Efficiently decodable non-adaptive group testing

We consider the following "efficiently decodable" non-adaptive group testing problem. There is an unknown string <i>x</i> ∈ {0, 1}<i><sup>n</sup></i> with at most <i>d</i> ones in it. We are allowed to test any subset <i>S</i> ⊆ [<i>n</i>] of the indices. The answer to the test tells whether <i>x</i><sub><i>i</i></sub> = 0 for all <i>i</i> ∈ <i>S</i> or not. The objective is to design as few tests as possible (say, <i>t</i> tests) such that <i>x</i> can be identified as fast as possible (say, poly(<i>t</i>)-time). Efficiently decodable non-adaptive group testing has applications in many areas, including data stream algorithms and data forensics. A non-adaptive group testing strategy can be represented by a <i>t</i> x <i>n</i> matrix, which is the stacking of all the characteristic vectors of the tests. It is well-known that if this matrix is <i>d</i>-disjunct, then any test outcome corresponds uniquely to an unknown input string. Furthermore, we know how to construct <i>d</i>-disjunct matrices with <i>t</i> = <i>O</i>(<i>d</i><sup>2</sup> log <i>n</i>) efficiently. However, these matrices so far only allow for a "decoding" time of <i>O</i>(<i>nt</i>), which can be exponentially larger than poly(<i>t</i>) for relatively small values of <i>d</i>. This paper presents a randomness efficient construction of <i>d</i>-disjunct matrices with <i>t</i> = <i>O</i>(<i>d</i><sup>2</sup> log <i>n</i>) that can be decoded in time poly(<i>d</i>) · <i>t</i> log<sup>2</sup> <i>t</i> + <i>O</i>(<i>t</i><sup>2</sup>). To the best of our knowledge, this is the first result that achieves an efficient decoding time and matches the best known <i>O</i>(<i>d</i><sup>2</sup> log <i>n</i>) bound on the number of tests. We also derandomize the construction, which results in a polynomial time deterministic construction of such matrices when <i>d</i> = <i>O</i>(log <i>n</i> / log log <i>n</i>). A crucial building block in our construction is the notion of (<i>d</i>, <i>l</i>)-list disjunct matrices, which represent the more general "list group testing" problem whose goal is to output less than <i>d</i> + <i>l</i> positions in <i>x</i>, including all the (at most <i>d</i>) positions that have a one in them. List disjunct matrices turn out to be interesting objects in their own right and were also considered independently by [Cheraghchi, FCT 2009]. We present connections between list disjunct matrices, expanders, dispersers and disjunct matrices. List disjunct matrices have applications in constructing (<i>d</i>, <i>l</i>)-sparsity separator structures [Ganguly, ISAAC 2008] and in constructing tolerant testers for Reed-Solomon codes in the data stream model.

[1]  Anthony J. Macula,et al.  A group testing method for finding patterns in data , 2004, Discret. Appl. Math..

[2]  Atri Rudra,et al.  Data Stream Algorithms for Codeword Testing , 2010, ICALP.

[3]  Enkatesan G Uruswami Unbalanced expanders and randomness extractors from Parvaresh-Vardy codes , 2008 .

[4]  V. V. Rykov,et al.  Superimposed distance codes , 1989 .

[5]  Noam Nisan,et al.  Efficient approximation of product distributions , 1998, Random Struct. Algorithms.

[6]  Frank K. Hwang,et al.  A survey on nonadaptive group testing algorithms through the angle of decoding , 2008, J. Comb. Optim..

[7]  Alexander Vardy,et al.  Correcting errors beyond the Guruswami-Sudan radius in polynomial time , 2005, 46th Annual IEEE Symposium on Foundations of Computer Science (FOCS'05).

[8]  Graham Cormode,et al.  What's hot and what's not: tracking most frequent items dynamically , 2003, PODS '03.

[9]  GuruswamiVenkatesan,et al.  Unbalanced expanders and randomness extractors from Parvaresh--Vardy codes , 2009 .

[10]  Venkatesan Guruswami,et al.  Concatenated codes can achieve list-decoding capacity , 2008, SODA '08.

[11]  Venkatesan Guruswami,et al.  Soft Decoding, Dual BCH Codes, and Better List-Decodable e-Biased Codes , 2008, 2008 23rd Annual IEEE Conference on Computational Complexity.

[12]  David Zuckerman,et al.  Electronic Colloquium on Computational Complexity, Report No. 100 (2005) Linear Degree Extractors and the Inapproximability of MAX CLIQUE and CHROMATIC NUMBER , 2005 .

[13]  Michael Alekhnovich Linear diophantine equations over polynomials and soft decoding of Reed-Solomon codes , 2005, IEEE Transactions on Information Theory.

[14]  Noam Nisan,et al.  Pseudorandom generators for space-bounded computation , 1992, Comb..

[15]  Oded Goldreich,et al.  Efficient approximation of product distributions , 1998 .

[16]  Sumit Ganguly,et al.  Data Stream Algorithms via Expander Graphs , 2008, ISAAC.

[17]  Christian Thommesen The existence of binary linear concatenated codes with Reed - Solomon outer codes which asymptotically meet the Gilbert- Varshamov bound , 1983, IEEE Trans. Inf. Theory.

[18]  Zoltán Füredi On r-Cover-free Families , 1996, J. Comb. Theory, Ser. A.

[19]  Ding-Zhu Du,et al.  A survey on combinatorial group testing algorithms with applications to DNA Library Screening , 1999, Discrete Mathematical Problems with Medical Applications.

[20]  Jack K. Wolf,et al.  Born again group testing: Multiaccess communications , 1985, IEEE Trans. Inf. Theory.

[21]  Aravind Srinivasan,et al.  Finding Large Independent Sets in Graphs and Hypergraphs , 2005, SIAM J. Discret. Math..

[22]  A. Rudra,et al.  List decoding and property testing of error-correcting codes , 2007 .

[23]  Mahdi Cheraghchi,et al.  Noise-resilient group testing: Limitations and constructions , 2008, Discret. Appl. Math..

[24]  Mikhail J. Atallah,et al.  Indexing Information for Data Forensics , 2005, ACNS.

[25]  Amnon Ta-Shma,et al.  Lossless Condensers, Unbalanced Expanders, And Extractors , 2007, Comb..

[26]  Ely Porat,et al.  Search Methodologies , 2022 .

[27]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[28]  D. Du,et al.  Combinatorial Group Testing and Its Applications , 1993 .

[29]  F. Lemmermeyer Error-correcting Codes , 2005 .

[30]  Venkatesan Guruswami,et al.  Soft Decoding, Dual BCH Codes, and Better List-Decodable e-Biased Codes , 2008, 2008 23rd Annual IEEE Conference on Computational Complexity.

[31]  Noga Alon,et al.  Algorithmic construction of sets for k-restrictions , 2006, TALG.

[32]  Venkatesan Guruswami,et al.  Linear-Time List Decoding in Error-Free Settings: (Extended Abstract) , 2004, ICALP.

[33]  Donald F. Towsley,et al.  Random Multiple-Access Communication and Group Testing , 1984, IEEE Trans. Commun..

[34]  Richard C. Singleton,et al.  Nonrandom binary superimposed codes , 1964, IEEE Trans. Inf. Theory.

[35]  A. Sterrett On the Detection of Defective Members of Large Populations , 1957 .