CSE 501 Research Overview Atri Rudra

Slides:



Advertisements
Similar presentations
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Advertisements

Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
Applied Algorithmics - week7
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
Jump to first page A. Patwardhan, CSE Digital Fountains Main Ideas : n Distribution of bulk data n Reliable multicast, broadcast n Ideal digital.
1 Wireless Sensor Networks Akyildiz/Vuran Administration Issues  Take home Mid-term Exam  Assign April 2, Due April 7  Individual work is required 
NETWORKING CONCEPTS. ERROR DETECTION Error occures when a bit is altered between transmission& reception ie. Binary 1 is transmitted but received is binary.
Error Correcting Codes: Combinatorics, Algorithms and Applications CSE 510C August 27, 2006.
Lecture 40 CSE 331 Dec 11, Announcements Solutions to HW 10 and graded HW 9 at end of the lecture Review session on Monday: see blog for details.
Chapter 10 Error Detection and Correction
CSE 501 Research Overview Atri Rudra
Lecture 41 CSE 331 Dec 10, HW 10 due today Q1 in one pile and Q 3+4 in another I will not take any HW after 1:15pm.
Fountain Codes Amin Shokrollahi EPFL and Digital Fountain, Inc.
Error Correcting Codes: Combinatorics, Algorithms and Applications CSE 545 January 19, 2011.
2/28/03 1 The Virtues of Redundancy An Introduction to Error-Correcting Codes Paul H. Siegel Director, CMRR University of California, San Diego The Virtues.
An Introduction to Cryptology and Coding Theory Discrete Math 2006.
ECE358: Computer Networks Spring 2012
15-853Page :Algorithms in the Real World Error Correcting Codes I – Overview – Hamming Codes – Linear Codes.
Error Detection and Correction
Error Detection and Reliable Transmission EECS 122: Lecture 24 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
An Introduction to Cryptology and Coding Theory Sarah Spence Adams Olin College Gordon Prichett Babson College
Error Detection and Correction Rizwan Rehman Centre for Computer Studies Dibrugarh University.
1 INF244 Textbook: Lin and Costello Lectures (Tu+Th ) covering roughly Chapter 1;Chapters 9-19? Weekly exercises: For your convenience Mandatory.
Great Theoretical Ideas in Computer Science.
Error Correcting Codes: Combinatorics, Algorithms and Applications CSE 545 January 14, 2013.
© 2009 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved. 1 Communication Reliability Asst. Prof. Chaiporn Jaikaeo, Ph.D.
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
ICOM 6115©Manuel Rodriguez-Martinez ICOM 6115 – Computer Networks and the WWW Manuel Rodriguez-Martinez, Ph.D. Lecture 14.
Data Link Layer: Error Detection and Correction
Major objective of this course is: Design and analysis of modern algorithms Different variants Accuracy Efficiency Comparing efficiencies Motivation thinking.
The Data Link Layer Goal –As reliable as possible, efficient communication Point-to-Point –single connection –bits arrive in order sent Not necessarily.
Error Correcting Codes: Combinatorics, Algorithms and Applications CSE 545 January 11, 2010.
Great Theoretical Ideas in Computer Science.
Error Detection and Correction
CS717 Algorithm-Based Fault Tolerance Matrix Multiplication Greg Bronevetsky.
Computer Science Division
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
CHAPTER 3: DATA LINK CONTROL Flow control, Error detection – two dimensional parity checks, Internet checksum, CRC, Error control, Transmission efficiency.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Error Detection. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. An error-detecting code can.
Data Link Layer. Data Link Layer Topics to Cover Error Detection and Correction Data Link Control and Protocols Multiple Access Local Area Networks Wireless.
a/b/g Networks Routing Herbert Rubens Slides taken from UIUC Wireless Networking Group.
Data Communications and Networking
Error-Detecting and Error-Correcting Codes
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
Hamming Distance & Hamming Code
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Error-Correcting Code
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 20 CSE 331 July 30, Longest path problem Given G, does there exist a simple path of length n-1 ?
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Data Link Layer Chapter 3.
Algorithms for Big Data: Streaming and Sublinear Time Algorithms
Error Detection and Correction
Advanced Computer Networks
Ken Gunnells, Ph.D. - Networking Paul Crigler - Programming
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Chapter 10 Error Detection And Correction
Detecting and Correcting Bit Errors
Packetizing Error Detection
Packetizing Error Detection
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
Objective of This Course
Error Detection Neil Tang 9/26/2008
Packetizing Error Detection
Error Detection and Correction
Error Detection and Correction
COS 463: Wireless Networks Lecture 9 Kyle Jamieson
Types of Errors Data transmission suffers unpredictable changes because of interference The interference can change the shape of the signal Single-bit.
Presentation transcript:

CSE 501 Research Overview Atri Rudra

2 Research Interests Theoretical Computer Science  Coding Theory  Algorithmic Game Theory  Sublinear algorithms  Approximation and online algorithms  Computational Complexity The “algorithmic” side

3 Coding Theory

4 The setup C(x) x y = C(x)+error x Give up Mapping C  Error-correcting code or just code  Encoding: x  C(x)  Decoding: y  X  C(x) is a codeword

5 Different Channels and Codes Internet  Checksum used in multiple layers of TCP/IP stack Cell phones Satellite broadcast  TV Deep space telecommunications  Mars Rover

6 “Unusual” Channels Data Storage  CDs and DVDs  RAID  ECC memory Paper bar codes  UPS (MaxiCode) Codes are all around us

7 Redundancy vs. Error-correction Repetition code: Repeat every bit say 100 times  Good error correcting properties  Too much redundancy Parity code: Add a parity bit  Minimum amount of redundancy  Bad error correcting properties Two errors go completely undetected Neither of these codes are satisfactory

8 Two main challenges in coding theory Problem with parity example  Messages mapped to codewords which do not differ in many places Need to pick a lot of codewords that differ a lot from each other Efficient decoding  Naive algorithm: check received word with all codewords

9 The fundamental tradeoff Correct as many errors as possible with as little redundancy as possible Can one achieve the “optimal” tradeoff with efficient encoding and decoding ?

