Nexus Trimester - 2016 - Central Workshop

# You can also click the upper-left icon to select videos from the playlist.

source: Institut Henri Poincaré     2016年3月14日

Sidharth Jaggi (CUHK) 38:17 Reliable communication in the presence of limited adversaires
Sidharth Jaggi (CUHK)
March 04, 2016
Abstract: An adversary wishes to corrupt stored (or transmitted) data, but operates in an information-limited manner. Examples of such limitations may include only viewing some subset of the data or some noisy version of it, viewing those subsets causally, or with the encoder getting feedback about the corruption. We determine the capacity of some classes of such channels, and computationally efficient schemes achieving these capacities in some models (in particular over “large alphabets”). This is an overview of a long line of classical results, and also work done over the last few years (with an emphasis on a flurry of recent results) in collaboration Bikash Kumar Dey, Anand Dilip Sarwate, Michael Langberg, Zitan Chen, Mayank Bakshi, Qiaosheng Zhang (Eric), Alex Sprintson, and Swanand Kadhe.Petr Kuznetsov (Télécom Paristech) 43:52
Omar Fawzi (ENS Lyon) 34:49
Ofer Shayevitz (Tel Aviv University) 34:39
Maxim Raginsky (University of Illinois) 36:50
David Woodruff (IBM Almaden) 38:48
Ankit Garg (Princeton) 35:42
Ran Gelles (Princeton) 36:54
Amir Yehudayoff (Technion) 33:16
Iordanis Kerenidis (Université Paris Diderot 7) 37:37
Ayfer Özgür (Stanford) 33:13
Rajesh Sundaresan 37:11
Sidharth Jaggi (CUHK) 34:48
Michelle Effros (California Institute of Technology) 36:15
Aaron Wagner (Cornell) 47:16
Shlomo Shamai (Technion) 38:51
Shay Moran (Technion) 24:27
Giacomo Como (Lund University) 42:28
Bruno Bauwens (Higher School of Economics) 29:06
Stephen Chestnut (ETH Zurich) 34:03

No comments: