An identity for dual versions of a chip-moving game Robert B. Ellis April 8 th, 2011 ISMAA 2011, North Central College Joint work with Ruoran Wang.

Slides:



Advertisements
Similar presentations
Ulams Game and Universal Communications Using Feedback Ofer Shayevitz June 2006.
Advertisements

Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
Nearest Neighbor Search in High Dimensions Seminar in Algorithms and Geometry Mica Arie-Nachimson and Daniel Glasner April 2009.
Qiwen Wang, Sidharth Jaggi, Shuo-Yen Robert Li Institute of Network Coding (INC) The Chinese University of Hong Kong October 19, 2011 IEEE Information.
Gillat Kol (IAS) joint work with Ran Raz (Weizmann + IAS) Interactive Channel Capacity.
“Ulam‘s” Liar Game with Lies in an Interval Benjamin Doerr (MPI Saarbrücken, Germany) joint work with Johannes Lengler and David Steurer (Universität des.
Games of Prediction or Things get simpler as Yoav Freund Banter Inc.
Information Theory Introduction to Channel Coding Jalal Al Roumy.
Day 2 Information theory ( 信息論 ) Civil engineering ( 土木工程 ) Cultural exchange.
Threshold Phenomena and Fountain Codes
Fountain Codes Amin Shokrollahi EPFL and Digital Fountain, Inc.
Coding Theory: Packing, Covering, and 2-Player Games Robert Ellis Menger Day 2008: Recent Applied Mathematics Research Advances April 14, 2008.
1 An Asymptotically Optimal Algorithm for the Max k-Armed Bandit Problem Matthew Streeter & Stephen Smith Carnegie Mellon University NESCAI, April
Spatial and Temporal Data Mining
The Goldreich-Levin Theorem: List-decoding the Hadamard code
Joshua Cooper Benjamin Doerr Joel Spencer Gábor Tardos Deterministic Random Walks UCSD (SC soon!) MPI Saarbrücken Courant Institute Simon Fraser.
2/28/03 1 The Virtues of Redundancy An Introduction to Error-Correcting Codes Paul H. Siegel Director, CMRR University of California, San Diego The Virtues.
Variable-Length Codes: Huffman Codes
Adaptive Coding from a Diffusion Process on the Integer Line Robert Ellis October 26, 2009 Joint work with Joshua Cooper, University of South Carolina.
Linear-Time Encodable and Decodable Error-Correcting Codes Jed Liu 3 March 2003.
A 2-player game for adaptive covering codes Robert B. Ellis Texas A&M coauthors: Vadim Ponomarenko, Trinity University Catherine Yan, Texas A&M.
15-853Page :Algorithms in the Real World Error Correcting Codes I – Overview – Hamming Codes – Linear Codes.
Mario Vodisek 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Erasure Codes for Reading and Writing Mario Vodisek ( joint work.
Experts and Boosting Algorithms. Experts: Motivation Given a set of experts –No prior information –No consistent behavior –Goal: Predict as the best expert.
Rényi-Ulam liar games with a fixed number of lies Robert B. Ellis Illinois Institute of Technology University of Illinois at Chicago, October 26, 2005.
exercise in the previous class (1)
Hamming Codes 11/17/04. History In the late 1940’s Richard Hamming recognized that the further evolution of computers required greater reliability, in.
Games, Hats, and Codes Mira Bernstein Wellesley College SUMS 2005.
©2003/04 Alessandro Bogliolo Background Information theory Probability theory Algorithms.
Identification of strategies for liar-type games via discrepancy from their linear approximations Robert Ellis October 14 th, 2011 AMS Sectional Meeting,
The Hat Game 11/19/04 James Fiedler. References Hendrik W. Lenstra, Jr. and Gadiel Seroussi, On Hats and Other Covers, preprint, 2002,
The Multiplicative Weights Update Method Based on Arora, Hazan & Kale (2005) Mashor Housh Oded Cats Advanced simulation methods Prof. Rubinstein.
An Improved Liar Game Strategy From a Deterministic Random Walk Robert Ellis February 22 nd, 2010 Peled Workshop, UIC Joint work with Joshua Cooper, University.
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
Huffman coding Content 1 Encoding and decoding messages Fixed-length coding Variable-length coding 2 Huffman coding.
Coding and Algorithms for Memories Lecture 4 1.
§6 Linear Codes § 6.1 Classification of error control system § 6.2 Channel coding conception § 6.3 The generator and parity-check matrices § 6.5 Hamming.
Codes & the Hat Game Troy Lynn Bullock John H. Reagan High School, Houston ISD Shalini Kapoor McArthur High School, Aldine ISD Faculty Mentor: Dr. Tie.
1 Private codes or Succinct random codes that are (almost) perfect Michael Langberg California Institute of Technology.
Information Theory Linear Block Codes Jalal Al Roumy.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Chapter 10 Error Detection and Correction Data can be corrupted during transmission. Some applications require that errors be detected and.
Error Detection. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. An error-detecting code can.
Some Computation Problems in Coding Theory
Flipping letters to minimize the support of a string Giuseppe Lancia, Franca Rinaldi, Romeo Rizzi University of Udine.
Bahareh Sarrafzadeh 6111 Fall 2009
Data Communications and Networking
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
Hamming Distance & Hamming Code
Error-Correcting Code
Error Detecting and Error Correcting Codes
An identity for dual versions of a chip-moving game Robert B. Ellis April 8 th, 2011 ISMAA 2011, North Central College Joint work with Ruoran Wang.
8 Coding Theory Discrete Mathematics: A Concept-based Approach.
An Improved Liar Game Strategy From a Deterministic Random Walk
RELIABLE COMMUNICATION
The Viterbi Decoding Algorithm
Error Detection and Correction
Computing and Compressive Sensing in Wireless Sensor Networks
2018/9/16 Distributed Source Coding Using Syndromes (DISCUS): Design and Construction S.Sandeep Pradhan, Kannan Ramchandran IEEE Transactions on Information.
Scalar Quantization – Mathematical Model
An Improved Liar Game Strategy From a Deterministic Random Walk
COT 5611 Operating Systems Design Principles Spring 2012
COT 5611 Operating Systems Design Principles Spring 2014
Chapter 16: Greedy algorithms Ming-Te Chi
Distributed Compression For Binary Symetric Channels
Information-Theoretic Security
Error Detection and Correction
Parameterized Complexity of Even Set (and others)
Types of Errors Data transmission suffers unpredictable changes because of interference The interference can change the shape of the signal Single-bit.
An Improved Liar Game Strategy From a Deterministic Random Walk
Presentation transcript:

