Local Decoding and Testing Polynomials over Grids
|
|
- Steven Woods
- 5 years ago
- Views:
Transcription
1 Local Decoding and Testing Polynomials over Grids Madhu Sudan Harvard University Joint work with Srikanth Srinivasan (IIT Bombay) January 11, 2018 ITCS: Polynomials over Grids 1 of 12
2 DeMillo-Lipton-Schwarz-Zippel Notation: FF = field, FF(dd, nn) = set of deg. dd, nn var. poly over FF δδ ff, gg = normalized Hamming distance δδ dd ff = min gg FF dd,nn δδ(ff, gg) DLSZ Lemma: Let SS FF, with 2 SS <. If ff, gg: SS nn FF satisfy ff gg FF dd, nn then δδ ff, gg 2 dd. Strengthens to δδ ff, gg 1 dd/ SS if dd < SS Holds even if SS = {0,1} For this talk: dd = constant DLSZ Lemma converts polynomials into error-correcting codes. With bonus: decodability, locality so δδ ff, gg bounded away from 0. January 11, 2018 ITCS: Polynomials over Grids 2 of 12
3 Local Decoding and Testing Informally: Given oracle access to ff: SS nn FF Testing: determine if δδ dd ff εε Decoding: If δδ dd ff δδ 0 and gg is nearest poly then determine value of gg(aa) given aa SS nn Parameters: Query complexity = # of oracle queries Testing accuracy Pr rejection δδ dd ff Decoding distance (δδ 0 above) Ideal: Query complexity OO dd (1), accuracy, dec. distance Ω dd (1) Terminology FF(dd, nn) testable (decodable) over SS if ideal achievable. Thms: For finite FF, FF(dd, nn) decodable over FF (folklore) and testable over FF ([Rubinfeld+S. 96]. [Kaufman+Ron 04]) January 11, 2018 ITCS: Polynomials over Grids 3 of 12
4 Polynomials over Grids Testing + decoding thms hold only for ff: FF nn FF Not surprising repeated occurrence with polynomials. Even classical decoding algorithms (non-local) work only in this case! [Kopparty-Kim 16]: Non-local Decoder (up to half the distance) for ff: SS nn FF for all finite SS This talk: Testing + decoding when SS = 0,1 grid (Note: equivalent to SS 1 SS nn with SS ii = 2) January 11, 2018 ITCS: Polynomials over Grids 4 of 12
5 Obstacles to decoding/testing Standard insight behind testing/decoding dd < FF ff has deg. dd iff ff restricted to lines has dd Can test/decode function on lines. Reduces complexity from FF nn to FF. When dd > FF use subspaces (= collection of linear restrictions) Affine invariance 2 transitivity Problem over grids: General lines don t stay within grid! Only linear restrictions that stay in grid: xx ii = 0 or xx ii = 1 xx ii = xx jj or xx ii = 1 xx jj (denoted xx ii = xx jj bb ) January 11, 2018 ITCS: Polynomials over Grids 5 of 12
6 Main Results Thm 1. FF(1, nn) not locally decodable over grid if char(ff) No 2-transitivity! Serious obstacle! Thm 2. FF(dd, nn) is locally decodable over grid if char FF <. O(max dd,char FF ) Query complexity = 2 Decoding without 2-transitivity! Thm 3. FF(dd, nn) is locally testable over grid ( FF) Testing without decoding! January 11, 2018 ITCS: Polynomials over Grids 6 of 12
7 Proofs: Not LDC over Q Idea dd = 1 : Consider ff = linear function that is erased on imbalanced points (of weight nn 2 cc nn, nn 2 + cc nn ) Claim 1: No local constraints over Q on balanced points and 0 nn Claim 1.1: if ff 0 nn = l ii=1 aa ii ff xx ii ff then 0 nn = l ii=1 aa ii xx ii Claim 1.2: 1 aa ii l! Claim 1.3: If xx 1,, xx l are εε-balanced jj jj then ii aa ii xx ii is εε ii aa ii Claim 2: No local constraints Not LDC Known over finite fields [BHR 04] Not immediate for Q -balanced January 11, 2018 ITCS: Polynomials over Grids 7 of 12
