: Error Correcting Codes. December 2017 Lecture 10
|
|
- Dortha Roberts
- 5 years ago
- Views:
Transcription
1 : Error Correcting Codes. December 017 Lecture 10 The Linear-Programming Bound Amnon Ta-Shma and Dean Doron 1 The LP-bound We will prove the Linear-Programming bound due to [, 1], which gives an upper bound on the code rate of a given distance. The bound s name hints the proof technique, however we will see a different proof which doesn t rely on linear programming, due to Navon and Samorodnitsky [3]. The linear-programming bound beats the Elias-Bassalygo bound when the relative distance is not too small. Before we proceed, consider the notion of a maimal eigenvalue restricted to a specific subset of indices. Definition 1. Let A C m m and B [m]. Define λ B (A) = ma v: v =1,supp(v) B v Av. Throughout, we consider A as the binary adjacency matri of the Hamming cube of dimension n. That is, the rows and column are indeed by {0, 1} n and A[, y] = 1 iff (, y) = 1 (as n-bit strings). Make sure you understand why λ {0,1} n = n. We abbreviate λ B = λ B (A), and note that we can think of every such v R n as a function v : {0, 1} n R. The way we establish an upper bound on the code s cardinality is by first proving a lower bound on λ B where B is a Hamming ball and then arguing that if a large enough B has a large maimal eigenvalue (w.r.t. the code s distance) then it must be the case that the code s cardinality is not too large. The Fourier Transform We will only consider Fourier epansion over the Boolean cube. Let V = {f : F n that it is a vector space on F n over R of dimension n. A natural basis for V is R} and note 1 w () = { 1, = w 0, otherwise for every w F n. It is also an inner-product space under the inner product f 1, f = E [f F n 1 ()f ()] = 1 n f 1 ()f (), and it is easy to see that the basis {1 w } w F n is an orthogonal basis under this inner product. We now introduce another basis, that contains only functions that are homomorphisms. 1 G
2 Definition. A character of the finite group G is a homomorphism χ : G C, i.e., χ( + y) = χ()χ(y) for every, y G, where the addition is the group operation in G, and the multiplication is the group operation in C. In our case, G = F n and we have an eplicit representation of the characters. For S Fn, define χ S V as χ S () = ( 1) S,. Verify that every character is a homomorphism. Now, Claim 3. The set of all characters of F n is orthonormal (under the above inner product). Proof. First, χ S, χ S = 1 n χ S()χ S () = 1 n n = 1. Now, for S T, χ S, χ T = 1 n χ S ()χ T () = 1 n ( 1),S+T. As S T, S + T is nonzero, say at indices I [n]. Eactly half of the -s have odd weight restricted to I and eactly half have even weight. Thus, the above sum is 0. The Fourier transform of a function is the linear transformation from V to V that maps the natural basis to the Fourier basis (of characters). Thus, every f V can be (uniquely) written as f = S ˆf(S) χ S, and the coefficients ˆf(S) are called the Fourier coefficients. We give their basic properties: Claim 4. Let f, g V. We have: 1. ˆf(S) = f, χs.. f, g = ˆf(S)ĝ(S) S (Parseval s identity). 3. ˆf( ) = E[f]. Proof. For item (1), f, χ S = T ˆf(T )χ T, χ S = T ˆf(T ) χ S, χ T = ˆf(S) χ S, χ S = ˆf(S). For item (), f, g = f, S ĝ(s)χ S = S ĝ(s) f, χ S = S ˆf(S)ĝ(S). For item (3), ˆf( ) = f, = 1 n f() ( 1) 0 = 1 n f() = E[f].
