Multiterminal Networks: Rate Regions, Codes, Computations, & Forbidden Minors

Size: px
Start display at page:

Download "Multiterminal Networks: Rate Regions, Codes, Computations, & Forbidden Minors"

Transcription

1 Multiterminal etworks: Rate Regions, Codes, Computations, & Forbidden Minors Ph D Thesis Proposal Congduan Li ASPITRG & MAL Drexel University congduanli@gmailcom October 5, 204 C Li (ASPITRG & MAL) Thesis Proposal October 5, 204 / 57

2 Problems of interest A multisource multicast network: Sources etwork Destinations Paths In(i) i Out(i) Y s s U ee R e ω s t β(t) S T Rate/capacity region: compute If Shannon outer (LP) bound tight If simple linear codes sufficient S T C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

3 Outline Rate Region 2 Shannon Outer Bounds & Converse Constraints P rojection 3 Matroid Bounds and Achievability Constraints Constraints 4 Forbidden Embedding etworks Motivation Operations Results 5 Proposed Tasks and Timeline In Sources etwork Destinations Insu Insu cient cient In C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

4 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Motivation Operations Results 5 Proposed Tasks and Timeline Constraints P rojection C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

5 etwork Coding: Sources Y s Paths s In(i) Out(i) U ee R e i t S T β(t) S Source Rate Source Independence Source Encoding T H(Y s ) ω s H(Y S ) = H(Y s ) s S H(U Out(s) Y s ) = 0 C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

6 etwork Coding: Edges Y s Paths s In(i) Out(i) U ee R e i t S T β(t) S Coding Rate R e H(U e ), e E T C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

7 etwork Coding: odes Y s Paths s In(i) Out(i) U ee R e i t S T β(t) S Coding Constraints H(U Out(i) U In(i) )=0, i V\(S T ) T C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

8 etwork Coding: Sinks Y s Paths s In(i) Out(i) U ee R e i t S T β(t) S Decoding Constraints H(Y β(t) U In(t) )=0, t T T C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

9 Example: Multilevel Diversity Coding Systems (MDCS) Encoders Prioritized Sources 9 U E X X 2 >= X :K >; X K E E U E Paths Fan(D ) Fan(D D ) Decoders D D i D d D j D D Prioritized sources, no intermediate nodes X X } X :k X :K X :K } } Lev(D )= = Lev(D i )= Lev(D d )=k Lev(D j )= = Lev(D D )=K Decoders are classified to levels: level k, decode X :k otation: (k, E ) MDCS instances C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

10 Rate region Rate region: all possible rate and source entropy vectors satisfying all network constraints Collect the network random variables and their joint entropies Define Γ : 2 -dim cone, region of valid entropy vectors Constraints from network A: L = {h Γ : h Y S = Σ s S h Ys } () L 2 = {h Γ : h X Out(k) Y s = 0} (2) L 3 = {h Γ : h X Out(i) X In(i) = 0} (3) L 4 = {(h T, R T ) T R 2 + E + : R e h Ue, e E} (4) L 5 = {h Γ : h Y β(t) U In(t) = 0} (5) Rate region (cone) in terms of rates and source entropies (derived from [Yan, Yeung, Zhang TranIT 202]): R(A) = proj RE,H(Y S )(con(γ L 23) L 45 ) (6) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

11 Region of Entropic Vectors Γ : ot all points in Euclidean space have distributions h entropic: exists a joint distribution associated with h Region of entropic vector: Γ = {h : h is entropic} Γ not fully characterized for 4: convex but contains non-polyhedral part Entropic: associated P (X,,X )exists Outer bounds Inner bounds C Li (ASPITRG & MAL) Thesis Proposal October 5, 204 / 57

12 Sandwich Bounds Γ ΓOut : R out(a) = proj RE,H(Y S )(Γ Out L 2345) Γ ΓIn : R in(a) = proj RE,H(Y S )(Γ In L 2345) It becomes: Initial polyhedra constraints projections R(A) = R out (A) = R in (A), if R out (A) = R in (A) Our work following this idea: Li, et al, Allerton 202, etcod 203, submission TransIT 204 Constraints P rojection Constraints Constraints In In C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

13 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Constraints Constraints Motivation Operations Results 5 Proposed Tasks and Timeline In In C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

14 Shannon Outer Bound Region determined by Shannon inequalities H(X i \ X i ) 0 and I (X i, X j X K ) 0, i, j, K \{i, j}, equivalent to polymatroid cone: ormalization: f ( ) = 0; 2 Monotonicity: if A B then f (A) f (B); 3 Submodularity: if A, B, f (A B) + f (A B) f (A) + f (B) Shannon ineq C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

15 Converse Proof Recall R out (A) = proj RE,H(Y S )(Γ Out L 2345) Suppose a polyhedral cone P (Γ Out L 2345): Ax 0 An inequality in the projected cone (rate region), b T x 0 Exists a vector λ 0 (weighted sum) s t A T λ = b This is a converse proof (inspired from Tian ISIT 203) 2 4 A X X X 2 X Projection 2 4 A T = 0 b b T X X X 2 X C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57 0

16 Determine Human Readable Converse Proof λ should be as sparse as possible Optimization minimize λ subject to λ 0 A T λ = b λ 0 Approximated by L -norm: λ We observed: redundant inequalities helpful, the order of inequalities determinable by computer Automatic human readable converse (Li, et al submission TransIT 204): Γ Out L b T x 0 LP solver Order determiner Converse proof C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

