Learn More
We prove that a random linear code over F q , with probability arbitrarily close to 1, is list decodable at radius 1 − 1/q − with list size L = O(1// 2) and rate R = Ω q (2 /(log 3 (1//))). Up to the polylogarithmic factor in 1// and constant factors depending on q, this matches the lower bound L = Ω q (1// 2) for the list size and upper bound R = O q (2)(More)
We present a new algorithm that produces a well-spaced superset of points conforming to a given input set in any dimension with guaranteed optimal output size. We also provide an approximate Delaunay graph on the output points. Our algorithm runs in expected time O(2<sup>O(d)</sup>(n log n + m)), where n is the input size, m is the output point set size,(More)
We prove a lower estimate on the increase in entropy when two copies of a conditional random variable X|Y , with X supported on Z q = {0, 1,. .. , q − 1} for prime q, are summed modulo q. Specifically, given two i.i.d. copies (X 1 , Y 1) and (X 2 , Y 2) of a pair of random variables (X, Y), with X taking values in Z q , we show H(X 1 + X 2 | Y 1 , Y 2) −(More)
Several researchers proposed using non-Euclidean metrics on point sets in Euclidean space for clustering noisy data. Almost always, a distance function is desired that recognizes the closeness of the points in the same cluster, even if the Euclidean cluster diameter is large. Therefore , it is preferred to assign smaller costs to the paths that stay close(More)
Various combinatorial/algebraic parameters are used to quantify the complexity of a Boolean function. Among them, sensitivity is one of the simplest and block sensitivity is one of the most useful. Nisan (1989) and Nisan and Szegedy (1991) showed that block sensitivity and several other parameters, such as certificate complexity, decision tree depth, and(More)
We introduce the notion of one-way communication schemes with partial noiseless feedback. In this setting, Alice wishes to communicate a message to Bob by using a communication scheme that involves sending a sequence of bits over a channel while receiving feedback bits from Bob for δ fraction of the transmissions. An adversary is allowed to corrupt up to a(More)
Locally testable codes (LTCs) of constant minimum (absolute) distance that allow the tester to make a nearly linear number of queries have become the focus of attention recently, due to their connections to central questions in approximability theory. In particular, the binary Reed-Muller code of block length N and absolute distance d is known to be(More)