Locality in Coding Theory
|
|
- Lauren Woods
- 5 years ago
- Views:
Transcription
1 Locality in Coding Theory Madhu Sudan Harvard April 9, 2016 Skoltech: Locality in Coding Theory 1
2 Error-Correcting Codes (Linear) Code CC FF qq nn. FF qq : Finite field with qq elements. nn block length kk = dim(cc) message length RR(CC) kk/nn: Rate of CC δδ CC min {δδ uu, vv Pr [uu ii vv ii ]}. xx yy CC ii Basic Algorithmic Tasks Encoding: map message in FF qq kk to codeword. Testing: Decide if uu CC Correcting: If uu CC, find nearest vv CC to uu. April 9, 2016 Skoltech: Locality in Coding Theory 2
3 Locality in Algorithms Sublinear time algorithms: Algorithms that run in time o(input), o(output). Assume random access to input Provide random access to output Typically probabilistic; allowed to compute output on approximation to input. (Property testing Sublinear time for Boolean functions) LTCs: Codes that have sublinear time testers. Decide if uu CC probabilistically. Allowed to accept uu if δδ(uu, CC) small. LCCs: Codes that have sublinear time correctors. If δδ(uu, CC) is small, compute vv ii, for vv CC closest to uu. April 9, 2016 Skoltech: Locality in Coding Theory 3
4 LTCs and LCCs: Formally CC is a (l, εε)-ltc if there exists a tester that Makes l(nn) queries to uu. Accept uu CC w.p. 1 Reject uu w.p. at least εε δδ(uu, CC). C is a (l, εε)-lcc if exists decoder DD s.t. Given oracle access uu close to vv CC, and ii Decoder makes l(nn) queries to uu. Decoder DD uu (ii) usually outputs vv ii. ii, Pr DD [ DD uu ii vv ii ] δδ(uu, vv)/εε Often: ignore εε (fix to 1 ) and focus on l 3 LDC if only coordinates of message can be recovered. April 9, 2016 Skoltech: Locality in Coding Theory 4
5 Outline of this talk Part 0: Definitions of LTC, LCC Part 1: Elementary construction Part 2: Motivation (historical, current) Part 3: State-of-the-art constructions of LCCs Part 4: State-of-the-art constructions of LTCs April 9, 2016 Skoltech: Locality in Coding Theory 5
6 Part 1: Elementary Construction April 9, 2016 Skoltech: Locality in Coding Theory 6
7 Main Example: Reed-Muller Codes Message = multivariate polynomial; Encoding = evaluations everywhere. RM mm, rr, qq { ff αα αα FFqq mm ff FF q xx 1,, xx mm, deg ff rr} Locality? Say rr < qq Restrictions of low-degree polynomials to lines yield low-degree (univ.) polys. Random lines sample FFmm qq uniformly (pairwise ind ly) April 9, 2016 Skoltech: Locality in Coding Theory 7
8 LCCs and LTCs from Polynomials Decoding (rr < qq): Problem: Given ff pp, αα FF mm qq, compute pp αα. Pick random ββ and consider ff LL where LL = {αα + tt ββ tt FF qq } is a random line αα. Find univ. poly h ff LL and output h(αα) Testing (rr < qq/2): Verify deg ff LL rr for random line LL Parameters: nn = qq mm Ideas ; l = can qq = be nn 1 mm extended ; RR CC to 1 rr > qq. Locality poly(δδ 1 ) mm! Analysis non-trivial April 9, 2016 Skoltech: Locality in Coding Theory 8
9 Part 2: Motivations April 9, 2016 Skoltech: Locality in Coding Theory 9
10 Motivation 1 ( Practical ) How to encode massive data? Solution I Encode all data in one big chunk Pro: Pr[failure] = exp(- big chunk ) Con: Recovery time ~ big chunk Solution II Break data into small pieces; encode separately. Pro: Recovery time ~ small Con: Pr[failure] = #pieces X Pr[failure of a piece] Locality (if possible): Best of both Solutions!! April 9, 2016 Skoltech: Locality in Coding Theory 10
11 Aside: LCCs vs. other Localities Local Reconstruction Codes (LRC): Recover from few (one? two?) erasures locally. AND Recover from many errors globally. Regenerating Codes (RgC): Restricted access pattern for recovery: Partition coordinates and access few symbols per partition. Main Differences: #errors: LCCs high vs LRC/RgC low Asymptotic (LCC) vs. Concrete parameters (LRC/RgC) April 9, 2016 Skoltech: Locality in Coding Theory 11
12 Motivation 2 ( Theoretical ) (Many?) mathematical consequences: Probabilistically checkable proofs: Use specific LCCs and LTCs Hardness amplification: Constructing functions that are very hard on average from functions that are hard on worst-case. Any (sufficiently good) LCC Hardness amplification Small set expanders (SSE): Usually have mostly small eigenvalues. LTCs SSEs with many big eigenvalues [Barak et al., Gopalan et al.] April 9, 2016 Skoltech: Locality in Coding Theory 12
