CSE 501 Research Overview Atri Rudra

Slides:



Advertisements
Similar presentations
Noise, Information Theory, and Entropy (cont.) CS414 – Spring 2007 By Karrie Karahalios, Roger Cheng, Brian Bailey.
Advertisements

current hadoop architecture
Applied Algorithmics - week7
Error Control Code.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
José Vieira Information Theory 2010 Information Theory MAP-Tele José Vieira IEETA Departamento de Electrónica, Telecomunicações e Informática Universidade.
CSE 461: Error Detection and Correction. Next Topic  Error detection and correction  Focus: How do we detect and correct messages that are garbled during.
Day 2 Information theory ( 信息論 ) Civil engineering ( 土木工程 ) Cultural exchange.
Error Correcting Codes: Combinatorics, Algorithms and Applications CSE 510C August 27, 2006.
Lecture 40 CSE 331 Dec 11, Announcements Solutions to HW 10 and graded HW 9 at end of the lecture Review session on Monday: see blog for details.
Chapter 10 Error Detection and Correction
Lecture 41 CSE 331 Dec 10, HW 10 due today Q1 in one pile and Q 3+4 in another I will not take any HW after 1:15pm.
Fountain Codes Amin Shokrollahi EPFL and Digital Fountain, Inc.
CSE 501 Research Overview Atri Rudra
Error Correcting Codes: Combinatorics, Algorithms and Applications CSE 545 January 19, 2011.
2/28/03 1 The Virtues of Redundancy An Introduction to Error-Correcting Codes Paul H. Siegel Director, CMRR University of California, San Diego The Virtues.
An Introduction to Cryptology and Coding Theory Discrete Math 2006.
COMPUTER ARCHITECTURE & OPERATIONS I Instructor: Hao Ji.
15-853Page :Algorithms in the Real World Error Correcting Codes I – Overview – Hamming Codes – Linear Codes.
Data Transmission Most digital messages are longer than just a few bits. It is neither practical nor economical to transfer all bits of a long message.
Error Detection and Correction
Error Detection and Reliable Transmission EECS 122: Lecture 24 Department of Electrical Engineering and Computer Sciences University of California Berkeley.
An Introduction to Cryptology and Coding Theory Sarah Spence Adams Olin College Gordon Prichett Babson College
1 INF244 Textbook: Lin and Costello Lectures (Tu+Th ) covering roughly Chapter 1;Chapters 9-19? Weekly exercises: For your convenience Mandatory.
Error Correcting Codes: Combinatorics, Algorithms and Applications CSE 545 January 14, 2013.
Lecture 10: Error Control Coding I Chapter 8 – Coding and Error Control From: Wireless Communications and Networks by William Stallings, Prentice Hall,
Error Detection and Correction
Threshold Phenomena and Fountain Codes Amin Shokrollahi EPFL Joint work with M. Luby, R. Karp, O. Etesami.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Cyclic Code. Linear Block Code Hamming Code is a Linear Block Code. Linear Block Code means that the codeword is generated by multiplying the message.
Data Link Layer: Error Detection and Correction
COEN 180 Erasure Correcting, Error Detecting, and Error Correcting Codes.
Error Correcting Codes: Combinatorics, Algorithms and Applications CSE 545 January 11, 2010.
Great Theoretical Ideas in Computer Science.
Error Detection and Correction
Computer Science Division
Computer Communication & Networks Lecture 9 Datalink Layer: Error Detection Waleed Ejaz
CHAPTER 3: DATA LINK CONTROL Flow control, Error detection – two dimensional parity checks, Internet checksum, CRC, Error control, Transmission efficiency.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1 Block Coding Messages are made up of k bits. Transmitted packets have n bits, n > k: k-data bits and r-redundant bits. n = k + r.
Error Detection. Data can be corrupted during transmission. Some applications require that errors be detected and corrected. An error-detecting code can.
Data Link Layer. Data Link Layer Topics to Cover Error Detection and Correction Data Link Control and Protocols Multiple Access Local Area Networks Wireless.
Data Communications and Networking
Error-Detecting and Error-Correcting Codes
Raptor Codes Amin Shokrollahi EPFL. BEC(p 1 ) BEC(p 2 ) BEC(p 3 ) BEC(p 4 ) BEC(p 5 ) BEC(p 6 ) Communication on Multiple Unknown Channels.
Hamming Distance & Hamming Code
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
10.1 Chapter 10 Error Detection and Correction Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
Lecture 20 CSE 331 July 30, Longest path problem Given G, does there exist a simple path of length n-1 ?
Computer Networks, Fifth Edition by Andrew Tanenbaum and David Wetherall, © Pearson Education-Prentice Hall, 2011 The Data Link Layer Chapter 3.
Practical Session 10 Computer Architecture and Assembly Language.
Computer Architecture and Assembly Language
Error Detection and Correction
DATA COMMUNICATION AND NETWORKINGS
Advanced Computer Networks
OCR AS Level F451: Data transmission
Part III Datalink Layer 10.
Detecting and Correcting Bit Errors
Packetizing Error Detection
Packetizing Error Detection
Fundamentals of Data Representation
Error Detection Neil Tang 9/26/2008
Packetizing Error Detection
Error Detection and Correction
Computer Architecture and Assembly Language
COS 463: Wireless Networks Lecture 9 Kyle Jamieson
Types of Errors Data transmission suffers unpredictable changes because of interference The interference can change the shape of the signal Single-bit.
Error Detection and Correction
Chapter 10 Error Detection and Correction
Presentation transcript:

CSE 501 Research Overview Atri Rudra

2 Research Interests Theoretical Computer Science  Coding Theory  Algorithmic Game Theory  Sublinear algorithms  Approximation and online algorithms

3 Coding Theory

4 The setup C(x) x y = C(x)+error x Give up Mapping C  Error-correcting code or just code  Encoding: x  C(x)  Decoding: y  X  C(x) is a codeword

5 Different Channels and Codes Internet  Checksum used in multiple layers of TCP/IP stack Cell phones Satellite broadcast  TV Deep space telecommunications  Mars Rover

6 “Unusual” Channels Data Storage  CDs and DVDs  RAID  ECC memory Paper bar codes  UPS (MaxiCode) Codes are all around us

7 Redundancy vs. Error-correction Repetition code: Repeat every bit say 100 times  Good error correcting properties  Too much redundancy Parity code: Add a parity bit  Minimum amount of redundancy  Bad error correcting properties Two errors go completely undetected Neither of these codes are satisfactory

8 Two main challenges in coding theory Problem with parity example  Messages mapped to codewords which do not differ in many places Need to pick a lot of codewords that differ a lot from each other Efficient decoding  Naive algorithm: check received word with all codewords

9 The fundamental tradeoff Correct as many errors as possible with as little redundancy as possible Can one achieve the “optimal” tradeoff with efficient encoding and decoding ?

10 A “low level” view Think of each symbol in  being a packet The setup  Sender wants to send k packets  After encoding sends n packets  Some packets get corrupted  Receiver needs to recover the original k packets

11 The Optimal Tradeoff C(x) sent, y received How much of y must be correct to recover x ?  At least k packets must be correct [Guruswami, R. STOC 2006]  An explicit code along with efficient decoding algorithm  Works as long as (almost) k packets are correct

12 So what is left to do? I cheated a bit in the last slide The result only holds for large packets We do not know an “optimal” code over smaller symbols (for example bits)

13 Algorithmic Game Theory Online auction of digital goods  [Blum, Kumar, R., Wu SODA 2003]

14 Online Auctions of Digital goods Say you want to sell mp3s of a song  Can make copies with no extra cost Buyers arrive one by one  Specify how much they are willing to pay You need to decide to sell or not  At what price ? You want to make lots of money $5 OK, $4 $1 No

15 However… Why not just sell at the value specified by a buyer ? Buyers are selfish  They will lie to get a better deal Why not charge a single fixed price ?  Do not know best price in advance The challenge  Build a online pricing scheme that gives buyers no incentive to cheat Our work gives pricing scheme as good as best fixed price  [Blum, Kumar, R., Wu SODA 2003]

16 Problems I am interested in Problems motivated by game theory Sometimes, “old” problem with a twist  What is the best way to pair up potential couples in a dating site? Twist on the classical graph matching problem

17 Sublinear Algorithms Data Streams  [Beame, Jayram, R. STOC 2007]

18 Data Streams (one application) Databases are huge  Fully reside in disk memory Main memory  Fast, not much of it Disk memory  Slow, lots of it  Random access is expensive  Sequential scan is reasonably cheap Main memory Disk Memory

19 Data Streams (one application) Given a restriction on number of random accesses to disk memory How much main memory is required ? For computations such as join of tables Answer: a lot  [Beame, Jayram, R. STOC 2007] Open question: computing other functions? Main memory Disk memory

20 Approximation Algorithms Ranking in Tournaments  [Coppersmith, Fleischer, R. SODA 2006]

21 US Open 2005 Everyone plays everyone Rank the players Min #upsets Rank by number of wins  Break ties Venus WilliamsMaria Sharapova Kim Clijsters Nadia Petrova #1 #2 #3 #4

22 Ranking in Tournament results [Coppersmith, Fleischer, R. SODA 2006] Ordering by number of wins is 5-approx  Ties broken arbitrarily  Problem shown to be NP-hard in 2005 Application in Rank Aggregation  Gives provable guarantee for Borda’s method (1781!) Future Directions  Try and analyze (variants) of heuristics that work well in practice

23 Research Interests Theoretical Computer Science  Coding Theory  Algorithmic Game Theory  Sublinear algorithms  Approximation and online algorithms

24 For more information… My Office is Bell 123: drop by! CSE 510C this fall  Course on error correcting codes