8 Proofs: LDC over small characteristic Given: ff δδ-close to gg FF(dd, nn), aa 0,1 nn (char FF = pp) Pick σσ: nn kk uniformly and let xx ii = aa ii yy σσ(ii) So considering ff yy 1,, yy kk = ff aa yy σσ : ff 0 = ff aa ; gg 0 = gg(aa) Claim 1: For balanced yy, have aa yy σσ aa Claim 2: If kk 2 = pptt and kk 2 > dd then gg (0) determined by gg (yy) yy = kk 2 (Usual ingredient Lucas s Theorem xx pp + yy pp = xx + yy pp ) January 11, 2018 ITCS: Polynomials over Grids 8 of 12
9 Proofs: LTC over all fields: Test Test Pick aa 0,1 nn uniformly and σσ: nn kk randomly Verify ff yy 1,, yy kk = ff aa yy σσ is of degree dd Randomly =? Not uniformly (don t know how to analyze). Instead random union-find Initially each xx ii in iith bucket. Iterate: pick two uniformly random buckets and merge till kk buckets left. Assign yy 1,, yy kk to kk buckets randomly. Allows for proof by induction January 11, 2018 ITCS: Polynomials over Grids 9 of 12
10 Proofs: LTC over all field: Analysis Key ingredients: (mimics BKSSZ analysis for RM) Main claim: Pr test rejects ff 2 OO(dd) min 1, δδ dd (ff) Proof by induction on nn with 3 cases: Case 1: ff moderately close to deg. dd Show that eventually ff disagrees from nearby poly on exactly one of 2 kk samples. Usual proof pairwise independence Our proof hypercontractivity of sphere [Polyanskiy] + prob. fact about random union-find Case 2: Pr ii,jj,bb ff xx ii =xx jj bb very close to deg. dd small Induction Case 3: ff far from deg. dd, but Pr ii,jj,bb high Use algebra to get contradiction. (Stitch different polynomials from diff. (ii, jj, bb) s to get nearby poly to ff) January 11, 2018 ITCS: Polynomials over Grids 10 of 12
11 Conclusions + Open questions Many aspects of polynomials well-understood only over domain = FF nn Grid setting (SS nn ) far less understood. When SS = {0,1} (equivalently SS = 2) testing possible without local decoding! (novel in context of low-degree tests!) General SS open!! (even SS = 3 or even SS = 0,1,2?) Is there a gap between characterizability and testability here? January 11, 2018 ITCS: Polynomials over Grids 11 of 12
12 Thank You! January 11, 2018 ITCS: Polynomials over Grids 12 of 12
Property Testing and Affine Invariance Part I Madhu Sudan Harvard University
Property Testing and Affine Invariance Part I Madhu Sudan Harvard University December 29-30, 2015 IITB: Property Testing & Affine Invariance 1 of 31 Goals of these talks Part I Introduce Property Testing
More informationLow-Degree Polynomials
Low-Degree Polynomials Madhu Sudan Harvard University October 7, 2016 Avi60!! Low-degree Polynomials 1 of 27 October 7, 2016 Avi60!! Low-degree Polynomials 2 of 27 Happy Birthday, Avi!! October 7, 2016
More informationGeneral Strong Polarization
General Strong Polarization Madhu Sudan Harvard University Joint work with Jaroslaw Blasiok (Harvard), Venkatesan Gurswami (CMU), Preetum Nakkiran (Harvard) and Atri Rudra (Buffalo) December 4, 2017 IAS:
More informationAlgebraic Codes and Invariance
Algebraic Codes and Invariance Madhu Sudan Harvard April 30, 2016 AAD3: Algebraic Codes and Invariance 1 of 29 Disclaimer Very little new work in this talk! Mainly: Ex- Coding theorist s perspective on
More informationLocality in Coding Theory
Locality in Coding Theory Madhu Sudan Harvard April 9, 2016 Skoltech: Locality in Coding Theory 1 Error-Correcting Codes (Linear) Code CC FF qq nn. FF qq : Finite field with qq elements. nn block length
More informationTwo Decades of Property Testing Madhu Sudan Harvard
Two Decades of Property Testing Madhu Sudan Harvard April 8, 2016 Two Decades of Property Testing 1 of 29 Kepler s Big Data Problem Tycho Brahe (~1550-1600): Wished to measure planetary motion accurately.