13 Aside: PCPs (1 of 4) Familiar task: Protect massive data mm 0,1 kk mm φφ mm PCP task: Protect mm + analysis φφ mm {0,1}. φφ(mm) is just one bit long would like to read & trust φφ(mm) with few probes. Can we do it? Yes! PCPs! Functional Error-correction EE(mm) EE φφ (mm) April 9, 2016 Skoltech: Locality in Coding Theory 13
14 PCPs (2 of 4) - Definition 0 W 1 1 HTHHTH V PCP Verifer: Given WW 0,1 NN 1. Tosses random coins 2. Determines query locations 3. Reads locations. Accepts/Rejects WW EE φφ mm with φφ mm = 1 V accepts w.h.p. WW far from every EE φφ mm with φφ mm = 1 rejects w.h.p. Distinguishes φφ 1 1 from φφ 1 1 = April 9, 2016 Skoltech: Locality in Coding Theory 14
15 PCPs (3 of 4): Polynomial-speak mm MM(xx) low-degree (multiv.) polynomial φφ Φ : local map from poly s to poly s φφ mm = 1 AA, BB, CC s. t. Φ MM, AA, BB, CC 0 EE φφ mm = ( MM, AA, BB, CC ) (evaluations) Local testability of RM codes can verify EE φφ (mm) syntactically correct. ( MM, AA, BB, CC polynomials ) Distance of RM codes + Φ MM, AA, BB, CC aa = 0 for random aa Semantically correct (φφ mm = 1)). April 9, 2016 Skoltech: Locality in Coding Theory 15
16 PCP (4 of 4) mm EE: VV VV 0,1 (edges of graph). EE : FF 2 qq FF qq with deg EE nn VV φφ EE = 1 graph 3-colorable. χχ: VV { 1,0,1} s.t. yy, zz VV, EE yy, zz = 1 χχ yy χχ zz Φ χχ, AA, AA 1, BB, BB 1, BB 2, tt = AA(yy) χχ yy + 1 χχ (yy) χχ (yy) tt AA yy AA 1 yy (yy aa) aa V + tt 2 BB yy, zz EE yy, zz χχ yy χχ zz jj jj { 2, 1,1,2} +tt 3 BB yy, zz BB 1 yy, zz aa VV yy aa BB 2 yy, zz (zz bb) bb VV April 9, 2016 Skoltech: Locality in Coding Theory 16
17 Part 3: Recent Progress on LCCs + LTCs April 9, 2016 Skoltech: Locality in Coding Theory 17
18 Summary of Recent Progress Till 2010: locality nn = oo nn RRRRRRRR < : LCC locality nn = 2 ~ log nn & RRRRRRRR 1 l nn = 2 ~ log nn meeting Singleton Bound l nn = 2 ~ log nn binary, Zyablov bound. (locally correcting half-the-distance!) LTC locality nn = ~poly log nn & RRRRRRRR 1 Singleton Bound, Zyablov bound April 9, 2016 Skoltech: Locality in Coding Theory 18
19 Main References Multiplicity codes [KoppartySarafYekhanin 10] See also Lifted Codes [GuoKoppartySudan 13] 1 Expander codes [HemenwayOstrovskyWootters 13] Tensor codes [Viderman 11] (see also [GKS 13] ) Above + Alon-Luby composition: [KoppartyMeirRon-ZewiSaraf 16a] 3 A Zig-Zag construction with above ingredients: [KMR-ZS 16b] 4 2 April 9, 2016 Skoltech: Locality in Coding Theory 19
20 Lifted Codes Codes obtained by inverting decoder: Recall decoder for RM codes. What code does it decode? CC mm,rr,qq = ff: FF qq mm FF qq deg ff LL rr LL} What we know: RM mm, rr, qq CC mm,rr,qq Theorem [GKS 13]: δδ(cc mm,rr,qq ) δδ RM mm, rr, qq RRRRRRRR CC mm,rr,qq 1 if qq = 2 tt and tt Local decodability by construction. Local testability [KaufmanS 07,GuoHaramatyS 15]. April 9, 2016 Skoltech: Locality in Coding Theory 20
21 Why does Rate CC mm,rr,qq 1? Example: mm = 2 Some monomials OK! E.g. qq = 2 tt ; rr = qq 2 ; ff xx, yy = xxrr yy rr satisfies deg ff llllllll rr for every line! xx rr aaaa + bb rr = bb rr xx rr + aa rr xx (mod xx qq xx) As rr qq many more monomials Proof: Lucas s lemma + simple combinatorics April 9, 2016 Skoltech: Locality in Coding Theory 21
22 Multiplicity Codes Basic example Message = (coeffs. of) poly pp FF qq xx, yy. Encoding = Evaluations of pp,, over FF qq 2. Length = nn = qq 2 ; Alphabet = FF qq 3 ; Rate 2 3 Local-decoding via lines. Locality = O More multiplicities Rate 1 More derivatives Locality nn εε nn April 9, 2016 Skoltech: Locality in Coding Theory 22
23 Multiplicity Codes - 2 Why does Rate 2 3? Every zero of pp,, two zeroes of pp Can afford to use pp of degree 2qq. Dimension 4 ; But encoding length 3 (Same reason that multiplicity improves radius of listdecoding in [Guruswami,S.]) April 9, 2016 Skoltech: Locality in Coding Theory 23
24 State-of-the-art as of 2014 εε, αα > 0 δδ = δδ εε,αα > 0 s.t. codes w. Rate 1 αα Distance δδ Locality = nn εε Promised: Locality nn oo(1) Singleton bound [What if you need higher distance?] Zyablov bound [What if you want a binary code?] April 9, 2016 Skoltech: Locality in Coding Theory 24
25 Alon-Luby Transformation Key ingredient in [Meir14], [Kopparty et al. 15] Short MDS Expander-based Interleaving Rate 1 Code Message Encoding April 9, 2016 Skoltech: Locality in Coding Theory 25
