Noisy Group Testing (Quick and Efficient) Sheng Cai, Mayank Bakshi, Sidharth Jaggi The Chinese University of Hong Kong Mohammad Jahangoshahi Sharif University.

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

* Distributed Algorithms in Multi-channel Wireless Ad Hoc Networks under the SINR Model Dongxiao Yu Department of Computer Science The University of Hong.
Raef Bassily Penn State Local, Private, Efficient Protocols for Succinct Histograms Based on joint work with Adam Smith (Penn State) (To appear in STOC.
1 Very Large-Scale Incremental Clustering Berk Berker Mumin Cebe Ismet Zeki Yalniz 27 March 2007.
Summarizing Distributed Data Ke Yi HKUST += ?. Small summaries for BIG data  Allow approximate computation with guarantees and small space – save space,
Qiwen Wang, Sidharth Jaggi, Shuo-Yen Robert Li Institute of Network Coding (INC) The Chinese University of Hong Kong October 19, 2011 IEEE Information.
Reliable Deniable Communication: Hiding Messages in Noise Mayank Bakshi Mahdi Jafari Siavoshani ME Sidharth Jaggi The Chinese University of Hong Kong The.
Online Stochastic Matching Barna Saha Vahid Liaghat.
Amplify-and-Forward in Wireless Relay Networks Samar Agnihotri, Sidharth Jaggi, Minghua Chen Institute of Network Coding The Chinese University of Hong.
Television Advertising and Idealized Image of “ Good Life ” among Adolescents in Rural China Xiao Cai and Kara Chan Hong Kong Baptist University ICORIA.
A Single-letter Characterization of Optimal Noisy Compressed Sensing Dongning Guo Dror Baron Shlomo Shamai.
1 On the Benefits of Adaptivity in Property Testing of Dense Graphs Joint work with Mira Gonen Dana Ron Tel-Aviv University.
Tracey Ho Sidharth Jaggi Tsinghua University Hongyi Yao California Institute of Technology Theodoros Dikaliotis California Institute of Technology Chinese.
Video Streaming: An FEC-Based Novel Approach Jianfei Cai, Chang Wen Chen Electrical and Computer Engineering, Canadian Conference on.
ISCC 2011 An Adaptive Epidemic Information Dissemination Scheme with Cross-layer Enhancements T. Kontos, E. Zaimidis, C. Anagnostopoulos, S. Hadjiefthymiades,
1 Matrix Addition, C = A + B Add corresponding elements of each matrix to form elements of result matrix. Given elements of A as a i,j and elements of.
Non-adaptive probabilistic group testing with noisy measurements: Near-optimal bounds with efficient algorithms Chun Lam Chan, Pak Hou Che and Sidharth.
Mario Vodisek 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Erasure Codes for Reading and Writing Mario Vodisek ( joint work.
1 How Many Packets Can We Encode? - An Analysis of Practical Wireless Network Coding Jerry Le, John C.S. Lui, Dah Ming Chiu Chinese University of Hong.
Compressive sensing SHO-FA: Robust compressive sensing with order-optimal complexity, measurements, and bits 1 Mayank Bakshi, Sidharth Jaggi, Sheng Cai.
1 Cardinality Estimation for Large-scale RFID Systems Chen Qian, Hoilun Ngan, and Yunhao Liu Hong Kong University of Science and Technology.
Teaching Fellow Admissions Tutor for Computer Science Director of Undergraduate Studies.
SUPER: Sparse signals with Unknown Phases Efficiently Recovered Sheng Cai, Mayank Bakshi, Sidharth Jaggi and Minghua Chen The Chinese University of Hong.
1 Software Quality Engineering CS410 Class 5 Seven Basic Quality Tools.
Diophantine Approximation and Basis Reduction
Network Coding and Information Security Raymond W. Yeung The Chinese University of Hong Kong Joint work with Ning Cai, Xidian University.
Revising the core ICT indicators 2008 Global Event on Measuring the Information Society Geneva, May 2008 Sheridan Roberts.
Department of Computer Science City University of Hong Kong Department of Computer Science City University of Hong Kong 1 A Statistics-Based Sensor Selection.
Fast and robust sparse recovery New Algorithms and Applications The Chinese University of Hong Kong The Institute of Network Coding Sheng Cai Eric Chan.
Pooling designs for clone library screening in the inhibitor complex model Department of Mathematics and Science National Taiwan Normal University (Lin-Kou)
CprE 545 project proposal Long.  Introduction  Random linear code  LT-code  Application  Future work.
