On Hierarchical Type Covering Ertem Tuncel 1, Jayanth Nayak 2, and Kenneth Rose 2 1 University of California, Riverside 2 University of California, Santa.

Slides:



Advertisements
Similar presentations
Tests of Hypotheses Based on a Single Sample
Advertisements

Theory of Computing Lecture 23 MAS 714 Hartmut Klauck.
Sampling and Pulse Code Modulation
1 390-Elliptic Curves and Elliptic Curve Cryptography Michael Karls.
M9302 Mathematical Models in Economics Instructor: Georgi Burlakov 2.5.Repeated Games Lecture
How Bad is Selfish Routing? By Tim Roughgarden Eva Tardos Presented by Alex Kogan.
13.4 Map Coloring and the Four Color Theorem. We started this chapter by coloring the regions formed by a set of circles in the plane. But when do we.
Having Proofs for Incorrectness
Deterministic Selection and Sorting Prepared by John Reif, Ph.D. Analysis of Algorithms.
Lower Envelopes (Cont.) Yuval Suede. Reminder Lower Envelope is the graph of the pointwise minimum of the (partially defined) functions. Letbe the maximum.
Lossy Source Coding under a Maximum Distortion Constraint with Decoder Side- Information Jayanth Nayak 1, Ertem Tuncel 2, and Kenneth Rose 1 1 University.
Definition Hamiltonian graph: A graph with a spanning cycle (also called a Hamiltonian cycle). Hamiltonian graph Hamiltonian cycle.
Data Flow Analysis Compiler Design Nov. 3, 2005.
1 Network Source Coding Lee Center Workshop 2006 Wei-Hsin Gu (EE, with Prof. Effros)
13. The Weak Law and the Strong Law of Large Numbers
Online Vertex Colorings of Random Graphs Without Monochromatic Subgraphs Reto Spöhel, ETH Zurich Joint work with Martin Marciniszyn.
Foundations of Measurement Ch 3 & 4 April 4, 2011 presented by Tucker Lentz April 4, 2011 presented by Tucker Lentz.
CMSC 414 Computer and Network Security Lecture 6 Jonathan Katz.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
Phylogenetic Networks of SNPs with Constrained Recombination D. Gusfield, S. Eddhu, C. Langley.
CS Dept, City Univ.1 The Complexity of Connectivity in Wireless Networks Presented by LUO Hongbo.
CS420 lecture eight Greedy Algorithms. Going from A to G Starting with a full tank, we can drive 350 miles before we need to gas up, minimize the number.
Linear Codes for Distributed Source Coding: Reconstruction of a Function of the Sources -D. Krithivasan and S. Sandeep Pradhan -University of Michigan,
Constant Price of Anarchy in Network Creation Games via Public Service Advertising Presented by Sepehr Assadi Based on a paper by Erik D. Demaine and Morteza.
Induction and recursion
Rate-distortion Theory for Secrecy Systems
Mechanisms for Making Crowds Truthful Andrew Mao, Sergiy Nesterko.
Block ciphers 2 Session 4. Contents Linear cryptanalysis Differential cryptanalysis 2/48.
HAWKES LEARNING SYSTEMS Students Matter. Success Counts. Copyright © 2013 by Hawkes Learning Systems/Quant Systems, Inc. All rights reserved. Section 10.2.
Auction Seminar Optimal Mechanism Presentation by: Alon Resler Supervised by: Amos Fiat.
Introduction to Proofs
Zvi Kohavi and Niraj K. Jha 1 Memory, Definiteness, and Information Losslessness of Finite Automata.
1 HMM - Part 2 Review of the last lecture The EM algorithm Continuous density HMM.
The Pumping Lemma for Context Free Grammars. Chomsky Normal Form Chomsky Normal Form (CNF) is a simple and useful form of a CFG Every rule of a CNF grammar.
The Integers. The Division Algorithms A high-school question: Compute 58/17. We can write 58 as 58 = 3 (17) + 7 This forms illustrates the answer: “3.
Chapter 9: Geometric Selection Theorems 11/01/2013
The Dirichlet Labeling Process for Functional Data Analysis XuanLong Nguyen & Alan E. Gelfand Duke University Machine Learning Group Presented by Lu Ren.
Communication System A communication system can be represented as in Figure. A message W, drawn from the index set {1, 2,..., M}, results in the signal.
Lecture 4,5 Mathematical Induction and Fibonacci Sequences.
Copyright © Zeph Grunschlag, Induction Zeph Grunschlag.
Superposition encoding A distorted version of is is encoded into the inner codebook Receiver 2 decodes using received signal and its side information Decoding.
Transmission over composite channels with combined source-channel outage: Reza Mirghaderi and Andrea Goldsmith Work Summary STATUS QUO A subset Vo (with.
Channel Coordination and Quantity Discounts Z. Kevin Weng Presented by Jing Zhou.
CS 103 Discrete Structures Lecture 13 Induction and Recursion (1)
Vector Quantization Vector quantization is used in many applications such as image and voice compression, voice recognition (in general statistical pattern.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Jayanth Nayak, Ertem Tuncel, Member, IEEE, and Deniz Gündüz, Member, IEEE.
Inequalities for Stochastic Linear Programming Problems By Albert Madansky Presented by Kevin Byrnes.
Copyright © Cengage Learning. All rights reserved. CHAPTER 8 RELATIONS.
Copyright © Zeph Grunschlag, Induction Zeph Grunschlag.
Universal Linked Multiple Access Source Codes Sidharth Jaggi Prof. Michelle Effros.
CompSci 102 Discrete Math for Computer Science March 13, 2012 Prof. Rodger Slides modified from Rosen.
Channel Coding Theorem (The most famous in IT) Channel Capacity; Problem: finding the maximum number of distinguishable signals for n uses of a communication.
ON AVCS WITH QUADRATIC CONSTRAINTS Farzin Haddadpour Joint work with Madhi Jafari Siavoshani, Mayank Bakshi and Sidharth Jaggi Sharif University of Technology,
12. Lecture WS 2012/13Bioinformatics III1 V12 Menger’s theorem Borrowing terminology from operations research consider certain primal-dual pairs of optimization.
Chapter 10 Mutual Exclusion Presented by Yisong Jiang.
Approximation Algorithms based on linear programming.
Copyright (c) 2004 Brooks/Cole, a division of Thomson Learning, Inc. Chapter 7 Inferences Concerning Means.
Section 1.7. Section Summary Mathematical Proofs Forms of Theorems Direct Proofs Indirect Proofs Proof of the Contrapositive Proof by Contradiction.
1 Decision Analysis Without Consequences, Bayesianism Without Probabilities Robert Nau Fuqua School of Business Duke University Presentation for RUD 2005.
37TH ANNUAL AMATYC CONFERENCE A Modern Existence Proof Through Graphs
Handbook of Applied Cryptography - CH4, from 4.1~4.3
Context Free Pumping Lemma Some languages are not context free!
Randomized Algorithms: Data Structures
13. The Weak Law and the Strong Law of Large Numbers
The Full Steiner tree problem Part Two
V12 Menger’s theorem Borrowing terminology from operations research
Information Theoretical Analysis of Digital Watermarking
13. The Weak Law and the Strong Law of Large Numbers
Presentation transcript:

On Hierarchical Type Covering Ertem Tuncel 1, Jayanth Nayak 2, and Kenneth Rose 2 1 University of California, Riverside 2 University of California, Santa Barbara

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING Types and Typical Sequences Type class : Collection of data points with empirical distribution P, i.e., Conditional type class (a.k.a. V-shell): Collection of data points with empirical conditional distribution V(x|y) w.r.t., i.e.,

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING Type Covering Covering of using “distortion spheres” about codevectors, i = 1, 2,…, M, i.e., where Type covering lemma (Csiszár and Körner) states that there exists a covering strategy with

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING Uses of Type Covering Source coding: Proof of achievability of the rate-distortion curve Proof of universal achievability of Marton’s error exponent in lossy source coding Results on rate redundancy Guessing subject to distortion: Alice presents Bob fixed guesses until Minimum guessing exponent is achieved by the concatenation of type-covering codebooks in a certain order.

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING 2-Stage Type Covering Weak covering: Implicit in Tuncel and Rose’s work on error exponents in scalable source coding, is the building of a tree of spheres and such that for each, at least one parent-child pair (i, j) simultaneously covers. Two possibilities: Strong covering: Introduced by Kanlis and Narayan, is the covering of using spheres, followed by a covering of each using spheres,.

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING Illustration of the Difference STRONG COVERINGWEAK COVERING Every x  is covered by at least one parent-child pair

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING Need for Strong vs. Weak The difference was previously overlooked. Even though strong covering was introduced in the context of scalable source coding, weak covering suffices for that purpose. Strong covering, on the other hand, is useful in the generalization of the guessing game, introduced by Merhav, Arikan, and Roth: Alice presents guesses until and then guesses until Minimum guessing exponent

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING Main Results We derive necessary and sufficient conditions for achievability of covering rates and for both strategies. The claimed rate region in Kanlis and Narayan’s work for strong covering is in fact the rate region for weak covering. All the type covering based results regarding error exponents remain valid, as weak covering is sufficient for those analyses. Strong covering rates can be strictly higher than weak covering rates (shown by example). The minimum achievable hierarchical guessing exponent result must be re-examined, as it relies on strong covering.

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING Let R P (D 1,D 2 ) denote the region of all (R 1,R 2 ) satisfying the following:  Q 1 (y 1 ), Q 2|1 (y 2 |y 1 ), V(x|y 1 ), and W(x| y 1, y 2 ) such that V  V (P,Q 1,D 1 ), i.e., V and Q 1 are consistent with P and induce distortion  D 1, W  W (V,Q 2|1,Q 1,D 2 ), i.e., W and Q 2|1 are consistent with V, and (together with Q 1 ) induce distortion  D 2, Weak Covering Rates

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING Weak Covering Rates If (R 1,R 2 )  R P (D 1,D 2 ), then there exists a weak covering with Conversely, if there exists a weak covering with codebook sizes M 1 and M 2, then

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING Strong Covering Rates Let T P (D 1,D 2 ) denote the region of all (R 1,R 2 ) with R 2  R 1 satisfying the following:  Q 1 (y 1 ) such that, For all V  V (P,Q 1,D 1 ),  Q 2|1 (y 2 |y 1 ) such that Note that T P (D 1,D 2 )  R P (D 1,D 2 )

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING Strong Covering Rates If (R 1,R 2 )  T P (D 1,D 2 ), then there exists a strong covering with Conversely, if there exists a strong covering with codebook sizes M 1 and M 2, then

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING Example of T P (D 1,D 2 )  R P (D 1,D 2 ) When R 1 = R P (D 1 ), there exists a unique pair (Q 1,V) such that V  V (P,Q 1,D 1 ) and I(Q 1,V)  R 1 Then it suffices to find V  V (P,Q 1,D 1 ) such that We found such V

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING Consequences on Guessing Merhav, Arikan, and Roth proved the following lower bound for the minimum guessing exponent where Using strong type covering, they also proved achievability of this lower bound when Alice knows the type of x in advance.

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING Consequences on Guessing Proof assumes every rate pair in R P (D 1,D 2 ) is sufficient for covering. What is achievable, instead, is where For the example yielding T P (D 1,D 2 )  R P (D 1,D 2 ), we also show that L(D 1,D 2,P) > K(D 1,D 2,P).

TUNCEL, NAYAK, AND ROSE: ON HIERARCHICAL TYPE COVERING To sum up… Contrasted two possibilities for hierarchical type covering. Presented rate regions for both cases. Rate regions are not identical. Investigated the effect of this distinction on the guessing problem.