26 Alon-Luby Transformation Key ingredient in [Meir14], [Kopparty et al. 15] Short MDS Expander-based Interleaving Rate 1 Code Message Encoding Rate/Distance of final code ~ Rate of MDS [Meir] Locality ~ Locality of Rate 1 code Proof = Picture April 9, 2016 Skoltech: Locality in Coding Theory 26
27 Subpolynomial Locality Apply previous transform, with initial code of Rate 1 oo(1) and locality nn oo(1)! [e.g., multiplicity codes with mm = ωω(1)] Singleton bound Zyablov bound? Concatenation [Forney 66] April 9, 2016 Skoltech: Locality in Coding Theory 27
28 Part 4: Locally Testable Codes (after break) April 9, 2016 Skoltech: Locality in Coding Theory 28
Algebraic Codes and Invariance
Algebraic Codes and Invariance Madhu Sudan Harvard April 30, 2016 AAD3: Algebraic Codes and Invariance 1 of 29 Disclaimer Very little new work in this talk! Mainly: Ex- Coding theorist s perspective on
More informationProperty Testing and Affine Invariance Part I Madhu Sudan Harvard University
Property Testing and Affine Invariance Part I Madhu Sudan Harvard University December 29-30, 2015 IITB: Property Testing & Affine Invariance 1 of 31 Goals of these talks Part I Introduce Property Testing
More informationGeneral Strong Polarization
General Strong Polarization Madhu Sudan Harvard University Joint work with Jaroslaw Blasiok (Harvard), Venkatesan Gurswami (CMU), Preetum Nakkiran (Harvard) and Atri Rudra (Buffalo) May 1, 018 G.Tech:
More informationTwo Decades of Property Testing Madhu Sudan Harvard
Two Decades of Property Testing Madhu Sudan Harvard April 8, 2016 Two Decades of Property Testing 1 of 29 Kepler s Big Data Problem Tycho Brahe (~1550-1600): Wished to measure planetary motion accurately.
More informationGeneral Strong Polarization
General Strong Polarization Madhu Sudan Harvard University Joint work with Jaroslaw Blasiok (Harvard), Venkatesan Gurswami (CMU), Preetum Nakkiran (Harvard) and Atri Rudra (Buffalo) December 4, 2017 IAS:
More informationLocal Decoding and Testing Polynomials over Grids
Local Decoding and Testing Polynomials over Grids Madhu Sudan Harvard University Joint work with Srikanth Srinivasan (IIT Bombay) January 11, 2018 ITCS: Polynomials over Grids 1 of 12 DeMillo-Lipton-Schwarz-Zippel
More informationLow-Degree Polynomials
Low-Degree Polynomials Madhu Sudan Harvard University October 7, 2016 Avi60!! Low-degree Polynomials 1 of 27 October 7, 2016 Avi60!! Low-degree Polynomials 2 of 27 Happy Birthday, Avi!! October 7, 2016
More informationGeneral Strong Polarization
General Strong Polarization Madhu Sudan Harvard University Joint work with Jaroslaw Blasiok (Harvard), Venkatesan Guruswami (CMU), Preetum Nakkiran (Harvard) and Atri Rudra (Buffalo) Oct. 8, 018 Berkeley:
More informationGeneral Strong Polarization
General Strong Polarization Madhu Sudan Harvard University Joint work with Jaroslaw Blasiok (Harvard), Venkatesan Guruswami (CMU), Preetum Nakkiran (Harvard) and Atri Rudra (Buffalo) Oct. 5, 018 Stanford:
More informationUncertain Compression & Graph Coloring. Madhu Sudan Harvard
Uncertain Compression & Graph Coloring Madhu Sudan Harvard Based on joint works with: (1) Adam Kalai (MSR), Sanjeev Khanna (U.Penn), Brendan Juba (WUStL) (2) Elad Haramaty (Harvard) (3) Badih Ghazi (MIT),
More informationHigh-rate Locally-testable Codes with Quasi-polylogarithmic Query Complexity
High-rate Locally-testable Codes with Quasi-polylogarithmic Query Complexity Swastik Kopparty, Or Meir, Noga Ron-Zewi, Shubhangi Saraf September 5, 205 Abstract An error correcting code is said to be locally
More informationLecture Introduction. 2 Formal Definition. CS CTT Current Topics in Theoretical CS Oct 30, 2012
CS 59000 CTT Current Topics in Theoretical CS Oct 30, 0 Lecturer: Elena Grigorescu Lecture 9 Scribe: Vivek Patel Introduction In this lecture we study locally decodable codes. Locally decodable codes are
More informationLocally testable and Locally correctable Codes Approaching the Gilbert-Varshamov Bound
Electronic Colloquium on Computational Complexity, Report No. 1 (016 Locally testable and Locally correctable Codes Approaching the Gilbert-Varshamov Bound Sivakanth Gopi Swastik Kopparty Rafael Oliveira
More informationTutorial: Locally decodable codes. UT Austin
Tutorial: Locally decodable codes Anna Gál UT Austin Locally decodable codes Error correcting codes with extra property: Recover (any) one message bit, by reading only a small number of codeword bits.
