Concert : Spem in Alium

I’m singing in this concert next week — I’m baritone in Choir 8 for “Spem in Alium,” which is for 8 choirs of 5.

SPEM IN ALIUM
Music of the English Renaissance

The Pacific Collegium, directed by Christopher Kula, and Schola Cantorum San Francisco, directed by John Renke, assemble the Bay Area’s finest choral forces to perform Thomas Tallis’ lush, rich and rarely-performed forty-part motet in celebration of John Renke’s forty years of artistry in the Bay Area. Also performed- William Byrd’s Mass for 5 Voices and selections from the Great Service.

Friday October 13, 8:00 PM
Ss. Peter and Paul Church
660 Filbert Street
San Francisco, CA 94133
P: 415.421.5219

Saturday October 14, 8:00 PM
St. Marks Episcopal Church
2300 Bancroft Way
Berkeley, CA 94704
P: 510.848.5107

Sunday October 15, 4:00 PM
Mercy Center
2300 Adeline Drive
Burlingame, CA 94010
P: 650.340.7474

ADMISSION: $18 general, $12 seniors, $8 students

TICKETS : Available online or at the door.

Allerton 2006

I just finished up attending the 44th Annual Allerton Conference on Communication, Control, and Computation. Conveniently, the conference is held in Monticello, IL, which is a short drive away from Urbana. So it’s a free trip home for me, and another chance to flog my research. The conference was fun — I attended a number of good talks, and although the synchronization across sessions was a little uneven, I think I got a lot of ideas out of being there. What follows is a small set of notes on a subset of talks that I attended. I went to more talks than these, and some that I didn’t mention here were also quite interesting.

As always, I may have misunderstood some of the results, so don’t take my word for it necessarily…

  • How to Filter an “Individual Sequence with Feedback”
    T. Weissman (Stanford)

    This was on a problem that is sometimes called “compound sequential decision-making against the well-informed antagonist.” The idea is that you have some data sequence which is corrupted by noise and you would like to denoise it. If the sequence is arbitrary, then you can take an individual sequence approach to the problem. However, suppose now that you observe the noisy sequence causally, and an aversary can select the next data sample based on the noisy outputs of the previous data samples. This is the well-informed adversary, and the problem becomes significantly harder. The interesting result for me is that randomized strategies perform better than deterministic ones, since the adversary can’t track the output. This is of course related in some way to the problems I’m thinking about, but has a totally different flavor.

  • Sharp Thresholds for Sparsity Recovery in the High-Dimensional and Noisy Setting
    M. Wainwright (Berkeley)

    There has been lots of work on compressed sensing and sparse reconstructions in recent years. Wainwright is interested in recovering a sparsity pattern in high dimensional data
    that is, which elements are nonzero? A lot of asymptotic analysis is done to relate how many observations you need of the noisy data in terms of the dimension of the problem and the number of nonzero elements. It turns out that scaling the sparsity linearly with the dimension of the problem is bad (which may not be so surprising to some, but it’s hard for me to get an intuition for these things).

  • Delay Asymptotics with Network Source Coding
    S. Bhadra and S. Shakkottai (UT Austin)

    This was an interesting talk on interpreting coding across packets in networks as effectively moving the buffering from nodes in the network back to the source. In networks with heterogeneous traffic, this might be a useful way of thinking about things. Shakkottai said it was like “waterpouring over unused capacity,” which sounded like an appealing intuition. Whenever I get the proceedings I’d like to look at the details.

