Jan 14 (Sat) |
Jan 15 (Sun) |
Jan 16 (Mon) |
Jan 17 (Tue) |
Jan 18 (Wed) |
Jan 19 (Thu) |
|
9:30am |
Arrival |
Opening |
Hong Kong Excursion | Individual Meeting & Departure |
||
9:45am | ||||||
11:30am |
Group discussion
| Group discussion |
||||
11:45am | ||||||
12:00noon | Group Photo |
Lunch |
||||
Lunch |
||||||
2:00pm
|
Registration at Regal Riverside Hotel |
Group Presentation |
||||
4:00pm |
Problem Session |
Problem Session |
Discussion |
|||
6:00pm |
Closing Dinner |
Jan 15, 2012 |
|
---|---|
Venue: Lecture Theatre, 9/F., William M.W.Mong Engineering Bldg., CUHK |
|
Opening | |
9:30-9:35 | Welcome speech by Prof. Andrew Yao, Director of ITCSC |
9:35-9:45 | Welcome speech by Prof. Raymond Yeung, Co-Director of INC |
9:45-11:45 | Prof. Shengyu Zhang |
In this lecture we will talk about polynomials, matrices, and randomness as they are used in information theory and computer science. | |
[Lecture Notes] | |
2:00-4:00 | Error-correcting Codes, part-1: by Prof. Sidharth Jaggi |
What if you want to transmit information over a noisy channel -- what strategies would you use? The challenge is to generate combinatorial structures which are sufficiently rich so as to be able to support communication at high rates, and yet are simple enough to lend themselves to efficient construction and implementation. In this discussion-based session we'll construct efficient codes that have performance that's not too far off from corresponding bounds that we'll also prove. See the handout below for the worksheet that'll be used. [Lecture Notes] |
|
Jan 16. 2012 |
|
Venue: Room 1009, 10/F., William M.W.Mong Engineering Bldg., CUHK |
|
9:30-11:30 | Network Coding: Theory and Applications by Prof. Raymond Yeung |
In recent years, network coding has generated much interest in information theory, coding theory, networking, wireless communications, cryptography, and computer science. Consider a point-to-point communication network on which a number of information sources are to be multicast to certain sets of destination nodes. The problem is to characterize the maximum possible throughput. Contrary to one's intuition, network coding theory reveals that it is in general not optimal to regard the information to be transmitted as a "fluid" which can simply be routed or replicated. Rather, by employing coding at the nodes, bandwidth can in general be saved. In this talk, we will give an overview of network coding theory and its extensions for error correction and information security. We will also discuss various applications of network coding. |
|
2:00-4:00 | Graph Connectivity, Network Coding, Expander Graph, and Matrix Rank by Prof. Lap Chi Lau |
We present a new algebraic formulation to compute edge connectivities in a directed graph, using the ideas developed in network coding. This reduces the problem of computing edge connectivities to solving systems of linear equations, thus allowing us to use tools in linear algebra to design new algorithms. Using the algebraic formulation we obtain faster algorithms for computing single source edge connectivities and all pairs edge connectivities, in some settings the amortized time to compute the edge connectivity for one pair is sublinear. Through this connection, we have also found an interesting use of expanders and superconcentrators to design fast algorithms for some graph connectivity problems. Finally we show some recent developments on using the above ideas to design fast algorithms for computing matrix rank. |
|
Jan 17, 2012 |
|
Venue: Room 1009, 10/F., William M.W.Mong Engineering Bldg., CUHK |
|
9:30-11:30 | Codes and Cryptography by Prof. Rachel Lin |
A fundamental problem in Cryptography is how to enable mutually distrustful entities to collaborate in a computational task without breaching the privacy of their data. We will present an elegant solution to this problem that ensures perfect privacy, provided that majority of the entities are honest (i.e., follows their prescribed instructions). As we show, this solution crucially relies on a tool, called Shamir's secret sharing, that is intimately connected with the Reed-Solomon codes. |
|
2:00-4:00 | Group Presentation |