17 Converse Proof Example X, Y, Z R E R 2 E 2 R 3 E3 D D 2 D3 D 4 X R H(X) R 2 H(X)+H(Y ) R 3 R + R 2 X, Y X, Y, Z X, Y, Z H(X)+H(Y )+H(Z) 2H(X)+H(Y )+H(Z) R + R 2 (,2) H(U )+H(U 2) (3,4) = H(X, U )+H(X, Y, U 2) (5) (6) (7) H(X)+H(X, Y, U,U 2) H(X)+H(U,U 2) H(X)+H(X, Y, Z) (8) = 2H(X)+H(Y )+H(Z) Order Coe cients Inequality or equality R H(U ) 2 R 2 H(U 2 ) 3 H(X U )=0 4 H(X, Y U 2 )=0 5 I(U ; YU 2 X) 0 6 H(X, Y U,U 2 )=0 7 H(X, Y, Z U,U 2 )=0 8 H(X, Y, Z) =H(X)+H(Y )+H(Z) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

18 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Constraints Constraints Motivation Operations Results 5 Proposed Tasks and Timeline In In C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

19 Matroid Definition: Rank Function Matroid: generalization of linear dependence and independence Definition (Matroid rank function) A set function r : 2 S {0,, } is a rank function of a matroid if it obeys the polymatroid axioms and two more conditions: Integrality: r(a) is integer-valued; 2 Cardinality: 0 r(a) A C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

20 Representable Matroids Definition A matroid M with ground set S of size S = and rank r M = r is representable over a field F if there exists a matrix A F r such that for each independent set I I the corresponding columns in A, viewed as vectors in F r, are linearly independent S,,S i,,s j,,s Mapping 2 i j r(s i,s j )=rank(i, j-th columns) Representable matroids usually can be characterized by forbidden minors (cannot contain such minors) Example: U 2,4 forbidden for binary (Tutte) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

21 Minors of Matroids Definition If M is a matroid on S and T S, a matroid M on T is called a minor of M if M is obtained by any combination of deletion (\) and contraction (/) of M Illustration of contraction and deletion: e Contraction e Deletion C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

22 Inner Bounds from Representable Matroids Observation: Conic hull Γ q of representable matroids form inner bounds on region of entropic vectors Proof: It suffices to show that a rank of representable matroid is entropic Suppose the associated representation matrix is A F k q, from which we can create the random variables (X,,X )=ua, u U(F k q ) S,,S i,,s j,,s Mapping 2 i j r(s i,s j )=rank(i, j-th columns) h i,j = rank(i, j-th columns) h u = r(s i,s j ) log 2 q C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

23 Generalized Inner Bounds Γ q, : Generalize the mapping to: S,, S -partition of, > Tighter inner bounds on Γ S,,S i,,s j,,s Mapping 2 i j 0 r(s i,s j )=rank(i, j-th columns) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

24 otion of sufficiency Recall: R in (A) = proj RE,H(Y S )(Γ In L 2345) Substitute in Γ q : each extreme ray associated with a matroid Variable to matrix: one to one mapping, scalar codes, region R s,q Substitute in Γ q, : each extreme ray associated with a projection of matroids Variable to matrix: one to multiple mapping, vector codes, region R q Scalar sufficiency: General sufficiency: R(A) = R s,q (A) R(A) = R q (A) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

25 Representable Matroids Determine Linear Codes Basic codes: matrices associated with extreme rays A point: conic combination of extreme rays Code for the point: block diagonalize the matrices according to conic coefficients (time sharing), reshuffling columns (details in [Li, et al etcod 203]) Conic combination C, C 2, C 3 : basic codes C 2 C 3 R 2 R 3 R C R C 2 4 X S X S X S 3 R = R + R 2 + R 3 T 2 5C = 4 X S X S X S U E U E U E 3T 2 3 C O O 5 4 O C 2 O 5 O O C 3 C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

26 Matroid extremality Suffice to work on rep matroids that are extreme rays (complexity reduction, Li, et al etcod 203, further work Apte, et al ISIT 204) Extremal ranks relationship: strict containment [Li, et al Allerton 203] Extreme rays of different cones Polymatroid Matroid q-rep matroid Theorem : o matroid here! Theorem 2: o binary matroid here! Γ Γ mat Γ bin C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

27 Revolution Conventional: (special) network, info ineq, manually, paper Computational: 03, 06 (arbitrary) networks, computer, # of papers? Improvement: easy to handle small networks, further work on symmetries, inheritance In(i) In(i) s i U e Re e T T Conventional way i Out(i) t s T S T T S T t U e Re e t S In(i) Out(i) e S S Out(i) S C Li (ASPITRG & MAL) i U e Re s In(i) i In(i) Out(i) i Out(i) t s S T S T S T S T s U e Re U e Re t e e Computational way Thesis Proposal October 5, / 57

28 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Sources etwork Destinations Insu cient Motivation Operations Results 5 Proposed Tasks and Timeline Insu cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

29 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Sources etwork Destinations Insu cient Motivation Operations Results 5 Proposed Tasks and Timeline Insu cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

