: Error Correcting Codes. December 2017 Lecture 10

Size: px
Start display at page:

Download ": Error Correcting Codes. December 2017 Lecture 10"

Transcription

1 : Error Correcting Codes. December 017 Lecture 10 The Linear-Programming Bound Amnon Ta-Shma and Dean Doron 1 The LP-bound We will prove the Linear-Programming bound due to [, 1], which gives an upper bound on the code rate of a given distance. The bound s name hints the proof technique, however we will see a different proof which doesn t rely on linear programming, due to Navon and Samorodnitsky [3]. The linear-programming bound beats the Elias-Bassalygo bound when the relative distance is not too small. Before we proceed, consider the notion of a maimal eigenvalue restricted to a specific subset of indices. Definition 1. Let A C m m and B [m]. Define λ B (A) = ma v: v =1,supp(v) B v Av. Throughout, we consider A as the binary adjacency matri of the Hamming cube of dimension n. That is, the rows and column are indeed by {0, 1} n and A[, y] = 1 iff (, y) = 1 (as n-bit strings). Make sure you understand why λ {0,1} n = n. We abbreviate λ B = λ B (A), and note that we can think of every such v R n as a function v : {0, 1} n R. The way we establish an upper bound on the code s cardinality is by first proving a lower bound on λ B where B is a Hamming ball and then arguing that if a large enough B has a large maimal eigenvalue (w.r.t. the code s distance) then it must be the case that the code s cardinality is not too large. The Fourier Transform We will only consider Fourier epansion over the Boolean cube. Let V = {f : F n that it is a vector space on F n over R of dimension n. A natural basis for V is R} and note 1 w () = { 1, = w 0, otherwise for every w F n. It is also an inner-product space under the inner product f 1, f = E [f F n 1 ()f ()] = 1 n f 1 ()f (), and it is easy to see that the basis {1 w } w F n is an orthogonal basis under this inner product. We now introduce another basis, that contains only functions that are homomorphisms. 1 G

2 Definition. A character of the finite group G is a homomorphism χ : G C, i.e., χ( + y) = χ()χ(y) for every, y G, where the addition is the group operation in G, and the multiplication is the group operation in C. In our case, G = F n and we have an eplicit representation of the characters. For S Fn, define χ S V as χ S () = ( 1) S,. Verify that every character is a homomorphism. Now, Claim 3. The set of all characters of F n is orthonormal (under the above inner product). Proof. First, χ S, χ S = 1 n χ S()χ S () = 1 n n = 1. Now, for S T, χ S, χ T = 1 n χ S ()χ T () = 1 n ( 1),S+T. As S T, S + T is nonzero, say at indices I [n]. Eactly half of the -s have odd weight restricted to I and eactly half have even weight. Thus, the above sum is 0. The Fourier transform of a function is the linear transformation from V to V that maps the natural basis to the Fourier basis (of characters). Thus, every f V can be (uniquely) written as f = S ˆf(S) χ S, and the coefficients ˆf(S) are called the Fourier coefficients. We give their basic properties: Claim 4. Let f, g V. We have: 1. ˆf(S) = f, χs.. f, g = ˆf(S)ĝ(S) S (Parseval s identity). 3. ˆf( ) = E[f]. Proof. For item (1), f, χ S = T ˆf(T )χ T, χ S = T ˆf(T ) χ S, χ T = ˆf(S) χ S, χ S = ˆf(S). For item (), f, g = f, S ĝ(s)χ S = S ĝ(s) f, χ S = S ˆf(S)ĝ(S). For item (3), ˆf( ) = f, = 1 n f() ( 1) 0 = 1 n f() = E[f].

3 We now define a convolution between two functions. Definition 5. Let f, g V. The convolution f g V is defined as (f g)() = E y f(y)g( + y). Verify that the convolution operator is commutative and associative. Also, a key property is the following one: Claim 6. f g = ˆf ĝ. Proof. Fi S F n. We have: ˆf(S) ĝ(s) = f, χ S g, χ S = 1 n f()g(y)χ S ()χ S (y) y y = 1 n f()g(y)χ S ( + y) = 1 n f()g(z + )χ S (z) = 1 n (f g)(z) χ S (z) = f g, χ S = f g(s). z z.1 Fourier transform and codes For C F n, we let 1 C be the characteristic function of C, in the sense that 1 C () = 1 if C and 0 otherwise. We record a few easy claims. Claim 7. Let C be a linear code. Then, 1 C = C n 1 C. Proof. For every S F n, 1 C (S) = 1 C, χ S = 1 1 C() ( 1),S = 1 C n ( 1),S. Now, if S C then all inner products are 0 and we get C. n n Otherwise, there eists c 0 C such that c 0, S = 1. For every C it holds that ( 1),S + ( 1) +c0,s = ( 1),S (1 + ( 1) c0,s ) = 0. Summing it over all C, we get: 0 = ( ) ( 1),S (1 + ( 1) +c0,s ) = ( 1),S + ( 1) +c0,s = C C C C( 1),S, as required. Claim 8. Let C be a linear code. Then, 1 C 1 C = C n 1 C. Proof. For every F n, (1 C 1 C )() = 1 y 1 C(y)1 C ( + y) = 1 y C 1 C( + y). Now, if C n then + y C and the sum is C. Otherwise, + y / C and the sum is 0. n n Let e i F n be the vector (a 1,..., a n ) with a j = δ i,j. Let L : F n R defined by L(e i) = n for every 1 i n, and 0 elsewhere. Claim 9. For every f V it holds that Af = L f. Consequently, (Af)() = i [n] f( + e i). 3