More informationGeneral Strong Polarization
General Strong Polarization Madhu Sudan Harvard University Joint work with Jaroslaw Blasiok (Harvard), Venkatesan Gurswami (CMU), Preetum Nakkiran (Harvard) and Atri Rudra (Buffalo) May 1, 018 G.Tech:
More informationUncertain Compression & Graph Coloring. Madhu Sudan Harvard
Uncertain Compression & Graph Coloring Madhu Sudan Harvard Based on joint works with: (1) Adam Kalai (MSR), Sanjeev Khanna (U.Penn), Brendan Juba (WUStL) (2) Elad Haramaty (Harvard) (3) Badih Ghazi (MIT),
More informationReed-Muller testing and approximating small set expansion & hypergraph coloring
Reed-Muller testing and approximating small set expansion & hypergraph coloring Venkatesan Guruswami Carnegie Mellon University (Spring 14 @ Microsoft Research New England) 2014 Bertinoro Workshop on Sublinear
More informationLow-Degree Testing. Madhu Sudan MSR. Survey based on many works. of /02/2015 CMSA: Low-degree Testing 1
Low-Degree Testing Madhu Sudan MSR Survey based on many works 09/02/2015 CMSA: Low-degree Testing 1 Kepler s Problem Tycho Brahe (~1550-1600): Wished to measure planetary motion accurately. To confirm
More informationGeneral Strong Polarization
General Strong Polarization Madhu Sudan Harvard University Joint work with Jaroslaw Blasiok (Harvard), Venkatesan Guruswami (CMU), Preetum Nakkiran (Harvard) and Atri Rudra (Buffalo) Oct. 5, 018 Stanford:
More informationGeneral Strong Polarization
General Strong Polarization Madhu Sudan Harvard University Joint work with Jaroslaw Blasiok (Harvard), Venkatesan Guruswami (CMU), Preetum Nakkiran (Harvard) and Atri Rudra (Buffalo) Oct. 8, 018 Berkeley:
More informationTwo Decades of Property Testing
Two Decades of Property Testing Madhu Sudan Microsoft Research 12/09/2014 Invariance in Property Testing @MIT 1 of 29 Kepler s Big Data Problem Tycho Brahe (~1550-1600): Wished to measure planetary motion
More informationFully Understanding the Hashing Trick
Fully Understanding the Hashing Trick Lior Kamma, Aarhus University Joint work with Casper Freksen and Kasper Green Larsen. Recommendation and Classification PG-13 Comic Book Super Hero Sci Fi Adventure
More informationTesting Affine-Invariant Properties
Testing Affine-Invariant Properties Madhu Sudan Microsoft Surveys: works with/of Eli Ben-Sasson, Elena Grigorescu, Tali Kaufman, Shachar Lovett, Ghid Maatouk, Amir Shpilka. May 23-28, 2011 Bertinoro: Testing
More informationApproximate Second Order Algorithms. Seo Taek Kong, Nithin Tangellamudi, Zhikai Guo
Approximate Second Order Algorithms Seo Taek Kong, Nithin Tangellamudi, Zhikai Guo Why Second Order Algorithms? Invariant under affine transformations e.g. stretching a function preserves the convergence
More informationWorksheets for GCSE Mathematics. Quadratics. mr-mathematics.com Maths Resources for Teachers. Algebra
Worksheets for GCSE Mathematics Quadratics mr-mathematics.com Maths Resources for Teachers Algebra Quadratics Worksheets Contents Differentiated Independent Learning Worksheets Solving x + bx + c by factorisation
More informationSub-Constant Error Low Degree Test of Almost Linear Size
Sub-Constant rror Low Degree Test of Almost Linear Size Dana Moshkovitz Ran Raz March 9, 2006 Abstract Given a function f : F m F over a finite field F, a low degree tester tests its agreement with an
More informationInvariance in Property Testing
Invariance in Property Testing Madhu Sudan Microsoft Research Based on: works with/of Eli Ben-Sasson, Elena Grigorescu, Tali Kaufman, Shachar Lovett, Ghid Maatouk, Amir Shpilka. February 22, 2012 Invariance
More informationHighly resilient correctors for polynomials
Highly resilient correctors for polynomials Peter Gemmell Madhu Sudan Abstract We consider the problem of correcting programs that compute multivariate polynomials over large finite fields and give an
More informationLecture 8 (Notes) 1. The book Computational Complexity: A Modern Approach by Sanjeev Arora and Boaz Barak;
Topics in Theoretical Computer Science April 18, 2016 Lecturer: Ola Svensson Lecture 8 (Notes) Scribes: Ola Svensson Disclaimer: These notes were written for the lecturer only and may contain inconsistent
More informationSupport Vector Machines. CSE 4309 Machine Learning Vassilis Athitsos Computer Science and Engineering Department University of Texas at Arlington
Support Vector Machines CSE 4309 Machine Learning Vassilis Athitsos Computer Science and Engineering Department University of Texas at Arlington 1 A Linearly Separable Problem Consider the binary classification
More information7.3 The Jacobi and Gauss-Seidel Iterative Methods
7.3 The Jacobi and Gauss-Seidel Iterative Methods 1 The Jacobi Method Two assumptions made on Jacobi Method: 1.The system given by aa 11 xx 1 + aa 12 xx 2 + aa 1nn xx nn = bb 1 aa 21 xx 1 + aa 22 xx 2
More informationHomomorphism Testing
