Algebraic Codes and Invariance

Size: px
Start display at page:

Download "Algebraic Codes and Invariance"

Transcription

1 Algebraic Codes and Invariance Madhu Sudan Harvard April 30, 2016 AAD3: Algebraic Codes and Invariance 1 of 29

2 Disclaimer Very little new work in this talk! Mainly: Ex- Coding theorist s perspective on Algebraic and Algebraic-Geometric Codes What additional properties it would be nice to have in algebraic-geometry codes. April 30, 2016 AAD3: Algebraic Codes and Invariance 2 of 29

3 Outline of the talk Part 1: Codes and Algebraic Codes Part 2: Combinatorics of Algebraic Codes Fundamental theorem(s) of algebra Part 3: Algorithmics of Algebraic Codes Product property Part 4: Locality of (some) Algebraic Codes Invariances Part 5: Conclusions April 30, 2016 AAD3: Algebraic Codes and Invariance 3 of 29

4 Part 1: Basic Definitions April 30, 2016 AAD3: Algebraic Codes and Invariance 4 of 29

5 Error-correcting codes Notation: FF qq - finite field of cardinality qq Encoding function: messages codewords EE: FF qq kk FF qq nn ; associated Code CC EE mm mm FF qq kk } Key parameters: Rate RR CC = kk/nn ; Distance δδ CC = min {δδ xx, yy }. xx yy CC δδ xx, yy = ii xx ii yy ii nn Pigeonhole Principle RR CC + δδ CC nn Algebraic codes: Get very close to this limit! April 30, 2016 AAD3: Algebraic Codes and Invariance 5 of 29

6 Algorithmic tasks Encoding: Compute EE mm given mm. Testing: Given rr FF qq nn, decide if mm s. t. rr = EE(mm)? Decoding: Given rr FF qq nn, compute mm minimizing δδ(ee mm, rr) [All linear codes nicely encodable, but algebraic ones efficiently (list) decodable.] Locality Perform tasks (testing/decoding) in oo nn time. Assume random access to rr Suffices to decode mm ii, for given ii [kk] [Many algebraic codes locally decodable and testable!] April 30, 2016 AAD3: Algebraic Codes and Invariance 6 of 29

7 Algebraic Codes? General paradigm: Message space = (Vector) space of functions Coordinates = Subset of domain of functions Encoding Messages = evaluations = FF rr qq [xx 1, of, xxmessage mm ] on domain Examples: Reed-Solomon Codes: Domain Reed-Muller = (subset Codes: of) FF qq Messages = mm Domain = FF FF kk qq qq [xx] (univ. poly. of deg. kk) Algebraic-Geometry Codes: mm Domain = Rational points of irred. curve in FF qq (mm-var poly. of deg. rr) Messages = Functions of bounded order Reed-Solomon Codes Reed-Muller Codes Algebraic-Geometric Codes Others (BCH codes, dual BCH codes ) April 30, 2016 AAD3: Algebraic Codes and Invariance 7 of 29

8 Part 2: Combinatorics Fund. Thm April 30, 2016 AAD3: Algebraic Codes and Invariance 8 of 29

9 Essence of combinatorics Rate of code Dimension of vector space Distance of code Scarcity of roots Univ poly of deg kk has kk roots. Multiv poly of deg kk has kk qq fraction roots. Functions of order kk have fewer than kk roots [Bezout, Riemann-Roch, Ihara, Drinfeld- Vladuts] [Goppa, Tsfasman-Vladuts-Zink, Garcia- Stichtenoth] April 30, 2016 AAD3: Algebraic Codes and Invariance 9 of 29

10 Consequences qq nn codes CC satisfying RR CC + δδ CC = nn For infinitely many qq, there exist infinitely many nn, and codes CC qq,nn over FF qq satisfying RR CC qq,nn + δδ CC qq,nn 1 1 qq 1 Many codes that are better than random codes Reed-Solomon, Reed-Muller of order 1, AG, BCH, dual BCH Moral: Distance property Algebra! April 30, 2016 AAD3: Algebraic Codes and Invariance 10 of 29

11 Part 3: Algorithmics Product property April 30, 2016 AAD3: Algebraic Codes and Invariance 11 of 29

12 Remarkable algorithmics Combinatorial implications: Code of distance δδ Corrects δδ 2 fraction errors uniquely. Corrects 1 lists. Algorithmically? 1 δδ fraction errors with small For all known algebraic codes, above can be matched! Why? April 30, 2016 AAD3: Algebraic Codes and Invariance 12 of 29

13 Product property Reed-Solomon Codes: For vectors uu, vv FF nn nn qq, let uu vv FF qq denote their coordinate-wise CC = deg kk poly product. EE = deg nn kk poly 2 For linear codes AA, BB FF nn qq, let AA BB = span aa bb aa AA, bb BB} EE CC = deg nn+kk 2 poly Obvious, but remarkable, feature: For every known algebraic code CC of distance δδ code EE of dimension δδ 2 nn s.t. EE CC is a code of distance δδ 2. Terminology: EE, EE CC error-locating pair for CC April 30, 2016 AAD3: Algebraic Codes and Invariance 13 of 29

14 Unique decoding by error-locating pairs nn Given rr FF qq : Find xx CC s.t. δδ xx, rr δδ 2 Algorithm Step 1: Find ee EE, ff EE CC s.t. ee rr = ff [Linear system] [Pellikaan], [Koetter], [Duursma] 90s Step 2: Find xx CC s.t. ee xx = ff [Linear system again!] Analysis: Solution to Step 1 exists? Yes provided dim EE > #errors Solution to Step 2 xx = xx? Yes Provided δδ EE CC large enough. April 30, 2016 AAD3: Algebraic Codes and Invariance 14 of 29

15 List decoding abstraction Increasing basis sequence bb 1, bb 2, CC ii span bb 1,, bb ii δδ CC ii nn ii + oo nn bb ii bb jj CC ii+jj ( CC ii CC jj CC ii+jj ) Reed-Solomon Codes: [Guruswami, Sahai, S. 2000s] List-decoding bb algorithms ii = xx ii (or its evaluations etc.) correcting 1 1 δδ fraction errors exist for codes with increasing basis sequences. (Increasing basis Error-locating pairs) April 30, 2016 AAD3: Algebraic Codes and Invariance 15 of 29

