6.440 Essential Coding Theory Lecture 18 1 Notations and Main Results from Last Lecture

نویسنده

  • Elena Grigorescu
چکیده

Let G = L ∪ R be a bipartite graph with n left vertices and m right vertices. Then G corresponds to a binary code CG with block length n, and dimension k ≥ n −m, where the left vertices correspond to variables x1, . . . , xn ∈ {0, 1}, while the right vertices c1, . . . , cm correspond to constraints, such that ci is satisfied iff ∑ u↔ci xu = 0. Let SAT be the set of satisfied constraints, and UNSAT be its complement in R. For u ∈ L let sat(u) be the number of satisfied constraints that u is adjacent to, and let unsat(u) be the number of unsatisfied such constraints. The graph G is (c, d)-bounded if the left degrees are at most c and the right degrees are at most d. Let Γ(S) = {v ∈ R | ∃ u ∈ S, u ↔ v}. G is a (γ, δ)expander if: ∀S ⊆ L s.t. |S| < δn, it is the case that |Γ(S)| > γ|S|. We assume γ > 1. We also needed a special subset of Γ(S) namely, the set of vertices with unique neighbors in S, denoted Γ(S) = {v ∈ R | ∃ ! u ∈ S, u ↔ v}. As before, G is a (γ̃, δ)unique neighbor expander if: ∀S ⊆ L s.t. |S| < δn, it is the case that |Γ(S)| > γ̃|S|. We showed last time the existence of such expander codes and exhibited a relation between the expansion parameters of the underlying graph G and the relative distance δ(CG) of the resulting Gallager code. We could thus obtain binary codes with rate > 0 and relative minimum distance > 0, which is a non-trivial task.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Comparison of the learning of two notations: A pilot study

Introduction: MICAP is a new notation in which the teeth areindicated by letters (I-incisor, C-canine, P-premolar, M-molar)and numbers [1,2,3] which are written superscript and subscripton the relevant letters. FDI tooth notation is a two digit systemwhere one digit shows quadrant and the second one shows thetooth of the quadrant. This study aimed to compare the short termretention of knowledge...

متن کامل

Lecture 4: Covering the Large Spectrum via Dual-sparse Approximation

1 Discrete Fourier analysis In this lecture, we use the dual-sparse approximation theorem from the last lecture to prove some results in discrete Fourier analysis. For simplicity, we restrict ourselves to the setting of G ¿ n 2 , but the theorems hold (when suitably restated) for any finite abelian group G. Fourier analysis over ¿ n 2. We use ¿ 2 {0, 1} to denote the field on two elements. Let ...

متن کامل

CS364A: Algorithmic Game Theory Lecture #20: Mixed Nash Equilibria and PPAD-Completeness∗

Today we continue our study of the limitations of learning dynamics and polynomial-time algorithms for converging to and computing equilibria. Recall that we have sweeping positive results for coarse correlated and correlated equilibria, which are tractable in arbitrary games. We have only partial positive results for pure Nash equilibria of routing and congestion games, and last lecture we dev...

متن کامل

CS 364 A : Algorithmic Game Theory Lecture # 18 : From External Regret to Swap Regret and the Minimax Theorem ∗

Last lecture we proved that coarse correlated equilibria (CCE) are tractable, in a satisfying sense: there are simple and computationally efficient learning procedures that converge quickly to the set of CCE. Of course, if anything in our equilibrium hierarchy (Figure 1) was going to be tractable, it was going to be CCE, the biggest set. The good researcher is never satisfied and always seeks s...

متن کامل

comparing effect of two combined training method and lecture on puberty health on awareness level of high school girls in Masjed Soleiman

Background and Aims: it is essential to pay attention to various dimensions of puberty health among girls. This study aimed at comparing effect of two combined training method and lecture on puberty health on awareness level of high school girls in Masjed Soleiman. Methods: This is a quasi-experimental study conducted on 126 students without health educators; cluster sampling method was use...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008