Homomorphism Shpilka & Wigderson, 2006 Daniel Shahaf Tel-Aviv University January 2009 Table of Contents 1 2 3 1 / 26 Algebra Definitions 1 Algebra Definitions 2 / 26 Groups Algebra Definitions Definition
More informationCS 151 Complexity Theory Spring Solution Set 5
CS 151 Complexity Theory Spring 2017 Solution Set 5 Posted: May 17 Chris Umans 1. We are given a Boolean circuit C on n variables x 1, x 2,..., x n with m, and gates. Our 3-CNF formula will have m auxiliary
More informationLearning and Fourier Analysis
Learning and Fourier Analysis Grigory Yaroslavtsev http://grigory.us CIS 625: Computational Learning Theory Fourier Analysis and Learning Powerful tool for PAC-style learning under uniform distribution
More informationOn the Fourier spectrum of symmetric Boolean functions
On the Fourier spectrum of symmetric Boolean functions Amir Shpilka Technion and MSR NE Based on joint work with Avishay Tal 1 Theme: Analysis of Boolean functions Pick favorite representation: Fourier
More informationLow Rate Is Insufficient for Local Testability
Electronic Colloquium on Computational Complexity, Revision 2 of Report No. 4 (200) Low Rate Is Insufficient for Local Testability Eli Ben-Sasson Michael Viderman Computer Science Department Technion Israel
More informationcompare to comparison and pointer based sorting, binary trees
Admin Hashing Dictionaries Model Operations. makeset, insert, delete, find keys are integers in M = {1,..., m} (so assume machine word size, or unit time, is log m) can store in array of size M using power:
More informationIntroduction Long transparent proofs The real PCP theorem. Real Number PCPs. Klaus Meer. Brandenburg University of Technology, Cottbus, Germany
Santaló s Summer School, Part 3, July, 2012 joint work with Martijn Baartse (work supported by DFG, GZ:ME 1424/7-1) Outline 1 Introduction 2 Long transparent proofs for NP R 3 The real PCP theorem First
More informationA Posteriori Error Estimates For Discontinuous Galerkin Methods Using Non-polynomial Basis Functions
Lin Lin A Posteriori DG using Non-Polynomial Basis 1 A Posteriori Error Estimates For Discontinuous Galerkin Methods Using Non-polynomial Basis Functions Lin Lin Department of Mathematics, UC Berkeley;
More informationRecent Developments on Circuit Satisfiability Algorithms
Recent Developments on Circuit Satisfiability Algorithms Suguru TAMAKI Kyoto University Fine-Grained Complexity and Algorithm Design Reunion, December 14, 2016, Simons Institute, Berkeley, CA After the
More informationTesting by Implicit Learning
Testing by Implicit Learning Rocco Servedio Columbia University ITCS Property Testing Workshop Beijing January 2010 What this talk is about 1. Testing by Implicit Learning: method for testing classes of
More informationPower of Adiabatic Quantum Computation
Power of Adiabatic Quantum Computation Itay Hen Information Sciences Institute, USC Physics Colloquium, USC February 10, 2014 arxiv preprints: 1207.1712, 1301.4956, 1307.6538, 1401.5172 Motivation in what
More informationCrash course Verification of Finite Automata Binary Decision Diagrams
Crash course Verification of Finite Automata Binary Decision Diagrams Exercise session 10 Xiaoxi He 1 Equivalence of representations E Sets A B A B Set algebra,, ψψ EE = 1 ψψ AA = ff ψψ BB = gg ψψ AA BB
More informationLecture No. 1 Introduction to Method of Weighted Residuals. Solve the differential equation L (u) = p(x) in V where L is a differential operator
Lecture No. 1 Introduction to Method of Weighted Residuals Solve the differential equation L (u) = p(x) in V where L is a differential operator with boundary conditions S(u) = g(x) on Γ where S is a differential
More informationClassical RSA algorithm
Classical RSA algorithm We need to discuss some mathematics (number theory) first Modulo-NN arithmetic (modular arithmetic, clock arithmetic) 9 (mod 7) 4 3 5 (mod 7) congruent (I will also use = instead
More informationInternational Journal of Mathematical Archive-5(3), 2014, Available online through ISSN
International Journal of Mathematical Archive-5(3), 214, 189-195 Available online through www.ijma.info ISSN 2229 546 COMMON FIXED POINT THEOREMS FOR OCCASIONALLY WEAKLY COMPATIBLE MAPPINGS IN INTUITIONISTIC
More informationInternational Journal of Mathematical Archive-5(12), 2014, Available online through ISSN
International Journal of Mathematical Archive-5(12), 2014, 75-79 Available online through www.ijma.info ISSN 2229 5046 ABOUT WEAK ALMOST LIMITED OPERATORS A. Retbi* and B. El Wahbi Université Ibn Tofail,
More informationDefinition: A sequence is a function from a subset of the integers (usually either the set
Math 3336 Section 2.4 Sequences and Summations Sequences Geometric Progression Arithmetic Progression Recurrence Relation Fibonacci Sequence Summations Definition: A sequence is a function from a subset
More informationMath 3336 Section 4.3 Primes and Greatest Common Divisors. Prime Numbers and their Properties Conjectures and Open Problems About Primes
Math 3336 Section 4.3 Primes and Greatest Common Divisors Prime Numbers and their Properties Conjectures and Open Problems About Primes Greatest Common Divisors and Least Common Multiples The Euclidian
More informationVariations. ECE 6540, Lecture 02 Multivariate Random Variables & Linear Algebra
Variations ECE 6540, Lecture 02 Multivariate Random Variables & Linear Algebra Last Time Probability Density Functions Normal Distribution Expectation / Expectation of a function Independence Uncorrelated
More informationGrover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick
Grover s algorithm Search in an unordered database Example: phonebook, need to find a person from a phone number Actually, something else, like hard (e.g., NP-complete) problem 0, xx aa Black box ff xx
More information: Error Correcting Codes. October 2017 Lecture 1
03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of
More informationAlgebraic Property Testing: The Role of Invariance
Algebraic Property Testing: The Role of Invariance Tali Kaufman Madhu Sudan November 2, 2007 Abstract We argue that the symmetries of a property being tested play a central role in property testing. We
More informationQuantum Chosen-Ciphertext Attacks against Feistel Ciphers
SESSION ID: CRYP-R09 Quantum Chosen-Ciphertext Attacks against Feistel Ciphers Gembu Ito Nagoya University Joint work with Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki and Tetsu Iwata Overview 3-round
More informationCompressed representation of Kohn-Sham orbitals via selected columns of the density matrix
Lin Lin Compressed Kohn-Sham Orbitals 1 Compressed representation of Kohn-Sham orbitals via selected columns of the density matrix Lin Lin Department of Mathematics, UC Berkeley; Computational Research
More informationSymmetric LDPC codes are not necessarily locally testable
Symmetric LDPC codes are not necessarily locally testable Eli Ben-Sasson, Ghid Maatouk, Amir Shpilka, and Madhu Sudan Faculty of Computer Science, Technion, Haifa, Israel, eli,shpilka@cs.technion.ac.il
More informationMath 95--Review Prealgebra--page 1
Math 95--Review Prealgebra--page 1 Name Date In order to do well in algebra, there are many different ideas from prealgebra that you MUST know. Some of the main ideas follow. If these ideas are not just
More informationQuestions Pool. Amnon Ta-Shma and Dean Doron. January 2, Make sure you know how to solve. Do not submit.
Questions Pool Amnon Ta-Shma and Dean Doron January 2, 2017 General guidelines The questions fall into several categories: (Know). (Mandatory). (Bonus). Make sure you know how to solve. Do not submit.
More informationThe Tensor Product of Two Codes is Not Necessarily Robustly Testable
The Tensor Product of Two Codes is Not Necessarily Robustly Testable Paul Valiant Massachusetts Institute of Technology pvaliant@mit.edu Abstract. There has been significant interest lately in the task
More informationTHE KENNESAW STATE UNIVERSITY HIGH SCHOOL MATHEMATICS COMPETITION PART II Calculators are NOT permitted Time allowed: 2 hours
THE 018-019 KENNESAW STATE UNIVERSITY HIGH SCHOOL MATHEMATICS COMPETITION PART II Calculators are NOT permitted Time allowed: hours 1 Let m be a three-digit integer with distinct digits Find all such integers
More informationM.5 Modeling the Effect of Functional Responses
M.5 Modeling the Effect of Functional Responses The functional response is referred to the predation rate as a function of the number of prey per predator. It is recognized that as the number of prey increases,
More informationIntroduction to Algorithms
Introduction to Algorithms 6.046J/18.401J LECTURE 14 Shortest Paths I Properties of shortest paths Dijkstra s algorithm Correctness Analysis Breadth-first search Prof. Charles E. Leiserson Paths in graphs
More informationTesting Lipschitz Functions on Hypergrid Domains
Testing Lipschitz Functions on Hypergrid Domains Pranjal Awasthi 1, Madhav Jha 2, Marco Molinaro 1, and Sofya Raskhodnikova 2 1 Carnegie Mellon University, USA, {pawasthi,molinaro}@cmu.edu. 2 Pennsylvania
More informationTesting Low-Degree Polynomials over Prime Fields
Testing Low-Degree Polynomials over Prime Fields Charanjit S. Jutla IBM Thomas J. Watson Research Center, Yorktown Heights, NY 0598 csjutla@watson.ibm.com Atri Rudra Dept. of Computer Science & Engineering
More informationCryptography CS 555. Topic 22: Number Theory/Public Key-Cryptography
Cryptography CS 555 Topic 22: Number Theory/Public Key-Cryptography 1 Exam Recap 2 Exam Recap Highest Average Score on Question Question 4: (Feistel Network with round function f(x) = 0 n ) Tougher Questions
More informationAngular Momentum, Electromagnetic Waves
Angular Momentum, Electromagnetic Waves Lecture33: Electromagnetic Theory Professor D. K. Ghosh, Physics Department, I.I.T., Bombay As before, we keep in view the four Maxwell s equations for all our discussions.
