Lecture 38. CSE 331 Dec 4, 2017

Similar documents
CSCI-B609: A Theorist s Toolkit, Fall 2016 Oct 4. Theorem 1. A non-zero, univariate polynomial with degree d has at most d roots.

Computational Complexity

ECE 4450:427/527 - Computer Networks Spring 2017

Lecture 15 - Zero Knowledge Proofs

Can You Hear Me Now?

P vs. NP. Data Structures and Algorithms CSE AU 1

Computational and Statistical Learning Theory

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p.

Information redundancy

NP-complete problems. CSE 101: Design and Analysis of Algorithms Lecture 20

Lecture 22: Counting

Lecture 2: A Las Vegas Algorithm for finding the closest pair of points in the plane

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution

channel of communication noise Each codeword has length 2, and all digits are either 0 or 1. Such codes are called Binary Codes.

Coding for Computing. ASPITRG, Drexel University. Jie Ren 2012/11/14

Block Codes :Algorithms in the Real World

PCP Theorem and Hardness of Approximation

Computational Complexity and Intractability: An Introduction to the Theory of NP. Chapter 9

Coding theory: Applications

Lecture 3: Interactive Proofs and Zero-Knowledge

Computational Complexity Theory

CS168: The Modern Algorithmic Toolbox Lecture #19: Expander Codes

Easy Problems vs. Hard Problems. CSE 421 Introduction to Algorithms Winter Is P a good definition of efficient? The class P

MATH 433 Applied Algebra Lecture 19: Subgroups (continued). Error-detecting and error-correcting codes.

Lecture 3: Error Correcting Codes

from notes written mostly by Dr. Matt Stallmann: All Rights Reserved

CS151 Complexity Theory. Lecture 9 May 1, 2017

Limitations of Algorithm Power

COP 4531 Complexity & Analysis of Data Structures & Algorithms

IS 709/809: Computational Methods in IS Research Fall Exam Review

Provable Approximation via Linear Programming

BBM402-Lecture 11: The Class NP

CMPT307: Complexity Classes: P and N P Week 13-1

Notes on Complexity Theory Last updated: November, Lecture 10

Errors, Eavesdroppers, and Enormous Matrices

Quantum Information Theory and Cryptography

Lecture 5. 1 Review (Pairwise Independence and Derandomization)

Limits to Approximability: When Algorithms Won't Help You. Note: Contents of today s lecture won t be on the exam

9 THEORY OF CODES. 9.0 Introduction. 9.1 Noise

Is It As Easy To Discover As To Verify?

Umans Complexity Theory Lectures

NP-Completeness. f(n) \ n n sec sec sec. n sec 24.3 sec 5.2 mins. 2 n sec 17.9 mins 35.

Tutorial: Locally decodable codes. UT Austin

Intro to Information Theory

Lecture 24: How to become Famous with P and NP

Lecture Notes 20: Zero-Knowledge Proofs

Lecture 16: Communication Complexity

Ma/CS 6b Class 25: Error Correcting Codes 2

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

Coping with disk crashes

Math 512 Syllabus Spring 2017, LIU Post

Fault Tolerant Computing CS 530 Information redundancy: Coding theory. Yashwant K. Malaiya Colorado State University

CS Communication Complexity: Applications and New Directions

LECTURE 15. Last time: Feedback channel: setting up the problem. Lecture outline. Joint source and channel coding theorem

Linear Block Codes. Saravanan Vijayakumaran Department of Electrical Engineering Indian Institute of Technology Bombay

NP-Completeness. NP-Completeness 1

Lecture 6. Today we shall use graph entropy to improve the obvious lower bound on good hash functions.

Lecture 22: Oct 29, Interactive proof for graph non-isomorphism

Error-Correcting Schemes with Dynamic Thresholds in Nonvolatile Memories

CSCI 2570 Introduction to Nanocomputing

Local correctability of expander codes

Lecture 4: NP and computational intractability

1. How many errors may be detected (not necessarily corrected) if a code has a Hamming Distance of 6?

Algorithm Design and Analysis

1 Recommended Reading 1. 2 Public Key/Private Key Cryptography Overview RSA Algorithm... 2

CS483 Design and Analysis of Algorithms

Communication Theory II

MATH3302. Coding and Cryptography. Coding Theory

Lecture Introduction. 2 Linear codes. CS CTT Current Topics in Theoretical CS Oct 4, 2012

2 Natural Proofs: a barrier for proving circuit lower bounds

Bandwidth: Communicate large complex & highly detailed 3D models through lowbandwidth connection (e.g. VRML over the Internet)

Information Redundancy: Coding

Coding Theory and Applications. Linear Codes. Enes Pasalic University of Primorska Koper, 2013

Lecture 18: PCP Theorem and Hardness of Approximation I

Outline. EECS Components and Design Techniques for Digital Systems. Lec 18 Error Coding. In the real world. Our beautiful digital world.

Discrete Optimization 2010 Lecture 10 P, N P, and N PCompleteness

NP-Completeness. Until now we have been designing algorithms for specific problems

IS VALIANT VAZIRANI S ISOLATION PROBABILITY IMPROVABLE? Holger Dell, Valentine Kabanets, Dieter van Melkebeek, and Osamu Watanabe December 31, 2012

6-1 Computational Complexity

Lecture 4: Proof of Shannon s theorem and an explicit code

Graph-based codes for flash memory

Models of Computation

Design and Analysis of Algorithms

Lecture 12: November 6, 2017

Notes on Zero Knowledge

CS 151 Complexity Theory Spring Solution Set 5

VHDL Implementation of Reed Solomon Improved Encoding Algorithm

Correctness of Dijkstra s algorithm

Essential facts about NP-completeness:

Locally Decodable Codes

Two Query PCP with Sub-Constant Error

Communication vs. Computation

Computer Science 385 Analysis of Algorithms Siena College Spring Topic Notes: Limitations of Algorithms

Lecture 4: Codes based on Concatenation

CS483 Design and Analysis of Algorithms

CSI 4105 MIDTERM SOLUTION

Algorithms Design & Analysis. Approximation Algorithm

Error Correcting Codes Questions Pool

1 Agenda. 2 History. 3 Probabilistically Checkable Proofs (PCPs). Lecture Notes Definitions. PCPs. Approximation Algorithms.

