ref: Proceedings of the 51st Annual Symposium on Theory of Computing, STOC 2019, Pages 515-526

  34. arXiv:1901.11420  [pdf, other

    cs.CV

    Is Image Memorability Prediction Solved?

    Authors: Shay Perera, Ayellet Tal, Lihi Zelnik-Manor

    Abstract: This paper deals with the prediction of the memorability of a given image. We start by proposing an algorithm that reaches human-level performance on the LaMem dataset - the only large scale benchmark for memorability prediction. The suggested algorithm is based on three observations we make regarding convolutional neural networks (CNNs) that affect memorability prediction. Having reached human-le… ▽ More

    Submitted 31 January, 2019; originally announced January 2019.

  35. arXiv:1812.10553  [pdf, other

    cs.CV

    Solving Archaeological Puzzles

    Authors: Niv Derech, Ayellet Tal, Ilan Shimshoni

    Abstract: Puzzle solving is a difficult problem in its own right, even when the pieces are all square and build up a natural image. But what if these ideal conditions do not hold? One such application domain is archaeology, where restoring an artifact from its fragments is highly important. From the point of view of computer vision, archaeological puzzle solving is very challenging, due to three additional… ▽ More

    Submitted 26 December, 2018; originally announced December 2018.

  36. arXiv:1807.01312  [pdf, other

    cs.CV

    Viewpoint Estimation-Insights & Model

    Authors: Gilad Divon, Ayellet Tal

    Abstract: This paper addresses the problem of viewpoint estimation of an object in a given image. It presents five key insights that should be taken into consideration when designing a CNN that solves the problem. Based on these insights, the paper proposes a network in which (i) The architecture jointly solves detection, classification, and viewpoint estimation. (ii) New types of data are added and trained… ▽ More

    Submitted 3 July, 2018; originally announced July 2018.

    Comments: 17 pages, ECCV2018 submission

  37. arXiv:1806.04256  [pdf, ps, other

    cs.CC

    Pseudorandom Generators for Width-3 Branching Programs

    Authors: Raghu Meka, Omer Reingold, Avishay Tal

    Abstract: We construct pseudorandom generators of seed length $\tilde{O}(\log(n)\cdot \log(1/ε))$ that $ε$-fool ordered read-once branching programs (ROBPs) of width $3$ and length $n$. For unordered ROBPs, we construct pseudorandom generators with seed length $\tilde{O}(\log(n) \cdot \mathrm{poly}(1/ε))$. This is the first improvement for pseudorandom generators fooling width $3$ ROBPs since the work of Ni… ▽ More

    Submitted 11 June, 2018; originally announced June 2018.

    Comments: 51 pages

  38. arXiv:1708.02639  [pdf, ps, other

    cs.LG cs.CC

    Extractor-Based Time-Space Lower Bounds for Learning

    Authors: Sumegha Garg, Ran Raz, Avishay Tal

    Abstract: A matrix $M: A \times X \rightarrow \{-1,1\}$ corresponds to the following learning problem: An unknown element $x \in X$ is chosen uniformly at random. A learner tries to learn $x$ from a stream of samples, $(a_1, b_1), (a_2, b_2) \ldots$, where for every $i$, $a_i \in A$ is chosen uniformly at random and $b_i = M(a_i,x)$. Assume that $k,\ell, r$ are such that any submatrix of $M$ of at least… ▽ More

    Submitted 8 August, 2017; originally announced August 2017.

  39. arXiv:1701.07668  [pdf, ps, other

    physics.med-ph cs.IT

    Low Rank Magnetic Resonance Fingerprinting

    Authors: Gal Mazor, Lior Weizman, Assaf Tal, Yonina C. Eldar

    Abstract: Purpose: Magnetic Resonance Fingerprinting (MRF) is a relatively new approach that provides quantitative MRI measures using randomized acquisition. Extraction of physical quantitative tissue parameters is performed off-line, without the need of patient presence, based on acquisition with varying parameters and a dictionary generated according to the Bloch equation simulations. MRF uses hundreds of… ▽ More

    Submitted 27 June, 2017; v1 submitted 26 January, 2017; originally announced January 2017.

    Comments: 11 pages, 11 figures

  40. arXiv:1611.06980  [pdf, ps, other

    cs.CC cs.DM

    Lower bounds for 2-query LCCs over large alphabet

    Authors: Arnab Bhattacharyya, Sivakanth Gopi, Avishay Tal

    Abstract: A locally correctable code (LCC) is an error correcting code that allows correction of any arbitrary coordinate of a corrupted codeword by querying only a few coordinates. We show that any {\em zero-error} $2$-query locally correctable code $\mathcal{C}: \{0,1\}^k \to Σ^n$ that can correct a constant fraction of corrupted symbols must have $n \geq \exp(k/\log|Σ|)$. We say that an LCC is zero-error… ▽ More

    Submitted 28 April, 2017; v1 submitted 21 November, 2016; originally announced November 2016.

  41. arXiv:1605.07084  [pdf, ps, other

    cs.CC quant-ph

    Low-Sensitivity Functions from Unambiguous Certificates

    Authors: Shalev Ben-David, Pooya Hatami, Avishay Tal

    Abstract: We provide new query complexity separations against sensitivity for total Boolean functions: a power $3$ separation between deterministic (and even randomized or quantum) query complexity and sensitivity, and a power $2.22$ separation between certificate complexity and sensitivity. We get these separations by using a new connection between sensitivity and a seemingly unrelated measure called one-s… ▽ More

    Submitted 15 November, 2017; v1 submitted 23 May, 2016; originally announced May 2016.

    Comments: 25 pages. This version expands the results and adds Pooya Hatami and Avishay Tal as authors

  42. arXiv:1604.07432  [pdf, ps, other

    cs.CC

    Degree and Sensitivity: tails of two distributions

    Authors: Parikshit Gopalan, Rocco Servedio, Avishay Tal, Avi Wigderson

    Abstract: The sensitivity of a Boolean function f is the maximum over all inputs x, of the number of sensitive coordinates of x. The well-known sensitivity conjecture of Nisan (see also Nisan and Szegedy) states that every sensitivity-s Boolean function can be computed by a polynomial over the reals of degree poly(s). The best known upper bounds on degree, however, are exponential rather than polynomial in… ▽ More

    Submitted 25 April, 2016; originally announced April 2016.

    Comments: The conference version of this paper will appear in CCC'2016

    MSC Class: 68Q10; 68Q15

  43. arXiv:1404.0654  [pdf, ps, other

    cs.CC

    Two Structural Results for Low Degree Polynomials and Applications

    Authors: Gil Cohen, Avishay Tal

    Abstract: In this paper, two structural results concerning low degree polynomials over finite fields are given. The first states that over any finite field $\mathbb{F}$, for any polynomial $f$ on $n$ variables with degree $d \le \log(n)/10$, there exists a subspace of $\mathbb{F}^n$ with dimension $Ω(d \cdot n^{1/(d-1)})$ on which $f$ is constant. This result is shown to be tight. Stated differently, a degr… ▽ More

    Submitted 2 April, 2014; originally announced April 2014.

  44. arXiv:1304.0371  [pdf, other

    cs.CC math.CA math.CO

    On the Structure of Boolean Functions with Small Spectral Norm

    Authors: Amir Shpilka, Avishay Tal, Ben lee Volk

    Abstract: In this paper we prove results regarding Boolean functions with small spectral norm (the spectral norm of f is $\|\hat{f}\|_1=\sum_α|\hat{f}(α)|$). Specifically, we prove the following results for functions $f:\{0,1\}^n \to \{0,1\}$ with $\|\hat{f}\|_1=A$. 1. There is a subspace $V$ of co-dimension at most $A^2$ such that $f|_V$ is constant. 2. f can be computed by a parity decision tree of si… ▽ More

    Submitted 22 May, 2013; v1 submitted 1 April, 2013; originally announced April 2013.