30 Motivated from matroid theory Inheritance property regarding insufficiency of class of codes Inspired from matroid theory: forbidden minor for linear representability, eg, U 2,4 is the forbidden minor for binary matroids Ground set size F q -representable matroids ot F q -representable matroids 2 C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

31 Similar characterization for networks? If networks have similar characterization? Possible list of forbidden embedded networks for sufficiency of linear codes over a field etwork operations to obtain such embedded networks preserving insufficiency, & region relationships Three operations [Li, et al, Allerton 204] Sources etwork Destinations Insu cient Insu cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

32 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Sources etwork Destinations Insu cient Motivation Operations Results 5 Proposed Tasks and Timeline Insu cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

33 Source deletion A = A \ k Source Y k deleted, source k stops sending information to the network, H(Y k ) = 0 Sinks requiring Y k will no longer demand it Sources etwork Destinations Paths In(i) i Out(i) Y k k U ee R e! k t S T S T (t) \ k C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

34 Example: MDCS source deletion X Y Z E E 2 E 3 D X X, Y D 2 X, Y D 3 X, Y D 4 X, Y, Z D 5 i) A(3, 3) MDCS X Y Z E E 2 E 3 X D X, Y D 2 X, Y D 3 X, Y D 4 X, Y, Z D 5 ii) Delete/contract Z Decoder D 5 no longer requires Z Redundant decoder is deleted X Y E E 2 E 3 X D X, Y D 2 X, Y D 3 X, Y D 4 iii) After deletion of Z C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

35 Source deletion: A = A \ k R(A ) = Proj Y\k,R ({R R(A) H(Y E k) = 0}), (7) R q (A ) = Proj Y\k,R ({R R E q(a) H(Y k ) = 0}), (8) R s,q (A ) = Proj Y\k,R ({R R E s,q(a) H(Y k ) = 0}) (9) Preservation: R q (A) = R(A) R q (A ) = R(A ) Scalar case: R s,q (A) = R(A) R s,q (A ) = R(A ) R(A) r R(A ) r R(A) with H(Y k ) = 0 The code to achieve r is the code to achieve r with sending nothing on source Y k All-zero is valid F q code, can reverse H(Y k )=0 P rojection R(A 0 ) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

36 Edge deletion A = A \ e Edge U e deleted, nothing on U e, R e = H(U e ) = 0 Sources etwork Destinations Paths In(i) i Out(i) Y s s U ee R e! s t S T (t) S T C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

37 Example: MDCS encoder deletion X Y Z E E 2 E 3 E 4 D X X, Y D 2 X, Y D 3 X, Y, Z D 4 X, Y, Z D 5 i) A(3, 4) MDCS X Y Z E E 2 E 3 E 4 X D X, Y D 2 X, Y D 3 X, Y, Z D 4 X, Y, Z D 5 ii) DeleteencoderE 4 X Y Z D X E X, Y D 3 E 2 X, Y, Z D 4 E 3 X, Y, Z D 5 iii) After deletion of E 4 Decoders connected to E 4 keep same decoding ability without E 4 Redundant decoders deleted C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

38 Edge deletion: A = A \ Y k R(A ) = Proj H(YS ),R ({R R E q(a) R e = 0}), (0) R q (A ) = Proj H(YS ),R ({R R E q(a) R e = 0}), () R s,q (A ) = Proj H(YS ),R ({R R E s,q(a) R e = 0}) (2) Preservation: R q (A) = R(A) R q (A ) = R(A ) Scalar case: R s,q (A) = R(A) R s,q (A ) = R(A ) r R(A ) r R(A) with R e = H(U e ) = 0 The code to achieve r is the code to achieve r with deleting column(s) for U e, ie, sending nothing on edge e All-zero is valid F q code, can reverse R(A) R e =0 P rojection R(A 0 ) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

39 Edge contraction A = A/e Edge e contracted, input to tail of e available for head of e, R e =, H(U e ) free Sources etwork Destinations Paths In(i) i Out(i) Y s s U ee R t U e R e! s S R e 0 = T S T (t) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

40 Example: MDCS encoder contraction X Y Z E E 2 E 3 E 4 X D X, Y D 2 X, Y D 3 X, Y D 4 X, Y, Z D 5 X, Y, Z D 6 X Y Z E E 2 E 3 E 4 X D X, Y D 2 X, Y X D 3 Y X, Y D 4 Z X, Y, Z D 5 X, Y, Z D 6 X D X, Y D 2 X, Y D 3 X, Y, Z D 5 i) A(3, 4) MDCS ii) Contract encoder E 4 iii) After contraction of E 4 Decoders connected to E 4 directly access to all sources Requirements trivially satisfied, deleted E E 2 E 3 C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

41 Edge contraction: A = A/e R(A ) = Proj H(Yk ),k S,R E R(A), (3) R q (A ) = Proj H(Yk ),k S,R R E q(a), (4) R s,q (A ) Proj H(Yk ),k S,R E R s,q(a), (5) Preservation: R q (A) = R(A) R q (A ) = R(A ) Scalar case: R s,q (A) = R(A) R s,q (A ) = R(A ) r R(A ) r R(A) with some H(U e ) (not of interest in A ) The code to achieve r is the code to achieve r with deleting column(s) for U e, sending possibly everything available on e, possibly violating scalar code R(A 0 ) R e = R(A) Project on dimensions other than R e C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

42 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Sources etwork Destinations Insu cient Motivation Operations Results 5 Proposed Tasks and Timeline Insu cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

