Recent Interests and Progress Hung-Lin Fu (傅恒霖)

Slides:



Advertisements
Similar presentations
Bart Jansen 1.  Problem definition  Instance: Connected graph G, positive integer k  Question: Is there a spanning tree for G with at least k leaves?
Advertisements

Chun-Cheng Chen Department of Mathematics National Central University 1.
C&O 355 Lecture 23 N. Harvey TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A A A A A A A.
1 LP Duality Lecture 13: Feb Min-Max Theorems In bipartite graph, Maximum matching = Minimum Vertex Cover In every graph, Maximum Flow = Minimum.
22C:19 Discrete Math Graphs Fall 2010 Sukumar Ghosh.
22C:19 Discrete Math Graphs Fall 2014 Sukumar Ghosh.
Bipartite Matching, Extremal Problems, Matrix Tree Theorem.
Greedy Algorithms Greed is good. (Some of the time)
S. J. Shyu Chap. 1 Introduction 1 The Design and Analysis of Algorithms Chapter 1 Introduction S. J. Shyu.
1 Weighted Bipartite Matching Lecture 4: Jan Weighted Bipartite Matching Given a weighted bipartite graph, find a matching with maximum total weight.
Approximate Counting via Correlation Decay Pinyan Lu Microsoft Research.
Minimum Spanning Trees Kun-Mao Chao ( 趙坤茂 ) Department of Computer Science and Information Engineering National Taiwan University, Taiwan
Last time: terminology reminder w Simple graph Vertex = node Edge Degree Weight Neighbours Complete Dual Bipartite Planar Cycle Tree Path Circuit Components.
1 Discrete Structures & Algorithms Graphs and Trees: II EECE 320.
2007 Kézdy André Kézdy Department of Mathematics University of Louisville * Preliminary report.  More -valuations for trees via the combinatorial nullstellensatz*
What is the next line of the proof? a). Let G be a graph with k vertices. b). Assume the theorem holds for all graphs with k+1 vertices. c). Let G be a.
The Theory of NP-Completeness
Graph Colouring Lecture 20: Nov 25.
On conflict-avoiding codes of weight 3 and odd length Kenneth Shum Oct 2011.
Multicolored Subgraphs in an Edge Colored Graph Hung-Lin Fu Department of Applied Mathematics NCTU, Hsin Chu, Taiwan
What is the next line of the proof? a). Assume the theorem holds for all graphs with k edges. b). Let G be a graph with k edges. c). Assume the theorem.
Coloring 3/16/121. Flight Gates flights need gates, but times overlap. how many gates needed? 3/16/122.
Approximation Algorithms Department of Mathematics and Computer Science Drexel University.
The Rectilinear Symmetric Crossing Minimization Problem Seokhee Hong The University of Sydney.
On Counting Sequences and Some Research Questions
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
Pooling designs for clone library screening in the inhibitor complex model Department of Mathematics and Science National Taiwan Normal University (Lin-Kou)
1 Rotational and Cyclic Cycle Systems 聯 合 大 學 吳 順 良.
1 Some Results in Interval Routing Francis C.M. Lau HKU and ITCS Tsinghua December 2, 2007.
DIGITAL COMMUNICATIONS Linear Block Codes
Graph Colouring L09: Oct 10. This Lecture Graph coloring is another important problem in graph theory. It also has many applications, including the famous.
Cyclic m-Cycle Systems of K n, n for m 100 Yuge Zheng Department of Mathematics, Shanghai Jiao Tong University, Shanghai , P.R.China Department of.
Graph.
Graph Colouring Lecture 20: Nov 25. This Lecture Graph coloring is another important problem in graph theory. It also has many applications, including.
Tung-Wei Kuo, Kate Ching-Ju Lin, and Ming-Jer Tsai Academia Sinica, Taiwan National Tsing Hua University, Taiwan Maximizing Submodular Set Function with.
Decomposition Theory in Matching Covered Graphs Qinglin Yu Nankai U., China & U. C. Cariboo, Canada.
Some Computation Problems in Coding Theory
Introduction to Graph Theory
Introduction to Graph Theory By: Arun Kumar (Asst. Professor) (Asst. Professor)
Learning Hidden Graphs Hung-Lin Fu 傅 恆 霖 Department of Applied Mathematics Hsin-Chu Chiao Tung Univerity.
Group Testing and Its Applications
Multicolored Subgraphs in Properly Edge-colored Graphs
Graph Coloring Lots of application – be it mapping routes, coloring graphs, building redundant systems, mapping genes, looking at traffic patterns (see.
IERG6120 Lecture 22 Kenneth Shum Dec 2016.
Perfect Secret Sharing Schemes
Group Testing – a tool of protecting Network Security
Maximum Matching in the Online Batch-Arrival Model
Algorithms and Networks
June 2017 High Density Clusters.
What is the next line of the proof?
Chapter 5. Optimal Matchings
Lecture 15: Graph Theory II
On Sequential Locally Repairable Codes
Discrete Math II Howon Kim
Problem Solving 4.
Multicolored Subgraphs in an Edge-colored Complete Graph
Minimum Spanning Trees
Optimal Conflict-avoiding Codes of Odd Length Weight Three
Properties and applications of spectra for networks
Source:. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL
Pooling Designs in Group Testing
Rainbow Graph Designs Hung-Lin Fu (傅 恒 霖)
Grid-Block Designs and Packings
Multicolored Subgraphs in an Edge Colored Graph
Game chromatic number of graphs
Problems on Paired Graphs
Parameterized Complexity of Even Set (and others)
Richard Anderson Lecture 5 Graph Theory
Learning a hidden graph with adaptive algorithms
Lecture 24 Vertex Cover and Hamiltonian Cycle
Presentation transcript:

Recent Interests and Progress Hung-Lin Fu (傅恒霖) Department of Applied Mathematics National Chiao Tung University, Taiwan 30010

1. Constructing Special Codes Conflict-avoiding code CAC(n,k) Length n Hamming weight k Inner product of arbitrary cyclic shift of any two distinct codewords is either 0 or 1. (1 0 0 1 0) (1 1 0 0 0)

We are interested in odd n and k = 3, and k = 4. Objective Given n and k, maximize M. Optimal CAC : a CAC with maximum size M(n, k): the size of an optimal CAC(n, k) We are interested in odd n and k = 3, and k = 4.

Optimal CACs for prime power Theorem Let p > 3 be a non-Wieferich prime. Then for r ≥ 1,

On weight 4 If n = 3d, then Me(n) = (n – 1)/8 provided d is even and Me(n) = (n – 3)/8 provided d is odd. If n = 2·3d, then Me(n) = (n + 2)/8 provided d is even and Me(n) = (n – 2)/8 provided d is odd. For general n = 6k, extra effort is needed! Keep working. (Preprints)

Progress M. Mishima, H. L. Fu and S. Uruno, Optimal conflict-avoiding codes of length n ≣ 0 (mod 16) and weight 3, Des. Codes Cryptogr., 2009. H. L. Fu, Yi-Hean Lin and M. Mishima, Optimal conflict-avoiding codes of even length and weight 3, IEEE Trans. Inf. Theory, 2010. H. L. Fu, Yi-Hean Lin and M. Mishima, Errata to “ Optimal conflict- avoiding codes of even length and weight 3, IEEE Transaction Information Th., Vol. 57, No. 8, Aug. 2011, 5572. H. L. Fu, Y. H. Lo and K. W. Shum, Optimal conflict-avoiding codes of odd length and weight three, Des. Codes Cryptogr., 2012, to appear. S. L. Wu and H. L. Fu, Optimal tight equi-differnece conflict-avoiding codes of length 2q ± 1 and weight three, JCD, 2012, to appear. H. L. Fu, Yi-Hean Lin and Y. H. Lo, Optimal tight equi-differnece conflict- avoiding codes with weight 4, in preprints.

2. Constructing Pooling Designs We focus on non-adaptive algorithms for various models, but adaptive or 2-stage algorithms are also considered for special type of group testings. Mainly, special disjunct matrices are utilized for non-adaptive algorithms. Progress: An upper bound of the number of tests in pooling designs for the error-tolerant complex model (with H. B. Chen and F. K. Hwang), Optimization Letters, 2(2008), no. 3, 425-431. Nonadaptive algorithms for threshold group testing (with H. B. Chen), Discrete Applied Math., 157(2009), 1581-1585.

Continued … Identification and classification problem on pooling designs for inhibitor models (with Hui-Lan Chang and Hong-Bin Chen), J. Comput. Biology, Vol. 17 (2010), No. 7, 927-941. Reconstruction of hidden graphs and threshold group testing (with Hui-Lan Chang, Hong-Bin Chen and Chi-Huai Shih), J. Combin. Optim., 22(2011), no. 2, 270 – 281. Group testing with multiple mutually-obscuring positives (with Hong-Bin Chen), LNCS, to appear. Threshold group testing on inhibitor model (Huilan Chang and Chie-Huai Shih), in preprints.

3. Find the Average Information Ratio of Perfect Secret Sharing Schemes Whose Access Structures Are Graph Based We mainly apply the idea of covering a graph with complete multipartite graphs to tackle this problem. Of course, knowing the graph structure is also essential. Progress: The exact values of the average information ratio for tree-based access structures of perfect secret sharing schemes (with Hui-Chuan Lu), Des. Code Crypt., to appear.

Continued … New bounds on the average information rate of secret sharing schemes for graph-based weight threshold access structures (with Hui-Chuan Lu), in preprints. The optimal average information ratio of perfect secret sharing schemes for the access structures based on bipartite graphs (with Hui-Chuan Lu), in preprints.

Others We have some results on decycling sets and edge-colorings: Feedback vertex set of planar graphs (with Hong-Bin Chen and Chie-Huai Shih), TJM, to appear. The decycling number of outerplanar graphs (with Huilan Chang and Min-Yin Lien), J. Combin. Optim., to appear. The decycling number of Pm  Pn (with Min-Yin Lien and Chie-Huai Shih), in preprints. Edge chromatic critical graphs with high maximum degree (R. Lou and Y. Zhao), in preprints.