16 Part 4: Locality Invariances April 30, 2016 AAD3: Algebraic Codes and Invariance 16 of 29

17 Locality in Codes General motivation: Does correcting linear fraction of errors require scanning the whole code? Does testing? Deterministically: Yes! Probabilistically? Not necessarily!! If possible, potentially a very useful concept Definitely in other mathematical settings PCPs, Small-set expanders, Hardness amplification, Private information retrieval Maybe even in practice April 30, 2016 AAD3: Algebraic Codes and Invariance 17 of 29

18 Locality of some algebraic codes Locality is a rare phenomenon. Reed-Solomon codes are not local. Random codes are not local. AG codes are (usually) not local. Basic examples are algebraic and a few composition operators preserve it. Canonical example: Reed-Muller Codes = lowdegree polynomials. April 30, 2016 AAD3: Algebraic Codes and Invariance 18 of 29

19 Main Example: Reed-Muller Codes Message = multivariate polynomial; Encoding = evaluations everywhere. RM mm, rr, qq = { ff αα αα FFqq mm ff FF q xx 1,, xx mm, deg ff rr} Locality? (when rr < qq) Restrictions of low-degree polynomials to lines yield low-degree (univ.) polys. Random lines sample FF qq mm uniformly (pairwise ind ly) Locality ~ qq April 30, 2016 AAD3: Algebraic Codes and Invariance 19 of 29

20 Locality? Necessary condition: Small (local) constraints. Examples deg ff 1 ff xx + ff xx + 2yy = 2ff xx + yy ff llllllll has low-degree (so values on line are not arbitrary) Local Constraints local decoding/testing? No! Transitivity + locality? April 30, 2016 AAD3: Algebraic Codes and Invariance 20 of 29

21 Symmetry in codes AAAAAA CC ππ SS nn xx CC, xx ππ CC} Well-studied concept. Cyclic codes Basic algebraic codes (Reed-Solomon, Reed- Muller, BCH) symmetric under affine group Domain is vector space FF QQ tt (where QQ tt = nn) Code invariant under non-singular affine transforms from FF QQ tt FF QQ tt April 30, 2016 AAD3: Algebraic Codes and Invariance 21 of 29

22 Symmetry and Locality Code has l-local constraint + 2-transitive Code is l-locally decodable from OO 1 -fraction errors. l 2-transitive? ii jj, kk ll ππ Aut CC s. t. ππ ii = kk, ππ jj = ll Why? Suppose constraint ff aa = ff bb + ff cc + ff dd Wish to determine ff xx Find random ππ Aut CC s.t. ππ aa = xx; ff xx = ff ππ bb + ff ππ cc + ff(ππ dd ); ππ bb, ππ cc, ππ (dd) random, ind. of xx April 30, 2016 AAD3: Algebraic Codes and Invariance 22 of 29

23 Symmetry + Locality - II Local constraint + affine-invariance Local testing specifically Theorem [Kaufman-S. 08]: CC l-local constraint & is FF QQ tt -affine-invariant CC is l (l, QQ)-locally testable. Theorem [Ben-Sasson,Kaplan,Kopparty,Meir] CC has product property & 1-transitive CC 1- transitive and locally testable and product property Theorem [B-S,K,K,M,Stichtenoth] Such CC exists. (CC = AG code) April 30, 2016 AAD3: Algebraic Codes and Invariance 23 of 29

24 Aside: Recent Progress in Locality - 1 [Yekhanin,Efremenko 06]: 3-Locally decodable codes of subexponential length. [Kopparty-Meir-RonZewi-Saraf 15]: nn oo(1) -locally decodable codes w. RR + δδ 1 log nn log nn -locally testable codes w. RR + δδ 1 Codes not symmetric, but based on symmetric codes. April 30, 2016 AAD3: Algebraic Codes and Invariance 24 of 29

25 Aside 2: Symmetric Ingredients Lifted Codes [Guo-Kopparty-S. 13] CC mm,dd,qq = ff: FF mm qq FF qq deg ff llllllll dd llllllll Multiplicity Codes [Kopparty-Saraf-Yekhanin 10] Message = biv. polynomial Encode ff via evaluations of (ff, ff xx, ff yy ) April 30, 2016 AAD3: Algebraic Codes and Invariance 25 of 29

26 Part 5: Conclusions April 30, 2016 AAD3: Algebraic Codes and Invariance 26 of 29

27 Remarkable properties of Algebraic Codes Strikingly strong combinatorially: Often only proof that extreme choices of parameters are feasible. Algorithmically tractable! The product property! Surprisingly versatile Broad search space (domain, space of functions) April 30, 2016 AAD3: Algebraic Codes and Invariance 27 of 29

28 Quest for future Construct algebraic geometric codes with rich symmetries. In general points on curve have few(er) symmetries. Can we construct curve carefully? Symmetry inherently? Symmetry by design? Still work to be done for specific applications. April 30, 2016 AAD3: Algebraic Codes and Invariance 28 of 29

29 Thank You! April 30, 2016 AAD3: Algebraic Codes and Invariance 29 of 29

Locality in Coding Theory

Locality in Coding Theory Locality in Coding Theory Madhu Sudan Harvard April 9, 2016 Skoltech: Locality in Coding Theory 1 Error-Correcting Codes (Linear) Code CC FF qq nn. FF qq : Finite field with qq elements. nn block length

More information

Property Testing and Affine Invariance Part I Madhu Sudan Harvard University

Property Testing and Affine Invariance Part I Madhu Sudan Harvard University Property Testing and Affine Invariance Part I Madhu Sudan Harvard University December 29-30, 2015 IITB: Property Testing & Affine Invariance 1 of 31 Goals of these talks Part I Introduce Property Testing

More information

Local Decoding and Testing Polynomials over Grids

Local Decoding and Testing Polynomials over Grids Local Decoding and Testing Polynomials over Grids Madhu Sudan Harvard University Joint work with Srikanth Srinivasan (IIT Bombay) January 11, 2018 ITCS: Polynomials over Grids 1 of 12 DeMillo-Lipton-Schwarz-Zippel

More information

Low-Degree Polynomials

Low-Degree Polynomials Low-Degree Polynomials Madhu Sudan Harvard University October 7, 2016 Avi60!! Low-degree Polynomials 1 of 27 October 7, 2016 Avi60!! Low-degree Polynomials 2 of 27 Happy Birthday, Avi!! October 7, 2016

More information

Two Decades of Property Testing Madhu Sudan Harvard

Two Decades of Property Testing Madhu Sudan Harvard Two Decades of Property Testing Madhu Sudan Harvard April 8, 2016 Two Decades of Property Testing 1 of 29 Kepler s Big Data Problem Tycho Brahe (~1550-1600): Wished to measure planetary motion accurately.