43 Example: Forbidden embedded networks Goal: minimal forbidden networks for sufficiency Scalar binary codes considered k =, 2, 3; E = 2, 3, 4, 7360 non-isomorphic MDCS 922 sufficient, 5438 insufficient 2 forbidden embedded networks (Li, et al submission TransIT 204) Open questions: complete list? Finite number for F q? 5438 / 7360 insu cient 922 / 7360 su cient 2 forbidden embedded networks C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

44 Summary of work thus far Enumerate > 0 5 networks Find > 7000 non-isomorphic ones Calculate outer bounds Calculate inner bounds Yes Obtain exact rate region &su ciency of codes Match? o Insu ciency for networks with arbitrary size? Operations preserving insu ciency Thousands of insu cient networks boiled down to 2 forbidden embedded networks C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

45 Publication List Steven Weber, Congduan Li, and John Walsh, Rate Region for a class of delay mitigatting codes and P2P networks, 46th Annual Conference on Information Sciences and Systems, Princeton University, March, 202, Invited Paper 2 Congduan Li, John Walsh, and Steven Weber, A Computational Approach for Determining Rate Regions and Codes using Entropic Vector Bounds, 50th Allerton Conference, UIUC, Oct Congduan Li, Jayant Apte, John M Walsh, and Steven Weber, A new computational approach for determining rate regions and optimal codes for coded networks, The 203 IEEE International Symposium on etwork Coding (etcod 203), Calgary, Canada, Jun 7-9, Congduan Li, John M Walsh, and Steven Weber, Matroid bounds on region of entropic vectors, 5th Allerton conference on Communication, Control and Computation, UIUC, IL, Oct Jayant Apte, Congduan Li, John MacLaren Walsh, and Steven Weber, Exact pepair problems with multiple sources, in The 48th annual IEEE Conference on Information Sciences and Systems(CISS), Mar Jayant Apte, Congduan Li, and John MacLaren Walsh, Algorithms for Computing etwork Coding Rate Regions via Single Element Extensions of Matroids, IEEE International Symposium on Information Theory (ISIT) 204, Honolulu, Hawaii 7 Congduan Li, Steven Weber, and John M Walsh, etwork Embedding Operations Preserving the Insufficiency of Linear etwork Codes, 52th Allerton conference on Communication, Control and Computation, UIUC, IL, Oct Congduan Li, Steven Weber, and John M Walsh, Multilevel Diversity Coding Systems: Rate Regions, Codes, Computation, & Forbidden Minors, IEEE Transactions on Information Theory, 204, SUBMITTED C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

46 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Motivation Operations Results 5 Proposed Tasks and Timeline C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

47 Task : network combination operations Recall: embedding operations (tools) to certify insufficiency of class of codes in arbitrary size networks but not sufficiency (no tools) Extension: certify sufficiency of class of codes ew operations: combine smaller networks into a bigger network Preserving: sufficiency of class of codes Existence: concatenation of two independent sufficient networks Sources etwork Destinations Su cient Su cient Su cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

48 Task : network combination operations Objectives: other operations preserving sufficiency Source Union? Sources etwork Destinations Su cient Su cient Su cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

49 Task : network combination operations Objectives: other operations preserving sufficiency Edge Connection? Deliverable: ISIT/etCod 205, journal with [Li, et al Allerton 204] Sources etwork Destinations Su cient Su cient Su cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

50 Task 2: asymmetric distributed storage exact repair Computation tools work for general networks, will try storage exact repair problems Common setup: symmetric, (n, k, d, α, β) Source n storage disks k disks reconstruct k k k d helpers repair C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

51 Task 2: asymmetric distributed storage exact repair Will investigate asymmetric setups with prioritized data Initial work with Jayant Apte [6, CISS 204]: symmetric in disks and repair, asymmetric in reconstruction Deliverable: etcod 205 n storage disks with distinct capacities asymmetric reconstruction: access not necessarily k disks; hot data, cold data R Hot Cold R m R n F m,n F,n asymmetric repair: not necessarily d helpers distinct repair bandwidth C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

52 Task 3: polymatroid extremality Recall: computation cares exclusively about matroids that are extreme rays, Connected matroids are extremal: r(a) + r(e \ A) > r(e), A E Extremal matroids are extremal polymatroids Connected polymatroid = extremal polymatroids? C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

53 Task 3: polymatroid extremality Extremal polymatroids Connected: otherwise separable, sum of two polymatroids Connected polymatroid extremal polymatroids Investigate the sufficient condition for polymatroid extremality Potential reduction in computation complexity Deliverable: ISIT 205, journal with [Li, et al Allerton 203] [H(X) H(Y ) H(XY ) H(Z) H(XZ) H(YZ) H(XY Z)] [ ] = [ ] + [ ] Connected but ot extremal ot connected Connected C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

54 Task 4: necessity of non-shannon inequalities Tighter outer bound on Γ : Shannon + non-shannon on-shannon to close the gap? Investigate necessity of non-shannon: try to construct distributed storage exact repair network associated with Vámos matroid Preserving property: if a network requires non-shannon, what about its extensions? Deliverable: ISIT/etCod 205 on-shannon ineq Shannon ineq Constraints non-shannon In C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

55 Timeline Time Task Task 2 Task 3 Task 4 Thesis Defense 0/204 Enumeration Construction /204 Start Calculation Reading Proof 2/204 Proof Writing Proof Writing 0/205 Writing Writing Writing 02/205 Writing Writing 03/205 Journal 04/205 Journal 05/205 Writing 06/205 Present Visit IC at CUHK: ov, Dec, 204 ISIT due Jan 9, 205, etcod due Feb 20, 205 C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

56 References X Yan, RW Yeung, and Z Zhang (202) An Implicit Characterization of the Achievable Rate Region for Acyclic Multisource Multisink etwork Coding IEEE Transactions on Information Theory 58(9), C Tian (203) Rate region of the (4, 3, 3) exact-repair regenerating codes IEEE International Symposium on Information Theory (ISIT), C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

57 Q & A Thank you! C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57

Symmetry in Network Coding

Symmetry in Network Coding Symmetry in Network Coding Formalization, Graph-theoretic Characterization, and Computation Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia ISIT,

More information

Network Combination Operations Preserving the Sufficiency of Linear Network Codes

Network Combination Operations Preserving the Sufficiency of Linear Network Codes Network Combination Operations Preserving the Sufficiency of Linear Network Codes Congduan Li, Steven Weber, John MacLaren Walsh ECE Department, Drexel University Philadelphia, PA 904 Abstract Operations

More information

Matroid Bounds on the Region of Entropic Vectors

Matroid Bounds on the Region of Entropic Vectors Matroid Bounds on the Region of Entropic Vectors Congduan Li, John MacLaren Walsh, Steven Weber Drexel University, Dept of ECE, Philadelphia, PA 19104, USA congduanli@drexeledu, jwalsh@coedrexeledu, sweber@coedrexeledu

More information

A computational approach for determining rate regions and codes using entropic vector bounds

A computational approach for determining rate regions and codes using entropic vector bounds 1 A computational approach for determining rate regions and codes using entropic vector bounds Congduan Li, John MacLaren Walsh, Steven Weber Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA

More information

On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region. Computation, and Hierarchy. A Thesis. Submitted to the Faculty

On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region. Computation, and Hierarchy. A Thesis. Submitted to the Faculty On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region Computation, and Hierarchy A Thesis Submitted to the Faculty of Drexel University by Congduan Li in partial fulfillment of the requirements

More information

On Multi-source Multi-sink Hyperedge Networks: Enumeration, Rate Region Computation, & Hierarchy

On Multi-source Multi-sink Hyperedge Networks: Enumeration, Rate Region Computation, & Hierarchy On Multi-ource Multi-ink Hyperedge Network: Enumeration, Rate Region Computation, & Hierarchy Ph D Diertation Defene Congduan Li ASPITRG & MANL Drexel Univerity congduanli@gmailcom May 9, 05 C Li (ASPITRG

More information

Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions

Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia NetCod, 205 NSF

More information

A new computational approach for determining rate regions and optimal codes for coded networks

A new computational approach for determining rate regions and optimal codes for coded networks A new computational approach for determining rate regions and optimal codes for coded networks Congduan Li, Jayant Apte, John MacLaren Walsh, Steven Weber Drexel University, Dept. of ECE, Philadelphia,

More information

Symmetries in the Entropy Space

Symmetries in the Entropy Space Symmetries in the Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Abstract This paper investigates when Shannon-type inequalities completely characterize the part of the closure of the entropy

More information

Network Coding on Directed Acyclic Graphs

Network Coding on Directed Acyclic Graphs Network Coding on Directed Acyclic Graphs John MacLaren Walsh, Ph.D. Multiterminal Information Theory, Spring Quarter, 0 Reference These notes are directly derived from Chapter of R. W. Yeung s Information

More information

Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids

Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids Jayant Apte, Congduan Li, John MacLaren Walsh Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA

More information

Entropic Vectors: Polyhedral Computation & Information Geometry

Entropic Vectors: Polyhedral Computation & Information Geometry Entropic Vectors: Polyhedral Computation & Information Geometry John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks to

More information

Symmetry in Network Coding

Symmetry in Network Coding Symmetry in Network Coding Jayant Apte, John MacLaren Walsh Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA jsa46@drexel.edu, jwalsh@coe.drexel.edu Abstract We establish connections between

More information

Rate region for a class of delay mitigating codes and P2P networks

Rate region for a class of delay mitigating codes and P2P networks Rate region for a class of delay mitigating codes and P2P networks Steven Weber, Congduan Li, John MacLaren Walsh Drexel University, Dept of ECE, Philadelphia, PA 19104 Abstract This paper identifies the

More information

Symmetries in Entropy Space

Symmetries in Entropy Space 1 Symmetries in Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks to NSF CCF-1421828

More information

Characterizing the Region of Entropic Vectors via Information Geometry

Characterizing the Region of Entropic Vectors via Information Geometry Characterizing the Region of Entropic Vectors via Information Geometry John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks

More information

. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables

. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables . Relationships Among Bounds for the Region of Entropic Vectors in Four Variables John MacLaren Walsh and Steven Weber Department of Electrical and Computer Engineering, Drexel University, Philadelphia,

More information

Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences.

Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences. Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences A Thesis Submitted to the Faculty of Drexel University by Yunshu

More information

The Capacity Region for Multi-source Multi-sink Network Coding

The Capacity Region for Multi-source Multi-sink Network Coding The Capacity Region for Multi-source Multi-sink Network Coding Xijin Yan Dept. of Electrical Eng. - Systems University of Southern California Los Angeles, CA, U.S.A. xyan@usc.edu Raymond W. Yeung Dept.

