1,823 research outputs found
Performance bounds for expander-based compressed sensing in Poisson noise
This paper provides performance bounds for compressed sensing in the presence
of Poisson noise using expander graphs. The Poisson noise model is appropriate
for a variety of applications, including low-light imaging and digital
streaming, where the signal-independent and/or bounded noise models used in the
compressed sensing literature are no longer applicable. In this paper, we
develop a novel sensing paradigm based on expander graphs and propose a MAP
algorithm for recovering sparse or compressible signals from Poisson
observations. The geometry of the expander graphs and the positivity of the
corresponding sensing matrices play a crucial role in establishing the bounds
on the signal reconstruction error of the proposed algorithm. We support our
results with experimental demonstrations of reconstructing average packet
arrival rates and instantaneous packet counts at a router in a communication
network, where the arrivals of packets in each flow follow a Poisson process.Comment: revised version; accepted to IEEE Transactions on Signal Processin
Derandomization and Group Testing
The rapid development of derandomization theory, which is a fundamental area
in theoretical computer science, has recently led to many surprising
applications outside its initial intention. We will review some recent such
developments related to combinatorial group testing. In its most basic setting,
the aim of group testing is to identify a set of "positive" individuals in a
population of items by taking groups of items and asking whether there is a
positive in each group.
In particular, we will discuss explicit constructions of optimal or
nearly-optimal group testing schemes using "randomness-conducting" functions.
Among such developments are constructions of error-correcting group testing
schemes using randomness extractors and condensers, as well as threshold group
testing schemes from lossless condensers.Comment: Invited Paper in Proceedings of 48th Annual Allerton Conference on
Communication, Control, and Computing, 201
A robust parallel algorithm for combinatorial compressed sensing
In previous work two of the authors have shown that a vector with at most nonzeros can be recovered from an expander
sketch in operations via the
Parallel- decoding algorithm, where denotes the
number of nonzero entries in . In this paper we
present the Robust- decoding algorithm, which robustifies
Parallel- when the sketch is corrupted by additive noise. This
robustness is achieved by approximating the asymptotic posterior distribution
of values in the sketch given its corrupted measurements. We provide analytic
expressions that approximate these posteriors under the assumptions that the
nonzero entries in the signal and the noise are drawn from continuous
distributions. Numerical experiments presented show that Robust- is
superior to existing greedy and combinatorial compressed sensing algorithms in
the presence of small to moderate signal-to-noise ratios in the setting of
Gaussian signals and Gaussian additive noise
On Fortification of Projection Games
A recent result of Moshkovitz \cite{Moshkovitz14} presented an ingenious
method to provide a completely elementary proof of the Parallel Repetition
Theorem for certain projection games via a construction called fortification.
However, the construction used in \cite{Moshkovitz14} to fortify arbitrary
label cover instances using an arbitrary extractor is insufficient to prove
parallel repetition. In this paper, we provide a fix by using a stronger graph
that we call fortifiers. Fortifiers are graphs that have both and
guarantees on induced distributions from large subsets. We then show
that an expander with sufficient spectral gap, or a bi-regular extractor with
stronger parameters (the latter is also the construction used in an independent
update \cite{Moshkovitz15} of \cite{Moshkovitz14} with an alternate argument),
is a good fortifier. We also show that using a fortifier (in particular
guarantees) is necessary for obtaining the robustness required for
fortification.Comment: 19 page
Candidate One-Way Functions and One-Way Permutations Based on Quasigroup String Transformations
In this paper we propose a definition and construction of a new family of
one-way candidate functions , where
is an alphabet with elements. Special instances of these functions can have
the additional property to be permutations (i.e. one-way permutations). These
one-way functions have the property that for achieving the security level of
computations in order to invert them, only bits of input are needed.
The construction is based on quasigroup string transformations. Since
quasigroups in general do not have algebraic properties such as associativity,
commutativity, neutral elements, inverting these functions seems to require
exponentially many readings from the lookup table that defines them (a Latin
Square) in order to check the satisfiability for the initial conditions, thus
making them natural candidates for one-way functions.Comment: Submitetd to conferenc
- …