More informationRecurrence Relations
Recurrence Relations Recurrence Relations Reading (Epp s textbook) 5.6 5.8 1 Recurrence Relations A recurrence relation for a sequence aa 0, aa 1, aa 2, ({a n }) is a formula that relates each term a k
More informationLecture 6. k+1 n, wherein n =, is defined for a given
(67611) Advanced Topics in Complexity: PCP Theory November 24, 2004 Lecturer: Irit Dinur Lecture 6 Scribe: Sharon Peri Abstract In this lecture we continue our discussion of locally testable and locally
More informationTwo Query PCP with Sub-Constant Error
Electronic Colloquium on Computational Complexity, Report No 71 (2008) Two Query PCP with Sub-Constant Error Dana Moshkovitz Ran Raz July 28, 2008 Abstract We show that the N P-Complete language 3SAT has
More informationPCP Theorem and Hardness of Approximation
PCP Theorem and Hardness of Approximation An Introduction Lee Carraher and Ryan McGovern Department of Computer Science University of Cincinnati October 27, 2003 Introduction Assuming NP P, there are many
More informationTowards the Sliding Scale Conjecture (Old & New PCP constructions)
Towards the Sliding Scale Conjecture (Old & New PCP constructions) Prahladh Harsha TIFR [Based on joint works with Irit Dinur & Guy Kindler] Outline Intro, Background & Context Goals and questions in this
More informationPredicting Winners of Competitive Events with Topological Data Analysis
Predicting Winners of Competitive Events with Topological Data Analysis Conrad D Souza Ruben Sanchez-Garcia R.Sanchez-Garcia@soton.ac.uk Tiejun Ma tiejun.ma@soton.ac.uk Johnnie Johnson J.E.Johnson@soton.ac.uk
More informationLecture 6. Notes on Linear Algebra. Perceptron
Lecture 6. Notes on Linear Algebra. Perceptron COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Andrey Kan Copyright: University of Melbourne This lecture Notes on linear algebra Vectors
More informationControl of Mobile Robots
Control of Mobile Robots Regulation and trajectory tracking Prof. Luca Bascetta (luca.bascetta@polimi.it) Politecnico di Milano Dipartimento di Elettronica, Informazione e Bioingegneria Organization and
More informationSymmetric LDPC codes are not necessarily locally testable
Symmetric LDPC codes are not necessarily locally testable Eli Ben-Sasson Ghid Maatouk Amir Shpilka Madhu Sudan Abstract Locally testable codes, i.e., codes where membership in the code is testable with
More informationOn Axis-Parallel Tests for Tensor Product Codes
Electronic Colloquium on Computational Complexity, Report No. 110 (2017) On Axis-Parallel Tests for Tensor Product Codes Alessandro Chiesa alexch@berkeley.edu UC Berkeley Peter Manohar manohar@berkeley.edu
More informationSolar Photovoltaics & Energy Systems
Solar Photovoltaics & Energy Systems Lecture 3. Solar energy conversion with band-gap materials ChE-600 Kevin Sivula, Spring 2014 The Müser Engine with a concentrator T s Q 1 = σσ CffT ss 4 + 1 Cff T pp
More informationBig Bang Planck Era. This theory: cosmological model of the universe that is best supported by several aspects of scientific evidence and observation
Big Bang Planck Era Source: http://www.crystalinks.com/bigbang.html Source: http://www.odec.ca/index.htm This theory: cosmological model of the universe that is best supported by several aspects of scientific
More informationB(w, z, v 1, v 2, v 3, A(v 1 ), A(v 2 ), A(v 3 )).
