Data stream algorithms via expander graphs
#1

Abstract.
We present a simple way of designing deterministic algorithms for problems in the data stream model via lossless expander graphs.We illustrate this by considering two problems, namely, k-sparsity testing and estimating frequency of items.
1 Introduction
We say that an n-dimensional vector f from Zn is k-sparse if it has at most k non-zero entries. The problem is to test whether f is k-sparse or no after it has been subject to a sequence of coordinate wise updates in arbitrary order, that is, f is the frequency vector of a data stream. More formally, a data stream over the domain [n] = {1, 2, . . . , n} is a sequence _ of records of the form (index, i, v), where, index is the position of the record in the sequence, i 2 [n] and v 2 Z. Associated with each data stream _ is an n-dimensional frequency vector f(_), such that fi(_) is the frequency of i, or the cumulative sum of the updates to fi(_), made by the sequence _. That is, fi(_) = X (index,i,v)2_ v, i 2 [n] . The k-sparsity testing problem is as follows: design a data structure, referred to as a k-sparsity tester, that (a) processes any stream _ of updates over the domain [n], and, (b) provides a test to check whether f(_) is k-sparse, that is, whether, f has at most k non-zero entries. The problem is to obtain solutions whose space requirement is o(n). We first review work on the following well-studied and closely related problem, namely, k-sparse vector reconstruction problem, where it is required to design a structure that can process a data stream _ and can retrieve the frequency vector f(_) provided f(_) is k-sparse. However, the structure is not required to actually test whether f(_) is k-sparse or not and may present an incorrect answer if f(_) is not k-sparse. Let m denote maxni =1|fi|. It is easy to show [15] that the k-sparse reconstruction problem requires (k log(mn/k)) bits. Minsky et. al. [22] study a constrained version of the k-sparse vector reconstruction problem where f(_) 2 {−1, 0, 1}n and present a space-optimal algorithm for this scenario. Eppstein and Goodrich [11] present a space-optimal solution for the case when f(_) 2 {0, 1}n. The k-set structure [15] presents a k-sparse vector reconstruction technique for the general case when f 2 {−m, . . . ,m}n. We reproduce their theorem since we will refer to it later.

Download full report
http://googleurl?sa=t&source=web&cd=1&ve...Fisc08.pdf&ei=I7VEToyXK4HVrQea_qztAw&usg=AFQjCNH5gT4FnolID7KRu33yeg_e2PfZig&sig2=Q-Hvr532MyhHG-74Ps1a-Q
Reply

Important Note..!

If you are not satisfied with above reply ,..Please

ASK HERE

So that we will collect data for you and will made reply to the request....OR try below "QUICK REPLY" box to add a reply to this page
Popular Searches: silverlight expander, seminar topics on graphs, graphs of 1g 2g 4g 5g 3g networks, aurora a new model and architecture for data stream management ppt, graphs of parle, automotive stream based data management, data transfer via ppt,

[-]
Quick Reply
Message
Type your reply to this message here.

Image Verification
Please enter the text contained within the image into the text box below it. This process is used to prevent automated spam bots.
Image Verification
(case insensitive)

Possibly Related Threads...
Thread Author Replies Views Last Post
  A Link-Based Cluster Ensemble Approach for Categorical Data Clustering 1 1,084 16-02-2017, 10:51 AM
Last Post: jaseela123d
  Exploiting the Functional and Taxonomic Structure of Genomic Data by Probabilistic To 1 768 14-02-2017, 04:15 PM
Last Post: jaseela123d
  Remote Server Monitoring System For Corporate Data Centers smart paper boy 3 2,851 28-03-2016, 02:51 PM
Last Post: dhanabhagya
  Secured Data Hiding and Extractions Using BPCS project report helper 4 3,670 04-02-2016, 12:52 PM
Last Post: seminar report asees
  Data Hiding in Binary Images for Authentication & Annotation project topics 2 1,836 06-11-2015, 02:27 PM
Last Post: seminar report asees
  DATA LEAKAGE DETECTION project topics 16 13,118 31-07-2015, 02:59 PM
Last Post: seminar report asees
  Privacy Preservation in Data Mining sajidpk123 3 2,974 13-11-2014, 10:48 PM
Last Post: jaseela123d
  projects on data mining? shakir_ali 2 2,047 05-11-2014, 09:30 PM
Last Post: jaseela123d
  data mining full report project report tiger 25 171,252 07-10-2014, 09:10 PM
Last Post: ToPWA
  Data Security Using Honey Pot System computer science topics 5 6,702 11-09-2014, 07:45 PM
Last Post: erhhk

Forum Jump: