Exercises

ex18-1

Easy

Show that tanh⁑(x)\tanh(x) on [βˆ’1,1][-1, 1] has Chebyshev coefficients decaying exponentially. What polynomial degree is needed for 10βˆ’310^{-3} uniform error?

ex18-2

Easy

Explain why ReLU's polynomial approximation gives only O(1/d)O(1/d) error, not exponential.

ex18-3

Easy

For n=50n = 50 users, d=105d = 10^5 gradient dim, T=3T = 3-privacy, B=5B = 5 Byzantine, Ξ΅=1,Ξ΄=10βˆ’5\varepsilon = 1, \delta = 10^{-5} DP, compute the lower-bound communication per round.

ex18-4

Easy

An ErdΕ‘s-RΓ©nyi G(n,p)G(n, p) graph has spectral gap (second eigenvalue of Metropolis-Hastings mixing matrix) Οβ‰ˆ1βˆ’cp(1βˆ’p)\rho \approx 1 - c p (1-p) for large nn. Compute ρ\rho for n=100n = 100, p=0.05p = 0.05. What is the mixing time Tmix=1/(1βˆ’Ο)T_{\text{mix}} = 1/(1-\rho)?

ex18-5

Medium

Compute the quantum PIR rate (Nβˆ’T)/(N+T)(N - T)/(N + T) and classical (1βˆ’T/N)(1 - T/N) for N=6,T=2N = 6, T = 2. By what percent does quantum outperform?

ex18-6

Medium

For n=100n = 100 users in D-SGD with graph density p=log⁑(100)/100β‰ˆ0.046p = \log(100)/100 \approx 0.046, compute the total per-round peer exchanges and compare with centralized (nn uploads).

ex18-7

Medium

For coded transformer attention with Chebyshev-polynomial softmax approximation of degree d=8d = 8 and n=20n = 20 workers, compute the recovery threshold if (i) only QKT\mathbf{Q}\mathbf{K}^T is coded, and (ii) both QKT\mathbf{Q}\mathbf{K}^T and softmax are coded.

ex18-8

Medium

In an MoE model with M=64M = 64 experts and k=2k = 2 active per input, a fraction k/M=1/32k/M = 1/32 of the computation is activated per input. Argue that coded computing must adapt to this sparsity.

ex18-9

Medium

A RAG system performs T=100T = 100 queries per session. The user caches M=5M = 5 documents from previous queries. Apply cache-aided PIR (Chapter 15) to estimate the retrieval-rate improvement.

ex18-10

Hard

Sketch an approach to proving an information-theoretic lower bound on the recovery threshold of non-linear coded computing. What is the converse argument?

ex18-11

Hard

Given a fixed total communication budget CC bits, what is the optimal allocation among privacy (TT), robustness (BB), and DP ((Ξ΅,Ξ΄)(\varepsilon, \delta))? Derive the Pareto frontier.

ex18-12

Hard

Sketch how AirComp (Ch 16) could be combined with D-SGD (Β§18.3). Each peer-to-peer pair uses a small MAC; aggregation is per-edge. What are the synchronization and scaling implications?

ex18-13

Hard

A federated RAG system has n=100n = 100 users, each hosting K/n=10K/n = 10 documents. Retrieval must be TT-private against any TT users. What is the total retrieval overhead (per document) under different TT?

ex18-14

Hard

For TT-colluding PIR with N=8,K=100N = 8, K = 100, compute (i) classical PIR capacity and (ii) quantum PIR rate (Theorem 18.4.1). For what range of TT does quantum strictly outperform classical?

ex18-15

Challenge

The five CommIT contributions cover coded shuffling, SecAgg, ByzSecAgg, CCESA, and IT-secure FRL. Propose a joint problem β€” combining two or more contributions β€” that would constitute a sixth CommIT direction. State the problem statement, the achievability scheme, and the key open questions.