More information

General Strong Polarization

General Strong Polarization General Strong Polarization Madhu Sudan Harvard University Joint work with Jaroslaw Blasiok (Harvard), Venkatesan Gurswami (CMU), Preetum Nakkiran (Harvard) and Atri Rudra (Buffalo) May 1, 018 G.Tech:

More information

Uncertain Compression & Graph Coloring. Madhu Sudan Harvard

Uncertain Compression & Graph Coloring. Madhu Sudan Harvard Uncertain Compression & Graph Coloring Madhu Sudan Harvard Based on joint works with: (1) Adam Kalai (MSR), Sanjeev Khanna (U.Penn), Brendan Juba (WUStL) (2) Elad Haramaty (Harvard) (3) Badih Ghazi (MIT),

More information

General Strong Polarization

General Strong Polarization General Strong Polarization Madhu Sudan Harvard University Joint work with Jaroslaw Blasiok (Harvard), Venkatesan Gurswami (CMU), Preetum Nakkiran (Harvard) and Atri Rudra (Buffalo) December 4, 2017 IAS:

More information

Asymptotically good sequences of codes and curves

Asymptotically good sequences of codes and curves Asymptotically good sequences of codes and curves Ruud Pellikaan Technical University of Eindhoven Soria Summer School on Computational Mathematics July 9, 2008 /k 1/29 Content: 8 Some algebraic geometry

More information

Low-Degree Testing. Madhu Sudan MSR. Survey based on many works. of /02/2015 CMSA: Low-degree Testing 1

Low-Degree Testing. Madhu Sudan MSR. Survey based on many works. of /02/2015 CMSA: Low-degree Testing 1 Low-Degree Testing Madhu Sudan MSR Survey based on many works 09/02/2015 CMSA: Low-degree Testing 1 Kepler s Problem Tycho Brahe (~1550-1600): Wished to measure planetary motion accurately. To confirm

More information

General Strong Polarization

General Strong Polarization General Strong Polarization Madhu Sudan Harvard University Joint work with Jaroslaw Blasiok (Harvard), Venkatesan Guruswami (CMU), Preetum Nakkiran (Harvard) and Atri Rudra (Buffalo) Oct. 8, 018 Berkeley:

More information

General Strong Polarization

General Strong Polarization General Strong Polarization Madhu Sudan Harvard University Joint work with Jaroslaw Blasiok (Harvard), Venkatesan Guruswami (CMU), Preetum Nakkiran (Harvard) and Atri Rudra (Buffalo) Oct. 5, 018 Stanford:

More information

List Decoding of Reed Solomon Codes

List Decoding of Reed Solomon Codes List Decoding of Reed Solomon Codes p. 1/30 List Decoding of Reed Solomon Codes Madhu Sudan MIT CSAIL Background: Reliable Transmission of Information List Decoding of Reed Solomon Codes p. 2/30 List Decoding

More information

LET be the finite field of cardinality and let

LET be the finite field of cardinality and let 128 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO. 1, JANUARY 1997 An Explicit Construction of a Sequence of Codes Attaining the Tsfasman Vlăduţ Zink Bound The First Steps Conny Voss Tom Høholdt,

More information

Worksheets for GCSE Mathematics. Quadratics. mr-mathematics.com Maths Resources for Teachers. Algebra

Worksheets for GCSE Mathematics. Quadratics. mr-mathematics.com Maths Resources for Teachers. Algebra Worksheets for GCSE Mathematics Quadratics mr-mathematics.com Maths Resources for Teachers Algebra Quadratics Worksheets Contents Differentiated Independent Learning Worksheets Solving x + bx + c by factorisation

More information

Local correctability of expander codes

Local correctability of expander codes Local correctability of expander codes Brett Hemenway Rafail Ostrovsky Mary Wootters IAS April 4, 24 The point(s) of this talk Locally decodable codes are codes which admit sublinear time decoding of small

More information

10.4 The Cross Product

10.4 The Cross Product Math 172 Chapter 10B notes Page 1 of 9 10.4 The Cross Product The cross product, or vector product, is defined in 3 dimensions only. Let aa = aa 1, aa 2, aa 3 bb = bb 1, bb 2, bb 3 then aa bb = aa 2 bb

More information

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding

Chapter 6 Reed-Solomon Codes. 6.1 Finite Field Algebra 6.2 Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding Chapter 6 Reed-Solomon Codes 6. Finite Field Algebra 6. Reed-Solomon Codes 6.3 Syndrome Based Decoding 6.4 Curve-Fitting Based Decoding 6. Finite Field Algebra Nonbinary codes: message and codeword symbols

More information

Lecture No. 1 Introduction to Method of Weighted Residuals. Solve the differential equation L (u) = p(x) in V where L is a differential operator

Lecture No. 1 Introduction to Method of Weighted Residuals. Solve the differential equation L (u) = p(x) in V where L is a differential operator Lecture No. 1 Introduction to Method of Weighted Residuals Solve the differential equation L (u) = p(x) in V where L is a differential operator with boundary conditions S(u) = g(x) on Γ where S is a differential

More information

Math 171 Spring 2017 Final Exam. Problem Worth

Math 171 Spring 2017 Final Exam. Problem Worth Math 171 Spring 2017 Final Exam Problem 1 2 3 4 5 6 7 8 9 10 11 Worth 9 6 6 5 9 8 5 8 8 8 10 12 13 14 15 16 17 18 19 20 21 22 Total 8 5 5 6 6 8 6 6 6 6 6 150 Last Name: First Name: Student ID: Section:

