Probabilistic Methods in Coding Theory: Asymmetric Covering Codes Joshua N. Cooper UCSD Dept. of Mathematics Robert B. Ellis Texas A&M Dept. of Mathematics.

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Shortest Vector In A Lattice is NP-Hard to approximate
On Complexity, Sampling, and -Nets and -Samples. Range Spaces A range space is a pair, where is a ground set, it’s elements called points and is a family.
Inapproximability of MAX-CUT Khot,Kindler,Mossel and O ’ Donnell Moshe Ben Nehemia June 05.
Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
On the Density of a Graph and its Blowup Raphael Yuster Joint work with Asaf Shapira.
INTRODUCTION  The problem of classification of optimal ternary constant-weight codes (TCW) is considered  We use combinatorial and computer methods.
Nearest Neighbor Search in High Dimensions Seminar in Algorithms and Geometry Mica Arie-Nachimson and Daniel Glasner April 2009.
Locally Decodable Codes from Nice Subsets of Finite Fields and Prime Factors of Mersenne Numbers Kiran Kedlaya Sergey Yekhanin MIT Microsoft Research.
Approximation Algorithms Chapter 14: Rounding Applied to Set Cover.
Information and Coding Theory
Chapter 10 Shannon’s Theorem. Shannon’s Theorems First theorem:H(S) ≤ L n (S n )/n < H(S) + 1/n where L n is the length of a certain code. Second theorem:
CmpE 104 SOFTWARE STATISTICAL TOOLS & METHODS MEASURING & ESTIMATING SOFTWARE SIZE AND RESOURCE & SCHEDULE ESTIMATING.
Bounds on Code Length Theorem: Let l ∗ 1, l ∗ 2,..., l ∗ m be optimal codeword lengths for a source distribution p and a D-ary alphabet, and let L ∗ be.
Information Theory Introduction to Channel Coding Jalal Al Roumy.
On the Spread of Viruses on the Internet Noam Berger Joint work with C. Borgs, J.T. Chayes and A. Saberi.
1 By Gil Kalai Institute of Mathematics and Center for Rationality, Hebrew University, Jerusalem, Israel presented by: Yair Cymbalista.
Online Ramsey Games in Random Graphs Reto Spöhel Joint work with Martin Marciniszyn and Angelika Steger.
CSCE 669 Project Presentation (Paper Reading) Student Presenter: Praveen Tiwari Original Author: Noga Alon, Tel Aviv University Publication: FOCS '10 Proceedings.
Computational problems, algorithms, runtime, hardness
Dagstuhl 2010 University of Puerto Rico Computer Science Department The power of group algebras for constrained multilinear monomial detection Yiannis.
Convergent and Correct Message Passing Algorithms Nicholas Ruozzi and Sekhar Tatikonda Yale University TexPoint fonts used in EMF. Read the TexPoint manual.
Coding Theory: Packing, Covering, and 2-Player Games Robert Ellis Menger Day 2008: Recent Applied Mathematics Research Advances April 14, 2008.
Upper Bounds on the Time and Space Complexity of Optimizing Additively Separable Functions Matthew J. Streeter Carnegie Mellon University Pittsburgh, PA.
EXPANDER GRAPHS Properties & Applications. Things to cover ! Definitions Properties Combinatorial, Spectral properties Constructions “Explicit” constructions.
1 Worst-Case Equilibria Elias Koutsoupias and Christos Papadimitriou Proceedings of the 16th Annual Symposium on Theoretical Aspects of Computer Science.
A 2-player game for adaptive covering codes Robert B. Ellis Texas A&M coauthors: Vadim Ponomarenko, Trinity University Catherine Yan, Texas A&M.
15-853Page :Algorithms in the Real World Error Correcting Codes I – Overview – Hamming Codes – Linear Codes.
Information Theory and Security
Hamming Codes 11/17/04. History In the late 1940’s Richard Hamming recognized that the further evolution of computers required greater reliability, in.
Games, Hats, and Codes Mira Bernstein Wellesley College SUMS 2005.

