Twenty (Short) Questions

A basic combinatorial interpretation of Shannon’s entropy function is via the “20 questions” game. This cooperative game is played by two players, Alice and Bob: Alice picks a distribution π over the numbers {1, …, n}, and announces it to Bob. She then chooses a number x according to π, and Bob attempts to identify x using as few Yes/No queries as possible, on average. An optimal strategy for the “20 questions” game is given by a Huffman code for π: Bob’s questions reveal the codeword for x bit by bit. This strategy finds x using fewer than H(π) + 1 questions on average. However, the questions asked by Bob could be arbitrary. In this paper, we investigate the following question: Are there restricted sets of questions that match the performance of Huffman codes, either exactly or approximately? Our main result gives a set $$\mathcal{Q}$$ of 1.25n+o(n) questions such that for every distribution π, Bob can implement an optimal strategy for π using only questions from $$\mathcal{Q}$$ . We also show that 1.25n−o(n) allowed questions are needed, for infinitely many n. When allowing a small slack of r questions for identifying x over the optimal strategy, we show that a set of roughly (rn)Θ(1/r) allowed questions is necessary and sufficient.

[1]  Stephan G. Wagner,et al.  Compositions into Powers of b: Asymptotic Enumeration and Parameters , 2015, Algorithmica.

[2]  Shay Moran,et al.  A Note on Average-Case Sorting , 2013, Order.

[3]  Yasuichi Horibe An Improved Bound for Weight-Balanced Tree , 1977, Inf. Control..

[4]  Zbigniew Lonc,et al.  Chains, antichains, and fibres , 1987, J. Comb. Theory, Ser. A.

[5]  Ottar Johnsen,et al.  On the redundancy of binary Huffman codes (Corresp.) , 1980, IEEE Trans. Inf. Theory.

[6]  D. Du,et al.  Combinatorial Group Testing and Its Applications , 1993 .

[7]  Javed A. Aslam,et al.  Searching in the presence of linearly bounded errors , 1991, STOC '91.

[8]  Peter Winkler,et al.  Three Thresholds for a Liar , 1992, Combinatorics, Probability and Computing.

[9]  A. Sterrett On the Detection of Defective Members of Large Populations , 1957 .

[10]  David A. Huffman,et al.  A method for the construction of minimum-redundancy codes , 1952, Proceedings of the IRE.

[11]  Peter Winkler,et al.  On playing “Twenty Questions” with a liar , 1992, SODA '92.

[12]  Michael L. Fredman,et al.  How Good is the Information Theory Bound in Sorting? , 1976, Theor. Comput. Sci..

[13]  Philip N. Klein,et al.  On the Number of Iterations for Dantzig-Wolfe Optimization and Packing-Covering Approximation Algorithms , 1999, SIAM J. Comput..

[14]  David W. Boyd The Asymptotic Number of Solutions of a Diophantine Equation from Coding Theory , 1975, J. Comb. Theory, Ser. A.

[15]  Robert G. Gallager,et al.  Variations on a theme by Huffman , 1978, IEEE Trans. Inf. Theory.

[16]  Rudolf Ahlswede,et al.  Search Problems , 1987 .

[17]  Inder Jeet Taneja,et al.  Bounds on the redundancy of Huffman codes , 1986, IEEE Trans. Inf. Theory.

[18]  Dietrich Manstetten Tight bounds on the redundancy of Huffman codes , 1992, IEEE Trans. Inf. Theory.

[19]  Christian Deppe,et al.  Information Theory, Combinatorics, and Search Theory , 2013, Lecture Notes in Computer Science.

[20]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[21]  Joel H. Spencer,et al.  Coping with Errors in Binary Search Procedures , 1980, J. Comput. Syst. Sci..

[22]  Gyula Katona,et al.  Combinatorial Search Problems , 1972, International Centre for Mechanical Sciences.

[23]  E. F. Moore,et al.  Variable-length binary encodings , 1959 .

[24]  Jorma Rissanen Bounds for Weight Balanced Trees , 1973, IBM J. Res. Dev..

[25]  Julia Abrahams,et al.  On the redundancy of optimal binary prefix-condition codes for finite and infinite sources , 1987, IEEE Trans. Inf. Theory.

[26]  Narao Nakatsu,et al.  Bounds on the redundancy of binary alphabetical codes , 1991, IEEE Trans. Inf. Theory.