More information

1. The graph of a function f is given above. Answer the question: a. Find the value(s) of x where f is not differentiable. Ans: x = 4, x = 3, x = 2,

1. The graph of a function f is given above. Answer the question: a. Find the value(s) of x where f is not differentiable. Ans: x = 4, x = 3, x = 2, 1. The graph of a function f is given above. Answer the question: a. Find the value(s) of x where f is not differentiable. x = 4, x = 3, x = 2, x = 1, x = 1, x = 2, x = 3, x = 4, x = 5 b. Find the value(s)

More information

Classical RSA algorithm

Classical RSA algorithm Classical RSA algorithm We need to discuss some mathematics (number theory) first Modulo-NN arithmetic (modular arithmetic, clock arithmetic) 9 (mod 7) 4 3 5 (mod 7) congruent (I will also use = instead

More information

Error-correcting Pairs for a Public-key Cryptosystem

Error-correcting Pairs for a Public-key Cryptosystem Error-correcting Pairs for a Public-key Cryptosystem Ruud Pellikaan g.r.pellikaan@tue.nl joint work with Irene Márquez-Corbella Code-based Cryptography Workshop 2012 Lyngby, 9 May 2012 Introduction and

More information

Control of Mobile Robots

Control of Mobile Robots Control of Mobile Robots Regulation and trajectory tracking Prof. Luca Bascetta (luca.bascetta@polimi.it) Politecnico di Milano Dipartimento di Elettronica, Informazione e Bioingegneria Organization and

More information

Testing Affine-Invariant Properties

Testing Affine-Invariant Properties Testing Affine-Invariant Properties Madhu Sudan Microsoft Surveys: works with/of Eli Ben-Sasson, Elena Grigorescu, Tali Kaufman, Shachar Lovett, Ghid Maatouk, Amir Shpilka. May 23-28, 2011 Bertinoro: Testing

More information

Worksheets for GCSE Mathematics. Algebraic Expressions. Mr Black 's Maths Resources for Teachers GCSE 1-9. Algebra

Worksheets for GCSE Mathematics. Algebraic Expressions. Mr Black 's Maths Resources for Teachers GCSE 1-9. Algebra Worksheets for GCSE Mathematics Algebraic Expressions Mr Black 's Maths Resources for Teachers GCSE 1-9 Algebra Algebraic Expressions Worksheets Contents Differentiated Independent Learning Worksheets

More information

Algebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding.

Algebraic Geometry Codes. Shelly Manber. Linear Codes. Algebraic Geometry Codes. Example: Hermitian. Shelly Manber. Codes. Decoding. Linear December 2, 2011 References Linear Main Source: Stichtenoth, Henning. Function Fields and. Springer, 2009. Other Sources: Høholdt, Lint and Pellikaan. geometry codes. Handbook of Coding Theory,

More information

Support Vector Machines. CSE 4309 Machine Learning Vassilis Athitsos Computer Science and Engineering Department University of Texas at Arlington

Support Vector Machines. CSE 4309 Machine Learning Vassilis Athitsos Computer Science and Engineering Department University of Texas at Arlington Support Vector Machines CSE 4309 Machine Learning Vassilis Athitsos Computer Science and Engineering Department University of Texas at Arlington 1 A Linearly Separable Problem Consider the binary classification

More information

Terms of Use. Copyright Embark on the Journey

Terms of Use. Copyright Embark on the Journey Terms of Use All rights reserved. No part of this packet may be reproduced, stored in a retrieval system, or transmitted in any form by any means - electronic, mechanical, photo-copies, recording, or otherwise

More information

Secondary 3H Unit = 1 = 7. Lesson 3.3 Worksheet. Simplify: Lesson 3.6 Worksheet

Secondary 3H Unit = 1 = 7. Lesson 3.3 Worksheet. Simplify: Lesson 3.6 Worksheet Secondary H Unit Lesson Worksheet Simplify: mm + 2 mm 2 4 mm+6 mm + 2 mm 2 mm 20 mm+4 5 2 9+20 2 0+25 4 +2 2 + 2 8 2 6 5. 2 yy 2 + yy 6. +2 + 5 2 2 2 0 Lesson 6 Worksheet List all asymptotes, holes and

More information

Lecture 6. Notes on Linear Algebra. Perceptron

Lecture 6. Notes on Linear Algebra. Perceptron Lecture 6. Notes on Linear Algebra. Perceptron COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Andrey Kan Copyright: University of Melbourne This lecture Notes on linear algebra Vectors

More information

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes

Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes Introduction to Coding Theory CMU: Spring 010 Notes 10: List Decoding Reed-Solomon Codes and Concatenated codes April 010 Lecturer: Venkatesan Guruswami Scribe: Venkat Guruswami & Ali Kemal Sinop DRAFT

More information

Mathematics, Proofs and Computation

Mathematics, Proofs and Computation Mathematics, Proofs and Computation Madhu Sudan Harvard December 16, 2016 TIMC: Math, Proofs, Computing 1 of 25 Logic, Mathematics, Proofs Reasoning: Start with body of knowledge. Add to body of knowledge

More information

Chapter 22 : Electric potential

Chapter 22 : Electric potential Chapter 22 : Electric potential What is electric potential? How does it relate to potential energy? How does it relate to electric field? Some simple applications What does it mean when it says 1.5 Volts

More information

Chapter 5: Spectral Domain From: The Handbook of Spatial Statistics. Dr. Montserrat Fuentes and Dr. Brian Reich Prepared by: Amanda Bell

Chapter 5: Spectral Domain From: The Handbook of Spatial Statistics. Dr. Montserrat Fuentes and Dr. Brian Reich Prepared by: Amanda Bell Chapter 5: Spectral Domain From: The Handbook of Spatial Statistics Dr. Montserrat Fuentes and Dr. Brian Reich Prepared by: Amanda Bell Background Benefits of Spectral Analysis Type of data Basic Idea

