4,773 research outputs found

    Two-batch liar games on a general bounded channel

    Get PDF
    We consider an extension of the 2-person R\'enyi-Ulam liar game in which lies are governed by a channel CC, a set of allowable lie strings of maximum length kk. Carole selects x∈[n]x\in[n], and Paul makes tt-ary queries to uniquely determine xx. In each of qq rounds, Paul weakly partitions [n]=A0βˆͺ>...βˆͺAtβˆ’1[n]=A_0\cup >... \cup A_{t-1} and asks for aa such that x∈Aax\in A_a. Carole responds with some bb, and if aβ‰ ba\neq b, then xx accumulates a lie (a,b)(a,b). Carole's string of lies for xx must be in the channel CC. Paul wins if he determines xx within qq rounds. We further restrict Paul to ask his questions in two off-line batches. We show that for a range of sizes of the second batch, the maximum size of the search space [n][n] for which Paul can guarantee finding the distinguished element is ∼tq+k/(Ek(C)(qk))\sim t^{q+k}/(E_k(C)\binom{q}{k}) as qβ†’βˆžq\to\infty, where Ek(C)E_k(C) is the number of lie strings in CC of maximum length kk. This generalizes previous work of Dumitriu and Spencer, and of Ahlswede, Cicalese, and Deppe. We extend Paul's strategy to solve also the pathological liar variant, in a unified manner which gives the existence of asymptotically perfect two-batch adaptive codes for the channel CC.Comment: 26 page

    Improving the Sphere-Packing Bound for Binary Codes over Memoryless Symmetric Channels

    Full text link
    A lower bound on the minimum required code length of binary codes is obtained. The bound is obtained based on observing a close relation between the Ulam's liar game and channel coding. In fact, Spencer's optimal solution to the game is used to derive this new bound which improves the famous Sphere-Packing Bound.Comment: 5 pages,3 figures, Presented at the Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing, Sep. 200

    The Entropy of Lies: Playing Twenty Questions with a Liar

    Get PDF

    Deterministic and Probabilistic Binary Search in Graphs

    Full text link
    We consider the following natural generalization of Binary Search: in a given undirected, positively weighted graph, one vertex is a target. The algorithm's task is to identify the target by adaptively querying vertices. In response to querying a node qq, the algorithm learns either that qq is the target, or is given an edge out of qq that lies on a shortest path from qq to the target. We study this problem in a general noisy model in which each query independently receives a correct answer with probability p>12p > \frac{1}{2} (a known constant), and an (adversarial) incorrect one with probability 1βˆ’p1-p. Our main positive result is that when p=1p = 1 (i.e., all answers are correct), log⁑2n\log_2 n queries are always sufficient. For general pp, we give an (almost information-theoretically optimal) algorithm that uses, in expectation, no more than (1βˆ’Ξ΄)log⁑2n1βˆ’H(p)+o(log⁑n)+O(log⁑2(1/Ξ΄))(1 - \delta)\frac{\log_2 n}{1 - H(p)} + o(\log n) + O(\log^2 (1/\delta)) queries, and identifies the target correctly with probability at leas 1βˆ’Ξ΄1-\delta. Here, H(p)=βˆ’(plog⁑p+(1βˆ’p)log⁑(1βˆ’p))H(p) = -(p \log p + (1-p) \log(1-p)) denotes the entropy. The first bound is achieved by the algorithm that iteratively queries a 1-median of the nodes not ruled out yet; the second bound by careful repeated invocations of a multiplicative weights algorithm. Even for p=1p = 1, we show several hardness results for the problem of determining whether a target can be found using KK queries. Our upper bound of log⁑2n\log_2 n implies a quasipolynomial-time algorithm for undirected connected graphs; we show that this is best-possible under the Strong Exponential Time Hypothesis (SETH). Furthermore, for directed graphs, or for undirected graphs with non-uniform node querying costs, the problem is PSPACE-complete. For a semi-adaptive version, in which one may query rr nodes each in kk rounds, we show membership in Ξ£2kβˆ’1\Sigma_{2k-1} in the polynomial hierarchy, and hardness for Ξ£2kβˆ’5\Sigma_{2k-5}

    Economic and Organizational Issues in Alaska Water Quality Management

    Get PDF
    The work upon which this report (Proj. A-029-ALAS) is based was supported by funds provided by the United States Department of the Interior, Office of Water Resources Research, as authorized under the Water Resources Act of 1964
    • …
    corecore