More informationClassical RSA algorithm
Classical RSA algorithm We need to discuss some mathematics (number theory) first Modulo-NN arithmetic (modular arithmetic, clock arithmetic) 9 (mod 7) 4 3 5 (mod 7) congruent (I will also use = instead
More informationError-Correcting Codes:
Error-Correcting Codes: Progress & Challenges Madhu Sudan Microsoft/MIT Communication in presence of noise We are not ready Sender Noisy Channel We are now ready Receiver If information is digital, reliability
More informationInvariance in Property Testing
Invariance in Property Testing Madhu Sudan Microsoft Research Based on: works with/of Eli Ben-Sasson, Elena Grigorescu, Tali Kaufman, Shachar Lovett, Ghid Maatouk, Amir Shpilka. February 22, 2012 Invariance
More informationLecture 4: Codes based on Concatenation
Lecture 4: Codes based on Concatenation Error-Correcting Codes (Spring 206) Rutgers University Swastik Kopparty Scribe: Aditya Potukuchi and Meng-Tsung Tsai Overview In the last lecture, we studied codes
More informationTwo Decades of Property Testing
Two Decades of Property Testing Madhu Sudan Microsoft Research 12/09/2014 Invariance in Property Testing @MIT 1 of 29 Kepler s Big Data Problem Tycho Brahe (~1550-1600): Wished to measure planetary motion
More informationLocal correctability of expander codes
Local correctability of expander codes Brett Hemenway Rafail Ostrovsky Mary Wootters IAS April 4, 24 The point(s) of this talk Locally decodable codes are codes which admit sublinear time decoding of small
More informationReed-Muller testing and approximating small set expansion & hypergraph coloring
Reed-Muller testing and approximating small set expansion & hypergraph coloring Venkatesan Guruswami Carnegie Mellon University (Spring 14 @ Microsoft Research New England) 2014 Bertinoro Workshop on Sublinear
More informationNotes 10: List Decoding Reed-Solomon Codes and Concatenated codes
Introduction to Coding Theory CMU: Spring 010 Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes April 010 Lecturer: Venkatesan Guruswami Scribe: Venkat Guruswami & Ali Kemal Sinop DRAFT
More informationTerms of Use. Copyright Embark on the Journey
Terms of Use All rights reserved. No part of this packet may be reproduced, stored in a retrieval system, or transmitted in any form by any means - electronic, mechanical, photo-copies, recording, or otherwise
More informationLow-Degree Testing. Madhu Sudan MSR. Survey based on many works. of /02/2015 CMSA: Low-degree Testing 1
Low-Degree Testing Madhu Sudan MSR Survey based on many works 09/02/2015 CMSA: Low-degree Testing 1 Kepler s Problem Tycho Brahe (~1550-1600): Wished to measure planetary motion accurately. To confirm
More informationLecture 19 : Reed-Muller, Concatenation Codes & Decoding problem
IITM-CS6845: Theory Toolkit February 08, 2012 Lecture 19 : Reed-Muller, Concatenation Codes & Decoding problem Lecturer: Jayalal Sarma Scribe: Dinesh K Theme: Error correcting codes In the previous lecture,
More informationQuantum Chosen-Ciphertext Attacks against Feistel Ciphers
SESSION ID: CRYP-R09 Quantum Chosen-Ciphertext Attacks against Feistel Ciphers Gembu Ito Nagoya University Joint work with Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki and Tetsu Iwata Overview 3-round
More informationWorksheets for GCSE Mathematics. Quadratics. mr-mathematics.com Maths Resources for Teachers. Algebra
Worksheets for GCSE Mathematics Quadratics mr-mathematics.com Maths Resources for Teachers Algebra Quadratics Worksheets Contents Differentiated Independent Learning Worksheets Solving x + bx + c by factorisation
More informationLocally Decodable Codes
Foundations and Trends R in sample Vol. xx, No xx (xxxx) 1 98 c xxxx xxxxxxxxx DOI: xxxxxx Locally Decodable Codes Sergey Yekhanin 1 1 Microsoft Research Silicon Valley, 1065 La Avenida, Mountain View,
More informationList and local error-correction
List and local error-correction Venkatesan Guruswami Carnegie Mellon University 8th North American Summer School of Information Theory (NASIT) San Diego, CA August 11, 2015 Venkat Guruswami (CMU) List
More informationLocally Decodable Codes
Foundations and Trends R in sample Vol. xx, No xx (xxxx) 1 114 c xxxx xxxxxxxxx DOI: xxxxxx Locally Decodable Codes Sergey Yekhanin 1 1 Microsoft Research Silicon Valley, 1065 La Avenida, Mountain View,
More informationLow Rate Is Insufficient for Local Testability
Electronic Colloquium on Computational Complexity, Revision 2 of Report No. 4 (200) Low Rate Is Insufficient for Local Testability Eli Ben-Sasson Michael Viderman Computer Science Department Technion Israel
More informationThe Tensor Product of Two Codes is Not Necessarily Robustly Testable
The Tensor Product of Two Codes is Not Necessarily Robustly Testable Paul Valiant Massachusetts Institute of Technology pvaliant@mit.edu Abstract. There has been significant interest lately in the task
More informationChapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding
Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols
More informationarxiv: v1 [cs.cc] 22 Apr 2015
High rate locally-correctable and locally-testable codes with sub-polynomial query complexity Swastik Kopparty Or Meir Noga Ron-Zewi Shubhangi Saraf arxiv:504.05653v [cs.cc] 22 Apr 205 April 23, 205 Abstract
More informationModule 7 (Lecture 25) RETAINING WALLS
Module 7 (Lecture 25) RETAINING WALLS Topics Check for Bearing Capacity Failure Example Factor of Safety Against Overturning Factor of Safety Against Sliding Factor of Safety Against Bearing Capacity Failure
More informationControl of Mobile Robots
Control of Mobile Robots Regulation and trajectory tracking Prof. Luca Bascetta (luca.bascetta@polimi.it) Politecnico di Milano Dipartimento di Elettronica, Informazione e Bioingegneria Organization and
More informationLecture 11. Kernel Methods
Lecture 11. Kernel Methods COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Andrey Kan Copyright: University of Melbourne This lecture The kernel trick Efficient computation of a dot product
More informationLecture 3. STAT161/261 Introduction to Pattern Recognition and Machine Learning Spring 2018 Prof. Allie Fletcher
Lecture 3 STAT161/261 Introduction to Pattern Recognition and Machine Learning Spring 2018 Prof. Allie Fletcher Previous lectures What is machine learning? Objectives of machine learning Supervised and
More informationGrover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick
Grover s algorithm Search in an unordered database Example: phonebook, need to find a person from a phone number Actually, something else, like hard (e.g., NP-complete) problem 0, xx aa Black box ff xx
More informationProbabilistically Checkable Proofs
Probabilistically Checkable Proofs Madhu Sudan Microsoft Research June 11, 2015 TIFR: Probabilistically Checkable Proofs 1 Can Proofs be Checked Efficiently? The Riemann Hypothesis is true (12 th Revision)
More informationLecture 6. Notes on Linear Algebra. Perceptron
Lecture 6. Notes on Linear Algebra. Perceptron COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Andrey Kan Copyright: University of Melbourne This lecture Notes on linear algebra Vectors
More informationSupport Vector Machines. CSE 4309 Machine Learning Vassilis Athitsos Computer Science and Engineering Department University of Texas at Arlington
Support Vector Machines CSE 4309 Machine Learning Vassilis Athitsos Computer Science and Engineering Department University of Texas at Arlington 1 A Linearly Separable Problem Consider the binary classification
More informationPCP Theorem and Hardness of Approximation
PCP Theorem and Hardness of Approximation An Introduction Lee Carraher and Ryan McGovern Department of Computer Science University of Cincinnati October 27, 2003 Introduction Assuming NP P, there are many
More information10.4 The Cross Product
Math 172 Chapter 10B notes Page 1 of 9 10.4 The Cross Product The cross product, or vector product, is defined in 3 dimensions only. Let aa = aa 1, aa 2, aa 3 bb = bb 1, bb 2, bb 3 then aa bb = aa 2 bb
More informationTowards the Sliding Scale Conjecture (Old & New PCP constructions)
Towards the Sliding Scale Conjecture (Old & New PCP constructions) Prahladh Harsha TIFR [Based on joint works with Irit Dinur & Guy Kindler] Outline Intro, Background & Context Goals and questions in this
More informationSecondary 3H Unit = 1 = 7. Lesson 3.3 Worksheet. Simplify: Lesson 3.6 Worksheet
Secondary H Unit Lesson Worksheet Simplify: mm + 2 mm 2 4 mm+6 mm + 2 mm 2 mm 20 mm+4 5 2 9+20 2 0+25 4 +2 2 + 2 8 2 6 5. 2 yy 2 + yy 6. +2 + 5 2 2 2 0 Lesson 6 Worksheet List all asymptotes, holes and
More information" = Y(#,$) % R(r) = 1 4& % " = Y(#,$) % R(r) = Recitation Problems: Week 4. a. 5 B, b. 6. , Ne Mg + 15 P 2+ c. 23 V,
Recitation Problems: Week 4 1. Which of the following combinations of quantum numbers are allowed for an electron in a one-electron atom: n l m l m s 2 2 1! 3 1 0 -! 5 1 2! 4-1 0! 3 2 1 0 2 0 0 -! 7 2-2!
More informationInferring the origin of an epidemic with a dynamic message-passing algorithm
Inferring the origin of an epidemic with a dynamic message-passing algorithm HARSH GUPTA (Based on the original work done by Andrey Y. Lokhov, Marc Mézard, Hiroki Ohta, and Lenka Zdeborová) Paper Andrey
More informationTwo Query PCP with Sub-Constant Error
Electronic Colloquium on Computational Complexity, Report No 71 (2008) Two Query PCP with Sub-Constant Error Dana Moshkovitz Ran Raz July 28, 2008 Abstract We show that the N P-Complete language 3SAT has
More informationLecture 8 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak;
Topics in Theoretical Computer Science April 18, 2016 Lecturer: Ola Svensson Lecture 8 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent
More informationQuestions Pool. Amnon Ta-Shma and Dean Doron. January 2, Make sure you know how to solve. Do not submit.