Bucket & Radix Sorts. Efficient Sorts QuickSort : O(nlogn) – O(n 2 ) MergeSort : O(nlogn) Coincidence?
Stochastic Threshold Group Testing Chun Lam Chan, Sheng Cai, Mayank Bakshi, Sidharth Jaggi The Chinese University of Hong Kong Venkatesh Saligrama Boston.
Figure 1.a AVS China encoder [3] Video Bit stream.
1 “Steering the ATLAS High Level Trigger” COMUNE, G. (Michigan State University ) GEORGE, S. (Royal Holloway, University of London) HALLER, J. (CERN) MORETTINI,
1 Private codes or Succinct random codes that are (almost) perfect Michael Langberg California Institute of Technology.
Numerical Algorithms Quiz questions ITCS4145/5145, Parallel Programming March 14, 2013.
Scalable Video Coding and Transport Over Broad-band wireless networks Authors: D. Wu, Y. Hou, and Y.-Q. Zhang Source: Proceedings of the IEEE, Volume:
Approximate Inference: Decomposition Methods with Applications to Computer Vision Kyomin Jung ( KAIST ) Joint work with Pushmeet Kohli (Microsoft Research)
Compressive sensing meets group testing: LP decoding for non-linear (disjunctive) measurements Chun Lam Chan, Sidharth Jaggi and Samar Agnihotri The Chinese.
Interactive Channel Capacity. [Shannon 48]: A Mathematical Theory of Communication An exact formula for the channel capacity of any noisy channel.
Network RS Codes for Efficient Network Adversary Localization Sidharth Jaggi Minghua Chen Hongyi Yao.
Reliable Deniable Communication: Hiding Messages in Noise The Chinese University of Hong Kong The Institute of Network Coding Pak Hou Che Mayank Bakshi.
Speaker : Yu-Hui Chen Authors : Dinuka A. Soysa, Denis Guangyin Chen, Oscar C. Au, and Amine Bermak From : 2013 IEEE Symposium on Computational Intelligence.
A Subsidiary of Utilizing Technology in Fund Development Efforts.
Reliable Deniable Communication: Hiding Messages from Noise Pak Hou Che Joint Work with Sidharth Jaggi, Mayank Bakshi and Madhi Jafari Siavoshani Institute.
Source Encoder Channel Encoder Noisy channel Source Decoder Channel Decoder Figure 1.1. A communication system: source and channel coding.
Network Coding Tomography for Network Failures
Mutual Information, Joint Entropy & Conditional Entropy
ON AVCS WITH QUADRATIC CONSTRAINTS Farzin Haddadpour Joint work with Madhi Jafari Siavoshani, Mayank Bakshi and Sidharth Jaggi Sharif University of Technology,
Comparison of Algorithms Objective: Understand how and why algorithms are compared. Imagine you own a company. You’re trying to buy software to process.
RISC / CISC Architecture by Derek Ng. Overview CISC Architecture RISC Architecture  Pipelining RISC vs CISC.
APPLICATIONS OF DIRICHLET PROCESS MIXTURES TO SPEAKER ADAPTATION Amir Harati and Joseph PiconeMarc Sobel Institute for Signal and Information Processing,
Learning Hidden Graphs Hung-Lin Fu 傅 恆 霖 Department of Applied Mathematics Hsin-Chu Chiao Tung Univerity.
Accurate WiFi Packet Delivery Rate Estimation and Applications Owais Khan and Lili Qiu. The University of Texas at Austin 1 Infocom 2016, San Francisco.
Application-Aware Traffic Scheduling for Workload Offloading in Mobile Clouds Liang Tong, Wei Gao University of Tennessee – Knoxville IEEE INFOCOM
Computational Molecular Biology Pooling Designs – Inhibitor Models.
Efficient Huffman Decoding Aggarwal, M. and Narayan, A., International Conference on Image Processing, vol. 1, pp. 936 – 939, 2000 Presenter :Yu-Cheng.
TEMPLATE DESIGN © H. Che 2, E. D’Azevedo 1, M. Sekachev 3, K. Wong 3 1 Oak Ridge National Laboratory, 2 Chinese University.
DATA MINING: ASSOCIATION ANALYSIS (2) Instructor: Dr. Chun Yu School of Statistics Jiangxi University of Finance and Economics Fall 2015.
RELIABLE COMMUNICATION
Secretary Markets with Local Information
Reliable Deniable Communication: Hiding Messages in Noise
Section 6.4 Multiplicative Inverses of Matices and Matrix Equations
IEEE TG13 Review of VLNComm’s PHY July 2017
Designing Algorithms for Multiplication of Fractions
Numerical Algorithms Quiz questions
Section 9.4 Multiplicative Inverses of Matices and Matrix Equations
Designing Algorithms for Multiplication of Fractions
Algorithm Course Algorithms Lecture 3 Sorting Algorithm-1
Presentation transcript:

