New📚 Introducing our captivating new product - Explore the enchanting world of Novel Search with our latest book collection! 🌟📖 Check it out

Write Sign In
Deedee BookDeedee Book
Write
Sign In
Member-only story

Deterministic Extraction From Weak Random Sources: Monographs in Theoretical Computer Science

Jese Leos
·6.4k Followers· Follow
Published in Deterministic Extraction From Weak Random Sources (Monographs In Theoretical Computer Science An EATCS Series)
5 min read
1.3k View Claps
78 Respond
Save
Listen
Share

This book develops a framework for deterministically extracting nearly optimal randomness from arbitrary sources of weak randomness. This framework has found applications in cryptography, derandomization, data structures, and machine learning, and it has led to a number of important consequences, including new constructions of pseudorandom generators, derandomized algorithms, and randomness extractors.

Randomness is a fundamental resource in computer science. It is used in a wide variety of applications, including cryptography, derandomization, data structures, and machine learning. However, in many practical situations, it is difficult or impossible to obtain truly random bits. Instead, we must often rely on sources of weak randomness, such as the output of a physical random number generator or the results of a coin flip.

Deterministic Extraction from Weak Random Sources (Monographs in Theoretical Computer Science An EATCS Series)
Deterministic Extraction from Weak Random Sources (Monographs in Theoretical Computer Science. An EATCS Series)
by Matthew Phillion

4.9 out of 5

Language : English
File size : 9285 KB
Text-to-Speech : Enabled
Screen Reader : Supported
Enhanced typesetting : Enabled
Print length : 306 pages

Deterministic extraction is a technique for extracting nearly optimal randomness from weak random sources. This means that we can take a source of weak randomness and convert it into a source of nearly random bits that can be used in any application that requires randomness.

The framework for deterministic extraction developed in this book is based on the notion of a condenser. A condenser is a function that takes a long string of weakly random bits and outputs a shorter string of nearly random bits. The quality of the output bits is measured by their min-entropy, which is a measure of their unpredictability.

The main result of this book is a construction of a condenser that can extract nearly optimal randomness from any source of weak randomness. This condenser is based on a new technique called the "amplification lemma." The amplification lemma shows how to take a weak source of randomness and amplify its min-entropy by a constant factor.

Applications

The framework for deterministic extraction developed in this book has found applications in a wide variety of areas, including:

  • Cryptography: Deterministic extraction can be used to construct pseudorandom generators, which are efficient algorithms for generating nearly random bits from a small seed. Pseudorandom generators are used in a variety of cryptographic applications, such as encryption and authentication.
  • Derandomization: Deterministic extraction can be used to derandomize randomized algorithms. A randomized algorithm is an algorithm that uses randomness to make its decisions. Derandomized algorithms are more efficient than randomized algorithms, and they can be used in applications where randomness is not available or desirable.
  • Data structures: Deterministic extraction can be used to construct data structures that are more efficient than traditional data structures. For example, deterministic extraction can be used to construct a hash table that can be searched in constant time, even if the hash function is not perfect.
  • Machine learning: Deterministic extraction can be used to improve the performance of machine learning algorithms. For example, deterministic extraction can be used to train a neural network that is more robust to noise.

Deterministic extraction is a powerful technique that can be used to extract nearly optimal randomness from arbitrary sources of weak randomness. This framework has found applications in a wide variety of areas, and it has led to a number of important consequences, including new constructions of pseudorandom generators, derandomized algorithms, and randomness extractors.

Deterministic Extraction from Weak Random Sources (Monographs in Theoretical Computer Science An EATCS Series)
Deterministic Extraction from Weak Random Sources (Monographs in Theoretical Computer Science. An EATCS Series)
by Matthew Phillion

4.9 out of 5

Language : English
File size : 9285 KB
Text-to-Speech : Enabled
Screen Reader : Supported
Enhanced typesetting : Enabled
Print length : 306 pages
Create an account to read the full story.
The author made this story available to Deedee Book members only.
If you’re new to Deedee Book, create a new account to read this story on us.
Already have an account? Sign in
1.3k View Claps
78 Respond
Save
Listen
Share

Light bulbAdvertise smarter! Our strategic ad space ensures maximum exposure. Reserve your spot today!

Good Author
  • George Orwell profile picture
    George Orwell
    Follow ·12k
  • Craig Carter profile picture
    Craig Carter
    Follow ·2k
  • Percy Bysshe Shelley profile picture
    Percy Bysshe Shelley
    Follow ·16k
  • Darren Nelson profile picture
    Darren Nelson
    Follow ·9.4k
  • D'Angelo Carter profile picture
    D'Angelo Carter
    Follow ·10.1k
  • Allen Parker profile picture
    Allen Parker
    Follow ·16.1k
  • George Martin profile picture
    George Martin
    Follow ·18.1k
  • Peter Carter profile picture
    Peter Carter
    Follow ·17.3k
Recommended from Deedee Book
Education And Peace (Montessori 10)
Fletcher Mitchell profile pictureFletcher Mitchell

Education And Peace Montessori 10: Where Learning...

A Symphony of Learning and Well-being Amidst...

·4 min read
760 View Claps
82 Respond
Understanding Language And Literacy Development: Diverse Learners In The Classroom
Glen Powell profile pictureGlen Powell
·5 min read
432 View Claps
37 Respond
The Portable Benjamin Franklin (Penguin Classics)
Rod Ward profile pictureRod Ward

The Portable Benjamin Franklin: A Timeless Collection of...

In the vast tapestry of American history,...

·5 min read
503 View Claps
64 Respond
Citizenship After Trump: Democracy Versus Authoritarianism In A Post Pandemic Era
Kelly Blair profile pictureKelly Blair
·5 min read
528 View Claps
59 Respond
VIRGIN KILLER SWEATER BOUDOIR SPECIAL: Get Inspired To Shoot Over 130 Poses
Colin Richardson profile pictureColin Richardson
·3 min read
240 View Claps
31 Respond
The Forbidden Wilds: Crossing The Styx
Jared Nelson profile pictureJared Nelson

Embark on a Shadowy Journey: The Forbidden Wilds and...

Prologue: A Realm Enshrouded in Darkness As...

·5 min read
1.4k View Claps
100 Respond
The book was found!
Deterministic Extraction from Weak Random Sources (Monographs in Theoretical Computer Science An EATCS Series)
Deterministic Extraction from Weak Random Sources (Monographs in Theoretical Computer Science. An EATCS Series)
by Matthew Phillion

4.9 out of 5

Language : English
File size : 9285 KB
Text-to-Speech : Enabled
Screen Reader : Supported
Enhanced typesetting : Enabled
Print length : 306 pages
Sign up for our newsletter and stay up to date!

By subscribing to our newsletter, you'll receive valuable content straight to your inbox, including informative articles, helpful tips, product launches, and exciting promotions.

By subscribing, you agree with our Privacy Policy.


© 2024 Deedee Book™ is a registered trademark. All Rights Reserved.