More information

Bounding the Entropic Region via Information Geometry

Bounding the Entropic Region via Information Geometry Bounding the ntropic Region via Information Geometry Yunshu Liu John MacLaren Walsh Dept. of C, Drexel University, Philadelphia, PA 19104, USA yunshu.liu@drexel.edu jwalsh@coe.drexel.edu Abstract This

More information

Generalized Network Sharing Outer Bound and the Two-Unicast Problem

Generalized Network Sharing Outer Bound and the Two-Unicast Problem Generalized Network Sharing Outer Bound and the Two-Unicast Problem Sudeep U. Kamath, David N. C. Tse and Venkat Anantharam Wireless Foundations, Dept of EECS, University of California at Berkeley, Berkeley,

More information

Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions

Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions 2009 IEEE Information Theory Workshop Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions Asaf Cohen, Michelle Effros, Salman Avestimehr and Ralf Koetter Abstract In this

More information

Capacity Region of the Permutation Channel

Capacity Region of the Permutation Channel Capacity Region of the Permutation Channel John MacLaren Walsh and Steven Weber Abstract We discuss the capacity region of a degraded broadcast channel (DBC) formed from a channel that randomly permutes

More information

Networks and Matroids

Networks and Matroids Adaptive Signal Processing and Information Theory Research Group ECE Department, Drexel University June 1, 2012 Outline 1 Mappings and Definitions Source Mapping: S : V 2 µ, µ is message set. Message Assignment:

More information

Non-isomorphic Distribution Supports for Calculating Entropic Vectors

Non-isomorphic Distribution Supports for Calculating Entropic Vectors Non-isomorphic Distribution Supports for Calculating Entropic Vectors Yunshu Liu & John MacLaren Walsh Adaptive Signal Processing and Information Theory Research Group Department of Electrical and Computer

More information

Amobile satellite communication system, like Motorola s

Amobile satellite communication system, like Motorola s I TRANSACTIONS ON INFORMATION THORY, VOL. 45, NO. 4, MAY 1999 1111 Distributed Source Coding for Satellite Communications Raymond W. Yeung, Senior Member, I, Zhen Zhang, Senior Member, I Abstract Inspired

More information

Partition Symmetrical Entropy Functions*

Partition Symmetrical Entropy Functions* Partition Symmetrical Entropy Functions* Jayant Apte ASPITRG *Chen, Qi; Yeung, Raymond W., Partition Symmetrical Entropy Functions, arxiv:1407.7405v1 [cs.it] Outline Sneak Peak Background: Basic facts

More information

Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel

Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel Jun Chen Dept. of Electrical and Computer Engr. McMaster University Hamilton, Ontario, Canada Chao Tian AT&T Labs-Research 80 Park

More information

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse Two-unicast is hard Sudeep Kamath ECE Department, University of California, San Diego, CA, USA sukamath@ucsd.edu David N.C. Tse EECS Department, University of California, Berkeley, CA, USA dtse@eecs.berkeley.edu

More information

IN FUTURE communication networks, say next-generation

IN FUTURE communication networks, say next-generation IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 36, NO. 4, APRIL 2018 737 Fundamental Limits on a Class of Secure Asymmetric Multilevel Diversity Coding Systems Congduan Li, Member, IEEE, Xuan Guang,

More information

On Secret Sharing Schemes, Matroids and Polymatroids

On Secret Sharing Schemes, Matroids and Polymatroids On Secret Sharing Schemes, Matroids and Polymatroids Jaume Martí-Farré, Carles Padró Dep. de Matemàtica Aplicada 4, Universitat Politècnica de Catalunya, Barcelona, Spain {jaumem,cpadro}@ma4.upc.edu June

More information

Characterising Probability Distributions via Entropies

Characterising Probability Distributions via Entropies 1 Characterising Probability Distributions via Entropies Satyajit Thakor, Terence Chan and Alex Grant Indian Institute of Technology Mandi University of South Australia Myriota Pty Ltd arxiv:1602.03618v2

More information

Cayley s Hyperdeterminant, the Principal Minors of a Symmetric Matrix and the Entropy Region of 4 Gaussian Random Variables

Cayley s Hyperdeterminant, the Principal Minors of a Symmetric Matrix and the Entropy Region of 4 Gaussian Random Variables Forty-Sixth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 23-26, 2008 Cayley s Hyperdeterminant, the Principal Minors of a Symmetric Matrix and the Entropy Region of 4 Gaussian

More information

Characteristic-Dependent Linear Rank Inequalities and Network Coding Applications

Characteristic-Dependent Linear Rank Inequalities and Network Coding Applications haracteristic-ependent Linear Rank Inequalities and Network oding pplications Randall ougherty, Eric Freiling, and Kenneth Zeger bstract Two characteristic-dependent linear rank inequalities are given

More information

Quasi-linear Network Coding

Quasi-linear Network Coding Quasi-linear Network Coding Moshe Schwartz Electrical and Computer Engineering Ben-Gurion University of the Negev Beer Sheva 8410501, Israel schwartz@ee.bgu.ac.il Abstract We present a heuristic for designing

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Finite nilpotent metacyclic groups never violate the Ingleton inequality Author(s) Stancu, Radu; Oggier,