Questions Pool Amnon Ta-Shma and Dean Doron January 2, 2017 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to solve. Do not submit.
More informationReview for Exam Hyunse Yoon, Ph.D. Assistant Research Scientist IIHR-Hydroscience & Engineering University of Iowa
57:020 Fluids Mechanics Fall2013 1 Review for Exam3 12. 11. 2013 Hyunse Yoon, Ph.D. Assistant Research Scientist IIHR-Hydroscience & Engineering University of Iowa 57:020 Fluids Mechanics Fall2013 2 Chapter
More informationDiffusive DE & DM Diffusve DE and DM. Eduardo Guendelman With my student David Benisty, Joseph Katz Memorial Conference, May 23, 2017
Diffusive DE & DM Diffusve DE and DM Eduardo Guendelman With my student David Benisty, Joseph Katz Memorial Conference, May 23, 2017 Main problems in cosmology The vacuum energy behaves as the Λ term in
More informationEfficiently decodable codes for the binary deletion channel
Efficiently decodable codes for the binary deletion channel Venkatesan Guruswami (venkatg@cs.cmu.edu) Ray Li * (rayyli@stanford.edu) Carnegie Mellon University August 18, 2017 V. Guruswami and R. Li (CMU)
More informationModule 7 (Lecture 27) RETAINING WALLS
Module 7 (Lecture 27) RETAINING WALLS Topics 1.1 RETAINING WALLS WITH METALLIC STRIP REINFORCEMENT Calculation of Active Horizontal and vertical Pressure Tie Force Factor of Safety Against Tie Failure
More informationTesting Affine-Invariant Properties
Testing Affine-Invariant Properties Madhu Sudan Microsoft Surveys: works with/of Eli Ben-Sasson, Elena Grigorescu, Tali Kaufman, Shachar Lovett, Ghid Maatouk, Amir Shpilka. May 23-28, 2011 Bertinoro: Testing
More information7.3 The Jacobi and Gauss-Seidel Iterative Methods
7.3 The Jacobi and Gauss-Seidel Iterative Methods 1 The Jacobi Method Two assumptions made on Jacobi Method: 1.The system given by aa 11 xx 1 + aa 12 xx 2 + aa 1nn xx nn = bb 1 aa 21 xx 1 + aa 22 xx 2
More information1. The graph of a function f is given above. Answer the question: a. Find the value(s) of x where f is not differentiable. Ans: x = 4, x = 3, x = 2,
1. The graph of a function f is given above. Answer the question: a. Find the value(s) of x where f is not differentiable. x = 4, x = 3, x = 2, x = 1, x = 1, x = 2, x = 3, x = 4, x = 5 b. Find the value(s)
More informationAlmost transparent short proofs for NP R
Brandenburgische Technische Universität, Cottbus, Germany From Dynamics to Complexity: A conference celebrating the work of Mike Shub Toronto, May 10, 2012 Supported by DFG under GZ:ME 1424/7-1 Outline
More informationCryptography CS 555. Topic 22: Number Theory/Public Key-Cryptography
Cryptography CS 555 Topic 22: Number Theory/Public Key-Cryptography 1 Exam Recap 2 Exam Recap Highest Average Score on Question Question 4: (Feistel Network with round function f(x) = 0 n ) Tougher Questions
More informationLocal list-decoding and testing of random linear codes from high-error
Local list-decoding and testing of random linear codes from high-error Swastik Kopparty Shubhangi Saraf February 4, 01 Abstract In this paper, we give efficient algorithms for list-decoding and testing
More information6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory
6895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 3: Coding Theory Lecturer: Dana Moshkovitz Scribe: Michael Forbes and Dana Moshkovitz 1 Motivation In the course we will make heavy use of
More informationAngular Momentum, Electromagnetic Waves
Angular Momentum, Electromagnetic Waves Lecture33: Electromagnetic Theory Professor D. K. Ghosh, Physics Department, I.I.T., Bombay As before, we keep in view the four Maxwell s equations for all our discussions.