Lecture 13 PCP Continued Last time we began the proof of the theorem that PCP(poly, poly) = NEXP. May 13, 2004 Lecturer: Paul Beame Notes: Tian Sang We showed that IMPLICIT-3SAT is NEXP-complete where
More informationLecture 22. m n c (k) i,j x i x j = c (k) k=1
Notes on Complexity Theory Last updated: June, 2014 Jonathan Katz Lecture 22 1 N P PCP(poly, 1) We show here a probabilistically checkable proof for N P in which the verifier reads only a constant number
More informationLearning and Fourier Analysis
Learning and Fourier Analysis Grigory Yaroslavtsev http://grigory.us Slides at http://grigory.us/cis625/lecture2.pdf CIS 625: Computational Learning Theory Fourier Analysis and Learning Powerful tool for
More information1. The graph of a function f is given above. Answer the question: a. Find the value(s) of x where f is not differentiable. Ans: x = 4, x = 3, x = 2,
1. The graph of a function f is given above. Answer the question: a. Find the value(s) of x where f is not differentiable. x = 4, x = 3, x = 2, x = 1, x = 1, x = 2, x = 3, x = 4, x = 5 b. Find the value(s)
More informationMath 3 Unit 3: Polynomial Functions
Math 3 Unit 3: Polynomial Functions Unit Title Standards 3.1 End Behavior of Polynomial Functions F.IF.7c 3.2 Graphing Polynomial Functions F.IF.7c, A.APR3 3.3 Writing Equations of Polynomial Functions
More information10.4 The Cross Product
Math 172 Chapter 10B notes Page 1 of 9 10.4 The Cross Product The cross product, or vector product, is defined in 3 dimensions only. Let aa = aa 1, aa 2, aa 3 bb = bb 1, bb 2, bb 3 then aa bb = aa 2 bb
More information6.895 PCP and Hardness of Approximation MIT, Fall Lecture 3: Coding Theory
6895 PCP and Hardness of Approximation MIT, Fall 2010 Lecture 3: Coding Theory Lecturer: Dana Moshkovitz Scribe: Michael Forbes and Dana Moshkovitz 1 Motivation In the course we will make heavy use of
More informationRobust local testability of tensor products of LDPC codes
Robust local testability of tensor products of LDPC codes Irit Dinur 1, Madhu Sudan, and Avi Wigderson 3 1 Hebrew University, Jerusalem, Israel. dinuri@cs.huji.ac.il Massachusetts Institute of Technology,
More informationCompatible probability measures
Coin tossing space Think of a coin toss as a random choice from the two element set {0,1}. Thus the set {0,1} n represents the set of possible outcomes of n coin tosses, and Ω := {0,1} N, consisting of
More informationPHY103A: Lecture # 4
Semester II, 2017-18 Department of Physics, IIT Kanpur PHY103A: Lecture # 4 (Text Book: Intro to Electrodynamics by Griffiths, 3 rd Ed.) Anand Kumar Jha 10-Jan-2018 Notes The Solutions to HW # 1 have been
More informationLecture 6. Today we shall use graph entropy to improve the obvious lower bound on good hash functions.
CSE533: Information Theory in Computer Science September 8, 010 Lecturer: Anup Rao Lecture 6 Scribe: Lukas Svec 1 A lower bound for perfect hash functions Today we shall use graph entropy to improve the
More informationNumber Representations
Computer Arithmetic Algorithms Prof. Dae Hyun Kim School of Electrical Engineering and Computer Science Washington State University Number Representations Information Textbook Israel Koren, Computer Arithmetic
More informationWork, Energy, and Power. Chapter 6 of Essential University Physics, Richard Wolfson, 3 rd Edition
Work, Energy, and Power Chapter 6 of Essential University Physics, Richard Wolfson, 3 rd Edition 1 With the knowledge we got so far, we can handle the situation on the left but not the one on the right.
More informationPolynomial Representations of Threshold Functions and Algorithmic Applications. Joint with Josh Alman (Stanford) and Timothy M.
Polynomial Representations of Threshold Functions and Algorithmic Applications Ryan Williams Stanford Joint with Josh Alman (Stanford) and Timothy M. Chan (Waterloo) Outline The Context: Polynomial Representations,
More informationIntroduction to Algorithms
Introduction to Algorithms 6.046J/18.401J LECTURE 17 Shortest Paths I Properties of shortest paths Dijkstra s algorithm Correctness Analysis Breadth-first search Prof. Erik Demaine November 14, 005 Copyright
More information2.4 Error Analysis for Iterative Methods
2.4 Error Analysis for Iterative Methods 1 Definition 2.7. Order of Convergence Suppose {pp nn } nn=0 is a sequence that converges to pp with pp nn pp for all nn. If positive constants λλ and αα exist
More informationCS60020: Foundations of Algorithm Design and Machine Learning. Sourangshu Bhattacharya
CS6000: Foundations of Algorithm Design and Machine Learning Sourangshu Bhattacharya Paths in graphs Consider a digraph G = (V, E) with edge-weight function w : E R. The weight of path p = v 1 v L v k
More informationRelaxed Locally Correctable Codes in Computationally Bounded Channels
Relaxed Locally Correctable Codes in Computationally Bounded Channels Elena Grigorescu (Purdue) Joint with Jeremiah Blocki (Purdue), Venkata Gandikota (JHU), Samson Zhou (Purdue) Classical Locally Decodable/Correctable
More informationCourse Business. Homework 3 Due Now. Homework 4 Released. Professor Blocki is travelling, but will be back next week
Course Business Homework 3 Due Now Homework 4 Released Professor Blocki is travelling, but will be back next week 1 Cryptography CS 555 Week 11: Discrete Log/DDH Applications of DDH Factoring Algorithms,
More informationMath 3 Unit 3: Polynomial Functions
Math 3 Unit 3: Polynomial Functions Unit Title Standards 3.1 End Behavior of Polynomial Functions F.IF.7c 3.2 Graphing Polynomial Functions F.IF.7c, A.APR3 3.3 Writing Equations of Polynomial Functions
More informationTesting Low-Degree Polynomials over GF (2)
Testing Low-Degree Polynomials over GF (2) Noga Alon Tali Kaufman Michael Krivelevich Simon Litsyn Dana Ron July 9, 2003 Abstract We describe an efficient randomized algorithm to test if a given binary
More informationWith P. Berman and S. Raskhodnikova (STOC 14+). Grigory Yaroslavtsev Warren Center for Network and Data Sciences
L p -Testing With P. Berman and S. Raskhodnikova (STOC 14+). Grigory Yaroslavtsev Warren Center for Network and Data Sciences http://grigory.us Property Testing [Goldreich, Goldwasser, Ron; Rubinfeld,
More informationHopfield Network for Associative Memory
CSE 5526: Introduction to Neural Networks Hopfield Network for Associative Memory 1 The next few units cover unsupervised models Goal: learn the distribution of a set of observations Some observations
More informationIntroduction to Algorithms
Introduction to Algorithms 6.046J/8.40J/SMA550 Lecture 7 Prof. Erik Demaine Paths in graphs Consider a digraph G = (V, E) with edge-weight function w : E R. The weight of path p = v v L v k is defined
More informationMath, Stats, and Mathstats Review ECONOMETRICS (ECON 360) BEN VAN KAMMEN, PHD
Math, Stats, and Mathstats Review ECONOMETRICS (ECON 360) BEN VAN KAMMEN, PHD Outline These preliminaries serve to signal to students what tools they need to know to succeed in ECON 360 and refresh their
More informationWorksheets for GCSE Mathematics. Algebraic Expressions. Mr Black 's Maths Resources for Teachers GCSE 1-9. Algebra
Worksheets for GCSE Mathematics Algebraic Expressions Mr Black 's Maths Resources for Teachers GCSE 1-9 Algebra Algebraic Expressions Worksheets Contents Differentiated Independent Learning Worksheets
More informationProf. Dr.-Ing. Armin Dekorsy Department of Communications Engineering. Stochastic Processes and Linear Algebra Recap Slides
Prof. Dr.-Ing. Armin Dekorsy Department of Communications Engineering Stochastic Processes and Linear Algebra Recap Slides Stochastic processes and variables XX tt 0 = XX xx nn (tt) xx 2 (tt) XX tt XX
More information15-251: Great Theoretical Ideas In Computer Science Recitation 9 : Randomized Algorithms and Communication Complexity Solutions
15-251: Great Theoretical Ideas In Computer Science Recitation 9 : Randomized Algorithms and Communication Complexity Solutions Definitions We say a (deterministic) protocol P computes f if (x, y) {0,
More informationLecture 4: Codes based on Concatenation
Lecture 4: Codes based on Concatenation Error-Correcting Codes (Spring 206) Rutgers University Swastik Kopparty Scribe: Aditya Potukuchi and Meng-Tsung Tsai Overview In the last lecture, we studied codes
More informationHigher-order Fourier Analysis over Finite Fields, and Applications. Pooya Hatami
Higher-order Fourier Analysis over Finite Fields, and Applications Pooya Hatami Coding Theory: Task: Reliably transmit a message through an unreliable channel. m F k 2 c m F N 2 Coding Theory: Task: Reliably
More information