Noisy Group Testing (Quick and Efficient) Sheng Cai, Mayank Bakshi, Sidharth Jaggi The Chinese University of Hong Kong Mohammad Jahangoshahi Sharif University of Technology

q Group Testing For Pr(error)< ε, Lower bound of number of tests: What’s known [CCJS11] 2 q Chun Lam Chan; Pak Hou Che; Jaggi, S.; Saligrama, V.;, "Non-adaptive probabilistic group testing with noisy measurements: Near-optimal bounds with efficient algorithms," 49th Annual Allerton Conference on Communication, Control, and Computing, pp , Sept [CCJS11] Adaptive vs. Non-adaptive

Decoding complexity # Tests  Lower bound Lower bound      Adaptive Non-Adaptive Two-Stage Adaptive This work   O(poly(D)log(N)),O(D 2 log(N)) O(DN),O(Dlog(N)) [NPR12] O(Dlog(N)) 3

Hammer: GROTESQUE Testing 4

4

4

4

Testing Matrix IN OUT Negative 0 Positive 1 5

Multiplicity ? 6

Multiplicity (d = 0) 7

7

7

7 d = 0 No positive tests

Multiplicity (d = 1) 8

8

8

8 d = 1 50% positive tests

Multiplicity (d = 2) 9

9

9

9 d = 2 75% positive tests Statistical Difference!

Multiplicity ? 10

Localization 11 ?

Localization BSC (q) Channel Expander Codes Decoder Signature Test Outcome Particular Signature 12

Hammer: GROTESQUE Testing 4

Nail: “Good” Partioning N items D defectives 13

Adaptive Group Testing Groups 14

Adaptive Group Testing 14 Decaying geometrically Tests Groups

Adaptive Group Testing 14 The number of unidentified defectives <

Adaptive Group Testing 14 Tests of size Coupon Collection

Non-Adaptive Group Testing Groupsconstant fraction of “Good” groups Tests 15

Non-Adaptive Group Testing 15

Non-Adaptive Group Testing 15 Independent partitions Coupon Collection Tests

2-Stage Adaptive Group Testing 16 Groups (Birthdays)

2-Stage Adaptive Group Testing Non-adaptive Group Testing 16 + Tests

   Summary of this work Decoding complexity # Tests O(Dlog(N)) 3

THANK YOU 謝謝