More informationCOMPRESSION FOR QUANTUM POPULATION CODING
COMPRESSION FOR QUANTUM POPULATION CODING Ge Bai, The University of Hong Kong Collaborative work with: Yuxiang Yang, Giulio Chiribella, Masahito Hayashi INTRODUCTION Population: A group of identical states
More informationError Correcting Codes Questions Pool
Error Correcting Codes Questions Pool Amnon Ta-Shma and Dean Doron January 3, 018 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to
More informationTECHNICAL NOTE AUTOMATIC GENERATION OF POINT SPRING SUPPORTS BASED ON DEFINED SOIL PROFILES AND COLUMN-FOOTING PROPERTIES
COMPUTERS AND STRUCTURES, INC., FEBRUARY 2016 TECHNICAL NOTE AUTOMATIC GENERATION OF POINT SPRING SUPPORTS BASED ON DEFINED SOIL PROFILES AND COLUMN-FOOTING PROPERTIES Introduction This technical note
More informationNumber Representations
Computer Arithmetic Algorithms Prof. Dae Hyun Kim School of Electrical Engineering and Computer Science Washington State University Number Representations Information Textbook Israel Koren, Computer Arithmetic
More informationWorksheets for GCSE Mathematics. Algebraic Expressions. Mr Black 's Maths Resources for Teachers GCSE 1-9. Algebra
Worksheets for GCSE Mathematics Algebraic Expressions Mr Black 's Maths Resources for Teachers GCSE 1-9 Algebra Algebraic Expressions Worksheets Contents Differentiated Independent Learning Worksheets
More informationInternational Journal of Mathematical Archive-5(3), 2014, Available online through ISSN
International Journal of Mathematical Archive-5(3), 214, 189-195 Available online through www.ijma.info ISSN 2229 546 COMMON FIXED POINT THEOREMS FOR OCCASIONALLY WEAKLY COMPATIBLE MAPPINGS IN INTUITIONISTIC
More informationShort PCPs with Polylog Query Complexity
Short PCPs with Polylog Query Complexity Eli Ben-Sasson Computer Science Department Technion Israel Institute of Technology Haifa, 32000, Israel eli@cs.technion.ac.il Madhu Sudan Computer Science and Artificial
More informationSystems of Linear Equations
Systems of Linear Equations As stated in Section G, Definition., a linear equation in two variables is an equation of the form AAAA + BBBB = CC, where AA and BB are not both zero. Such an equation has
More informationThe Complexity of the Matroid-Greedoid Partition Problem
The Complexity of the Matroid-Greedoid Partition Problem Vera Asodi and Christopher Umans Abstract We show that the maximum matroid-greedoid partition problem is NP-hard to approximate to within 1/2 +
More informationMathematics Ext 2. HSC 2014 Solutions. Suite 403, 410 Elizabeth St, Surry Hills NSW 2010 keystoneeducation.com.
Mathematics Ext HSC 4 Solutions Suite 43, 4 Elizabeth St, Surry Hills NSW info@keystoneeducation.com.au keystoneeducation.com.au Mathematics Extension : HSC 4 Solutions Contents Multiple Choice... 3 Question...
More informationCSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010
CSC 5170: Theory of Computational Complexity Lecture 13 The Chinese University of Hong Kong 19 April 2010 Recall the definition of probabilistically checkable proofs (PCP) from last time. We say L has
More informationList Decoding of Reed Solomon Codes
List Decoding of Reed Solomon Codes p. 1/30 List Decoding of Reed Solomon Codes Madhu Sudan MIT CSAIL Background: Reliable Transmission of Information List Decoding of Reed Solomon Codes p. 2/30 List Decoding
More informationMathematics, Proofs and Computation
Mathematics, Proofs and Computation Madhu Sudan Harvard December 16, 2016 TIMC: Math, Proofs, Computing 1 of 25 Logic, Mathematics, Proofs Reasoning: Start with body of knowledge. Add to body of knowledge
More informationLecture 9: List decoding Reed-Solomon and Folded Reed-Solomon codes
Lecture 9: List decoding Reed-Solomon and Folded Reed-Solomon codes Error-Correcting Codes (Spring 2016) Rutgers University Swastik Kopparty Scribes: John Kim and Pat Devlin 1 List decoding review Definition
More informationA list-decodable code with local encoding and decoding
A list-decodable code with local encoding and decoding Marius Zimand Towson University Department of Computer and Information Sciences Baltimore, MD http://triton.towson.edu/ mzimand Abstract For arbitrary
More informationBig Bang Planck Era. This theory: cosmological model of the universe that is best supported by several aspects of scientific evidence and observation
Big Bang Planck Era Source: http://www.crystalinks.com/bigbang.html Source: http://www.odec.ca/index.htm This theory: cosmological model of the universe that is best supported by several aspects of scientific
More informationThree Query Locally Decodable Codes with Higher Correctness Require Exponential Length
Three Query Locally Decodable Codes with Higher Correctness Require Exponential Length Anna Gál UT Austin panni@cs.utexas.edu Andrew Mills UT Austin amills@cs.utexas.edu March 8, 20 Abstract Locally decodable
More informationLecture No. 1 Introduction to Method of Weighted Residuals. Solve the differential equation L (u) = p(x) in V where L is a differential operator
Lecture No. 1 Introduction to Method of Weighted Residuals Solve the differential equation L (u) = p(x) in V where L is a differential operator with boundary conditions S(u) = g(x) on Γ where S is a differential
More information2 Completing the Hardness of approximation of Set Cover
CSE 533: The PCP Theorem and Hardness of Approximation (Autumn 2005) Lecture 15: Set Cover hardness and testing Long Codes Nov. 21, 2005 Lecturer: Venkat Guruswami Scribe: Atri Rudra 1 Recap We will first
More informationA Posteriori Error Estimates For Discontinuous Galerkin Methods Using Non-polynomial Basis Functions
Lin Lin A Posteriori DG using Non-Polynomial Basis 1 A Posteriori Error Estimates For Discontinuous Galerkin Methods Using Non-polynomial Basis Functions Lin Lin Department of Mathematics, UC Berkeley;
More informationChapter 22 : Electric potential
Chapter 22 : Electric potential What is electric potential? How does it relate to potential energy? How does it relate to electric field? Some simple applications What does it mean when it says 1.5 Volts
More informationKENNESAW STATE UNIVERSITY ATHLETICS VISUAL IDENTITY
KENNESAW STATE UNIVERSITY ATHLETICS VISUAL IDENTITY KENNESAW STATE DEPARTMENT OF ATHLETICS VISUAL IDENTITY GENERAL University Athletics Brand History...3 Referencing the Institution...3 Referencing the
More informationSHORT PCPS WITH POLYLOG QUERY COMPLEXITY
SIAM J. COMPUT. Vol. 38, No. 2, pp. 551 607 c 2008 Society for Industrial and Applied Mathematics SHORT PCPS WITH POLYLOG QUERY COMPLEXITY ELI BEN-SASSON AND MADHU SUDAN Abstract. We give constructions
More informationA A A A A A A A A A A A. a a a a a a a a a a a a a a a. Apples taste amazingly good.
