Deterministic Extractors - Lecture Notes
نویسندگان
چکیده
Randomness is used in many places in our daily lives. Some examples are gambling, statistics, algorithms, cryptography etc. For such applications one typically assumes a supply of completely unbiased and independent randim bits. This raises the problem of where to get these assumed random bits from. We could try and use natural sources of randomness such as sun spots, the stock market or the weather, which seem unpredictable at least to some degree. The problem is that these natural sources are not completely random, only somewhat random, in the sense that samples from them are often correlated and biased. The goal of deterministic extractors is to extract completely random bits from such “weak random sources”. One hopes to obtain extractors which would achieve this task for as large and general families of weak sources. We will concentrate on the problem of extracting only a single random bit, which turns out to demonstrate the variety of problems, results and techniques in this area (in the general case we would like to get many uncorrelated bits). We will not discuss here seeded extractors (e.g. see survey [Sha02] and the recent [DW08]).
منابع مشابه
Applied Dynamical Systems London Taught Course Centre , Lectures 6 – 10 From Deterministic Chaos to Deterministic Diffusion
These are easy-to-read lecture notes for a short first-year Ph.D. student course on Applied Dynamical Systems, given at the London Taught Course Centre in Spring 2008 and 2009. The full course consists of two parts, each covering five hours of lectures. The first part by David Arrowsmith is on Basic dynamical systems, intermittency and autocorrelation. The present notes cover only the second pa...
متن کاملLecture 12: Weak Sources of Randomness and Extractors
Probabilistic algorithms play a major role in computer science; for some problems, for example Identity Testing, there is no efficient deterministic algorithm, but instead there are quite efficient probabilistic ones. For some other problems like Primality, although we know the problem is in P, yet randomized algorithms are more efficient. Randomization is also a major ingredient in Cryptograph...
متن کاملFactors affecting students tendency of Univercity students to Lecture Notes
Introduction: Many studies detected factors contributing to the students’ tendency to lecture notes. This study aimed at evaluating the factors affecting students tendency to lecture notes in Hormozgan University of Medical Sciences. Methods: In this descriptive study, 179 students from medicine, nursing & midwifery, health, and Paramedicine schools were selected through stratified random...
متن کاملApplied Dynamical Systems
These are easy-to-read lecture notes for a short first-year Ph.D. student course on Applied Dynamical Systems, given at the London Taught Course Centre in Spring 2008, 2009 and 2010. The full course consists of two parts, covering four and six hours of lectures, respectively. The first part taught by Wolfram Just is on Basic Dynamical Systems. The present notes cover only the second part, which...
متن کاملLecture Notes on Evasiveness of Graph Properties
These notes cover the first eight lectures of the class Many Models of Complexity taught by László Lovász at Princeton University in the Fall of 1990. The first eight lectures were on evasiveness of graph properties and related topics; subsequent lectures were on communication complexity and Kolmogorov complexity and are covered in other sets of notes. The fundamental question considered in the...
متن کامل