3 We now define a convolution between two functions. Definition 5. Let f, g V. The convolution f g V is defined as (f g)() = E y f(y)g( + y). Verify that the convolution operator is commutative and associative. Also, a key property is the following one: Claim 6. f g = ˆf ĝ. Proof. Fi S F n. We have: ˆf(S) ĝ(s) = f, χ S g, χ S = 1 n f()g(y)χ S ()χ S (y) y y = 1 n f()g(y)χ S ( + y) = 1 n f()g(z + )χ S (z) = 1 n (f g)(z) χ S (z) = f g, χ S = f g(s). z z.1 Fourier transform and codes For C F n, we let 1 C be the characteristic function of C, in the sense that 1 C () = 1 if C and 0 otherwise. We record a few easy claims. Claim 7. Let C be a linear code. Then, 1 C = C n 1 C. Proof. For every S F n, 1 C (S) = 1 C, χ S = 1 1 C() ( 1),S = 1 C n ( 1),S. Now, if S C then all inner products are 0 and we get C. n n Otherwise, there eists c 0 C such that c 0, S = 1. For every C it holds that ( 1),S + ( 1) +c0,s = ( 1),S (1 + ( 1) c0,s ) = 0. Summing it over all C, we get: 0 = ( ) ( 1),S (1 + ( 1) +c0,s ) = ( 1),S + ( 1) +c0,s = C C C C( 1),S, as required. Claim 8. Let C be a linear code. Then, 1 C 1 C = C n 1 C. Proof. For every F n, (1 C 1 C )() = 1 y 1 C(y)1 C ( + y) = 1 y C 1 C( + y). Now, if C n then + y C and the sum is C. Otherwise, + y / C and the sum is 0. n n Let e i F n be the vector (a 1,..., a n ) with a j = δ i,j. Let L : F n R defined by L(e i) = n for every 1 i n, and 0 elsewhere. Claim 9. For every f V it holds that Af = L f. Consequently, (Af)() = i [n] f( + e i). 3
4 Proof. Follows easily by (f L)() = 1 n y L(y)f( + y) = i [n] f( + e i) and inspecting the neighbors of in the Hamming cube. Claim 10. For every S F n, ˆL(S) = n w(s). Proof. ˆL(S) = L, χs = 1 n L() ( 1),S = i [n] ( 1)S i = (n w(s)) w(s). Finally, we give one last eample: Claim 11. Let B = B(0, τn) and C F n a code. Then, (1 C 1 B )(z) = C B(z, τn) / n. Proof. For every z F n, (1 C 1 B )(z) = 1 n 1 C ()1 B ( + z) = 1 n 1 B(z,τn) (). C 3 The approach We say f g if f() g() for every F n. Lemma 1. Let B = B(0, r = τn) be the Hamming ball of radius r. Then there eists a function f V with the following properties: f is supported on B, f 0, Af λ r f for λ r = r(n r) o(n) = n( τ(1 τ) o(1)). Definition 13. We say C F n has dual distance d if the Fourier transform of 1 C points of Hamming weight 0 < S < d. vanishes on Claim 14. If C F n C. is a linear code with dual distance d then d is also the minimal distance of Proof. We want to show that 1 C () = 0 for with 0 < w() < d. As C is linear, 1 C and by definition 1 C () vanishes on such -s. = n C 1 C, Lemma 15. Suppose C F n is a vector space with dual distance d (i.e., it s dual code has distance at least d). Let B = B r for an integer r such that λ r n d + 1. Then, (z + B r ) n n. z C 4
5 Let δ = d/n < 1, Take τ = 1 δ(1 δ) + o(1) and r = τn. So, ( (1 λ r = n ) ( 1 δ(1 δ) + o(1) + ) ) δ(1 δ) + o(1) o(1) ) = n (δ δ + 14 ( 1 + o(1) o(1) ) = n 4δ 4δ o(1) ( ) 1 = n (1 δ) + o(1) = n d + o n (1) n d + 1, and the premise of Lemma 15 is satisfied by choosing the o(1) terms both in λ r and in τ appropriately. From now on, that is the r we should think of. Now take C = C. Then, balls of radius r centered at the points of the dual code cover an -fraction of the space. Then, 1 n and so we obtain: C B r = C n(h(τ)+o(1)) n n, Corollary 16. Let C be a [n, k, d] code and δ = d/n is the relative distance. Then: C (1 H(τ) o(1))n and therefore C = n C (H(τ)+o(1))n, where τ = 1 δ(1 δ). Asymptotically, this gives R(δ) H( 1 δ(1 δ)). We are left with proving Lemma 1 and Lemma Proving a lower bound on the Dirichlet eigenvalue of a ball in F n Lemma 17. Let B = B(0, r = τn) be the Hamming ball of radius r. Then there eists a function f V with the following properties: f is supported on B, f 0, Af, f λ r f, f for λ r = r(n r) o(n) = n( τ(1 τ) o(1)). Proof. We construct a specific eigenfunction f that achieves the bound. f will be symmetric, so it is fully defined by its values on n + 1 vectors of distinct Hamming weights. We overload notation and write f(i) for the value gives on weight i vectors. We choose f such that f gives the same weight for each level on its support. Let M = n = o(n). Define f as follows: 1 i [r M, r], f(i) = ( n i) 0 otherwise. 5
6 Now we need to compute (Af)(v) = n j=1 f(v + e j). Notice that Af is also symmetric and Af(i) = if(i 1) + (n i)f(i + 1). Also, if i [r M, r 1], ( n ) f(i) f(i + 1) = i+1 ( n = i) n i i + 1. Thus, for i [r M + 1, r 1], Af(i) = i(n i)f(i) + (n i)(i + 1)f(i). Hence, f Af = r 1 k=r M+1 r 1 k=r M+1 ( ) n ( k(n k + 1) + (n k)(k + 1))f(k) k k(n k + 1) + (n k)(k + 1). As k(n k + 1), (n k)(k + 1) (r M)(n r) r(n r) M, we get that f Af (M 1)( r(n r) M) = r(n r) o(n), whereas f f 1, completing the proof. Having that we prove Lemma 1 Proof. A is a symmetric, irreducible (i.e., the corresponding graph is connected) operator with non-negative entries. Let A be its restriction to B (one can view it as either restricting the matri A to the B B sub-rectangle, or as the operator Π B AΠ B where Π B is projection on B). A is also symmetric, irreducible and with non-negative entries. By the Perron-Frobenius theorem the greatest eigenvalue of A is obtained by a non-negative vector f 0 supported on B. Say A f = λ f. We have already seen an f supported on B such that f Af f f λ r. However, f Af = f Π B AΠ Bf = f A f, and λ is the largest singular value of A, hence we must have λ λ r. Also Af A f because A A 0 and f 0, hence we have as desired. Af A f λ f λf, 6