More information

Analyzing Large Communication Networks

Analyzing Large Communication Networks Analyzing Large Communication Networks Shirin Jalali joint work with Michelle Effros and Tracey Ho Dec. 2015 1 The gap Fundamental questions: i. What is the best achievable performance? ii. How to communicate

More information

Reverse Edge Cut-Set Bounds for Secure Network Coding

Reverse Edge Cut-Set Bounds for Secure Network Coding Reverse Edge Cut-Set Bounds for Secure Network Coding Wentao Huang and Tracey Ho California Institute of Technology Michael Langberg University at Buffalo, SUNY Joerg Kliewer New Jersey Institute of Technology

More information

Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach

Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Mehran Elyasi Department of ECE University of Minnesota melyasi@umn.edu Soheil Mohajer Department of ECE University

More information

Lossy Distributed Source Coding

Lossy Distributed Source Coding Lossy Distributed Source Coding John MacLaren Walsh, Ph.D. Multiterminal Information Theory, Spring Quarter, 202 Lossy Distributed Source Coding Problem X X 2 S {,...,2 R } S 2 {,...,2 R2 } Ẑ Ẑ 2 E d(z,n,

More information

Design of linear Boolean network codes for combination networks

Design of linear Boolean network codes for combination networks Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2006 Design of linear Boolean network codes for combination networks Shoupei Li Louisiana State University and Agricultural

More information

Index Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago

Index Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago Index Coding Algorithms for Constructing Network Codes Salim El Rouayheb Illinois Institute of Technology, Chicago Matlab Code with GUI for Constructing Linear Network Codes Matlab outputs network code

More information

On The Binary Lossless Many-Help-One Problem with Independently Degraded Helpers

On The Binary Lossless Many-Help-One Problem with Independently Degraded Helpers On The Binary Lossless Many-Help-One Problem with Independently Degraded Helpers Albrecht Wolf, Diana Cristina González, Meik Dörpinghaus, José Cândido Silveira Santos Filho, and Gerhard Fettweis Vodafone

More information

Polar codes for the m-user MAC and matroids

Polar codes for the m-user MAC and matroids Research Collection Conference Paper Polar codes for the m-user MAC and matroids Author(s): Abbe, Emmanuel; Telatar, Emre Publication Date: 2010 Permanent Link: https://doi.org/10.3929/ethz-a-005997169

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes

More information

Entropy Vectors and Network Information Theory

Entropy Vectors and Network Information Theory Entropy Vectors and Network Information Theory Sormeh Shadbakht and Babak Hassibi Department of Electrical Engineering Caltech Lee Center Workshop May 25, 2007 1 Sormeh Shadbakht and Babak Hassibi Entropy

More information

Entropic and informatic matroids

Entropic and informatic matroids Entropic and informatic matroids Emmanuel Abbe Abstract This paper studies dependencies between random variables by means of information theoretic functionals such as the entropy and the mutual information.

More information

On Network Coding Capacity - Matroidal Networks and Network Capacity Regions. Anthony Eli Kim

On Network Coding Capacity - Matroidal Networks and Network Capacity Regions. Anthony Eli Kim On Network Coding Capacity - Matroidal Networks and Network Capacity Regions by Anthony Eli Kim S.B., Electrical Engineering and Computer Science (2009), and S.B., Mathematics (2009) Massachusetts Institute

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

Algebraic matroids are almost entropic

Algebraic matroids are almost entropic accepted to Proceedings of the AMS June 28, 2017 Algebraic matroids are almost entropic František Matúš Abstract. Algebraic matroids capture properties of the algebraic dependence among elements of extension

More information

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets

Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Shivaprasad Kotagiri and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame,

More information

Polar Codes for Arbitrary DMCs and Arbitrary MACs

Polar Codes for Arbitrary DMCs and Arbitrary MACs Polar Codes for Arbitrary DMCs and Arbitrary MACs Rajai Nasser and Emre Telatar, Fellow, IEEE, School of Computer and Communication Sciences, EPFL Lausanne, Switzerland Email: rajainasser, emretelatar}@epflch

More information

Sparse Solutions of Systems of Equations and Sparse Modelling of Signals and Images

Sparse Solutions of Systems of Equations and Sparse Modelling of Signals and Images Sparse Solutions of Systems of Equations and Sparse Modelling of Signals and Images Alfredo Nava-Tudela ant@umd.edu John J. Benedetto Department of Mathematics jjb@umd.edu Abstract In this project we are

More information

Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching

Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching entropy Article Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching Chao Tian Department of Electrical and Computer Engineering, Texas A&M

More information

1 Matroid intersection

1 Matroid intersection CS 369P: Polyhedral techniques in combinatorial optimization Instructor: Jan Vondrák Lecture date: October 21st, 2010 Scribe: Bernd Bandemer 1 Matroid intersection Given two matroids M 1 = (E, I 1 ) and

More information

Received: 1 September 2018; Accepted: 10 October 2018; Published: 12 October 2018

Received: 1 September 2018; Accepted: 10 October 2018; Published: 12 October 2018 entropy Article Entropy Inequalities for Lattices Peter Harremoës Copenhagen Business College, Nørre Voldgade 34, 1358 Copenhagen K, Denmark; harremoes@ieee.org; Tel.: +45-39-56-41-71 Current address:

More information

Rank-one Generated Spectral Cones Defined by Two Homogeneous Linear Matrix Inequalities

Rank-one Generated Spectral Cones Defined by Two Homogeneous Linear Matrix Inequalities Rank-one Generated Spectral Cones Defined by Two Homogeneous Linear Matrix Inequalities C.J. Argue Joint work with Fatma Kılınç-Karzan October 22, 2017 INFORMS Annual Meeting Houston, Texas C. Argue, F.