4 Proof. Follows easily by (f L)() = 1 n y L(y)f( + y) = i [n] f( + e i) and inspecting the neighbors of in the Hamming cube. Claim 10. For every S F n, ˆL(S) = n w(s). Proof. ˆL(S) = L, χs = 1 n L() ( 1),S = i [n] ( 1)S i = (n w(s)) w(s). Finally, we give one last eample: Claim 11. Let B = B(0, τn) and C F n a code. Then, (1 C 1 B )(z) = C B(z, τn) / n. Proof. For every z F n, (1 C 1 B )(z) = 1 n 1 C ()1 B ( + z) = 1 n 1 B(z,τn) (). C 3 The approach We say f g if f() g() for every F n. Lemma 1. Let B = B(0, r = τn) be the Hamming ball of radius r. Then there eists a function f V with the following properties: f is supported on B, f 0, Af λ r f for λ r = r(n r) o(n) = n( τ(1 τ) o(1)). Definition 13. We say C F n has dual distance d if the Fourier transform of 1 C points of Hamming weight 0 < S < d. vanishes on Claim 14. If C F n C. is a linear code with dual distance d then d is also the minimal distance of Proof. We want to show that 1 C () = 0 for with 0 < w() < d. As C is linear, 1 C and by definition 1 C () vanishes on such -s. = n C 1 C, Lemma 15. Suppose C F n is a vector space with dual distance d (i.e., it s dual code has distance at least d). Let B = B r for an integer r such that λ r n d + 1. Then, (z + B r ) n n. z C 4

5 Let δ = d/n < 1, Take τ = 1 δ(1 δ) + o(1) and r = τn. So, ( (1 λ r = n ) ( 1 δ(1 δ) + o(1) + ) ) δ(1 δ) + o(1) o(1) ) = n (δ δ + 14 ( 1 + o(1) o(1) ) = n 4δ 4δ o(1) ( ) 1 = n (1 δ) + o(1) = n d + o n (1) n d + 1, and the premise of Lemma 15 is satisfied by choosing the o(1) terms both in λ r and in τ appropriately. From now on, that is the r we should think of. Now take C = C. Then, balls of radius r centered at the points of the dual code cover an -fraction of the space. Then, 1 n and so we obtain: C B r = C n(h(τ)+o(1)) n n, Corollary 16. Let C be a [n, k, d] code and δ = d/n is the relative distance. Then: C (1 H(τ) o(1))n and therefore C = n C (H(τ)+o(1))n, where τ = 1 δ(1 δ). Asymptotically, this gives R(δ) H( 1 δ(1 δ)). We are left with proving Lemma 1 and Lemma Proving a lower bound on the Dirichlet eigenvalue of a ball in F n Lemma 17. Let B = B(0, r = τn) be the Hamming ball of radius r. Then there eists a function f V with the following properties: f is supported on B, f 0, Af, f λ r f, f for λ r = r(n r) o(n) = n( τ(1 τ) o(1)). Proof. We construct a specific eigenfunction f that achieves the bound. f will be symmetric, so it is fully defined by its values on n + 1 vectors of distinct Hamming weights. We overload notation and write f(i) for the value gives on weight i vectors. We choose f such that f gives the same weight for each level on its support. Let M = n = o(n). Define f as follows: 1 i [r M, r], f(i) = ( n i) 0 otherwise. 5

6 Now we need to compute (Af)(v) = n j=1 f(v + e j). Notice that Af is also symmetric and Af(i) = if(i 1) + (n i)f(i + 1). Also, if i [r M, r 1], ( n ) f(i) f(i + 1) = i+1 ( n = i) n i i + 1. Thus, for i [r M + 1, r 1], Af(i) = i(n i)f(i) + (n i)(i + 1)f(i). Hence, f Af = r 1 k=r M+1 r 1 k=r M+1 ( ) n ( k(n k + 1) + (n k)(k + 1))f(k) k k(n k + 1) + (n k)(k + 1). As k(n k + 1), (n k)(k + 1) (r M)(n r) r(n r) M, we get that f Af (M 1)( r(n r) M) = r(n r) o(n), whereas f f 1, completing the proof. Having that we prove Lemma 1 Proof. A is a symmetric, irreducible (i.e., the corresponding graph is connected) operator with non-negative entries. Let A be its restriction to B (one can view it as either restricting the matri A to the B B sub-rectangle, or as the operator Π B AΠ B where Π B is projection on B). A is also symmetric, irreducible and with non-negative entries. By the Perron-Frobenius theorem the greatest eigenvalue of A is obtained by a non-negative vector f 0 supported on B. Say A f = λ f. We have already seen an f supported on B such that f Af f f λ r. However, f Af = f Π B AΠ Bf = f A f, and λ is the largest singular value of A, hence we must have λ λ r. Also Af A f because A A 0 and f 0, hence we have as desired. Af A f λ f λf, 6

7 3. The covering bound Proof. Let B = B r and f be the function guaranteed by Lemma 1 for B. Define I.e., for z F n : F (z) = 1 n F n F = 1 C f. 1 C ()f( + z) = 1 n w C f(z + w). Hence, F is supported on w C (w + B). We will bound AF, F from both sides. One side: By definition, AF = F L = (1 C f) L = 1 C (f L) = 1 C Af. As 1 C 0 and Af λ B f we have AF = 1 C Af λ B 1 C f = λ B F. Thus, Other side: It holds that AF, F λ B F, F. AF, F = S ÂF (S) F (S) = S L F (S) F (S) = S L(S) F (S) F (S). But F (S) = 1 C f(s) = 1 C (S) f(s), and C has dual distance d, so we get zero for every set S of cardinality between 1 and d 1. Hence, AF, F = L( )( F ( )) + = n( F ( )) + n( F ( )) + S S:w(S) d S:w(S) d L(S)( F (S)) (n w(s))( F (S)) (n d)( F (S)). Together we get that (n d + 1) F, F λ B F, F AF, F n E[F ] + (n d) F, F Thus, F, F n E[F ]. But, F is supported on Λ = w C (w + B), and by Cauchy-Schwartz, ( ) E[F ] 1 = n 1 F () 1 Λ F () = Λ n n F, F Hence 1 n Λ n, as desired. Λ 7

