16 research outputs found

    Spectra of lifted Ramanujan graphs

    Get PDF
    A random nn-lift of a base graph GG is its cover graph HH on the vertices [n]×V(G)[n]\times V(G), where for each edge uvu v in GG there is an independent uniform bijection π\pi, and HH has all edges of the form (i,u),(π(i),v)(i,u),(\pi(i),v). A main motivation for studying lifts is understanding Ramanujan graphs, and namely whether typical covers of such a graph are also Ramanujan. Let GG be a graph with largest eigenvalue λ1\lambda_1 and let ρ\rho be the spectral radius of its universal cover. Friedman (2003) proved that every "new" eigenvalue of a random lift of GG is O(ρ1/2λ11/2)O(\rho^{1/2}\lambda_1^{1/2}) with high probability, and conjectured a bound of ρ+o(1)\rho+o(1), which would be tight by results of Lubotzky and Greenberg (1995). Linial and Puder (2008) improved Friedman's bound to O(ρ2/3λ11/3)O(\rho^{2/3}\lambda_1^{1/3}). For dd-regular graphs, where λ1=d\lambda_1=d and ρ=2d1\rho=2\sqrt{d-1}, this translates to a bound of O(d2/3)O(d^{2/3}), compared to the conjectured 2d12\sqrt{d-1}. Here we analyze the spectrum of a random nn-lift of a dd-regular graph whose nontrivial eigenvalues are all at most λ\lambda in absolute value. We show that with high probability the absolute value of every nontrivial eigenvalue of the lift is O((λρ)logρ)O((\lambda \vee \rho) \log \rho). This result is tight up to a logarithmic factor, and for λd2/3ϵ\lambda \leq d^{2/3-\epsilon} it substantially improves the above upper bounds of Friedman and of Linial and Puder. In particular, it implies that a typical nn-lift of a Ramanujan graph is nearly Ramanujan.Comment: 34 pages, 4 figure

    Sparse graph codes for compression, sensing, and secrecy

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2010.Cataloged from student PDF version of thesis.Includes bibliographical references (p. 201-212).Sparse graph codes were first introduced by Gallager over 40 years ago. Over the last two decades, such codes have been the subject of intense research, and capacity approaching sparse graph codes with low complexity encoding and decoding algorithms have been designed for many channels. Motivated by the success of sparse graph codes for channel coding, we explore the use of sparse graph codes for four other problems related to compression, sensing, and security. First, we construct locally encodable and decodable source codes for a simple class of sources. Local encodability refers to the property that when the original source data changes slightly, the compression produced by the source code can be updated easily. Local decodability refers to the property that a single source symbol can be recovered without having to decode the entire source block. Second, we analyze a simple message-passing algorithm for compressed sensing recovery, and show that our algorithm provides a nontrivial f1/f1 guarantee. We also show that very sparse matrices and matrices whose entries must be either 0 or 1 have poor performance with respect to the restricted isometry property for the f2 norm. Third, we analyze the performance of a special class of sparse graph codes, LDPC codes, for the problem of quantizing a uniformly random bit string under Hamming distortion. We show that LDPC codes can come arbitrarily close to the rate-distortion bound using an optimal quantizer. This is a special case of a general result showing a duality between lossy source coding and channel coding-if we ignore computational complexity, then good channel codes are automatically good lossy source codes. We also prove a lower bound on the average degree of vertices in an LDPC code as a function of the gap to the rate-distortion bound. Finally, we construct efficient, capacity-achieving codes for the wiretap channel, a model of communication that allows one to provide information-theoretic, rather than computational, security guarantees. Our main results include the introduction of a new security critertion which is an information-theoretic analog of semantic security, the construction of capacity-achieving codes possessing strong security with nearly linear time encoding and decoding algorithms for any degraded wiretap channel, and the construction of capacity-achieving codes possessing semantic security with linear time encoding and decoding algorithms for erasure wiretap channels. Our analysis relies on a relatively small set of tools. One tool is density evolution, a powerful method for analyzing the behavior of message-passing algorithms on long, random sparse graph codes. Another concept we use extensively is the notion of an expander graph. Expander graphs have powerful properties that allow us to prove adversarial, rather than probabilistic, guarantees for message-passing algorithms. Expander graphs are also useful in the context of the wiretap channel because they provide a method for constructing randomness extractors. Finally, we use several well-known isoperimetric inequalities (Harper's inequality, Azuma's inequality, and the Gaussian Isoperimetric inequality) in our analysis of the duality between lossy source coding and channel coding.by Venkat Bala Chandar.Ph.D

    Complexity Theory

    Get PDF
    Computational Complexity Theory is the mathematical study of the intrinsic power and limitations of computational resources like time, space, or randomness. The current workshop focused on recent developments in various sub-areas including arithmetic complexity, Boolean complexity, communication complexity, cryptography, probabilistic proof systems, pseudorandomness, and quantum computation. Many of the developments are related to diverse mathematical fields such as algebraic geometry, combinatorial number theory, probability theory, representation theory, and the theory of error-correcting codes

    Computationally efficient error-correcting codes and holographic proofs

    Get PDF
    Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Mathematics, 1995.Includes bibliographical references (p. 139-145).by Daniel Alan Spielman.Ph.D

    The expansion rate of Margulis expanders and LPS expanders for vertex set Z × Z

    No full text
    corecore