An identity for dual versions of a chip-moving game Robert B. Ellis April 8 th, 2011 ISMAA 2011, North Central College Joint work with Ruoran Wang

Motivation I: Binary Search SS 2 a1a1 a2a2 a3a3 a4a4 a5a5 a6a6 a7a7 a8a8 a9a9 a 10 Is x>a 5 ? Yes. a6a6 a7a7 a8a8 a9a9 a 10 Is x>a 7 ? No. a6a6 a7a7 Is x>a 6 ? …

Motivation I: Binary Search  Search question: which half of surviving list might x be in?  f(M)= d lg M e rounds to search length M list 3 a1a1 a2a2 a3a3 a4a4 a5a5 a6a6 a7a7 a8a8 a9a9 a 10 Is x>a 5 ? Yes. a6a6 a7a7 a8a8 a9a9 a 10 Is x>a 7 ? No. a6a6 a7a7 Is x>a 6 ? …

Motivation I: Binary Search on Z>=0  Redisplay binary search as on Z with e=0.  Go a couple of rounds  Straight reformulation, no difference 4

Motivation I: Binary Search with Errors  Let e>=0 and assume up to e responses are erroneous  We can’t be sure to have found x unless other candidates have e+1 “no” votes. 5

Motivation II: Random Walk on Z>=0  M chips at origin. Each round, at each position, half of the chips stay in place and half move to the right.  A (good) search algorithm is a discretization of this random walk.  Our search algorithm from now on: number chips left-to-right 1,…,M; split chips into odds and evens  Define P*(n,e), K*(n,e) 6

Game tree and tabular data  A (5,1) game tree, M=4 chips for P* tree, 3 chips for K* tree. Plus implication for P* and K*. Maybe tables? 7

Outline of Talk  Coding theory overview –Packing (error-correcting) & covering codes –Coding as a 2-player game –Liar game and pathological liar game  Diffusion processes on Z –Simple random walk (linear machine) –Liar machine –Pathological liar game, alternating question strategy  Improved pathological liar game bound –Reduction to liar machine –Discrepancy analysis of liar machine versus linear machine  Concluding remarks 8

Coding Theory Overview  Codewords: fixed-length strings from a finite alphabet  Primary uses: Error-correction for transmission in the presence of noise Compression of data with or without loss  Viewpoints: Packings and coverings of Hamming balls in the hypercube 2-player perfect information games  Applications: Cell phones, compact disks, deep-space communication 9

Coding Theory Overview  Codewords: fixed-length strings from a finite alphabet  Primary uses: Error-correction for transmission in the presence of noise Compression of data with or without loss  Viewpoints: Packings and coverings of Hamming balls in the hypercube 2-player perfect information games  Applications: Cell phones, compact disks, deep-space communication 10