8 References [1] Philippe Delsarte. An algebraic approach to the association schemes of coding theory. Philips Res. Reports Suppls., 10, [] Robert McEliece, Eugene Rodemich, Howard Rumsey, and Lloyd Welch. New upper bounds on the rate of a code via the delsarte-macwilliams inequalities. IEEE Transactions on Information Theory, 3(): , [3] Michael Navon and Ale Samorodnitsky. Linear programming bounds for codes via a covering argument. Discrete & Computational Geometry, 41(),

Delsarte s linear programming bound

Delsarte s linear programming bound 15-859 Coding Theory, Fall 14 December 5, 2014 Introduction For all n, q, and d, Delsarte s linear program establishes a series of linear constraints that every code in F n q with distance d must satisfy.

More information

Lecture 3 Small bias with respect to linear tests

Lecture 3 Small bias with respect to linear tests 03683170: Expanders, Pseudorandomness and Derandomization 3/04/16 Lecture 3 Small bias with respect to linear tests Amnon Ta-Shma and Dean Doron 1 The Fourier expansion 1.1 Over general domains Let G be

More information

Lecture 19: Elias-Bassalygo Bound

Lecture 19: Elias-Bassalygo Bound Error Correcting Codes: Combinatorics, Algorithms and Applications (Fall 2007) Lecturer: Atri Rudra Lecture 19: Elias-Bassalygo Bound October 10, 2007 Scribe: Michael Pfetsch & Atri Rudra In the last lecture,

More information

Error Correcting Codes Questions Pool

Error Correcting Codes Questions Pool Error Correcting Codes Questions Pool Amnon Ta-Shma and Dean Doron January 3, 018 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to

More information

: Error Correcting Codes. October 2017 Lecture 1

: Error Correcting Codes. October 2017 Lecture 1 03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of

More information

Lectures 15: Cayley Graphs of Abelian Groups

Lectures 15: Cayley Graphs of Abelian Groups U.C. Berkeley CS294: Spectral Methods and Expanders Handout 15 Luca Trevisan March 14, 2016 Lectures 15: Cayley Graphs of Abelian Groups In which we show how to find the eigenvalues and eigenvectors of

More information

Lecture 22. m n c (k) i,j x i x j = c (k) k=1

Lecture 22. m n c (k) i,j x i x j = c (k) k=1 Notes on Complexity Theory Last updated: June, 2014 Jonathan Katz Lecture 22 1 N P PCP(poly, 1) We show here a probabilistically checkable proof for N P in which the verifier reads only a constant number

More information

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms

ACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms 1. Computability, Complexity and Algorithms (a) Let G(V, E) be an undirected unweighted graph. Let C V be a vertex cover of G. Argue that V \ C is an independent set of G. (b) Minimum cardinality vertex

More information

Lecture 2 Linear Codes

Lecture 2 Linear Codes Lecture 2 Linear Codes 2.1. Linear Codes From now on we want to identify the alphabet Σ with a finite field F q. For general codes, introduced in the last section, the description is hard. For a code of

More information

Lecture 19 : Reed-Muller, Concatenation Codes & Decoding problem

Lecture 19 : Reed-Muller, Concatenation Codes & Decoding problem IITM-CS6845: Theory Toolkit February 08, 2012 Lecture 19 : Reed-Muller, Concatenation Codes & Decoding problem Lecturer: Jayalal Sarma Scribe: Dinesh K Theme: Error correcting codes In the previous lecture,

More information

Lecture 12: November 6, 2017

Lecture 12: November 6, 2017 Information and Coding Theory Autumn 017 Lecturer: Madhur Tulsiani Lecture 1: November 6, 017 Recall: We were looking at codes of the form C : F k p F n p, where p is prime, k is the message length, and

More information

Inner products and Norms. Inner product of 2 vectors. Inner product of 2 vectors x and y in R n : x 1 y 1 + x 2 y x n y n in R n

Inner products and Norms. Inner product of 2 vectors. Inner product of 2 vectors x and y in R n : x 1 y 1 + x 2 y x n y n in R n Inner products and Norms Inner product of 2 vectors Inner product of 2 vectors x and y in R n : x 1 y 1 + x 2 y 2 + + x n y n in R n Notation: (x, y) or y T x For complex vectors (x, y) = x 1 ȳ 1 + x 2

More information

Lecture 19: Simple Applications of Fourier Analysis & Convolution. Fourier Analysis

Lecture 19: Simple Applications of Fourier Analysis & Convolution. Fourier Analysis Lecture 19: Simple Applications of & Convolution Recall I Let f : {0, 1} n R be a function Let = 2 n Inner product of two functions is defined as follows f, g := 1 f (x)g(x) For S {0, 1} n, define the

More information

Statistical Mechanics and Combinatorics : Lecture IV

Statistical Mechanics and Combinatorics : Lecture IV Statistical Mechanics and Combinatorics : Lecture IV Dimer Model Local Statistics We ve already discussed the partition function Z for dimer coverings in a graph G which can be computed by Kasteleyn matrix

More information

Applied Mathematics Course Contents Matrices, linear systems Gauss-Jordan elimination, Determinants, Cramer's rule, inverse matrix.

Applied Mathematics Course Contents Matrices, linear systems Gauss-Jordan elimination, Determinants, Cramer's rule, inverse matrix. Applied Mathematics Course Contents Matrices, linear systems Gauss-Jordan elimination, Determinants, Cramer's rule, inverse matri. Vector spaces, inner product and norm, linear transformations. Matri eigenvalue

More information

: Error Correcting Codes. November 2017 Lecture 2

: Error Correcting Codes. November 2017 Lecture 2 03683072: Error Correcting Codes. November 2017 Lecture 2 Polynomial Codes and Cyclic Codes Amnon Ta-Shma and Dean Doron 1 Polynomial Codes Fix a finite field F q. For the purpose of constructing polynomial

More information

The Hamming Codes and Delsarte s Linear Programming Bound

The Hamming Codes and Delsarte s Linear Programming Bound The Hamming Codes and Delsarte s Linear Programming Bound by Sky McKinley Under the Astute Tutelage of Professor John S. Caughman, IV A thesis submitted in partial fulfillment of the requirements for the

More information

Almost Independent Binary Random Variables

Almost Independent Binary Random Variables Project Number: MA-WJM-6401 Almost Independent Binary Random Variables A Major Qualifying Project submitted to the Faculty of the WORCESTER POLYTECHNIC INSTITUTE in partial fulfillment of the requirements

More information

Lecture 3: Boolean Functions and the Walsh Hadamard Code 1

Lecture 3: Boolean Functions and the Walsh Hadamard Code 1 CS-E4550 Advanced Combinatorics in Computer Science Autumn 2016: Selected Topics in Complexity Theory Lecture 3: Boolean Functions and the Walsh Hadamard Code 1 1. Introduction The present lecture develops

More information

APPROXIMATION RESISTANCE AND LINEAR THRESHOLD FUNCTIONS

APPROXIMATION RESISTANCE AND LINEAR THRESHOLD FUNCTIONS APPROXIMATION RESISTANCE AND LINEAR THRESHOLD FUNCTIONS RIDWAN SYED Abstract. In the boolean Max k CSP (f) problem we are given a predicate f : { 1, 1} k {0, 1}, a set of variables, and local constraints

More information

Lecture 5: February 16, 2012

Lecture 5: February 16, 2012 COMS 6253: Advanced Computational Learning Theory Lecturer: Rocco Servedio Lecture 5: February 16, 2012 Spring 2012 Scribe: Igor Carboni Oliveira 1 Last time and today Previously: Finished first unit on

More information

Stanford University CS366: Graph Partitioning and Expanders Handout 13 Luca Trevisan March 4, 2013

Stanford University CS366: Graph Partitioning and Expanders Handout 13 Luca Trevisan March 4, 2013 Stanford University CS366: Graph Partitioning and Expanders Handout 13 Luca Trevisan March 4, 2013 Lecture 13 In which we construct a family of expander graphs. The problem of constructing expander graphs

More information

DS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra.

DS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra. DS-GA 1002 Lecture notes 0 Fall 2016 Linear Algebra These notes provide a review of basic concepts in linear algebra. 1 Vector spaces You are no doubt familiar with vectors in R 2 or R 3, i.e. [ ] 1.1

More information

Finite and Infinite Sets

Finite and Infinite Sets Chapter 9 Finite and Infinite Sets 9. Finite Sets Preview Activity (Equivalent Sets, Part ). Let A and B be sets and let f be a function from A to B..f W A! B/. Carefully complete each of the following

More information

Lecture 8: Linearity and Assignment Testing

Lecture 8: Linearity and Assignment Testing CE 533: The PCP Theorem and Hardness of Approximation (Autumn 2005) Lecture 8: Linearity and Assignment Testing 26 October 2005 Lecturer: Venkat Guruswami cribe: Paul Pham & Venkat Guruswami 1 Recap In

More information

Arrangements, matroids and codes

Arrangements, matroids and codes Arrangements, matroids and codes first lecture Ruud Pellikaan joint work with Relinde Jurrius ACAGM summer school Leuven Belgium, 18 July 2011 References 2/43 1. Codes, arrangements and matroids by Relinde

More information

Intriguing sets of vertices of regular graphs

Intriguing sets of vertices of regular graphs Intriguing sets of vertices of regular graphs Bart De Bruyn and Hiroshi Suzuki February 18, 2010 Abstract Intriguing and tight sets of vertices of point-line geometries have recently been studied in the

More information

Spectral Theorem for Self-adjoint Linear Operators

Spectral Theorem for Self-adjoint Linear Operators Notes for the undergraduate lecture by David Adams. (These are the notes I would write if I was teaching a course on this topic. I have included more material than I will cover in the 45 minute lecture;

More information

12x + 18y = 30? ax + by = m

12x + 18y = 30? ax + by = m Math 2201, Further Linear Algebra: a practical summary. February, 2009 There are just a few themes that were covered in the course. I. Algebra of integers and polynomials. II. Structure theory of one endomorphism.

More information

1 Math 241A-B Homework Problem List for F2015 and W2016

1 Math 241A-B Homework Problem List for F2015 and W2016 1 Math 241A-B Homework Problem List for F2015 W2016 1.1 Homework 1. Due Wednesday, October 7, 2015 Notation 1.1 Let U be any set, g be a positive function on U, Y be a normed space. For any f : U Y let

More information

Lecture 3: September 10

Lecture 3: September 10 CS294 Markov Chain Monte Carlo: Foundations & Applications Fall 2009 Lecture 3: September 10 Lecturer: Prof. Alistair Sinclair Scribes: Andrew H. Chan, Piyush Srivastava Disclaimer: These notes have not

More information

Eigenvalue comparisons in graph theory

Eigenvalue comparisons in graph theory Eigenvalue comparisons in graph theory Gregory T. Quenell July 1994 1 Introduction A standard technique for estimating the eigenvalues of the Laplacian on a compact Riemannian manifold M with bounded curvature