More information

(2) Orbital angular momentum

(2) Orbital angular momentum (2) Orbital angular momentum Consider SS = 0 and LL = rr pp, where pp is the canonical momentum Note: SS and LL are generators for different parts of the wave function. Note: from AA BB ii = εε iiiiii

More information

Asymptotically good sequences of curves and codes

Asymptotically good sequences of curves and codes Asymptotically good sequences of curves and codes Ruud Pellikaan Appeared in in Proc 34th Allerton Conf on Communication, Control, and Computing, Urbana-Champaign, October 2-4, 1996, 276-285 1 Introduction

More information

Review for Exam Hyunse Yoon, Ph.D. Assistant Research Scientist IIHR-Hydroscience & Engineering University of Iowa

Review for Exam Hyunse Yoon, Ph.D. Assistant Research Scientist IIHR-Hydroscience & Engineering University of Iowa 57:020 Fluids Mechanics Fall2013 1 Review for Exam3 12. 11. 2013 Hyunse Yoon, Ph.D. Assistant Research Scientist IIHR-Hydroscience & Engineering University of Iowa 57:020 Fluids Mechanics Fall2013 2 Chapter

More information

Lecture 3. STAT161/261 Introduction to Pattern Recognition and Machine Learning Spring 2018 Prof. Allie Fletcher

Lecture 3. STAT161/261 Introduction to Pattern Recognition and Machine Learning Spring 2018 Prof. Allie Fletcher Lecture 3 STAT161/261 Introduction to Pattern Recognition and Machine Learning Spring 2018 Prof. Allie Fletcher Previous lectures What is machine learning? Objectives of machine learning Supervised and

More information

Reed-Muller testing and approximating small set expansion & hypergraph coloring

Reed-Muller testing and approximating small set expansion & hypergraph coloring Reed-Muller testing and approximating small set expansion & hypergraph coloring Venkatesan Guruswami Carnegie Mellon University (Spring 14 @ Microsoft Research New England) 2014 Bertinoro Workshop on Sublinear

More information

" = Y(#,$) % R(r) = 1 4& % " = Y(#,$) % R(r) = Recitation Problems: Week 4. a. 5 B, b. 6. , Ne Mg + 15 P 2+ c. 23 V,

 = Y(#,$) % R(r) = 1 4& %  = Y(#,$) % R(r) = Recitation Problems: Week 4. a. 5 B, b. 6. , Ne Mg + 15 P 2+ c. 23 V, Recitation Problems: Week 4 1. Which of the following combinations of quantum numbers are allowed for an electron in a one-electron atom: n l m l m s 2 2 1! 3 1 0 -! 5 1 2! 4-1 0! 3 2 1 0 2 0 0 -! 7 2-2!

More information

Bounding the number of affine roots

Bounding the number of affine roots with applications in reliable and secure communication Inaugural Lecture, Aalborg University, August 11110, 11111100000 with applications in reliable and secure communication Polynomials: F (X ) = 2X 2

More information

(1) Introduction: a new basis set

(1) Introduction: a new basis set () Introduction: a new basis set In scattering, we are solving the S eq. for arbitrary VV in integral form We look for solutions to unbound states: certain boundary conditions (EE > 0, plane and spherical

More information

Time Domain Analysis of Linear Systems Ch2. University of Central Oklahoma Dr. Mohamed Bingabr

Time Domain Analysis of Linear Systems Ch2. University of Central Oklahoma Dr. Mohamed Bingabr Time Domain Analysis of Linear Systems Ch2 University of Central Oklahoma Dr. Mohamed Bingabr Outline Zero-input Response Impulse Response h(t) Convolution Zero-State Response System Stability System Response

More information

RUUD PELLIKAAN, HENNING STICHTENOTH, AND FERNANDO TORRES

RUUD PELLIKAAN, HENNING STICHTENOTH, AND FERNANDO TORRES Appeared in: Finite Fields and their Applications, vol. 4, pp. 38-392, 998. WEIERSTRASS SEMIGROUPS IN AN ASYMPTOTICALLY GOOD TOWER OF FUNCTION FIELDS RUUD PELLIKAAN, HENNING STICHTENOTH, AND FERNANDO TORRES

More information

Predicting Winners of Competitive Events with Topological Data Analysis

Predicting Winners of Competitive Events with Topological Data Analysis Predicting Winners of Competitive Events with Topological Data Analysis Conrad D Souza Ruben Sanchez-Garcia R.Sanchez-Garcia@soton.ac.uk Tiejun Ma tiejun.ma@soton.ac.uk Johnnie Johnson J.E.Johnson@soton.ac.uk

More information

Inferring the origin of an epidemic with a dynamic message-passing algorithm

Inferring the origin of an epidemic with a dynamic message-passing algorithm Inferring the origin of an epidemic with a dynamic message-passing algorithm HARSH GUPTA (Based on the original work done by Andrey Y. Lokhov, Marc Mézard, Hiroki Ohta, and Lenka Zdeborová) Paper Andrey

More information

Notes for the Hong Kong Lectures on Algorithmic Coding Theory. Luca Trevisan. January 7, 2007

Notes for the Hong Kong Lectures on Algorithmic Coding Theory. Luca Trevisan. January 7, 2007 Notes for the Hong Kong Lectures on Algorithmic Coding Theory Luca Trevisan January 7, 2007 These notes are excerpted from the paper Some Applications of Coding Theory in Computational Complexity [Tre04].

More information

Error-Correcting Codes

Error-Correcting Codes Error-Correcting Codes HMC Algebraic Geometry Final Project Dmitri Skjorshammer December 14, 2010 1 Introduction Transmission of information takes place over noisy signals. This is the case in satellite

More information

A A A A A A A A A A A A. a a a a a a a a a a a a a a a. Apples taste amazingly good.

A A A A A A A A A A A A. a a a a a a a a a a a a a a a. Apples taste amazingly good. Victorian Handwriting Sheet Aa A A A A A A A A A A A A Aa Aa Aa Aa Aa Aa Aa a a a a a a a a a a a a a a a Apples taste amazingly good. Apples taste amazingly good. Now make up a sentence of your own using

More information

Systems of Linear Equations

Systems of Linear Equations Systems of Linear Equations As stated in Section G, Definition., a linear equation in two variables is an equation of the form AAAA + BBBB = CC, where AA and BB are not both zero. Such an equation has

More information

Prof. Dr.-Ing. Armin Dekorsy Department of Communications Engineering. Stochastic Processes and Linear Algebra Recap Slides

Prof. Dr.-Ing. Armin Dekorsy Department of Communications Engineering. Stochastic Processes and Linear Algebra Recap Slides Prof. Dr.-Ing. Armin Dekorsy Department of Communications Engineering Stochastic Processes and Linear Algebra Recap Slides Stochastic processes and variables XX tt 0 = XX xx nn (tt) xx 2 (tt) XX tt XX

More information

The Feng Rao bounds. KIAS International Conference on Coding Theory and Applications Olav Geil, Aalborg University, Denmark

The Feng Rao bounds. KIAS International Conference on Coding Theory and Applications Olav Geil, Aalborg University, Denmark Olav Geil Aalborg University Denmark KIAS International Conference on Coding Theory and Applications 2012 Linear code = a subspace. Operations are: Vector addition. Scalar multiplication. [n, k, d] the

More information

Quantum Chosen-Ciphertext Attacks against Feistel Ciphers

Quantum Chosen-Ciphertext Attacks against Feistel Ciphers SESSION ID: CRYP-R09 Quantum Chosen-Ciphertext Attacks against Feistel Ciphers Gembu Ito Nagoya University Joint work with Akinori Hosoyamada, Ryutaroh Matsumoto, Yu Sasaki and Tetsu Iwata Overview 3-round

More information

10.1 Three Dimensional Space

10.1 Three Dimensional Space Math 172 Chapter 10A notes Page 1 of 12 10.1 Three Dimensional Space 2D space 0 xx.. xx-, 0 yy yy-, PP(xx, yy) [Fig. 1] Point PP represented by (xx, yy), an ordered pair of real nos. Set of all ordered

More information

Big Bang Planck Era. This theory: cosmological model of the universe that is best supported by several aspects of scientific evidence and observation

Big Bang Planck Era. This theory: cosmological model of the universe that is best supported by several aspects of scientific evidence and observation Big Bang Planck Era Source: http://www.crystalinks.com/bigbang.html Source: http://www.odec.ca/index.htm This theory: cosmological model of the universe that is best supported by several aspects of scientific

More information

: Error Correcting Codes. October 2017 Lecture 1

: Error Correcting Codes. October 2017 Lecture 1 03683072: Error Correcting Codes. October 2017 Lecture 1 First Definitions and Basic Codes Amnon Ta-Shma and Dean Doron 1 Error Correcting Codes Basics Definition 1. An (n, K, d) q code is a subset of

More information

Angular Momentum, Electromagnetic Waves

Angular Momentum, Electromagnetic Waves Angular Momentum, Electromagnetic Waves Lecture33: Electromagnetic Theory Professor D. K. Ghosh, Physics Department, I.I.T., Bombay As before, we keep in view the four Maxwell s equations for all our discussions.

More information

Definition: A sequence is a function from a subset of the integers (usually either the set

Definition: A sequence is a function from a subset of the integers (usually either the set Math 3336 Section 2.4 Sequences and Summations Sequences Geometric Progression Arithmetic Progression Recurrence Relation Fibonacci Sequence Summations Definition: A sequence is a function from a subset

More information

Lecture 11. Kernel Methods

Lecture 11. Kernel Methods Lecture 11. Kernel Methods COMP90051 Statistical Machine Learning Semester 2, 2017 Lecturer: Andrey Kan Copyright: University of Melbourne This lecture The kernel trick Efficient computation of a dot product

More information

ON A CONTINUED FRACTION IDENTITY FROM RAMANUJAN S NOTEBOOK

ON A CONTINUED FRACTION IDENTITY FROM RAMANUJAN S NOTEBOOK Asian Journal of Current Engineering and Maths 3: (04) 39-399. Contents lists available at www.innovativejournal.in ASIAN JOURNAL OF CURRENT ENGINEERING AND MATHS Journal homepage: http://www.innovativejournal.in/index.php/ajcem

More information

Classwork. Example 1 S.35

Classwork. Example 1 S.35 Classwork Example 1 In the picture below, we have a triangle AAAAAA that has been dilated from center OO by a scale factor of rr = 1. It is noted 2 by AA BB CC. We also have triangle AA BB CC, which is

More information

Module 7 (Lecture 27) RETAINING WALLS

Module 7 (Lecture 27) RETAINING WALLS Module 7 (Lecture 27) RETAINING WALLS Topics 1.1 RETAINING WALLS WITH METALLIC STRIP REINFORCEMENT Calculation of Active Horizontal and vertical Pressure Tie Force Factor of Safety Against Tie Failure

More information

Large Scale Data Analysis Using Deep Learning

Large Scale Data Analysis Using Deep Learning Large Scale Data Analysis Using Deep Learning Linear Algebra U Kang Seoul National University U Kang 1 In This Lecture Overview of linear algebra (but, not a comprehensive survey) Focused on the subset

More information

Yang-Hwan Ahn Based on arxiv:

Yang-Hwan Ahn Based on arxiv: Yang-Hwan Ahn (CTPU@IBS) Based on arxiv: 1611.08359 1 Introduction Now that the Higgs boson has been discovered at 126 GeV, assuming that it is indeed exactly the one predicted by the SM, there are several

More information

On the gonality of curves, abundant codes and decoding

On the gonality of curves, abundant codes and decoding On the gonality of curves, abundant codes and decoding Ruud Pellikaan Appeared in: in Coding Theory Algebraic Geometry, Luminy 99, (H. Stichtenoth and M.A. Tsfasman eds.), Lect. Notes Math. 58, Springer,

More information

Lecture 19 : Reed-Muller, Concatenation Codes & Decoding problem

Lecture 19 : Reed-Muller, Concatenation Codes & Decoding problem IITM-CS6845: Theory Toolkit February 08, 2012 Lecture 19 : Reed-Muller, Concatenation Codes & Decoding problem Lecturer: Jayalal Sarma Scribe: Dinesh K Theme: Error correcting codes In the previous lecture,

