+ All Categories
Home > Documents > Lecture 41

Lecture 41

Date post: 07-Jan-2016
Category:
Upload: cate
View: 37 times
Download: 0 times
Share this document with a friend
Description:
Lecture 41. CSE 331 Dec 9, 2011. HW 10 due today. Q1, Q2 and Q3 in separate piles. I will not take any HW after 1:15pm. Finals. Noon- 2:30pm. TALBRT 107. Blog post on the finals up. Fri, Dec 16. Today and Monday. hours-a-thon. Old HW and soins. Atri: Fri, 2:00-3:30 (Davis 319). - PowerPoint PPT Presentation
Popular Tags:
32
Lecture 41 CSE 331 Dec 9, 2011 1
Transcript
Page 1: Lecture 41

Lecture 41

CSE 331Dec 9, 2011

1

Page 2: Lecture 41

HW 10 due today

Q1, Q2 and Q3 in separate piles

I will not take any HW after 1:15pm

2

Page 3: Lecture 41

Finals

Noon- 2:30pm

TALBRT 107

Fri, Dec 16

Blog post on the

finals up

Blog post on the

finals up

3

Page 4: Lecture 41

Today and Monday

hours-a-thon

Atri: Fri, 2:00-3:30 (Davis 319)

Jiun-Jie: Fri, 3:00-4:30 (Commons 9)

Jesse: Mon, TBA (TBA)4

Old HW and

soins

Old HW and

soins

Page 5: Lecture 41

Solutions to HW 10

5

End of the lecture

Page 6: Lecture 41

Reminder

Please fill in the feedback forms from the Engineering school

6

Page 7: Lecture 41

High level view of CSE 331Problem StatementProblem Statement

AlgorithmAlgorithm

Problem DefinitionProblem Definition

“Implementation”“Implementation”

AnalysisAnalysis Correctness+Runtime Analysis

Data Structures

Three general techniques

Three general techniques

7

Page 8: Lecture 41

If you are curious for more

CSE431: Algorithms

CSE 396: Theory of Computation

8

Page 9: Lecture 41

HW 10 due today

Q1, Q2 and Q3 in separate piles

I will not take any HW after 1:15pm

9

Page 10: Lecture 41

Now relax…

10

Page 11: Lecture 41

11

Coding Theory

Page 12: Lecture 41

12

Communicating with my 2 year oldC(x)

x

y = C(x)+error

x Give up

“Code” C“Akash English”

C(x) is a “codeword”

Page 13: Lecture 41

13

The setupC(x)

x

y = C(x)+error

x Give up

Mapping CError-correcting code or just code

Encoding: x C(x)

Decoding: y x

C(x) is a codeword

Page 14: Lecture 41

14

Different Channels and Codes• Internet

– Checksum used in multiple layers of TCP/IP stack

• Cell phones• Satellite broadcast

– TV• Deep space

telecommunications– Mars Rover

Page 15: Lecture 41

15

“Unusual” Channels

• Data Storage– CDs and DVDs– RAID– ECC memory

• Paper bar codes– UPS (MaxiCode)

Codes are all around us

Page 16: Lecture 41

16

Redundancy vs. Error-correction

• Repetition code: Repeat every bit say 100 times– Good error correcting properties– Too much redundancy

• Parity code: Add a parity bit– Minimum amount of redundancy– Bad error correcting properties

• Two errors go completely undetected

• Neither of these codes are satisfactory

1 1 1 0 0 1

1 0 0 0 0 1

Page 17: Lecture 41

17

Two main challenges in coding theory

• Problem with parity example– Messages mapped to codewords which do not

differ in many places• Need to pick a lot of codewords that differ a

lot from each other

• Efficient decoding– Naive algorithm: check received word with all

codewords

Page 18: Lecture 41

18

The fundamental tradeoff

• Correct as many errors as possible with as little redundancy as possible

Can one achieve the “optimal” tradeoff with efficient encoding and decoding ?

Page 19: Lecture 41

Interested in more?

CSE 545, Spring 2012

19

Page 20: Lecture 41

20

Datastream AlgorithmsSingle pass over the input Poly-log “scratch” space

Page 21: Lecture 41

21

Data Streams (another application)

• Databases are huge– Fully reside in disk memory

• Main memory– Fast, not much of it

• Disk memory– Slow, lots of it– Random access is expensive– Sequential scan is reasonably

cheap

Main memory

Disk Memory

Page 22: Lecture 41

22

Data Streams (another application)• Given a restriction on number

of random accesses to disk memory

• How much main memory is required ?

• For computations such as join of tables

Main memory

Disk memory

Page 23: Lecture 41

Group Testing Overview

Test soldier for a disease

WWII example: syphillis

23

Page 24: Lecture 41

Group Testing Overview

Test an army for a disease

WWII example: syphillis

What if only one soldier has the

disease?

What if only one soldier has the

disease?

Can pool blood samples and

check if at least one soldier has

the disease

Can pool blood samples and

check if at least one soldier has

the disease

24

Page 25: Lecture 41

Compressed Sensing

25

http://www-stat.stanford.edu/~candes/stats330/index.shtml

Page 26: Lecture 41

Moving your data to the cloud

26

http://1sdiresource.com/pile.jpg

http://myhosting.com/blog/2011/06/cloud-storage-vps-vps-remote-fill-storage/

Page 27: Lecture 41

What if the cloud was bad?

27

http://area.autodesk.com/userdata/forum/h/harry_potter_clouds_scene.jpg

Page 28: Lecture 41

It all comes back to the same thing

28

CodingTheory

ComplexityTheory

LISTDECODING

Page 29: Lecture 41

Fingerprints as PasswordsOr making “Forgot password” links obsolete

Challenges in Fingerprint Matching

Fingerprint readings are inconsistent

Matching Algorithms exist

even in practice…

Using fingerprints securely?

Stored fingerprints can be stolen

Easy Hard

Main idea: obfuscate the fingerprint!

Use “error correcting codes”

Supported by:

Jesse Hartloff Sergey Tulyakov

Venu Govindaraju (PI) Atri Rudra (co-PI)

Team:

Relevant UBCSE courses:

CSE 666 (S ‘12) CSE 545 (S ‘12)

29

Page 30: Lecture 41

Whatever your impression of the 331

IT WASIT WAS

30

Page 31: Lecture 41

Hopefully it was fun!

31

Page 32: Lecture 41

Thanks!

32


Recommended