More information

Characterizations of Strongly Regular Graphs: Part II: Bose-Mesner algebras of graphs. Sung Y. Song Iowa State University

Characterizations of Strongly Regular Graphs: Part II: Bose-Mesner algebras of graphs. Sung Y. Song Iowa State University Characterizations of Strongly Regular Graphs: Part II: Bose-Mesner algebras of graphs Sung Y. Song Iowa State University sysong@iastate.edu Notation K: one of the fields R or C X: a nonempty finite set

More information

18.303: Introduction to Green s functions and operator inverses

18.303: Introduction to Green s functions and operator inverses 8.33: Introduction to Green s functions and operator inverses S. G. Johnson October 9, 2 Abstract In analogy with the inverse A of a matri A, we try to construct an analogous inverse  of differential

More information

Questions Pool. Amnon Ta-Shma and Dean Doron. January 2, Make sure you know how to solve. Do not submit.

Questions Pool. Amnon Ta-Shma and Dean Doron. January 2, Make sure you know how to solve. Do not submit. Questions Pool Amnon Ta-Shma and Dean Doron January 2, 2017 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to solve. Do not submit.

More information

On The Weights of Binary Irreducible Cyclic Codes

On The Weights of Binary Irreducible Cyclic Codes On The Weights of Binary Irreducible Cyclic Codes Yves Aubry and Philippe Langevin Université du Sud Toulon-Var, Laboratoire GRIM F-83270 La Garde, France, {langevin,yaubry}@univ-tln.fr, WWW home page:

More information

Ma/CS 6b Class 23: Eigenvalues in Regular Graphs

Ma/CS 6b Class 23: Eigenvalues in Regular Graphs Ma/CS 6b Class 3: Eigenvalues in Regular Graphs By Adam Sheffer Recall: The Spectrum of a Graph Consider a graph G = V, E and let A be the adjacency matrix of G. The eigenvalues of G are the eigenvalues

More information

CS Foundations of Communication Complexity

CS Foundations of Communication Complexity CS 49 - Foundations of Communication Complexity Lecturer: Toniann Pitassi 1 The Discrepancy Method Cont d In the previous lecture we ve outlined the discrepancy method, which is a method for getting lower

More information

18.S34 linear algebra problems (2007)

18.S34 linear algebra problems (2007) 18.S34 linear algebra problems (2007) Useful ideas for evaluating determinants 1. Row reduction, expanding by minors, or combinations thereof; sometimes these are useful in combination with an induction

More information

Vectors in Function Spaces

Vectors in Function Spaces Jim Lambers MAT 66 Spring Semester 15-16 Lecture 18 Notes These notes correspond to Section 6.3 in the text. Vectors in Function Spaces We begin with some necessary terminology. A vector space V, also

More information

Lecture 1: Review of linear algebra

Lecture 1: Review of linear algebra Lecture 1: Review of linear algebra Linear functions and linearization Inverse matrix, least-squares and least-norm solutions Subspaces, basis, and dimension Change of basis and similarity transformations

More information

Primitive Matrices with Combinatorial Properties

Primitive Matrices with Combinatorial Properties Southern Illinois University Carbondale OpenSIUC Research Papers Graduate School Fall 11-6-2012 Primitive Matrices with Combinatorial Properties Abdulkarem Alhuraiji al_rqai@yahoo.com Follow this and additional

More information

Boolean degree 1 functions on some classical association schemes

Boolean degree 1 functions on some classical association schemes Boolean degree 1 functions on some classical association schemes Yuval Filmus, Ferdinand Ihringer February 16, 2018 Abstract We investigate Boolean degree 1 functions for several classical association

More information

Lecture 9: SVD, Low Rank Approximation

Lecture 9: SVD, Low Rank Approximation CSE 521: Design and Analysis of Algorithms I Spring 2016 Lecture 9: SVD, Low Rank Approimation Lecturer: Shayan Oveis Gharan April 25th Scribe: Koosha Khalvati Disclaimer: hese notes have not been subjected

More information

CS 6815: Lecture 4. September 4, 2018

CS 6815: Lecture 4. September 4, 2018 XS = X s... X st CS 685: Lecture 4 Instructor: Eshan Chattopadhyay Scribe: Makis Arsenis and Ayush Sekhari September 4, 208 In this lecture, we will first see an algorithm to construct ɛ-biased spaces.

More information

CS 6820 Fall 2014 Lectures, October 3-20, 2014

CS 6820 Fall 2014 Lectures, October 3-20, 2014 Analysis of Algorithms Linear Programming Notes CS 6820 Fall 2014 Lectures, October 3-20, 2014 1 Linear programming The linear programming (LP) problem is the following optimization problem. We are given

More information

Lecture 21: P vs BPP 2

Lecture 21: P vs BPP 2 Advanced Complexity Theory Spring 206 Prof. Dana Moshkovitz Lecture 2: P vs BPP 2 Overview In the previous lecture, we began our discussion of pseudorandomness. We presented the Blum- Micali definition

More information

Lecture Notes 1: Vector spaces

Lecture Notes 1: Vector spaces Optimization-based data analysis Fall 2017 Lecture Notes 1: Vector spaces In this chapter we review certain basic concepts of linear algebra, highlighting their application to signal processing. 1 Vector

More information

Outline of the course

Outline of the course School of Mathematical Sciences PURE MTH 3022 Geometry of Surfaces III, Semester 2, 20 Outline of the course Contents. Review 2. Differentiation in R n. 3 2.. Functions of class C k 4 2.2. Mean Value Theorem

More information

Chapter 0: Preliminaries

Chapter 0: Preliminaries Chapter 0: Preliminaries Adam Sheffer March 28, 2016 1 Notation This chapter briefly surveys some basic concepts and tools that we will use in this class. Graduate students and some undergrads would probably

More information

A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1

A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1 BULLETIN (New Series) OF THE AMERICAN MATHEMATICAL SOCIETY Volume 23, Number 2, October 1990 A NEW UPPER BOUND FOR THE MINIMUM OF AN INTEGRAL LATTICE OF DETERMINANT 1 J. H. CONWAY AND N. J. A. SLOANE ABSTRACT.