7 3. The covering bound Proof. Let B = B r and f be the function guaranteed by Lemma 1 for B. Define I.e., for z F n : F (z) = 1 n F n F = 1 C f. 1 C ()f( + z) = 1 n w C f(z + w). Hence, F is supported on w C (w + B). We will bound AF, F from both sides. One side: By definition, AF = F L = (1 C f) L = 1 C (f L) = 1 C Af. As 1 C 0 and Af λ B f we have AF = 1 C Af λ B 1 C f = λ B F. Thus, Other side: It holds that AF, F λ B F, F. AF, F = S ÂF (S) F (S) = S L F (S) F (S) = S L(S) F (S) F (S). But F (S) = 1 C f(s) = 1 C (S) f(s), and C has dual distance d, so we get zero for every set S of cardinality between 1 and d 1. Hence, AF, F = L( )( F ( )) + = n( F ( )) + n( F ( )) + S S:w(S) d S:w(S) d L(S)( F (S)) (n w(s))( F (S)) (n d)( F (S)). Together we get that (n d + 1) F, F λ B F, F AF, F n E[F ] + (n d) F, F Thus, F, F n E[F ]. But, F is supported on Λ = w C (w + B), and by Cauchy-Schwartz, ( ) E[F ] 1 = n 1 F () 1 Λ F () = Λ n n F, F Hence 1 n Λ n, as desired. Λ 7
8 References [1] Philippe Delsarte. An algebraic approach to the association schemes of coding theory. Philips Res. Reports Suppls., 10, [] Robert McEliece, Eugene Rodemich, Howard Rumsey, and Lloyd Welch. New upper bounds on the rate of a code via the delsarte-macwilliams inequalities. IEEE Transactions on Information Theory, 3(): , [3] Michael Navon and Ale Samorodnitsky. Linear programming bounds for codes via a covering argument. Discrete & Computational Geometry, 41(),
Delsarte s linear programming bound
15-859 Coding Theory, Fall 14 December 5, 2014 Introduction For all n, q, and d, Delsarte s linear program establishes a series of linear constraints that every code in F n q with distance d must satisfy.
More informationLecture 3 Small bias with respect to linear tests
03683170: Expanders, Pseudorandomness and Derandomization 3/04/16 Lecture 3 Small bias with respect to linear tests Amnon Ta-Shma and Dean Doron 1 The Fourier expansion 1.1 Over general domains Let G be
More informationLecture 19: Elias-Bassalygo Bound
Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecturer: Atri Rudra Lecture 19: Elias-Bassalygo Bound October 10, 2007 Scribe: Michael Pfetsch & Atri Rudra In the last lecture,
More informationError Correcting Codes Questions Pool
Error Correcting Codes Questions Pool Amnon Ta-Shma and Dean Doron January 3, 018 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to
More information: Error Correcting Codes. October 2017 Lecture 1
03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of
More informationLectures 15: Cayley Graphs of Abelian Groups
U.C. Berkeley CS294: Spectral Methods and Expanders Handout 15 Luca Trevisan March 14, 2016 Lectures 15: Cayley Graphs of Abelian Groups In which we show how to find the eigenvalues and eigenvectors of
More informationLecture 22. m n c (k) i,j x i x j = c (k) k=1
Notes on Complexity Theory Last updated: June, 2014 Jonathan Katz Lecture 22 1 N P PCP(poly, 1) We show here a probabilistically checkable proof for N P in which the verifier reads only a constant number
More informationACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms
1. Computability, Complexity and Algorithms (a) Let G(V, E) be an undirected unweighted graph. Let C V be a vertex cover of G. Argue that V \ C is an independent set of G. (b) Minimum cardinality vertex
More informationLecture 2 Linear Codes
Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of
More informationLecture 19 : Reed-Muller, Concatenation Codes & Decoding problem
IITM-CS6845: Theory Toolkit February 08, 2012 Lecture 19 : Reed-Muller, Concatenation Codes & Decoding problem Lecturer: Jayalal Sarma Scribe: Dinesh K Theme: Error correcting codes In the previous lecture,
More informationLecture 12: November 6, 2017
Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and
More informationInner products and Norms. Inner product of 2 vectors. Inner product of 2 vectors x and y in R n : x 1 y 1 + x 2 y x n y n in R n
Inner products and Norms Inner product of 2 vectors Inner product of 2 vectors x and y in R n : x 1 y 1 + x 2 y 2 + + x n y n in R n Notation: (x, y) or y T x For complex vectors (x, y) = x 1 ȳ 1 + x 2
More informationLecture 19: Simple Applications of Fourier Analysis & Convolution. Fourier Analysis
Lecture 19: Simple Applications of & Convolution Recall I Let f : {0, 1} n R be a function Let = 2 n Inner product of two functions is defined as follows f, g := 1 f (x)g(x) For S {0, 1} n, define the
More informationStatistical Mechanics and Combinatorics : Lecture IV
Statistical Mechanics and Combinatorics : Lecture IV Dimer Model Local Statistics We ve already discussed the partition function Z for dimer coverings in a graph G which can be computed by Kasteleyn matrix
More informationApplied Mathematics Course Contents Matrices, linear systems Gauss-Jordan elimination, Determinants, Cramer's rule, inverse matrix.
Applied Mathematics Course Contents Matrices, linear systems Gauss-Jordan elimination, Determinants, Cramer's rule, inverse matri. Vector spaces, inner product and norm, linear transformations. Matri eigenvalue
More information: Error Correcting Codes. November 2017 Lecture 2
03683072: Error Correcting Codes. November 2017 Lecture 2 Polynomial Codes and Cyclic Codes Amnon Ta-Shma and Dean Doron 1 Polynomial Codes Fix a finite field F q. For the purpose of constructing polynomial
More informationThe Hamming Codes and Delsarte s Linear Programming Bound
The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the
More informationAlmost Independent Binary Random Variables
Project Number: MA-WJM-6401 Almost Independent Binary Random Variables A Major Qualifying Project submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements
More informationLecture 3: Boolean Functions and the Walsh Hadamard Code 1
CS-E4550 Advanced Combinatorics in Computer Science Autumn 2016: Selected Topics in Complexity Theory Lecture 3: Boolean Functions and the Walsh Hadamard Code 1 1. Introduction The present lecture develops
More informationAPPROXIMATION RESISTANCE AND LINEAR THRESHOLD FUNCTIONS
APPROXIMATION RESISTANCE AND LINEAR THRESHOLD FUNCTIONS RIDWAN SYED Abstract. In the boolean Max k CSP (f) problem we are given a predicate f : { 1, 1} k {0, 1}, a set of variables, and local constraints
More informationLecture 5: February 16, 2012
COMS 6253: Advanced Computational Learning Theory Lecturer: Rocco Servedio Lecture 5: February 16, 2012 Spring 2012 Scribe: Igor Carboni Oliveira 1 Last time and today Previously: Finished first unit on
More informationStanford University CS366: Graph Partitioning and Expanders Handout 13 Luca Trevisan March 4, 2013
Stanford University CS366: Graph Partitioning and Expanders Handout 13 Luca Trevisan March 4, 2013 Lecture 13 In which we construct a family of expander graphs. The problem of constructing expander graphs
More informationDS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra.
DS-GA 1002 Lecture notes 0 Fall 2016 Linear Algebra These notes provide a review of basic concepts in linear algebra. 1 Vector spaces You are no doubt familiar with vectors in R 2 or R 3, i.e. [ ] 1.1
More informationFinite and Infinite Sets
Chapter 9 Finite and Infinite Sets 9. Finite Sets Preview Activity (Equivalent Sets, Part ). Let A and B be sets and let f be a function from A to B..f W A! B/. Carefully complete each of the following
More informationLecture 8: Linearity and Assignment Testing
CE 533: The PCP Theorem and Hardness of Approximation (Autumn 2005) Lecture 8: Linearity and Assignment Testing 26 October 2005 Lecturer: Venkat Guruswami cribe: Paul Pham & Venkat Guruswami 1 Recap In
More informationArrangements, matroids and codes
Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde
More informationIntriguing sets of vertices of regular graphs
Intriguing sets of vertices of regular graphs Bart De Bruyn and Hiroshi Suzuki February 18, 2010 Abstract Intriguing and tight sets of vertices of point-line geometries have recently been studied in the
More informationSpectral Theorem for Self-adjoint Linear Operators
Notes for the undergraduate lecture by David Adams. (These are the notes I would write if I was teaching a course on this topic. I have included more material than I will cover in the 45 minute lecture;
More information12x + 18y = 30? ax + by = m
Math 2201, Further Linear Algebra: a practical summary. February, 2009 There are just a few themes that were covered in the course. I. Algebra of integers and polynomials. II. Structure theory of one endomorphism.