 Transmit blocks of length n  Noise changes ≤ e bits per block ( ||  || 1 ≤ e )  Repetition code 111, 000 – length: n = 3 – e = 1 –information rate: 1/3 Coding Theory: (n,e) -Codes  x1…xnx1…xn (x 1 +  1 )…(x n +  n ) Received: Decoded: blockwise majority vote Richard Hamming 11

errors: incorrect decoding Coding Theory – A Hamming (7,1)-Code Length n=7, corrects e=1 error received decoded error: correct decoding 12

A Repetition Code as a Packing  (3,1)-code: 111, 000  Pairwise distance = 3  1 error can be corrected  The M codewords of an (n,e) -code correspond to a packing of Hamming balls of radius e in the n -cube A packing of 2 radius-1 Hamming balls in the 3-cube 13

A (5,1) -Packing Code as a 2-Player Game  (5,1)-code: 11111, 10100, 01010, What is the 5 th bit? 1What is the 4 th bit? 0What is the 3 rd bit? 0What is the 2 nd bit? 0What is the 1 st bit? CarolePaul >1 # errors

Covering Codes  Covering is the companion problem to packing  Packing: (n,e) -code  Covering: (n,R) -code length packing radius covering radius (3,1) -packing code and (3,1) -covering code “perfect code” (5,1)-packing code(5,1)-covering code 15

Optimal Length 5 Packing & Covering Codes (5,1) -packing code (5,1) -covering code 16 Sphere bound:

A (5,1) -Covering Code as a Football Pool WLLLLBet 7 LWLLLBet 6 LLWLLBet 5 LLLWWBet 4 WWWLWBet 3 WWWWLBet 2 WWWWWBet 1 Round 5Round 4Round 3Round 2Round 1 Payoff: a bet with ≤ 1 bad prediction Question. Min # bets to guarantee a payoff? Ans.=

Codes with Feedback (Adaptive Codes)  Feedback Noiseless, delay-less report of actual received bits  Improves the number of decodable messages E.g., from 20 to 28 messages for an (8,1) -code sender receiver Noise Noiseless Feedback Elwyn Berlekamp 1, 0, 1, 1, 0 1, 1, 1, 1, 0 18

A (5,1) -Adaptive Packing Code as a 2-Player Liar Game A D B C 0 1 >1 # lies YIs the message C? NIs the message D? NIs the message B? NIs the message A or C? YIs the message C or D? CarolePaul Message Original encoding Adapted encoding A B C D **** 11*** 10*** 1000* 101**100** 1000* Y $ 1, N $ 0 19

A (5,1)-Adaptive Covering Code as a Football Pool LWLLW Carole L Bet 6 L Bet 5 L Bet 4 W Bet 3 W L L WW Bet 2 L W W W W W L L WW Bet 1 Round 5Round 4Round 3Round 2Round 1 Payoff: a bet with ≤ 1 bad prediction Question. Min # bets to guarantee a payoff? Ans.=6 Bet 3 Bet 6 Bet 4 Bet >1 # bad predictions (# lies) Bet 2 Bet 1 20

Optimal (5,1)-Codes 21 Code typeOptimal size (5,1)-code4 (5,1)-adaptive code4 Sphere bound5 1/3 (= 2 5 /(5+1) ) (5,1)-adaptive covering code6 (5,1)-covering code7

Adaptive Codes: Results and Questions 22 Sizes of optimal adaptive packing codes Binary, fixed e ≥ sphere bound - c e (Spencer `92) Binary, e=1,2,3 =sphere bound - O(1), exact solutions (Pelc; Guzicki; Deppe) Q-ary, e=1 =sphere bound - c(q,e), exact solution (Aigner `96) Q-ary, e linear unknown if rate meets Hamming bound for all e. (Ahlswede, C. Deppe, and V. Lebedev) Sizes of optimal adaptive covering codes Binary, fixed e · sphere bound + C e Binary, e=1,2 =sphere bound + O(1), exact solution (Ellis, Ponomarenko, Yan `05) Near-perfect adaptive codes Q-ary, symmetric or “balanced”, e=1 exact solution (Ellis `04+) General channel, fixed e asymptotic first term (Ellis, Nyman `09)

Outline of Talk  Coding theory overview –Packing (error-correcting) & covering codes –Coding as a 2-player game –Liar game and pathological liar game  Diffusion processes on Z –Simple random walk (linear machine) –Liar machine –Pathological liar game, alternating question strategy  Improved pathological liar game bound –Reduction to liar machine –Discrepancy analysis of liar machine versus linear machine  Concluding remarks 23

Linear Machine on Z

Linear Machine on Z 5.5

Linear Machine on Z Time-evolution: 11 £ binomial distribution of {-1,+1} coin flips

Liar Machine on Z Liar machine time-step Number chips left-to-right 1,2,3,… Move odd chips right, even chips left (Reassign numbers every time-step) 11 chips t=0 Approximates linear machine Preserves indivisibility of chips

