Jan 14
(Sat)
Jan 15
(Sun)
Jan 16
(Mon)
Jan 17
(Tue)
Jan 18
(Wed)
Jan 19
(Thu)

9:30am

Arrival
Opening

Professor Raymond Yeung

Dr. Rachel Lin

Hong Kong Excursion

Individual Meeting

&

Departure

9:45am
11:30am
Group discussion
Group discussion
11:45am
12:00noon

Group Photo

Lunch
Lunch

2:00pm

 

 

Registration at Regal Riverside Hotel

Professor Sidharth Jaggi

Professor Lap Chi Lau

Group Presentation

4:00pm

Problem Session

Problem Session

Discussion

6:00pm
     
Closing Dinner
   
Jan 15, 2012
Venue: Lecture Theatre, 9/F., William M.W.Mong Engineering Bldg., CUHK
  Opening
9:30-9:35 Welcome speech by Prof. Andrew Yao, Director of ITCSC
9:35-9:45 Welcome speech by Prof. Raymond Yeung, Co-Director of INC
   
9:45-11:45 Prof. Shengyu Zhang
  In this lecture we will talk about polynomials, matrices, and randomness as they are used in information theory and computer science.
  [Lecture Notes]
2:00-4:00 Error-correcting Codes, part-1: by Prof. Sidharth Jaggi
 
What if you want to transmit information over a noisy channel -- what strategies would you use? The challenge is to generate combinatorial structures which are sufficiently rich so as to be able to support communication at high rates, and yet are simple enough to lend themselves to efficient construction and implementation. In this discussion-based session we'll construct efficient codes that have performance that's not too far off from corresponding bounds that we'll also prove. See the handout below for the worksheet that'll be used.
[Lecture Notes]
   
Jan 16. 2012
Venue: Room 1009, 10/F., William M.W.Mong Engineering Bldg., CUHK
9:30-11:30 Network Coding: Theory and Applications by Prof. Raymond Yeung
 
In recent years, network coding has generated much interest in information theory, coding theory, networking, wireless communications, cryptography, and computer science. Consider a point-to-point communication network on which a number of information sources are to be multicast to certain sets of destination nodes. The problem is to characterize the maximum possible throughput. Contrary to one's intuition, network coding theory reveals that it is in general not optimal to regard the information to be transmitted as a "fluid" which can simply be routed or replicated. Rather, by employing coding at the nodes, bandwidth can in general be saved. In this talk, we will give an overview of network coding theory and its extensions for error correction and information security. We will also discuss various applications of network coding.
   
2:00-4:00 Graph Connectivity, Network Coding, Expander Graph, and Matrix Rank by Prof. Lap Chi Lau
 
We present a new algebraic formulation to compute edge connectivities in a directed graph, using the ideas developed in network coding. This reduces the problem of computing edge connectivities to solving systems of linear equations, thus allowing us to use tools in linear algebra to design new algorithms. Using the algebraic formulation we obtain faster algorithms for computing single source edge connectivities and all pairs edge connectivities, in some settings the amortized time to compute the edge connectivity for one pair is sublinear. Through this connection, we have also found an interesting use of expanders and superconcentrators to design fast algorithms for some graph connectivity problems. Finally we show some recent developments on using the above ideas to design fast algorithms for computing matrix rank.
   
Jan 17, 2012
Venue: Room 1009, 10/F., William M.W.Mong Engineering Bldg., CUHK
9:30-11:30 Codes and Cryptography by Prof. Rachel Lin
 
A fundamental problem in Cryptography is how to enable mutually distrustful entities to collaborate in a computational task without breaching the privacy of their data. We will present an elegant solution to this problem that ensures perfect privacy, provided that majority of the entities are honest (i.e., follows their prescribed instructions). As we show, this solution crucially relies on a tool, called Shamir's secret sharing, that is intimately connected with the Reed-Solomon codes.
   
2:00-4:00 Group Presentation

 


Organizers: The Chinese University of Hong Kong
Institute of Network Coding
Institute of Theoretical Computer Science and Communications