More information

Proof: Let the check matrix be

Proof: Let the check matrix be Review/Outline Recall: Looking for good codes High info rate vs. high min distance Want simple description, too Linear, even cyclic, plausible Gilbert-Varshamov bound for linear codes Check matrix criterion

More information

Coding theory: algebraic geometry of linear algebra David R. Kohel

Coding theory: algebraic geometry of linear algebra David R. Kohel Coding theory: algebraic geometry of linear algebra David R. Kohel 1. Introduction. Let R be a ring whose underlying set we call the alphabet. A linear code C over R is a free R-module V of rank k, an

More information

3.2 A2 - Just Like Derivatives but Backwards

3.2 A2 - Just Like Derivatives but Backwards 3. A - Just Like Derivatives but Backwards The Definite Integral In the previous lesson, you saw that as the number of rectangles got larger and larger, the values of Ln, Mn, and Rn all grew closer and

More information

CS Lecture 8 & 9. Lagrange Multipliers & Varitional Bounds

CS Lecture 8 & 9. Lagrange Multipliers & Varitional Bounds CS 6347 Lecture 8 & 9 Lagrange Multipliers & Varitional Bounds General Optimization subject to: min ff 0() R nn ff ii 0, h ii = 0, ii = 1,, mm ii = 1,, pp 2 General Optimization subject to: min ff 0()

More information

Grover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick

Grover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick Grover s algorithm Search in an unordered database Example: phonebook, need to find a person from a phone number Actually, something else, like hard (e.g., NP-complete) problem 0, xx aa Black box ff xx

More information

Rotational Motion. Chapter 10 of Essential University Physics, Richard Wolfson, 3 rd Edition

Rotational Motion. Chapter 10 of Essential University Physics, Richard Wolfson, 3 rd Edition Rotational Motion Chapter 10 of Essential University Physics, Richard Wolfson, 3 rd Edition 1 We ll look for a way to describe the combined (rotational) motion 2 Angle Measurements θθ ss rr rrrrrrrrrrrrrr

More information

List and local error-correction

List and local error-correction List and local error-correction Venkatesan Guruswami Carnegie Mellon University 8th North American Summer School of Information Theory (NASIT) San Diego, CA August 11, 2015 Venkat Guruswami (CMU) List

More information

Decoding Reed-Muller codes over product sets

Decoding Reed-Muller codes over product sets Rutgers University May 30, 2016 Overview Error-correcting codes 1 Error-correcting codes Motivation 2 Reed-Solomon codes Reed-Muller codes 3 Error-correcting codes Motivation Goal: Send a message Don t

More information

A Posteriori Error Estimates For Discontinuous Galerkin Methods Using Non-polynomial Basis Functions

A Posteriori Error Estimates For Discontinuous Galerkin Methods Using Non-polynomial Basis Functions Lin Lin A Posteriori DG using Non-Polynomial Basis 1 A Posteriori Error Estimates For Discontinuous Galerkin Methods Using Non-polynomial Basis Functions Lin Lin Department of Mathematics, UC Berkeley;

More information

Coding problems for memory and storage applications

Coding problems for memory and storage applications .. Coding problems for memory and storage applications Alexander Barg University of Maryland January 27, 2015 A. Barg (UMD) Coding for memory and storage January 27, 2015 1 / 73 Codes with locality Introduction:

More information

Lecture No. 5. For all weighted residual methods. For all (Bubnov) Galerkin methods. Summary of Conventional Galerkin Method

Lecture No. 5. For all weighted residual methods. For all (Bubnov) Galerkin methods. Summary of Conventional Galerkin Method Lecture No. 5 LL(uu) pp(xx) = 0 in ΩΩ SS EE (uu) = gg EE on ΓΓ EE SS NN (uu) = gg NN on ΓΓ NN For all weighted residual methods NN uu aaaaaa = uu BB + αα ii φφ ii For all (Bubnov) Galerkin methods ii=1

More information

ERROR CORRECTING CODES

ERROR CORRECTING CODES ERROR CORRECTING CODES To send a message of 0 s and 1 s from my computer on Earth to Mr. Spock s computer on the planet Vulcan we use codes which include redundancy to correct errors. n q Definition. A

More information

Variations. ECE 6540, Lecture 02 Multivariate Random Variables & Linear Algebra

Variations. ECE 6540, Lecture 02 Multivariate Random Variables & Linear Algebra Variations ECE 6540, Lecture 02 Multivariate Random Variables & Linear Algebra Last Time Probability Density Functions Normal Distribution Expectation / Expectation of a function Independence Uncorrelated

More information

Module 7 (Lecture 25) RETAINING WALLS

Module 7 (Lecture 25) RETAINING WALLS Module 7 (Lecture 25) RETAINING WALLS Topics Check for Bearing Capacity Failure Example Factor of Safety Against Overturning Factor of Safety Against Sliding Factor of Safety Against Bearing Capacity Failure

More information

Advanced data analysis

Advanced data analysis Advanced data analysis Akisato Kimura ( 木村昭悟 ) NTT Communication Science Laboratories E-mail: akisato@ieee.org Advanced data analysis 1. Introduction (Aug 20) 2. Dimensionality reduction (Aug 20,21) PCA,

More information

Two Decades of Property Testing

Two Decades of Property Testing Two Decades of Property Testing Madhu Sudan Microsoft Research 12/09/2014 Invariance in Property Testing @MIT 1 of 29 Kepler s Big Data Problem Tycho Brahe (~1550-1600): Wished to measure planetary motion

More information

Algebraic Property Testing: The Role of Invariance

Algebraic Property Testing: The Role of Invariance Algebraic Property Testing: The Role of Invariance Tali Kaufman Madhu Sudan November 2, 2007 Abstract We argue that the symmetries of a property being tested play a central role in property testing. We

More information

Exam Programme VWO Mathematics A

Exam Programme VWO Mathematics A Exam Programme VWO Mathematics A The exam. The exam programme recognizes the following domains: Domain A Domain B Domain C Domain D Domain E Mathematical skills Algebra and systematic counting Relationships

More information

Mathematics Ext 2. HSC 2014 Solutions. Suite 403, 410 Elizabeth St, Surry Hills NSW 2010 keystoneeducation.com.