The Hat Game 11/19/04 James Fiedler. References Hendrik W. Lenstra, Jr. and Gadiel Seroussi, On Hats and Other Covers, preprint, 2002,
Fractional decompositions of dense hypergraphs Raphael Yuster University of Haifa.
Efficient Model Selection for Support Vector Machines
Computing and Communicating Functions over Sensor Networks A.Giridhar and P. R. Kumar Presented by Srikanth Hariharan.
1 By: MOSES CHARIKAR, CHANDRA CHEKURI, TOMAS FEDER, AND RAJEEV MOTWANI Presented By: Sarah Hegab.
Quantum Computing MAS 725 Hartmut Klauck NTU TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A A A A.
On the union of cylinders in 3-space Esther Ezra Duke University.
Edge-disjoint induced subgraphs with given minimum degree Raphael Yuster 2012.
Basic Concepts in Number Theory Background for Random Number Generation 1.For any pair of integers n and m, m  0, there exists a unique pair of integers.
On the least covering radius of the binary linear codes of dimension 6 Tsonka Baicheva and Iliya Bouyukliev Institute of Mathematics and Informatics, Bulgaria.
ERROR CONTROL CODING Basic concepts Classes of codes: Block Codes
Mathematical Induction I Lecture 4: Sep 16. This Lecture Last time we have discussed different proof techniques. This time we will focus on probably the.
Coding and Algorithms for Memories Lecture 5 1.
Error Control Code. Widely used in many areas, like communications, DVD, data storage… In communications, because of noise, you can never be sure that.
§6 Linear Codes § 6.1 Classification of error control system § 6.2 Channel coding conception § 6.3 The generator and parity-check matrices § 6.5 Hamming.
Maximum density of copies of a graph in the n-cube John Goldwasser Ryan Hansen West Virginia University.
Linear codes of good error control performance Tsonka Baicheva Institute of Mathematics and Informatics Bulgarian Academy of Sciences Bulgaria.
1 Asymptotically optimal K k -packings of dense graphs via fractional K k -decompositions Raphael Yuster University of Haifa.
Chapter 31 INTRODUCTION TO ALGEBRAIC CODING THEORY.
Information Theory Linear Block Codes Jalal Al Roumy.
ICS 253: Discrete Structures I Discrete Probability King Fahd University of Petroleum & Minerals Information & Computer Science Department.
1 Decomposition into bipartite graphs with minimum degree 1. Raphael Yuster.
The parity bits of linear block codes are linear combination of the message. Therefore, we can represent the encoder by a linear system described by matrices.
Ravello, Settembre 2003Indexing Structures for Approximate String Matching Alessandra Gabriele Filippo Mignosi Antonio Restivo Marinella Sciortino.
Clase 3: Basic Concepts of Search. Problems: SAT, TSP. Tarea 1 Computación Evolutiva Gabriela Ochoa
Some Computation Problems in Coding Theory
1 Zero-sum square matrices Paul Balister Yair Caro Cecil Rousseau Raphael Yuster.
1 Covering Non-uniform Hypergraphs Endre Boros Yair Caro Zoltán Füredi Raphael Yuster.
1 4.1 Hash Functions and Data Integrity A cryptographic hash function can provide assurance of data integrity. ex: Bob can verify if y = h K (x) h is a.
Encoding/Decoding May 9, 2016 Russell Impagliazzo and Miles Jones Thanks to Janine Tiefenbruck 1.
Codes for Symbol-Pair Read Channels Yuval Cassuto EPFL – ALGO Formerly: Hitachi GST Research November 3, 2010 IPG Seminar.
Lecture 16: Earth-Mover Distance
Linear sketching with parities
Linear sketching over
Chapter 2.
Linear sketching with parities
Locality In Distributed Graph Algorithms
Presentation transcript:

Probabilistic Methods in Coding Theory: Asymmetric Covering Codes Joshua N. Cooper UCSD Dept. of Mathematics Robert B. Ellis Texas A&M Dept. of Mathematics Andrew B. Kahng UCSD Dept. of Computer Science and Engineering

Covering Codes Definition: A code is a subset of the set of binary n-strings. The (Hamming) distance d(S,T) between two strings S and T is the number of coordinates at which they differ. Definition: A covering code of radius R is a code C such that, for any binary n-string S, d(S,c) <= R for some element c in C. We use the convention that R will always be as small as possible.