Victorian Handwriting Sheet Aa A A A A A A A A A A A A Aa Aa Aa Aa Aa Aa Aa a a a a a a a a a a a a a a a Apples taste amazingly good. Apples taste amazingly good. Now make up a sentence of your own using
More informationReview for Exam Hyunse Yoon, Ph.D. Adjunct Assistant Professor Department of Mechanical Engineering, University of Iowa
Review for Exam3 12. 9. 2015 Hyunse Yoon, Ph.D. Adjunct Assistant Professor Department of Mechanical Engineering, University of Iowa Assistant Research Scientist IIHR-Hydroscience & Engineering, University
More informationNon-Approximability Results (2 nd part) 1/19
Non-Approximability Results (2 nd part) 1/19 Summary - The PCP theorem - Application: Non-approximability of MAXIMUM 3-SAT 2/19 Non deterministic TM - A TM where it is possible to associate more than one
More informationChapter 5: Spectral Domain From: The Handbook of Spatial Statistics. Dr. Montserrat Fuentes and Dr. Brian Reich Prepared by: Amanda Bell
Chapter 5: Spectral Domain From: The Handbook of Spatial Statistics Dr. Montserrat Fuentes and Dr. Brian Reich Prepared by: Amanda Bell Background Benefits of Spectral Analysis Type of data Basic Idea
More informationLecture No. 5. For all weighted residual methods. For all (Bubnov) Galerkin methods. Summary of Conventional Galerkin Method
Lecture No. 5 LL(uu) pp(xx) = 0 in ΩΩ SS EE (uu) = gg EE on ΓΓ EE SS NN (uu) = gg NN on ΓΓ NN For all weighted residual methods NN uu aaaaaa = uu BB + αα ii φφ ii For all (Bubnov) Galerkin methods ii=1
More informationQuantum Mechanics. An essential theory to understand properties of matter and light. Chemical Electronic Magnetic Thermal Optical Etc.
Quantum Mechanics An essential theory to understand properties of matter and light. Chemical Electronic Magnetic Thermal Optical Etc. Fall 2018 Prof. Sergio B. Mendes 1 CHAPTER 3 Experimental Basis of
More informationSECTION 7: FAULT ANALYSIS. ESE 470 Energy Distribution Systems
SECTION 7: FAULT ANALYSIS ESE 470 Energy Distribution Systems 2 Introduction Power System Faults 3 Faults in three-phase power systems are short circuits Line-to-ground Line-to-line Result in the flow
More informationLecture 03: Polynomial Based Codes
Lecture 03: Polynomial Based Codes Error-Correcting Codes (Spring 016) Rutgers University Swastik Kopparty Scribes: Ross Berkowitz & Amey Bhangale 1 Reed-Solomon Codes Reed Solomon codes are large alphabet
More informationVerification of quantum computation
Verification of quantum computation THOMAS VIDICK, CALIFORNIA INSTITUTE OF TECHNOLOGY Presentation based on the paper: Classical verification of quantum computation by U. Mahadev (IEEE symp. on Foundations
More informationSublinear Algorithms Lecture 3
Sublinear Algorithms Lecture 3 Sofya Raskhodnikova Penn State University Thanks to Madhav Jha (Penn State) for help with creating these slides. Tentative Plan Lecture. Background. Testing properties of
More informationME5286 Robotics Spring 2017 Quiz 2
Page 1 of 5 ME5286 Robotics Spring 2017 Quiz 2 Total Points: 30 You are responsible for following these instructions. Please take a minute and read them completely. 1. Put your name on this page, any other
More informationCS151 Complexity Theory. Lecture 9 May 1, 2017
CS151 Complexity Theory Lecture 9 Hardness vs. randomness We have shown: If one-way permutations exist then BPP δ>0 TIME(2 nδ ) ( EXP simulation is better than brute force, but just barely stronger assumptions
More informationLower Bounds for Testing Bipartiteness in Dense Graphs
Lower Bounds for Testing Bipartiteness in Dense Graphs Andrej Bogdanov Luca Trevisan Abstract We consider the problem of testing bipartiteness in the adjacency matrix model. The best known algorithm, due
More information