10 A “low level” view Think of each symbol in  being a packet The setup  Sender wants to send k packets  After encoding sends n packets  Some packets get corrupted  Receiver needs to recover the original k packets

11 The Optimal Tradeoff C(x) sent, y received How much of y must be correct to recover x ?  At least k packets must be correct [Guruswami, R. STOC 2006]  An explicit code along with efficient decoding algorithm  Works as long as (almost) k packets are correct

12 So what is left to do? I cheated a bit in the last slide The result only holds for large packets We do not know an “optimal” code over smaller symbols (for example bits)

13 Computational Complexity Collisions to lead to shallower decision trees  [Aspnes, Demirbas, O’Donnell, R.,Uurtamo 2008]

14 Wireless Sensor Networks Murat Demirbas’ specialty

15 Compute Aggregate Functions Each mote has one bit of information Is the temperature at least 70F? Does at least 2 motes have temperature at least 70F?

16 One possible solution Ask each mote one at a time Is your temp at least 70F? Yes Is your temp at least 70F? In the worst case might have to ask ALL motes No

17 Can we do any better? Formalize/Generalize this question Decision Tree model  Inputs: x 1, x 2,…,x n in {0,1}  Function: f : {0,1} n  {0,1}  Minimum # queries to the input to determine f(x 1, x 2,…,x n ) in the worst case  This worst case number of queries is called the decision tree complexity of f Very well studied complexity measure of functions

18 Back to our ≥ 70F example The 2-threshold T 2,n function Previously saw D(T 2,n )  n  In fact D(f)  n  Also D(T 2,n ) ≥ n  For the t-threshold function, D(T t,n ) ≥ n Logical OR, Majority are a special case

19 So are we done? The central node can broad/multi-cast Is your temp at least 70F? In the worst case might have to ask ALL motes Is your temp at least 70F? No Is your temp at least 70F?

20 Replies from the motes Answer back only if answer is yes Is your temp at least 70F?

21 Scenario 1: all the answers are 0 Central node hears “silence” Is your temp at least 70F?

22 Scenario 2: Only one answers is 1 Central node hears a “yes” Is your temp at least 70F? Yes

23 Scenario 3: ≥ 2 answers are 1 There is a collision  Central node can detect it! Is your temp at least 70F? Yes All done with ONE query!

24 Feedback to complexity theory A new “decision tree” model  Inputs: x 1, x 2,…,x n in {0,1}  Function: f : {0,1} n  {0,1}  Minimum # queries to the input to determine f(x 1, x 2,…,x n ) in the worst case  Queries are more general Query any subset of bits Answer is 0, 1 or 2 + depending on #ones in the subset k + decision trees

25 Our Results D 2+ (T t,n ) is O(t log (n/t)) D 2+ (T t,n ) is  (t) More general results  Understand D 2+ (f) fairly well

26 Approximation Algorithms Ranking in Tournaments  [Coppersmith, Fleischer, R. SODA 2006]

27 US Open 2005 Everyone plays everyone Rank the players Min #upsets Rank by number of wins  Break ties Venus WilliamsMaria Sharapova Kim Clijsters Nadia Petrova #1 #2 #3 #4

28 Ranking in Tournament results [Coppersmith, Fleischer, R. SODA 2006] Ordering by number of wins is 5-approx  Ties broken arbitrarily  Problem shown to be NP-hard in 2005 Application in Rank Aggregation  Gives provable guarantee for Borda’s method (1781!) Future Directions  Try and analyze (variants) of heuristics that work well in practice

29 Research Interests Theoretical Computer Science  Coding Theory  Algorithmic Game Theory  Sublinear algorithms  Approximation and online algorithms  Computational Complexity The “algorithmic” side

30 For more information… My Office is Bell 123: drop by! CSE 545 in Spring 09  Course on error correcting codes

31 Algorithmic Game Theory Online auction of digital goods  [Blum, Kumar, R., Wu SODA 2003]

32 Online Auctions of Digital goods Say you want to sell mp3s of a song  Can make copies with no extra cost Buyers arrive one by one  Specify how much they are willing to pay You need to decide to sell or not  At what price ? You want to make lots of money $5 OK, $4 $1 No

33 However… Why not just sell at the value specified by a buyer ? Buyers are selfish  They will lie to get a better deal Why not charge a single fixed price ?  Do not know best price in advance The challenge  Build a online pricing scheme that gives buyers no incentive to cheat Our work gives pricing scheme as good as best fixed price  [Blum, Kumar, R., Wu SODA 2003]

34 Problems I am interested in Problems motivated by game theory Sometimes, “old” problem with a twist  What is the best way to pair up potential couples in a dating site? Twist on the classical graph matching problem

35 Sublinear Algorithms Data Streams  [Beame, Jayram, R. STOC 2007]

36 Data Streams (one application) Databases are huge  Fully reside in disk memory Main memory  Fast, not much of it Disk memory  Slow, lots of it  Random access is expensive  Sequential scan is reasonably cheap Main memory Disk Memory

37 Data Streams (one application) Given a restriction on number of random accesses to disk memory How much main memory is required ? For computations such as join of tables Answer: a lot  [Beame, Jayram, R. STOC 2007] Open question: computing other functions? Main memory Disk memory