Asymptotic Enumeration of Binary Matrices with Bounded Row and Column Weights Farzad Parvaresh HP Labs, Palo Alto Joint work with Erik Ordentlich and Ron.

Slides:



Advertisements
Similar presentations
1+eps-Approximate Sparse Recovery Eric Price MIT David Woodruff IBM Almaden.
Advertisements

Optimal Space Lower Bounds for All Frequency Moments David Woodruff MIT
Quantum Lower Bounds The Polynomial and Adversary Methods Scott Aaronson September 14, 2001 Prelim Exam Talk.
The Average Case Complexity of Counting Distinct Elements David Woodruff IBM Almaden.
Computational Privacy. Overview Goal: Allow n-private computation of arbitrary funcs. –Impossible in information-theoretic setting Computational setting:
General Linear Model With correlated error terms  =  2 V ≠  2 I.
Applied Informatics Štefan BEREŽNÝ
An Ω(n 1/3 ) Lower Bound for Bilinear Group Based Private Information Retrieval Alexander Razborov Sergey Yekhanin.
Dense Matrix Algorithms. Topic Overview Matrix-Vector Multiplication Matrix-Matrix Multiplication Solving a System of Linear Equations.
Linear Equations in Linear Algebra
Signal Spaces.
June 3, 2015Windows Scheduling Problems for Broadcast System 1 Amotz Bar-Noy, and Richard E. Ladner Presented by Qiaosheng Shi.
Sampling algorithms for l 2 regression and applications Michael W. Mahoney Yahoo Research (Joint work with P. Drineas.
Asymptotic Enumerators of Protograph LDPCC Ensembles Jeremy Thorpe Joint work with Bob McEliece, Sarah Fogal.
4.I. Definition 4.II. Geometry of Determinants 4.III. Other Formulas Topics: Cramer’s Rule Speed of Calculating Determinants Projective Geometry Chapter.
Computational Complexity, Physical Mapping III + Perl CIS 667 March 4, 2004.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
Computing Sketches of Matrices Efficiently & (Privacy Preserving) Data Mining Petros Drineas Rensselaer Polytechnic Institute (joint.
Preference Analysis Joachim Giesen and Eva Schuberth May 24, 2006.
NEW APPROACH TO CALCULATION OF RANGE OF POLYNOMIALS USING BERNSTEIN FORMS.
Ch. 8 & 9 – Linear Sorting and Order Statistics What do you trade for speed?
Binary Variables (1) Coin flipping: heads=1, tails=0 Bernoulli Distribution.
System of Linear Equations Nattee Niparnan. LINEAR EQUATIONS.
Diophantine Approximation and Basis Reduction
2 2.1 © 2016 Pearson Education, Inc. Matrix Algebra MATRIX OPERATIONS.
Topic III The Simplex Method Setting up the Method Tabular Form Chapter(s): 4.
CMPS 1371 Introduction to Computing for Engineers MATRICES.
Orthogonality and Least Squares
Logic Circuits Chapter 2. Overview  Many important functions computed with straight-line programs No loops nor branches Conveniently described with circuits.
The Selection Problem. 2 Median and Order Statistics In this section, we will study algorithms for finding the i th smallest element in a set of n elements.
Three different ways There are three different ways to show that ρ(A) is a simple eigenvalue of an irreducible nonnegative matrix A:
If A and B are both m × n matrices then the sum of A and B, denoted A + B, is a matrix obtained by adding corresponding elements of A and B. add these.
Coding and Algorithms for Memories Lecture 5 1.
3.4 Zeros of Polynomial Functions. The Fundamental Theorem of Algebra If f(x) is a polynomial of degree n, where n>0, then f has at least one zero in.
Coding and Algorithms for Memories Lecture 4 1.
PROBABILITY AND STATISTICS FOR ENGINEERING Hossein Sameti Department of Computer Engineering Sharif University of Technology Principles of Parameter Estimation.
Quantization Codes Comprising Multiple Orthonormal Bases Alexei Ashikhmin Bell Labs  MIMO Broadcast Transmission  Quantizers Q(m) for MIMO Broadcast.
Meeting 18 Matrix Operations. Matrix If A is an m x n matrix - that is, a matrix with m rows and n columns – then the scalar entry in the i th row and.
2 2.1 © 2012 Pearson Education, Inc. Matrix Algebra MATRIX OPERATIONS.
Some Computation Problems in Coding Theory
Greatest Common Divisors & Least Common Multiples  Definition 4 Let a and b be integers, not both zero. The largest integer d such that d|a and d|b is.
Copyright © Cengage Learning. All rights reserved. 2 SYSTEMS OF LINEAR EQUATIONS AND MATRICES.
Optimization of Nonlinear Singularly Perturbed Systems with Hypersphere Control Restriction A.I. Kalinin and J.O. Grudo Belarusian State University, Minsk,
Fidelity of a Quantum ARQ Protocol Alexei Ashikhmin Bell Labs  Classical Automatic Repeat Request (ARQ) Protocol  Quantum Automatic Repeat Request (ARQ)
4-5 Exploring Polynomial Functions Locating Zeros.
2.5 – Determinants and Multiplicative Inverses of Matrices.
Chapter 6 Integration Section 4 The Definite Integral.
Compression for Fixed-Width Memories Ori Rottenstriech, Amit Berman, Yuval Cassuto and Isaac Keslassy Technion, Israel.
The Matrix Equation A x = b (9/16/05) Definition. If A is an m  n matrix with columns a 1, a 2,…, a n and x is a vector in R n, then the product of A.
Approximation Algorithms based on linear programming.
Matrix Operations McDougal Littell Algebra 2 Larson, Boswell, Kanold, Stiff Larson, Boswell, Kanold, Stiff Algebra 2: Applications, Equations, Graphs Algebra.
Matrix Operations McDougal Littell Algebra 2 Larson, Boswell, Kanold, Stiff Larson, Boswell, Kanold, Stiff Algebra 2: Applications, Equations, Graphs Algebra.
Ch 4. Language Acquisition: Memoryless Learning 4.1 ~ 4.3 The Computational Nature of Language Learning and Evolution Partha Niyogi 2004 Summarized by.
2.1 Matrix Operations 2. Matrix Algebra. j -th column i -th row Diagonal entries Diagonal matrix : a square matrix whose nondiagonal entries are zero.
6 6.5 © 2016 Pearson Education, Ltd. Orthogonality and Least Squares LEAST-SQUARES PROBLEMS.
REVIEW Linear Combinations Given vectors and given scalars
1.4 The Matrix Equation Ax = b
Linear Equations in Linear Algebra
Coding and Algorithms for Memories Lecture 5
Coding and Algorithms for Memories Lecture 4
Haim Kaplan and Uri Zwick
Synaptic Dynamics: Unsupervised Learning
Subhash Khot Theory Group
Linear Equations in Linear Algebra
2. Matrix Algebra 2.1 Matrix Operations.
4.6: Rank.
Problem Solving 4.
Biointelligence Laboratory, Seoul National University
The Selection Problem.
Optimal XOR based (2,n)-Visual Cryptography Schemes
Presentation transcript:

Asymptotic Enumeration of Binary Matrices with Bounded Row and Column Weights Farzad Parvaresh HP Labs, Palo Alto Joint work with Erik Ordentlich and Ron M. Roth Novermber 2011

2 Introducing the problem Consider all the 2x2 binary matrices:

3 Introducing the problem Consider all the 2x2 binary matrices: 7 How many binary matrices exist such that number of ones in each row or column is at most ?

4 Memristors Applications

5 Memristors Applications

6 Memristors Applications Drives too much current

7 Memristors Applications

8 Memristors Applications Drives too much current

9 Memristors Applications Do not want too many memristors in any row or column with low resistance state. Drives too much current Map binary data into matrices such that number of ones in each row or column is at most.  Each one in the matrix corresponds to a low resistance state. How many bits can be stored in an memory with this restriction?

10 First attempt Number of bounded row and column matrices E. Ordentlich, and R.M. Roth, “Low complexity two-dimensional weight-constrained codes”, ISIT, August, Efficient one-to-one mapping of bits to binary bounded row and column weight matrices. Are there more bounded row and column weight matrices?

11 Counting number of bounded row column matrices: First attempt Flipping Algorithm Add one row and one column of all zero vectors to the matrix.

12 Counting number of bounded row column matrices: First attempt Flipping Algorithm

13 Counting number of bounded row column matrices: First attempt Flipping Algorithm Flip

14 Counting number of bounded row column matrices: First attempt Flipping Algorithm Flip Notice that total number of ones in the matrix after each flipping will reduce at least by one.

15 Counting number of bounded row column matrices: First attempt Flipping Algorithm Flip Notice that total number of ones in the matrix after each flipping will reduce at least by one.

16 Counting number of bounded row column matrices: First attempt Flipping Algorithm Notice that total number of ones in the matrix after each flipping will reduce at least by one. Flipping will stop after at most steps. Flipping maps matrices to bounded row and column matrices.

Are there more bounded row and column matrices Count number of bounded row and column matrices for small. For even : For odd :

18 Main result Theorem: Let denote the standard normal cumulative distribution function, and then, Theorem: Let denote the standard normal cumulative distribution function, and then, Proof: In two parts. Show a lower bound and an upper bound for.

19 Previous work B.D. McKay, I.M. Wanless, and N.C. Wormald, “Asymptotic enumeration of graphs with a given bound on the maximum degree,” Comb. Probab. Comput., E.C. Posner and R.J. McEliece, “The number of stable points of and infinite-range spin glass memory,” Jet Propulsion Laboratory, Tech. Rep., Expected number of solutions to:

20 Canfield, Greenhill and McKay (CGM08) Lower bound Theorem[CGM08]: = Set of all binary matrices with row sum equal to column sum equal to.

21 Lower bound Enumerate bounded row and column matrices that satisfy assumptions of CGM theorem. Number of ones in each row or column is around the mean. Set of bounded row and column matrices:

22 Lower bound total number of ones in matrix

23 Lower bound Enlarge the set.

24 Lower bound

25 Lower bound where Approximate summation by integration

26 Lower bound where denotes the real n -dimensional cube,

27 Lower bound Looks like a multidimensional Gaussian distribution!

28 Lower bound Simulate Gaussians: Use saddle point

29 Upper bound Set of bounded row and column matrices: We have to enumerate rest of the matrices that do not satisfy assumptions of CGM theorem.

30 Majorization Lemma Upper bound Lemma: For any with and and, respectively, majorizing and,

31 Majorization Lemma Upper bound Lemma: For any with and and, respectively, majorizing and,

32 Majorization Lemma Upper bound Lemma: For any with and and, respectively, majorizing and, For any and find and that are majorized by and, and satisfy the assumptions of CGM theorem. Then use the Lemma to upper bound.

33 Upper bound After choosing the appropriate anchor point for majorization and simplification we can show: The Integral is equivalent to We can compute the expectation using the same techniques as lower bound: Same Gaussian as lower bound.

34 Main result Theorem: Let denote the standard normal cumulative distribution function, and then, Theorem: Let denote the standard normal cumulative distribution function, and then, Proof: Lower bound: Upper bound: Set

35 Future work Tighter enumeration of bounded row and column matrices. Efficient mapping of data to bounded row and column matrices that achieves optimal redundancy.