More information1 Math 241A-B Homework Problem List for F2015 and W2016
1 Math 241A-B Homework Problem List for F2015 W2016 1.1 Homework 1. Due Wednesday, October 7, 2015 Notation 1.1 Let U be any set, g be a positive function on U, Y be a normed space. For any f : U Y let
More informationLecture 3: September 10
CS294 Markov Chain Monte Carlo: Foundations & Applications Fall 2009 Lecture 3: September 10 Lecturer: Prof. Alistair Sinclair Scribes: Andrew H. Chan, Piyush Srivastava Disclaimer: These notes have not
More informationEigenvalue comparisons in graph theory
Eigenvalue comparisons in graph theory Gregory T. Quenell July 1994 1 Introduction A standard technique for estimating the eigenvalues of the Laplacian on a compact Riemannian manifold M with bounded curvature
More informationCharacterizations of Strongly Regular Graphs: Part II: Bose-Mesner algebras of graphs. Sung Y. Song Iowa State University
Characterizations of Strongly Regular Graphs: Part II: Bose-Mesner algebras of graphs Sung Y. Song Iowa State University sysong@iastate.edu Notation K: one of the fields R or C X: a nonempty finite set
More information18.303: Introduction to Green s functions and operator inverses
8.33: Introduction to Green s functions and operator inverses S. G. Johnson October 9, 2 Abstract In analogy with the inverse A of a matri A, we try to construct an analogous inverse  of differential
More informationQuestions Pool. Amnon Ta-Shma and Dean Doron. January 2, Make sure you know how to solve. Do not submit.
Questions Pool Amnon Ta-Shma and Dean Doron January 2, 2017 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to solve. Do not submit.
More informationOn The Weights of Binary Irreducible Cyclic Codes
On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:
More informationMa/CS 6b Class 23: Eigenvalues in Regular Graphs
Ma/CS 6b Class 3: Eigenvalues in Regular Graphs By Adam Sheffer Recall: The Spectrum of a Graph Consider a graph G = V, E and let A be the adjacency matrix of G. The eigenvalues of G are the eigenvalues
More informationCS Foundations of Communication Complexity
CS 49 - Foundations of Communication Complexity Lecturer: Toniann Pitassi 1 The Discrepancy Method Cont d In the previous lecture we ve outlined the discrepancy method, which is a method for getting lower
More information18.S34 linear algebra problems (2007)
18.S34 linear algebra problems (2007) Useful ideas for evaluating determinants 1. Row reduction, expanding by minors, or combinations thereof; sometimes these are useful in combination with an induction
More informationVectors in Function Spaces
Jim Lambers MAT 66 Spring Semester 15-16 Lecture 18 Notes These notes correspond to Section 6.3 in the text. Vectors in Function Spaces We begin with some necessary terminology. A vector space V, also
More informationLecture 1: Review of linear algebra
Lecture 1: Review of linear algebra Linear functions and linearization Inverse matrix, least-squares and least-norm solutions Subspaces, basis, and dimension Change of basis and similarity transformations
More informationPrimitive Matrices with Combinatorial Properties
Southern Illinois University Carbondale OpenSIUC Research Papers Graduate School Fall 11-6-2012 Primitive Matrices with Combinatorial Properties Abdulkarem Alhuraiji al_rqai@yahoo.com Follow this and additional
More informationBoolean degree 1 functions on some classical association schemes
Boolean degree 1 functions on some classical association schemes Yuval Filmus, Ferdinand Ihringer February 16, 2018 Abstract We investigate Boolean degree 1 functions for several classical association
More informationLecture 9: SVD, Low Rank Approximation
CSE 521: Design and Analysis of Algorithms I Spring 2016 Lecture 9: SVD, Low Rank Approimation Lecturer: Shayan Oveis Gharan April 25th Scribe: Koosha Khalvati Disclaimer: hese notes have not been subjected
More informationCS 6815: Lecture 4. September 4, 2018
XS = X s... X st CS 685: Lecture 4 Instructor: Eshan Chattopadhyay Scribe: Makis Arsenis and Ayush Sekhari September 4, 208 In this lecture, we will first see an algorithm to construct ɛ-biased spaces.
More informationCS 6820 Fall 2014 Lectures, October 3-20, 2014
Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given
More informationLecture 21: P vs BPP 2
Advanced Complexity Theory Spring 206 Prof. Dana Moshkovitz Lecture 2: P vs BPP 2 Overview In the previous lecture, we began our discussion of pseudorandomness. We presented the Blum- Micali definition
More informationLecture Notes 1: Vector spaces
Optimization-based data analysis Fall 2017 Lecture Notes 1: Vector spaces In this chapter we review certain basic concepts of linear algebra, highlighting their application to signal processing. 1 Vector
More informationOutline of the course
School of Mathematical Sciences PURE MTH 3022 Geometry of Surfaces III, Semester 2, 20 Outline of the course Contents. Review 2. Differentiation in R n. 3 2.. Functions of class C k 4 2.2. Mean Value Theorem
More informationChapter 0: Preliminaries
Chapter 0: Preliminaries Adam Sheffer March 28, 2016 1 Notation This chapter briefly surveys some basic concepts and tools that we will use in this class. Graduate students and some undergrads would probably
More informationA NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1
BULLETIN (New Series) OF THE AMERICAN MATHEMATICAL SOCIETY Volume 23, Number 2, October 1990 A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1 J. H. CONWAY AND N. J. A. SLOANE ABSTRACT.
More informationMAT 257, Handout 13: December 5-7, 2011.
MAT 257, Handout 13: December 5-7, 2011. The Change of Variables Theorem. In these notes, I try to make more explicit some parts of Spivak s proof of the Change of Variable Theorem, and to supply most
More informationAdjoint Representations of the Symmetric Group
Adjoint Representations of the Symmetric Group Mahir Bilen Can 1 and Miles Jones 2 1 mahirbilencan@gmail.com 2 mej016@ucsd.edu Abstract We study the restriction to the symmetric group, S n of the adjoint
More informationADVANCED CALCULUS - MTH433 LECTURE 4 - FINITE AND INFINITE SETS
ADVANCED CALCULUS - MTH433 LECTURE 4 - FINITE AND INFINITE SETS 1. Cardinal number of a set The cardinal number (or simply cardinal) of a set is a generalization of the concept of the number of elements
More informationMAT 445/ INTRODUCTION TO REPRESENTATION THEORY
MAT 445/1196 - INTRODUCTION TO REPRESENTATION THEORY CHAPTER 1 Representation Theory of Groups - Algebraic Foundations 1.1 Basic definitions, Schur s Lemma 1.2 Tensor products 1.3 Unitary representations
More informationThroughout these notes we assume V, W are finite dimensional inner product spaces over C.
Math 342 - Linear Algebra II Notes Throughout these notes we assume V, W are finite dimensional inner product spaces over C 1 Upper Triangular Representation Proposition: Let T L(V ) There exists an orthonormal
More informationThe MacWilliams Identities
The MacWilliams Identities Jay A. Wood Western Michigan University Colloquium March 1, 2012 The Coding Problem How to ensure the integrity of a message transmitted over a noisy channel? Cleverly add redundancy.
More informationLinear Algebra. Paul Yiu. Department of Mathematics Florida Atlantic University. Fall A: Inner products
Linear Algebra Paul Yiu Department of Mathematics Florida Atlantic University Fall 2011 6A: Inner products In this chapter, the field F = R or C. We regard F equipped with a conjugation χ : F F. If F =
More informationLecture 7: ɛ-biased and almost k-wise independent spaces
Lecture 7: ɛ-biased and almost k-wise independent spaces Topics in Complexity Theory and Pseudorandomness (pring 203) Rutgers University wastik Kopparty cribes: Ben Lund, Tim Naumovitz Today we will see
More informationFourier analysis of boolean functions in quantum computation
Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge
More informationFunctional Analysis Review
Outline 9.520: Statistical Learning Theory and Applications February 8, 2010 Outline 1 2 3 4 Vector Space Outline A vector space is a set V with binary operations +: V V V and : R V V such that for all
More informationApproximating MAX-E3LIN is NP-Hard
Approximating MAX-E3LIN is NP-Hard Evan Chen May 4, 2016 This lecture focuses on the MAX-E3LIN problem. We prove that approximating it is NP-hard by a reduction from LABEL-COVER. 1 Introducing MAX-E3LIN
More informationMa/CS 6b Class 25: Error Correcting Codes 2
Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets
More informationLecture 1: Introduction to Fourier Analysis. Lecture 2: Introduction to Some Convergence Theorems
Lecture : Introduction to Fourier Analysis p.2, line 6: we now at a new instead of we now look at an new p.2, line -: Maybe X C instead of X C p.3, line 2: An is missing in the denominator, i.e. < χ j,χ
More informationCHARACTER-FREE APPROACH TO PROGRESSION-FREE SETS
CHARACTR-FR APPROACH TO PROGRSSION-FR STS VSVOLOD F. LV Abstract. We present an elementary combinatorial argument showing that the density of a progression-free set in a finite r-dimensional vector space
More informationChapter One. The Calderón-Zygmund Theory I: Ellipticity
Chapter One The Calderón-Zygmund Theory I: Ellipticity Our story begins with a classical situation: convolution with homogeneous, Calderón- Zygmund ( kernels on R n. Let S n 1 R n denote the unit sphere
More informationPigeonhole Principle and Ramsey Theory
Pigeonhole Principle and Ramsey Theory The Pigeonhole Principle (PP) has often been termed as one of the most fundamental principles in combinatorics. The familiar statement is that if we have n pigeonholes
More informationOn the sum of two largest eigenvalues of a symmetric matrix
On the sum of two largest eigenvalues of a symmetric matrix Javad Ebrahimi B. Department of Mathematics Simon Fraser University Burnaby, B.C. V5A 1S6 Vladimir Nikiforov Department of Mathematical Sci.