More information

MAT 257, Handout 13: December 5-7, 2011.

MAT 257, Handout 13: December 5-7, 2011. MAT 257, Handout 13: December 5-7, 2011. The Change of Variables Theorem. In these notes, I try to make more explicit some parts of Spivak s proof of the Change of Variable Theorem, and to supply most

More information

Adjoint Representations of the Symmetric Group

Adjoint Representations of the Symmetric Group Adjoint Representations of the Symmetric Group Mahir Bilen Can 1 and Miles Jones 2 1 mahirbilencan@gmail.com 2 mej016@ucsd.edu Abstract We study the restriction to the symmetric group, S n of the adjoint

More information

ADVANCED CALCULUS - MTH433 LECTURE 4 - FINITE AND INFINITE SETS

ADVANCED CALCULUS - MTH433 LECTURE 4 - FINITE AND INFINITE SETS ADVANCED CALCULUS - MTH433 LECTURE 4 - FINITE AND INFINITE SETS 1. Cardinal number of a set The cardinal number (or simply cardinal) of a set is a generalization of the concept of the number of elements

More information

MAT 445/ INTRODUCTION TO REPRESENTATION THEORY

MAT 445/ INTRODUCTION TO REPRESENTATION THEORY MAT 445/1196 - INTRODUCTION TO REPRESENTATION THEORY CHAPTER 1 Representation Theory of Groups - Algebraic Foundations 1.1 Basic definitions, Schur s Lemma 1.2 Tensor products 1.3 Unitary representations

More information

Throughout these notes we assume V, W are finite dimensional inner product spaces over C.

Throughout these notes we assume V, W are finite dimensional inner product spaces over C. Math 342 - Linear Algebra II Notes Throughout these notes we assume V, W are finite dimensional inner product spaces over C 1 Upper Triangular Representation Proposition: Let T L(V ) There exists an orthonormal

More information

The MacWilliams Identities

The MacWilliams Identities The MacWilliams Identities Jay A. Wood Western Michigan University Colloquium March 1, 2012 The Coding Problem How to ensure the integrity of a message transmitted over a noisy channel? Cleverly add redundancy.

More information

Linear Algebra. Paul Yiu. Department of Mathematics Florida Atlantic University. Fall A: Inner products

Linear Algebra. Paul Yiu. Department of Mathematics Florida Atlantic University. Fall A: Inner products Linear Algebra Paul Yiu Department of Mathematics Florida Atlantic University Fall 2011 6A: Inner products In this chapter, the field F = R or C. We regard F equipped with a conjugation χ : F F. If F =

More information

Lecture 7: ɛ-biased and almost k-wise independent spaces

Lecture 7: ɛ-biased and almost k-wise independent spaces Lecture 7: ɛ-biased and almost k-wise independent spaces Topics in Complexity Theory and Pseudorandomness (pring 203) Rutgers University wastik Kopparty cribes: Ben Lund, Tim Naumovitz Today we will see

More information

Fourier analysis of boolean functions in quantum computation

Fourier analysis of boolean functions in quantum computation Fourier analysis of boolean functions in quantum computation Ashley Montanaro Centre for Quantum Information and Foundations, Department of Applied Mathematics and Theoretical Physics, University of Cambridge

More information

Functional Analysis Review

Functional Analysis Review Outline 9.520: Statistical Learning Theory and Applications February 8, 2010 Outline 1 2 3 4 Vector Space Outline A vector space is a set V with binary operations +: V V V and : R V V such that for all

More information

Approximating MAX-E3LIN is NP-Hard

Approximating MAX-E3LIN is NP-Hard Approximating MAX-E3LIN is NP-Hard Evan Chen May 4, 2016 This lecture focuses on the MAX-E3LIN problem. We prove that approximating it is NP-hard by a reduction from LABEL-COVER. 1 Introducing MAX-E3LIN

More information

Ma/CS 6b Class 25: Error Correcting Codes 2

Ma/CS 6b Class 25: Error Correcting Codes 2 Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets

More information

Lecture 1: Introduction to Fourier Analysis. Lecture 2: Introduction to Some Convergence Theorems

Lecture 1: Introduction to Fourier Analysis. Lecture 2: Introduction to Some Convergence Theorems Lecture : Introduction to Fourier Analysis p.2, line 6: we now at a new instead of we now look at an new p.2, line -: Maybe X C instead of X C p.3, line 2: An is missing in the denominator, i.e. < χ j,χ

More information

CHARACTER-FREE APPROACH TO PROGRESSION-FREE SETS

CHARACTER-FREE APPROACH TO PROGRESSION-FREE SETS CHARACTR-FR APPROACH TO PROGRSSION-FR STS VSVOLOD F. LV Abstract. We present an elementary combinatorial argument showing that the density of a progression-free set in a finite r-dimensional vector space

More information

Chapter One. The Calderón-Zygmund Theory I: Ellipticity

Chapter One. The Calderón-Zygmund Theory I: Ellipticity Chapter One The Calderón-Zygmund Theory I: Ellipticity Our story begins with a classical situation: convolution with homogeneous, Calderón- Zygmund ( kernels on R n. Let S n 1 R n denote the unit sphere

More information

Pigeonhole Principle and Ramsey Theory

Pigeonhole Principle and Ramsey Theory Pigeonhole Principle and Ramsey Theory The Pigeonhole Principle (PP) has often been termed as one of the most fundamental principles in combinatorics. The familiar statement is that if we have n pigeonholes

More information

On the sum of two largest eigenvalues of a symmetric matrix

On the sum of two largest eigenvalues of a symmetric matrix On the sum of two largest eigenvalues of a symmetric matrix Javad Ebrahimi B. Department of Mathematics Simon Fraser University Burnaby, B.C. V5A 1S6 Vladimir Nikiforov Department of Mathematical Sci.