  • How to Achieve Linear Capacity Scaling without Mobility
    A. Ozgur (EPFL), O. Leveque (Stanford) and D. Tse (Berkeley)

    This talk was completely packed, as it showed a complete solution for the scaling law problem in dense wireless networks like those of Gupta and Kumar. The scheme to achieve this was a hierarchical MIMO scheme on an overlay grid for the network that tried to get the maximum spatial reuse. The big picture was clear and the details looked quite tricky. The major thing needed is independent uniform phase fading from each point-to-point link in the network. There was a little confusion during the questions about uniform phase and scattering effects that went a bit over my head. The mathematical problem seems settled, although the debate on the engineering question may be open…

  • Coding into a Source: A Direct Inverse Rate-Distortion Theorem
    M. Agarwal (MIT), A. Sahai (Berkeley) and S. Mitter (MIT)

    Suppose you have to use a fixed input distribution for a channel, and the channel is guaranteed, given that input distribution, to not distort the input by too much (using a given distortion measure). How well can you do across such a channel? The capacity is actually the rate distortion function R(D), which neatly gives an operational meaning for rate-distortion in terms of channel coding. It’s a difficult problem to wrap your head around, and nearly impossible to describe in a few sentences. It’s one of those results that is trying to get at what information really is, and to what extent the “bit” formalism of information theory is a fundamental aspect of nature.

  • Data Fusion Trees for Detection: Does Architecture Matter?
    W-P. Tay, J. Tsitsilkis, and M. Win (MIT)

    Suppose we have a huge number of sensors that all observe iid samples that could come from one of two distributions. A fusion center wants to decide which distribution governs the samples, and can get quantized versions of the samples from the sensors. This paper is trying to get at how different fusion architectures (e.g. trees) perform versus a totally centralized scheme. The main result is that if the total number of leaves is asymptotically the same as the number of sensors and the tree has bounded height, then we can do as well as a completely centralized solution.

  • Randomization for robust communication in networks, or “Brother, can you spare a bit?”
    A.D. Sarwate and M. Gastpar (Berkeley)

    I don’t have much to say about this paper, since I wrote it. The basic idea is to justify the AVC model for interference in networks and to come up with some strategies for sensor networks and ad-hoc wireless networks to generate secret random keys to enable randomized coding on links in the network. For sensor networks, two terminals might be able to extract a shared random key from correlated sources. In wireless networks we can sacrifice some nodes to distribute keys to their neighbors in a decentralized scheme. The main point is that key distribution needs to happen only once — a new key for the next transmission can be sent with the current transmission with no asymptotic cost in rate.

  • Probabilistic Analysis of LP Decoding
    A.D.G. Dimakis, C. Daskalakis, R. Karp, and M. Wainwright (UC Berkeley)

    LP decoding is appealing since it is a way of efficiently decoding LDPC codes. The authors here provide a formalism for analyzing the performance of LP decoding for random errors (rather than the adversarial error model). The heuristic is that bits that are corrupted have “poison” that must be redistributed around the Tanner graph of the code using what they call a valid hyperflow. If such a flow exists than LP decoding succeeds. They then prove that for a large class of codes that are expanders a hyperflow will exist with high probability.

  • Distributed Beamforming Using 1 Bit Feedback: From Concept to Realization
    R. Mudumbai (UC Santa Barbara), B. Wild (UC Berkeley), U. Madhow (UC Santa Barbara), and K. Ramchandran (UC Berkeley)

    The one bit feedback scheme for distributed beamforming is a way of aligning antennas using one bit of feedback about the received SNR. Imagine a large number of nodes communicating with a base station. Beamforming gains can be huge with a large number of antennas, so it would be good if they could adjust their phases to add coherently at the receiver. The authors describe their scheme and show some experimental results. There is also an analysis of the speed of convergence, which is linear in the number of antennas.