Liar Machine on Z Liar machine time-step Number chips left-to-right 1,2,3,… Move odd chips right, even chips left (Reassign numbers every time-step) t=1

Liar Machine on Z Liar machine time-step Number chips left-to-right 1,2,3,… Move odd chips right, even chips left (Reassign numbers every time-step) t=2

Liar Machine on Z Liar machine time-step Number chips left-to-right 1,2,3,… Move odd chips right, even chips left (Reassign numbers every time-step) t=3

Liar Machine on Z Liar machine time-step Number chips left-to-right 1,2,3,… Move odd chips right, even chips left (Reassign numbers every time-step) t=4

Liar Machine on Z Liar machine time-step Number chips left-to-right 1,2,3,… Move odd chips right, even chips left (Reassign numbers every time-step) t=5

Liar Machine on Z Liar machine time-step Number chips left-to-right 1,2,3,… Move odd chips right, even chips left (Reassign numbers every time-step) t=6

Liar Machine on Z Liar machine time-step Number chips left-to-right 1,2,3,… Move odd chips right, even chips left (Reassign numbers every time-step) Height of linear machine at t=7 l 1 -distance: 5.80 l ∞ -distance: 0.98 t=7

Discrepancy for Two Discretizations Liar machine: round-offs spatially balanced Rotor-router model/Propp machine: round-offs temporally balanced The liar machine has poorer discrepancy… but provides bounds to the pathological liar game.

Proof of Liar Machine Pointwise Discrepancy

The Liar Game as a Diffusion Process A priori: M=#chips, n=#rounds, e=max #lies Initial configuration: f 0 = M ¢  0 Each round, obtain f t+1 from f t by: (1) Paul 2-colors the chips (2) Carole moves one color class left, the other right Final configuration: f n Winning conditions Original variant (Berlekamp, Rényi, Ulam) Pathological variant (Ellis, Yan)

Pathological Liar Game Bounds Fix n, e. Define M * (n,e) = minimum M such that Paul can win the pathological liar game with parameters M,n,e. Sphere Bound (E,P,Y `05) For fixed e, M * (n,e) · sphere bound + C e (Delsarte,Piret `86) For e/n 2 (0,1/2), M * (n,e) · sphere bound ¢ n ln 2. (C,E `09+) For e/n 2 (0,1/2), using the liar machine, M * (n,e) = sphere bound ¢.

Liar Machine vs. (6,1)-Pathological Liar Game chips t=0 disqualified

t=1 disqualified Liar Machine vs. (6,1)-Pathological Liar Game

t=2 disqualified Liar Machine vs. (6,1)-Pathological Liar Game

Liar Machine vs. (6,1)-Pathological Liar Game t=3 disqualified

Liar Machine vs. (6,1)-Pathological Liar Game t=4 disqualified

Liar Machine vs. (6,1)-Pathological Liar Game t=5 disqualified

Liar Machine vs. (6,1)-Pathological Liar Game t=6 disqualified No chips survive: Paul loses

Comparison of Processes 46 ProcessOptimal #chips Linear machine9 1/7 (6,1)-Pathological liar game10 (6,1)-Liar machine (6,1)-Liar machine started with 12 chips after 6 rounds disqualified

Loss from Liar Machine Reduction t=3 disqualified disqualified Paul’s optimal 2-coloring:

Reduction to Liar Machine

Saving One Chip in the Liar Machine 49

Summary: Pathological Liar Game Theorem

Further Exploration  Tighten the discrepancy analysis for the special case of initial chip configuration f 0 =M  0.  Generalize from binary questions to q-ary questions, q ¸ 2.  Improve analysis of the original liar game from Spencer and Winkler `92; solve the optimal rate of q-ary adaptive block codes for all fractional error rates.  Prove general pointwise and interval discrepancy theorems for various discretizations of random walks. 51

Reading List  This paper: Linearly bounded liars, adaptive covering codes, and deterministic random walks, preprint (see homepage).homepage  The liar machine –Joel Spencer and Peter Winkler. Three thresholds for a liar. Combin. Probab. Comput.1(1):81-93,  The pathological liar game –Robert Ellis, Vadim Ponomarenko, and Catherine Yan. The Renyi-Ulam pathological liar game with a fixed number of lies. J. Combin. Theory Ser. A 112(2): ,  Discrepancy of deterministic random walks –Joshua Cooper and Joel Spencer, Simulating a Random Walk with Constant Error, Combin. Probab. Comput. 15 (2006), no. 06, –Joshua Cooper, Benjamin Doerr, Joel Spencer, and Gabor Tardos. Deterministic random walks on the integers. European J. Combin., 28(8): ,