More information

FINITE FOURIER ANALYSIS. 1. The group Z N

FINITE FOURIER ANALYSIS. 1. The group Z N FIITE FOURIER AALYSIS EIL LYALL 1. The group Z Let be a positive integer. A complex number z is an th root of unity if z = 1. It is then easy to verify that the set of th roots of unity is precisely {

More information

Primes in arithmetic progressions

Primes in arithmetic progressions (September 26, 205) Primes in arithmetic progressions Paul Garrett garrett@math.umn.edu http://www.math.umn.edu/ garrett/ [This document is http://www.math.umn.edu/ garrett/m/mfms/notes 205-6/06 Dirichlet.pdf].

More information

Algebraic structures I

Algebraic structures I MTH5100 Assignment 1-10 Algebraic structures I For handing in on various dates January March 2011 1 FUNCTIONS. Say which of the following rules successfully define functions, giving reasons. For each one

More information

Lecture 5. Ch. 5, Norms for vectors and matrices. Norms for vectors and matrices Why?

Lecture 5. Ch. 5, Norms for vectors and matrices. Norms for vectors and matrices Why? KTH ROYAL INSTITUTE OF TECHNOLOGY Norms for vectors and matrices Why? Lecture 5 Ch. 5, Norms for vectors and matrices Emil Björnson/Magnus Jansson/Mats Bengtsson April 27, 2016 Problem: Measure size of

More information

Lecture 8 : Eigenvalues and Eigenvectors

Lecture 8 : Eigenvalues and Eigenvectors CPS290: Algorithmic Foundations of Data Science February 24, 2017 Lecture 8 : Eigenvalues and Eigenvectors Lecturer: Kamesh Munagala Scribe: Kamesh Munagala Hermitian Matrices It is simpler to begin with

More information

First we introduce the sets that are going to serve as the generalizations of the scalars.

First we introduce the sets that are going to serve as the generalizations of the scalars. Contents 1 Fields...................................... 2 2 Vector spaces.................................. 4 3 Matrices..................................... 7 4 Linear systems and matrices..........................

More information

Algebraic Constructions of Graphs

Algebraic Constructions of Graphs Spectral Graph Theory Lecture 15 Algebraic Constructions of Graphs Daniel A. Spielman October 17, 2012 15.1 Overview In this lecture, I will explain how to make graphs from linear error-correcting codes.

More information

Key words: Batch codes, error-correcting codes, computationally-private information retrieval, load balancing, distributed storage.

Key words: Batch codes, error-correcting codes, computationally-private information retrieval, load balancing, distributed storage. Linear Batch Codes Helger Lipmaa and Vitaly Skachek Abstract In an application, where a client wants to obtain many symbols from a large database, it is often desirable to balance the load. Batch codes

More information

5 Quiver Representations

5 Quiver Representations 5 Quiver Representations 5. Problems Problem 5.. Field embeddings. Recall that k(y,..., y m ) denotes the field of rational functions of y,..., y m over a field k. Let f : k[x,..., x n ] k(y,..., y m )

More information

Exact and heuristic minimization of Boolean functions

Exact and heuristic minimization of Boolean functions Eact and heuristic minimization of Boolean functions Quine a McCluskey Method a) Generation of all prime implicants b) Selection of a minimum subset of prime implicants, which will represent the original

More information

Estimates of the Distance Distribution of Codes and Designs

Estimates of the Distance Distribution of Codes and Designs 1050 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 47, NO. 3, MARCH 2001 Estimates of the Distance Distribution of Codes Designs Alexei Ashikhmin, Member, IEEE, Alexer Barg, Senior Member, IEEE, Simon

More information

MATH 220: INNER PRODUCT SPACES, SYMMETRIC OPERATORS, ORTHOGONALITY

MATH 220: INNER PRODUCT SPACES, SYMMETRIC OPERATORS, ORTHOGONALITY MATH 22: INNER PRODUCT SPACES, SYMMETRIC OPERATORS, ORTHOGONALITY When discussing separation of variables, we noted that at the last step we need to express the inhomogeneous initial or boundary data as

More information

Lecture 7: Passive Learning

Lecture 7: Passive Learning CS 880: Advanced Complexity Theory 2/8/2008 Lecture 7: Passive Learning Instructor: Dieter van Melkebeek Scribe: Tom Watson In the previous lectures, we studied harmonic analysis as a tool for analyzing

More information

T linear programming to be applied successfully to error-correcting

T linear programming to be applied successfully to error-correcting 1276 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 34, NO. 5, SEPTEMBER 1988 Inequalities for Covering Codes Abstract-Any code C with covering radius R must satisfy a set of linear inequalities that involve

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 12 Luca Trevisan October 3, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Handout 12 Luca Trevisan October 3, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analysis Handout 1 Luca Trevisan October 3, 017 Scribed by Maxim Rabinovich Lecture 1 In which we begin to prove that the SDP relaxation exactly recovers communities

More information

Topics in Probabilistic Combinatorics and Algorithms Winter, 2016

Topics in Probabilistic Combinatorics and Algorithms Winter, 2016 Topics in Probabilistic Combinatorics and Algorithms Winter, 06 4. Epander Graphs Review: verte boundary δ() = {v, v u }. edge boundary () = {{u, v} E, u, v / }. Remark. Of special interset are (, β) epander,

