Lecture 8 : Pseudorandomness and Sketching

نویسنده

  • Paul Beame
چکیده

Thus far we have been considered linear sketching algorithms for data streams where the sketch is given by an S ×M random matrix A where S is small and at most the space bound and M is huge. So far, as in the Count-Min, Count, and Tug-of-War sketches, the matrix A has been defined implicitly using pairwise or 4-wise independence using a very small number of random bits that contribute only a small amount to the space bound. If we required truly M -wise independent random entries in A then it would cost too much to store them during the algorithm.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Lecture 15 : Pseudorandomness for Logarithmic Space

In the last lecture, we discussed a recursive construction of a pseudorandom generator that is based on expanders: the INW generator. In this lecture we will show that the INW-generator with a suitable instantiation of an expander family produces pseudorandomness for machines that run in logarithmic space. We also introduce Nisan’s generator, which is a pseudorandom generator that has a recursi...

متن کامل

2 . 3 Sketching using Locality Sensitive Hashing

In this lecture we will get to know several techniques that can be grouped by the general definition of sketching. When using the sketching technique each element is replaced by a more compact representation of itself. An alternative algorithm is run on the more compact representations. Finally, one has to show that this algorithm gives the same result as the original algorithm with high probab...

متن کامل

Lecture 21

1 Overview In this lecture, we will • Wrap up Alon-Edmonds-Luby's graph theoretical codes: construction and analysis of distance • Introduce the interplay between codes and computational complexity: open problems and pseudorandomness 2 Alon-Edmonds-Luby The construction of the code depends on three main ingredients: • A binary code C 0 = [d, R 0 d, δ 0 d] 2 , where R 0 and δ 0 are our target ra...

متن کامل

18.405J S16 Lecture 21: P vs BPP 2

In the previous lecture, we began our discussion of pseudorandomness. We presented the BlumMicali definition of a pseudorandom generator, which defines pseudorandomness in terms of how hard it is for members of a specific computation class to distinguish between true randomness and generated randomness. We proved Yao’s theorem, which provides a link between the existence of certain pseudorandom...

متن کامل

Lecture 14 — October 30 , 2012

In the previous lecture, we began our discussion of pseudorandomness. We presented the BlumMicali definition of a pseudorandom generator, which defines pseudorandomness in terms of how hard it is for members of a specific computation class to distinguish between true randomness and generated randomness. We proved Yao’s theorem, which provides a link between the existence of certain pseudorandom...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014