Abstract
In this paper we consider the following coin weighing problem: Given n coins for which some of them are counterfeit with the same weight. The problem is: given the weights of the counterfeit coin and the authentic coin, detect the counterfeit coins a with minimal number of weighings. This problem has many applications in computational learning theory, compressed sensing and multiple access adder channels.
An old optimal non-adaptive polynomial time algorithm of Lindstrom can detect the counterfeit coins with O(n/logn) weighings. An information theoretic proof shows that Lindstrom’s algorithm is optimal. In this paper we study non-adaptive algorithms for this problem when some of the answers of the weighings received are incorrect or unknown.
We show that no coin weighing algorithm exists that can detect the counterfeit coins when the number of incorrect weighings is more than 1/4 fraction of the number of weighings. We also give the tight bound Θ(n/logn) for the number of weighings when the number of incorrect answers is less than 1/4 fraction of the number of weighings.
We then give a non-adaptive polynomial time algorithm that detects the counterfeit coins with k = O(n/loglogn) weighings even if some constant fraction of the answers of the weighings received are incorrect. This improves Bshouty and Mazzawi’s algorithm [7] that uses O(n) weighings. This is the first sublinear algorithm for this problem.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Aigner, M.: Combinatorial Search. John Wiley and Sons (1988)
Alon, N., Asodi, V.: Learning a Hidden Subgraph. SIAM J. Discrete Math. 18(4), 697–712 (2005)
Biglieri, E., Györfi, L.: Multiple Access Channels Theory and Practice Volume 10 NATO Security through Science Series - D: Information and Communication Security (April 2007)
Bruneau, L., Germinet, F.: On the singularity of random matrices with independent entries. Proc. Amer. Math. Soc. 137, 787–792 (2009)
Bshouty, N.H.: Optimal Algorithms for the Coin Weighing Problem with a Spring Scale. In: Conference on Learning Theory (2009)
Bshouty, N.H., Mazzawi, H.: Toward a Deterministic Polynomial Time Algorithm with Optimal Additive Query Complexity. In: Hliněný, P., Kučera, A. (eds.) MFCS 2010. LNCS, vol. 6281, pp. 221–232. Springer, Heidelberg (2010)
Bshouty, N.H., Mazzawi, H.: Algorithms for the Coin Weighing Problems with the Presence of Noise. ECCC, TR11-124
Cantor, D.: Determining a set from the cardinalities of its intersections with other sets. Canadian Journal of Athematics 16, 94–97 (1962)
Cheng, J., Kamoi, K., Watanabe, Y.: User Identification by Signature Code for Noisy Multiple-Access Adder Channel. In: ISIT (2006)
Cantor, D., Mills, W.: Determining a Subset from Certain Combinatorial Properties. Canad. J. Math. 18, 42–48 (1966)
Chang, S.C., Weldon, E.J.: Coding for T-user multiple access channels. IEEE Transactions on Information Theory 25(6), 684–691 (1979)
Cheng, J., Watanabe, Y.: A Multiuser k-Ary Code for the Noisy Multiple-Access Adder Channel. IEEE Transactions on Information Theory 47, 6 (2001)
Cheng, J., Watanabe, Y.: Affine Code for T-User Noisy Multiple Access Adder Channel. IEICE Trans. Fundamentals E83-A(3) (2000)
Choi, S., Han Kim, J.: Optimal Query Complexity Bounds for Finding Graphs. In: STOC, pp. 749–758 (2008)
Cheng, J., Kamoi, K., Watanabe, Y.: User Identification by Signature Code for Noisy Multiple-Access Adder Channel. In: IEEE International Symposium on Information Theory, pp. 1974–1977 (2006)
Du, D., Hwang, F.K.: Combinatorial group testing and its application. Series on applied mathematics, vol. 3. World Science (1993)
Danev, D., Laczay, B., Ruszinkó, M.: Multiple Access Adder Channel. Multiple Access Channels - Theory and Practice, pp. 26–53. IOS Press (2007)
Erdös, Rényi, A.: On two problems of information theory. Publ. Math. Inst. Hung. Acad. Sci. 8, 241–254 (1963)
Grebinski, V., Kucherov, G.: Optimal Reconstruction of Graphs Under the Additive Model. Algorithmica 28(1), 104–124 (2000)
Grebiniski, V., Kucherov, G.: Reconstructing a hamiltonian cycle by querying the graph: Application to DNA physical mapping. Discrete Applied Mathematics 88, 147–165 (1998)
Grebinski, V.: On the Power of Additive Combinatorial Search Model. In: Hsu, W.-L., Kao, M.-Y. (eds.) COCOON 1998. LNCS, vol. 1449, pp. 194–203. Springer, Heidelberg (1998)
Indyk, P., Ruzic, M.: Near-Optimal Sparse Recovery in the L1 Norm. In: FOCS 2008, pp. 199–207 (2008)
Khachatrian, G.K., Martirossian, S.S.: Codes for T-user Noiseless Adder Channel. Problems of Control and Information Theory 16, 187–192 (1987)
Komlós, J.: On the determinant of matrices. Studia. Sci. Math. Hungar. 2, 7–21 (1967)
Laczay, B.: Coding for the Multiple Access Adder Channel (2003)
Lindström, B.: On a combinatorial problem in number theory. Canad. Math. Bull. 8, 477–490 (1965)
Lindström, B.: On a combinatorial detection problem II. Studia Scientiarum Mathematicarum Hungarica 1, 353–361 (1966)
Lindström, B.: On Möbius functions and a problem in combinatorial number theory. Canad. Math. Bull. 14(4), 513–516 (1971)
Lindström, B.: Determining subsets by unramified experiments. In: Srivastava, J.N. (ed.) A Survey of Statistical Designs and Linear Models, pp. 407–418. North Holland, Amsterdam (1975)
Li, M., Vitányi, P.M.B.: Combinatorics and Kolmogorov Complexity. In: Structure in Complexity Theory Conference, pp. 154–163 (1991)
Moser, L.: The second moment method in combinatorial analysis. In: Combinatorial Structure and their Applications, pp. 283–384. Gordon and Breach (1970)
Pippenger, N.: An Informtation Theoretic Method in Combinatorial Theory. J. Comb. Theory, Ser. A 23(1), 99–104 (1977)
Pippenger, N.: Bounds on the performance of protocols for a multiple-access broadcast channel. IEEE Transactions on Information Theory 27(2), 145–151 (1981)
Roth, R.M.: Introduction to Coding Theory. Cambridge University Press, Cambridge (2006)
Soderberg, S., Shapiro, H.S.: A combinatory detection problem. American Mathematical Monthly 70, 1066–1070 (1963)
Wilson, J.H.: Error-Correcting Codes for a T-User Binary Adder Channel. IEEE Transactions of Information Theory 34(4) (1988)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Bshouty, N.H. (2012). On the Coin Weighing Problem with the Presence of Noise. In: Gupta, A., Jansen, K., Rolim, J., Servedio, R. (eds) Approximation, Randomization, and Combinatorial Optimization. Algorithms and Techniques. APPROX RANDOM 2012 2012. Lecture Notes in Computer Science, vol 7408. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-32512-0_40
Download citation
DOI: https://doi.org/10.1007/978-3-642-32512-0_40
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-32511-3
Online ISBN: 978-3-642-32512-0
eBook Packages: Computer ScienceComputer Science (R0)