More informationFINITE FOURIER ANALYSIS. 1. The group Z N
FIITE FOURIER AALYSIS EIL LYALL 1. The group Z Let be a positive integer. A complex number z is an th root of unity if z = 1. It is then easy to verify that the set of th roots of unity is precisely {
More informationPrimes in arithmetic progressions
(September 26, 205) Primes in arithmetic progressions Paul Garrett garrett@math.umn.edu http://www.math.umn.edu/ garrett/ [This document is http://www.math.umn.edu/ garrett/m/mfms/notes 205-6/06 Dirichlet.pdf].
More informationAlgebraic structures I
MTH5100 Assignment 1-10 Algebraic structures I For handing in on various dates January March 2011 1 FUNCTIONS. Say which of the following rules successfully define functions, giving reasons. For each one
More informationLecture 5. Ch. 5, Norms for vectors and matrices. Norms for vectors and matrices Why?
KTH ROYAL INSTITUTE OF TECHNOLOGY Norms for vectors and matrices Why? Lecture 5 Ch. 5, Norms for vectors and matrices Emil Björnson/Magnus Jansson/Mats Bengtsson April 27, 2016 Problem: Measure size of
More informationLecture 8 : Eigenvalues and Eigenvectors
CPS290: Algorithmic Foundations of Data Science February 24, 2017 Lecture 8 : Eigenvalues and Eigenvectors Lecturer: Kamesh Munagala Scribe: Kamesh Munagala Hermitian Matrices It is simpler to begin with
More informationFirst we introduce the sets that are going to serve as the generalizations of the scalars.
Contents 1 Fields...................................... 2 2 Vector spaces.................................. 4 3 Matrices..................................... 7 4 Linear systems and matrices..........................
More informationAlgebraic Constructions of Graphs
Spectral Graph Theory Lecture 15 Algebraic Constructions of Graphs Daniel A. Spielman October 17, 2012 15.1 Overview In this lecture, I will explain how to make graphs from linear error-correcting codes.
More informationKey words: Batch codes, error-correcting codes, computationally-private information retrieval, load balancing, distributed storage.
Linear Batch Codes Helger Lipmaa and Vitaly Skachek Abstract In an application, where a client wants to obtain many symbols from a large database, it is often desirable to balance the load. Batch codes
More information5 Quiver Representations
5 Quiver Representations 5. Problems Problem 5.. Field embeddings. Recall that k(y,..., y m ) denotes the field of rational functions of y,..., y m over a field k. Let f : k[x,..., x n ] k(y,..., y m )
More informationExact and heuristic minimization of Boolean functions
Eact and heuristic minimization of Boolean functions Quine a McCluskey Method a) Generation of all prime implicants b) Selection of a minimum subset of prime implicants, which will represent the original
More informationEstimates of the Distance Distribution of Codes and Designs
1050 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Estimates of the Distance Distribution of Codes Designs Alexei Ashikhmin, Member, IEEE, Alexer Barg, Senior Member, IEEE, Simon
More informationMATH 220: INNER PRODUCT SPACES, SYMMETRIC OPERATORS, ORTHOGONALITY
MATH 22: INNER PRODUCT SPACES, SYMMETRIC OPERATORS, ORTHOGONALITY When discussing separation of variables, we noted that at the last step we need to express the inhomogeneous initial or boundary data as
More informationLecture 7: Passive Learning
CS 880: Advanced Complexity Theory 2/8/2008 Lecture 7: Passive Learning Instructor: Dieter van Melkebeek Scribe: Tom Watson In the previous lectures, we studied harmonic analysis as a tool for analyzing
More informationT linear programming to be applied successfully to error-correcting
1276 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 34, NO. 5, SEPTEMBER 1988 Inequalities for Covering Codes Abstract-Any code C with covering radius R must satisfy a set of linear inequalities that involve
More informationU.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 12 Luca Trevisan October 3, 2017
U.C. Berkeley CS94: Beyond Worst-Case Analysis Handout 1 Luca Trevisan October 3, 017 Scribed by Maxim Rabinovich Lecture 1 In which we begin to prove that the SDP relaxation exactly recovers communities
More informationTopics in Probabilistic Combinatorics and Algorithms Winter, 2016
Topics in Probabilistic Combinatorics and Algorithms Winter, 06 4. Epander Graphs Review: verte boundary δ() = {v, v u }. edge boundary () = {{u, v} E, u, v / }. Remark. Of special interset are (, β) epander,
More information0.1. Linear transformations
Suggestions for midterm review #3 The repetitoria are usually not complete; I am merely bringing up the points that many people didn t now on the recitations Linear transformations The following mostly
More informationCS359G Lecture 5: Characters of Abelian Groups
4/25/2011 CS359G Lecture 5: Characters of Abelia in theory "Marge, I agree with you - in theory. In theory, communism works. In theory." -- Homer Simpson CS359G Lecture 5: Characters of Abelian Groups
More informationQuantum boolean functions
Quantum boolean functions Ashley Montanaro 1 and Tobias Osborne 2 1 Department of Computer Science 2 Department of Mathematics University of Bristol Royal Holloway, University of London Bristol, UK London,
More informationRecall that any inner product space V has an associated norm defined by
Hilbert Spaces Recall that any inner product space V has an associated norm defined by v = v v. Thus an inner product space can be viewed as a special kind of normed vector space. In particular every inner
More informationSub-Constant Error Low Degree Test of Almost Linear Size
Sub-Constant rror Low Degree Test of Almost Linear Size Dana Moshkovitz Ran Raz March 9, 2006 Abstract Given a function f : F m F over a finite field F, a low degree tester tests its agreement with an
More informationREAL AND COMPLEX ANALYSIS
REAL AND COMPLE ANALYSIS Third Edition Walter Rudin Professor of Mathematics University of Wisconsin, Madison Version 1.1 No rights reserved. Any part of this work can be reproduced or transmitted in any
More informationMET Workshop: Exercises
MET Workshop: Exercises Alex Blumenthal and Anthony Quas May 7, 206 Notation. R d is endowed with the standard inner product (, ) and Euclidean norm. M d d (R) denotes the space of n n real matrices. When
More informationLinear Equations in Linear Algebra
1 Linear Equations in Linear Algebra 1.1 SYSTEMS OF LINEAR EQUATIONS LINEAR EQUATION,, 1 n A linear equation in the variables equation that can be written in the form a a a b 1 1 2 2 n n a a is an where
More informationDefinition 1. A set V is a vector space over the scalar field F {R, C} iff. there are two operations defined on V, called vector addition
6 Vector Spaces with Inned Product Basis and Dimension Section Objective(s): Vector Spaces and Subspaces Linear (In)dependence Basis and Dimension Inner Product 6 Vector Spaces and Subspaces Definition
More informationOn non-antipodal binary completely regular codes
On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute
More informationPUTNAM TRAINING NUMBER THEORY. Exercises 1. Show that the sum of two consecutive primes is never twice a prime.
PUTNAM TRAINING NUMBER THEORY (Last updated: December 11, 2017) Remark. This is a list of exercises on Number Theory. Miguel A. Lerma Exercises 1. Show that the sum of two consecutive primes is never twice
More informationTopics in Representation Theory: Fourier Analysis and the Peter Weyl Theorem
Topics in Representation Theory: Fourier Analysis and the Peter Weyl Theorem 1 Fourier Analysis, a review We ll begin with a short review of simple facts about Fourier analysis, before going on to interpret
More informationSpectral radius, symmetric and positive matrices
Spectral radius, symmetric and positive matrices Zdeněk Dvořák April 28, 2016 1 Spectral radius Definition 1. The spectral radius of a square matrix A is ρ(a) = max{ λ : λ is an eigenvalue of A}. For an
More informationICT12 8. Linear codes. The Gilbert-Varshamov lower bound and the MacWilliams identities SXD
1 ICT12 8. Linear codes. The Gilbert-Varshamov lower bound and the MacWilliams identities 19.10.2012 SXD 8.1. The Gilbert Varshamov existence condition 8.2. The MacWilliams identities 2 8.1. The Gilbert
More informationAlgebraic Methods in Combinatorics
Algebraic Methods in Combinatorics Po-Shen Loh 27 June 2008 1 Warm-up 1. (A result of Bourbaki on finite geometries, from Răzvan) Let X be a finite set, and let F be a family of distinct proper subsets
More informationIntroduction. Genetic Algorithm Theory. Overview of tutorial. The Simple Genetic Algorithm. Jonathan E. Rowe
Introduction Genetic Algorithm Theory Jonathan E. Rowe University of Birmingham, UK GECCO 2012 The theory of genetic algorithms is beginning to come together into a coherent framework. However, there are
More information