  • Achieving List Decoding Capacity Using Folded Reed-Solomon Codes
    V. Guruswami and A. Rudra (U. Washington)

    Consider a Reed-Solomon code of blocklength n over an alphabet of size q that communicates N bits. We can take this code and make it into a Folded Reed-Solomon code of blocklength n/m over an alphabet of size mq that communicates N bits by taking m consecutive symbols and treating them as a single packet. In doing this and some clever list-decoding modifications to the original Guruswami-Sudan algorithm, the authors can get arbitrarily close to the capacity of the erasure channel. The tricky thing is that the alphabet size has to increase we well. The construction and decoding are pretty cool though, and it makes me wish we had done some of this kind of stuff in my algebra classes.

pstricks and Type 3 fonts

A warning to those who use the LaTeX package pstricks to make figures for papers : the macro “\psdots” will use a Type 3 font in the image that may cause your pre-press PDF validity checker to get annoyed at you. To avoid this you have to use “\pscircle,” which for me means a lot of cutting and pasting.

UPDATE : See my earlier experience for more pstricks + type 3 fonts issues. This time, however, the dashed lines were completely fine, so that makes me think that the IEEE PDF engine was even more confused than this one.

more IEEE election ridiculousness

The paper ballot that I was given for the IEEE general elections is misprinted! The two candidates for IEEE-USA President Elect are switched with the two candidates for Member-at-Large. The biographies/statements are printed correctly in the book, but the ballot is all wrong. What kind of an operation are these guys running anyway?

As a further note on the Information Theory Society ballot, one thing that was missing was a statement from any of the candidates — I basically had to make a decision on which 6 to vote for based on what I thought of their research, how they have comported themselves in talks, and (in a very few cases) personal interactions. None of these things really have much to do with how well they would do at running and organization, and there are certain policy issues which I think need to be addressed. It kind of makes the whole election thing into a referendum on research quality. I hope that changes in the future.

UPDATE : IEEE sent me a new ballot in the mail — that was pretty fast! Color me impressed…

silly coffeeshop names

If you’ll forgive the Seinfeldism, what’s the deal with “amusingly named” coffeeshops?

  • Daily Grind
  • Sufficient Grounds
  • Perks of the Job
  • Common Grounds
  • Drinky the Crow’s Kaw-fee Hut (ok, not really)

Is it that people are more willing to take the terrible puns before they’ve had their coffee?

Information Theory Society Ballots

I recently received my IEEE Information Theory Society Board of Governor ballot. It says there that

On the ballot card, names are listed in randomized order, no preference is intended.

Leaving the grammatical issues aside, what does this mean? This is the information theory crowd, so they should have told us how they were doing the randomizing! I mean, we’re supposed to get excited by that stuff, right? A more freewheeling (and incorrect) take on it is that they sent a different randomized ballot order to every one of the “over 6000” members of the society. Since there are 15 nominees for the board, there are a total of 15! = 1,307,674,368,000 different orderings, which would make the ballots-alphabet highly undersampled. Given that Alon Orlitsky is one of the candidates, perhaps that would be more appropriate…

amusing

The Frank Gehry Cocktail:

Now surround each shot with artistically-arranged panels of sugar, pin a strip of lime-peel to the top of each with a silver cocktail pick (?) or toothpick and draw the peel around the drink, thus holding it together. Serves two. (Hint: to drink, use the sugar panels to scoop up the gelatin.)

Ohgane

Broadway slightly after 40th. This is a Korean BBQ place that’s slightly out of the way from the main Korean drag on Telegraph. If you’re willing to pony up a ridiculous amount of money to be stuffed to the gills with meat grilled at your table, rice and an array of 20 little dishes of pickled things of unknown provenance, this is the place for you.

In case you’ve never been to a Korean BBQ, the tables have a hood and a grill at the table — you order various sorts of marinated (and sometimes unmarinated) meat that they then bring to the table and grill for you. There are some kind of wood chips in the grill to give a little smoky flavor, and the meat comes pretty de-fatted, which makes it all the better. We tried the saeng kalbi, which is unmarinated kalbi meat with a sesame oil dipping sauce. We also had a spicy pork thing that was not for the faint of tongue. Next time I come here I want to bring a larger group and also some Korean people to help explain the food better. This will be after my pocketbook recovers, of course.

A big thing to draw me back is that they have naeng-myun, a cold soup that I really like and haven’t had in years.