Mathematics Ext 2. HSC 2014 Solutions. Suite 403, 410 Elizabeth St, Surry Hills NSW 2010 keystoneeducation.com. Mathematics Ext HSC 4 Solutions Suite 43, 4 Elizabeth St, Surry Hills NSW info@keystoneeducation.com.au keystoneeducation.com.au Mathematics Extension : HSC 4 Solutions Contents Multiple Choice... 3 Question...

More information

Improved Decoding of Reed Solomon and Algebraic-Geometry Codes. Venkatesan Guruswami and Madhu Sudan /99$ IEEE

Improved Decoding of Reed Solomon and Algebraic-Geometry Codes. Venkatesan Guruswami and Madhu Sudan /99$ IEEE IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 45, NO 6, SEPTEMBER 1999 1757 Improved Decoding of Reed Solomon and Algebraic-Geometry Codes Venkatesan Guruswami and Madhu Sudan Abstract Given an error-correcting

More information

Quantum Mechanics. An essential theory to understand properties of matter and light. Chemical Electronic Magnetic Thermal Optical Etc.

Quantum Mechanics. An essential theory to understand properties of matter and light. Chemical Electronic Magnetic Thermal Optical Etc. Quantum Mechanics An essential theory to understand properties of matter and light. Chemical Electronic Magnetic Thermal Optical Etc. Fall 2018 Prof. Sergio B. Mendes 1 CHAPTER 3 Experimental Basis of

More information

Patterns of soiling in the Old Library Trinity College Dublin. Allyson Smith, Robbie Goodhue, Susie Bioletti

Patterns of soiling in the Old Library Trinity College Dublin. Allyson Smith, Robbie Goodhue, Susie Bioletti Patterns of soiling in the Old Library Trinity College Dublin Allyson Smith, Robbie Goodhue, Susie Bioletti Trinity College aerial view Old Library E N S W Old Library main (south) elevation Gallery Fagel

More information

PHY103A: Lecture # 9

PHY103A: Lecture # 9 Semester II, 2017-18 Department of Physics, IIT Kanpur PHY103A: Lecture # 9 (Text Book: Intro to Electrodynamics by Griffiths, 3 rd Ed.) Anand Kumar Jha 20-Jan-2018 Summary of Lecture # 8: Force per unit

More information

Module 4 (Lecture 16) SHALLOW FOUNDATIONS: ALLOWABLE BEARING CAPACITY AND SETTLEMENT

Module 4 (Lecture 16) SHALLOW FOUNDATIONS: ALLOWABLE BEARING CAPACITY AND SETTLEMENT Topics Module 4 (Lecture 16) SHALLOW FOUNDATIONS: ALLOWABLE BEARING CAPACITY AND SETTLEMENT 1.1 STRIP FOUNDATION ON GRANULAR SOIL REINFORCED BY METALLIC STRIPS Mode of Failure Location of Failure Surface

More information

Math 3336 Section 4.3 Primes and Greatest Common Divisors. Prime Numbers and their Properties Conjectures and Open Problems About Primes

Math 3336 Section 4.3 Primes and Greatest Common Divisors. Prime Numbers and their Properties Conjectures and Open Problems About Primes Math 3336 Section 4.3 Primes and Greatest Common Divisors Prime Numbers and their Properties Conjectures and Open Problems About Primes Greatest Common Divisors and Least Common Multiples The Euclidian

More information

Two Query PCP with Sub-Constant Error

Two Query PCP with Sub-Constant Error Electronic Colloquium on Computational Complexity, Report No 71 (2008) Two Query PCP with Sub-Constant Error Dana Moshkovitz Ran Raz July 28, 2008 Abstract We show that the N P-Complete language 3SAT has

More information

A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems

A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems A Polynomial Time Attack against Algebraic Geometry Code Based Public Key Cryptosystems Alain Couvreur 1, Irene Márquez-Corbella 1, and Ruud Pellikaan 1 INRIA Saclay & LIX, CNRS UMR 7161 École Polytechnique,

More information

A linear operator of a new class of multivalent harmonic functions

A linear operator of a new class of multivalent harmonic functions International Journal of Scientific Research Publications, Volume 7, Issue 8, August 2017 278 A linear operator of a new class of multivalent harmonic functions * WaggasGalibAtshan, ** Ali Hussein Battor,

More information

Lecture 4: Codes based on Concatenation

Lecture 4: Codes based on Concatenation Lecture 4: Codes based on Concatenation Error-Correcting Codes (Spring 206) Rutgers University Swastik Kopparty Scribe: Aditya Potukuchi and Meng-Tsung Tsai Overview In the last lecture, we studied codes

More information

Approximate Second Order Algorithms. Seo Taek Kong, Nithin Tangellamudi, Zhikai Guo

Approximate Second Order Algorithms. Seo Taek Kong, Nithin Tangellamudi, Zhikai Guo Approximate Second Order Algorithms Seo Taek Kong, Nithin Tangellamudi, Zhikai Guo Why Second Order Algorithms? Invariant under affine transformations e.g. stretching a function preserves the convergence

More information

High-rate Locally-testable Codes with Quasi-polylogarithmic Query Complexity

High-rate Locally-testable Codes with Quasi-polylogarithmic Query Complexity High-rate Locally-testable Codes with Quasi-polylogarithmic Query Complexity Swastik Kopparty, Or Meir, Noga Ron-Zewi, Shubhangi Saraf September 5, 205 Abstract An error correcting code is said to be locally

More information

An Interpolation Algorithm for List Decoding of Reed-Solomon Codes

An Interpolation Algorithm for List Decoding of Reed-Solomon Codes An Interpolation Algorithm for List Decoding of Reed-Solomon Codes Kwankyu Lee Department of Mathematics San Diego State University San Diego, USA Email: kwankyu@sogangackr Michael E O Sullivan Department

More information

MATH32031: Coding Theory Part 15: Summary

MATH32031: Coding Theory Part 15: Summary MATH32031: Coding Theory Part 15: Summary 1 The initial problem The main goal of coding theory is to develop techniques which permit the detection of errors in the transmission of information and, if necessary,

More information