More information

0.1. Linear transformations

0.1. Linear transformations Suggestions for midterm review #3 The repetitoria are usually not complete; I am merely bringing up the points that many people didn t now on the recitations Linear transformations The following mostly

More information

CS359G Lecture 5: Characters of Abelian Groups

CS359G Lecture 5: Characters of Abelian Groups 4/25/2011 CS359G Lecture 5: Characters of Abelia in theory "Marge, I agree with you - in theory. In theory, communism works. In theory." -- Homer Simpson CS359G Lecture 5: Characters of Abelian Groups

More information

Quantum boolean functions

Quantum boolean functions Quantum boolean functions Ashley Montanaro 1 and Tobias Osborne 2 1 Department of Computer Science 2 Department of Mathematics University of Bristol Royal Holloway, University of London Bristol, UK London,

More information

Recall that any inner product space V has an associated norm defined by

Recall that any inner product space V has an associated norm defined by Hilbert Spaces Recall that any inner product space V has an associated norm defined by v = v v. Thus an inner product space can be viewed as a special kind of normed vector space. In particular every inner

More information

Sub-Constant Error Low Degree Test of Almost Linear Size

Sub-Constant Error Low Degree Test of Almost Linear Size Sub-Constant rror Low Degree Test of Almost Linear Size Dana Moshkovitz Ran Raz March 9, 2006 Abstract Given a function f : F m F over a finite field F, a low degree tester tests its agreement with an

More information

REAL AND COMPLEX ANALYSIS

REAL AND COMPLEX ANALYSIS REAL AND COMPLE ANALYSIS Third Edition Walter Rudin Professor of Mathematics University of Wisconsin, Madison Version 1.1 No rights reserved. Any part of this work can be reproduced or transmitted in any

More information

MET Workshop: Exercises

MET Workshop: Exercises MET Workshop: Exercises Alex Blumenthal and Anthony Quas May 7, 206 Notation. R d is endowed with the standard inner product (, ) and Euclidean norm. M d d (R) denotes the space of n n real matrices. When

More information

Linear Equations in Linear Algebra

Linear Equations in Linear Algebra 1 Linear Equations in Linear Algebra 1.1 SYSTEMS OF LINEAR EQUATIONS LINEAR EQUATION,, 1 n A linear equation in the variables equation that can be written in the form a a a b 1 1 2 2 n n a a is an where

More information

Definition 1. A set V is a vector space over the scalar field F {R, C} iff. there are two operations defined on V, called vector addition

Definition 1. A set V is a vector space over the scalar field F {R, C} iff. there are two operations defined on V, called vector addition 6 Vector Spaces with Inned Product Basis and Dimension Section Objective(s): Vector Spaces and Subspaces Linear (In)dependence Basis and Dimension Inner Product 6 Vector Spaces and Subspaces Definition

More information

On non-antipodal binary completely regular codes

On non-antipodal binary completely regular codes On non-antipodal binary completely regular codes J. Borges, J. Rifà Department of Information and Communications Engineering, Universitat Autònoma de Barcelona, 08193-Bellaterra, Spain. V.A. Zinoviev Institute

More information

PUTNAM TRAINING NUMBER THEORY. Exercises 1. Show that the sum of two consecutive primes is never twice a prime.

PUTNAM TRAINING NUMBER THEORY. Exercises 1. Show that the sum of two consecutive primes is never twice a prime. PUTNAM TRAINING NUMBER THEORY (Last updated: December 11, 2017) Remark. This is a list of exercises on Number Theory. Miguel A. Lerma Exercises 1. Show that the sum of two consecutive primes is never twice

More information

Topics in Representation Theory: Fourier Analysis and the Peter Weyl Theorem

Topics in Representation Theory: Fourier Analysis and the Peter Weyl Theorem Topics in Representation Theory: Fourier Analysis and the Peter Weyl Theorem 1 Fourier Analysis, a review We ll begin with a short review of simple facts about Fourier analysis, before going on to interpret

More information

Spectral radius, symmetric and positive matrices

Spectral radius, symmetric and positive matrices Spectral radius, symmetric and positive matrices Zdeněk Dvořák April 28, 2016 1 Spectral radius Definition 1. The spectral radius of a square matrix A is ρ(a) = max{ λ : λ is an eigenvalue of A}. For an

More information

ICT12 8. Linear codes. The Gilbert-Varshamov lower bound and the MacWilliams identities SXD

ICT12 8. Linear codes. The Gilbert-Varshamov lower bound and the MacWilliams identities SXD 1 ICT12 8. Linear codes. The Gilbert-Varshamov lower bound and the MacWilliams identities 19.10.2012 SXD 8.1. The Gilbert Varshamov existence condition 8.2. The MacWilliams identities 2 8.1. The Gilbert

More information

Algebraic Methods in Combinatorics

Algebraic Methods in Combinatorics Algebraic Methods in Combinatorics Po-Shen Loh 27 June 2008 1 Warm-up 1. (A result of Bourbaki on finite geometries, from Răzvan) Let X be a finite set, and let F be a family of distinct proper subsets

More information

Introduction. Genetic Algorithm Theory. Overview of tutorial. The Simple Genetic Algorithm. Jonathan E. Rowe

Introduction. Genetic Algorithm Theory. Overview of tutorial. The Simple Genetic Algorithm. Jonathan E. Rowe Introduction Genetic Algorithm Theory Jonathan E. Rowe University of Birmingham, UK GECCO 2012 The theory of genetic algorithms is beginning to come together into a coherent framework. However, there are

More information