Compression WANT: USE: 1110 ID: 00

Asymmetric Loss What if only certain types of loss are allowed? For example, we can prohibit changes from 1’s to 0’s -- invalidating the > 1110 change from before. Definition: An asymmetric covering code of radius R is a code C such that, for any binary n-string S, there is some element c of C which can be turned into S by flipping at most R 0’s to 1’s.

Balls Define the (asymmetric) ball of radius R about the vector (string) x to be the set of strings reachable from the vector x by changing at most R ones to zeroes. A set of vectors is a asymmetric covering code of radius R iff the balls centered at the codewords cover the n-cube (and R is the smallest integer so that this is true).

Questions How large is the smallest possible asymmetric covering code of radius R on n bits? Call this number K + (n,R). Interesting cases: 3. Everything else. 1.R is constant. 2. n-R (the “coradius”) is constant.

Sphere-Covering Lower Bound: Ball Sizes Size of symmetric ball: independent of ball center Size of asymmetric ball: determined by weight of ball center V 3 (3;1) = 4V 3 (2;1) = 3V 3 (1;1) = 2V 3 (0;1) = Definition. V n (R): size of symmetric ball of radius R in Q n V n (k;R): size of asymmetric ball of radius R about a point of weight k V n (R) =V n (k;R) = -

Sphere-Covering Lower Bound (Constant Radius) Theorem (Symmetric Sphere-Covering Bound). K(n,R) Theorem (Asymmetric Sphere-Covering Bound). Proof.There are vertices of weight k. Fix such a vertex. Largest ball containing such a vertex is centered at level k+R The vertex contributes at least 1/ to the size of K + (n,R). K+(n,R)K+(n,R) ( ) nknk V n (k+R;R) -

Upper bounds? How close can we come to the sphere-covering lower bound? Theorem: The size of a minimal (symmetric) covering code of constant radius R is θ(2 n /n R ). The construction is linear, i.e., produces a code which is a linear subspace of GF(2) n. This is a problem, because the algebraic structure of Hamming space shows no respect at all for the asymmetric covering relation. In fact, minimal linear asymmetric covering codes turn out to be HUGE, like θ(2 n ).

A Random Approach Let’s try choosing a set of codewords randomly. Let the probability of picking a point x be proportional to log n divided by the number of points which x covers. Then, throw in anything we missed. Result: A code of size θ(2 n log n/n R ). Close, but no cigar.

A Tool For asymmetric covering codes C 1 and C 2, define the direct sum to be all concatenations of strings from C 1 and C 2 : Proposition: is an asymmetric covering code of radius R+S if C 1 and C 2 are asymmetric covering codes of radius R and S, respectively, so, in particular, K + (n+m,R+S) <= K + (n,R) K + (m,S).

A Random Approach (Reprise) Write the cube as a product of two cubes of about the same dimension. 1. Perform the previous random process on the first factor. 2. For each red point, put a full copy of the second factor in. 3. For each blue point, put an asymmetric covering code of the second factor in. (I.e., induction!)

Did it help? Theorem. K + (n,R) = θ(2 n /n R ). Next question: What’s the constant? Define μ * (R) = lim inf (K(n,R) * volume of R-ball / 2 n ) = min symmetric “redundancy” factor. Define μ 0 * (R) = lim inf (K + (n,R) * average vol. of R-ball / 2 n ) = min asymmetric “redundancy” factor.

Open Questions This construction gives an exponential upper bound for μ 0 * (R) and μ * (R). Van Vu has given an upper bound of cR log R for both. Conjecture. μ * (R) = 1 for all R. But what is μ 0 * (R)? Question: Are there efficiently computable minimal asymmetric covering codes? Question: What is the order of K + (n,R) where R is not constant? Question: What about the non-binary case? ?? ?

Best Known Bounds R \ n A single value appears if the bound is tight; otherwise a range of values appears.