Digital Communications III (ECE 154C) Introduction to Coding and Information Theory

Transcription:

Lecture 38 CSE 331 Dec 4, 2017

Quiz 2 1:00-1:10pm Lecture starts at 1:15pm

Final Reminder

Review sessions/extra OH

Shortest Path Problem Input: (Directed) Graph G=(V,E) and for every edge e has a cost c e (can be <0) t in V Output: Shortest path from every s to t Shortest path has cost negative infinity s 1 1 899 100 t Assume that G has no negative cycle -1000

Longest path problem Given G, does there exist a simple path of length n-1?

Longest vs Shortest Paths

Two sides of the same coin Shortest Path problem Can be solved by a polynomial time algorithm Is there a longest path of length n-1? Given a path can verify in polynomial time if the answer is yes

Poly time algo for longest path?

P vs NP question P: problems that can be solved by poly time algorithms Is P=NP? NP: problems that have polynomial time verifiable witness to optimal solution Alternate NP definition: Guess witness and verify!

Proving P NP Pick any one problem in NP and show it cannot be solved in poly time Pretty much all known proof techniques provably will not work

Proving P = NP Will make cryptography collapse Compute the encryption key! Prove that all problems in NP can be solved by polynomial time algorithms Solving any ONE problem in here in poly time will prove P=NP! NP-complete problems NP

A book on P vs. NP

High level view of CSE 331 Problem Statement Problem Definition Three general techniques Algorithm Implementation Data Structures Analysis Correctness+Runtime Analysis 14

If you are curious for more CSE 429 or 431: Algorithms CSE 396: Theory of Computation

Now relax 16

Randomized algorithms What is different? Algorithms can toss coins and make decisions A Representative Problem Hashing http://calculator.mathcaptain.com/coin-toss-probability-calculator.html Further Reading Chapter 13 of the textbook

Approximation algorithms What is different? Algorithms can output a solution that is say 50% as good as the optimal A Representative Problem Vertex Cover Further Reading Chapter 12 of the textbook

Online algorithms What is different? Algorithms have to make decisions before they see all the input A Representative Problem Secretary Problem Further Reading

Data streaming algorithms What is different? One pass on the input with severely limited memory https://www.flickr.com/photos/midom/2134991985/ A Representative Problem Compute the top-10 source IP addresses Further Reading

Distributed algorithms What is different? Input is distributed over a network A Representative Problem Consensus Further Reading

Beyond-worst case analysis What is different? Analyze algorithms in a more instance specific way A Representative Problem Intersect two sorted sets Further Reading http://theory.stanford.edu/~tim/f14/f14.html

Algorithms for Data Science What is different? Algorithms for non-discrete inputs A Representative Problem Compute Eigenvalues Further Reading http://research.microsoft.com/en-us/people/kannan/book-no-solutions-aug-21-2014.pdf

Johnson Lindenstrauss Lemma http://www.scipy-lectures.org/_images/pca_3d_axis.jpg

The simplest non-trivial join query Intersection of R and S R A S Assume R and S are sorted Let us concentrate on comparison based algorithms Assume R = S = N

Not all inputs are created equal R S R S 1 3 2 1 2 3 4 4 5 5 6 6 Ω(N) comparisons 1 comparison!

We need a faster/adaptive algorithm

The MERGE algorithm works R S 1 N

An assumption Output of the join is empty

MERGE is (near) instance optimal Benchmark: Minimum number of comparisons (C) to certify output 1 Demaine Lopez-Oritz Munro C logn comparions (and time) R S Value not ruled out yet Need a comparison to rule the value out Each value involved with 2 comparisons Once the pointer moves the value is N never seen again Each move takes log N comparisons

Coding Theory 31

Communicating with my 3 year old C(x) x Code C Kiran English C(x) is a codeword y = C(x)+error x Give up 32

The setup C(x) x Mapping C Error-correcting code or just code Encoding: x C(x) Decoding: y x C(x) is a codeword x y = C(x)+error Give up 33

Different Channels and Codes Internet Checksum used in multiple layers of TCP/IP stack Cell phones Satellite broadcast TV Deep space telecommunications Mars Rover 34

Unusual Channels Data Storage CDs and DVDs RAID ECC memory Paper bar codes UPS (MaxiCode) Codes are all around us 35

Redundancy vs. Error-correction Repetition code: Repeat every bit say 100 times Good error correcting properties Too much redundancy Parity code: Add a parity bit 1 1 1 0 0 1 Minimum amount of redundancy Bad error correcting properties Two errors go completely undetected 1 0 0 0 0 1 Neither of these codes are satisfactory 36

Two main challenges in coding theory Problem with parity example Messages mapped to codewords which do not differ in many places Need to pick a lot of codewords that differ a lot from each other Efficient decoding Naive algorithm: check received word with all codewords 37

The fundamental tradeoff Correct as many errors as possible with as little redundancy as possible Can one achieve the optimal tradeoff with efficient encoding and decoding? 38

Interested in more? CSE 545, Spring 2019 39

Whatever your impression of the 331 IT WAS 40

Hopefully it was fun! 41

Thanks! Except of course, HW 10, presentations and the final exam 42