More information

Network Routing Capacity

Network Routing Capacity 1 Network Routing Capacity Jillian Cannons (University of California, San Diego) Randy Dougherty (Center for Communications Research, La Jolla) Chris Freiling (California State University, San Bernardino)

More information

Product-matrix Construction

Product-matrix Construction IERG60 Coding for Distributed Storage Systems Lecture 0-9//06 Lecturer: Kenneth Shum Product-matrix Construction Scribe: Xishi Wang In previous lectures, we have discussed about the minimum storage regenerating

More information

Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences

Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences Ph.D. Dissertation Defense Yunshu Liu Adaptive Signal Processing

More information

A Numerical Study on the Wiretap Network with a Simple Network Topology

A Numerical Study on the Wiretap Network with a Simple Network Topology 1 A Numerical Study on the Wiretap Network with a Simple Network Topology Fan Cheng, Member, IEEE and Vincent Y. F. Tan, Senior Member, IEEE arxiv:1505.02862v3 [cs.it] 15 Jan 2016 Fig. 1. Abstract In this

More information

Network Routing Capacity

Network Routing Capacity 1 Network Routing Capacity Jillian Cannons (University of California, San Diego) Randy Dougherty (Center for Communications Research, La Jolla) Chris Freiling (California State University, San Bernardino)

More information

Distributed Storage Systems with Secure and Exact Repair - New Results

Distributed Storage Systems with Secure and Exact Repair - New Results Distributed torage ystems with ecure and Exact Repair - New Results Ravi Tandon, aidhiraj Amuru, T Charles Clancy, and R Michael Buehrer Bradley Department of Electrical and Computer Engineering Hume Center

More information

Error Correcting Index Codes and Matroids

Error Correcting Index Codes and Matroids Error Correcting Index Codes and Matroids Anoop Thomas and B Sundar Rajan Dept of ECE, IISc, Bangalore 5612, India, Email: {anoopt,bsrajan}@eceiiscernetin arxiv:15156v1 [csit 21 Jan 215 Abstract The connection

More information

Cut-Set Bound and Dependence Balance Bound

Cut-Set Bound and Dependence Balance Bound Cut-Set Bound and Dependence Balance Bound Lei Xiao lxiao@nd.edu 1 Date: 4 October, 2006 Reading: Elements of information theory by Cover and Thomas [1, Section 14.10], and the paper by Hekstra and Willems

More information

Variable-Rate Universal Slepian-Wolf Coding with Feedback

Variable-Rate Universal Slepian-Wolf Coding with Feedback Variable-Rate Universal Slepian-Wolf Coding with Feedback Shriram Sarvotham, Dror Baron, and Richard G. Baraniuk Dept. of Electrical and Computer Engineering Rice University, Houston, TX 77005 Abstract

More information

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:

More information

Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions

Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Chih-Chun Wang Center for Wireless Systems and Applications (CWSA) School of

More information

A New Achievable Region for Gaussian Multiple Descriptions Based on Subset Typicality

A New Achievable Region for Gaussian Multiple Descriptions Based on Subset Typicality 0 IEEE Information Theory Workshop A New Achievable Region for Gaussian Multiple Descriptions Based on Subset Typicality Kumar Viswanatha, Emrah Akyol and Kenneth Rose ECE Department, University of California

More information

On Scalable Source Coding for Multiple Decoders with Side Information

On Scalable Source Coding for Multiple Decoders with Side Information On Scalable Source Coding for Multiple Decoders with Side Information Chao Tian School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS), EPFL, Lausanne,

More information

Sum-networks from undirected graphs: Construction and capacity analysis

Sum-networks from undirected graphs: Construction and capacity analysis Electrical and Computer Engineering Conference Papers Posters and Presentations Electrical and Computer Engineering 014 Sum-networks from undirected graphs: Construction and capacity analysis Ardhendu

More information

Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach

Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach ALPHABET SIZE REDUCTION FOR SECURE NETWORK CODING: A GRAPH THEORETIC APPROACH 1 Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach Xuan Guang, Member, IEEE, and Raymond W. Yeung,

More information

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel

The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department

More information

Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function

Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function Dinesh Krithivasan and S. Sandeep Pradhan Department of Electrical Engineering and Computer Science,

More information

Random Linear Intersession Network Coding With Selective Cancelling

Random Linear Intersession Network Coding With Selective Cancelling 2009 IEEE Information Theory Workshop Random Linear Intersession Network Coding With Selective Cancelling Chih-Chun Wang Center of Wireless Systems and Applications (CWSA) School of ECE, Purdue University

More information

Distributed Lossy Interactive Function Computation

Distributed Lossy Interactive Function Computation Distributed Lossy Interactive Function Computation Solmaz Torabi & John MacLaren Walsh Dept. of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104 Email: solmaz.t@drexel.edu &

More information

The Capacity of a Network

The Capacity of a Network The Capacity of a Network April Rasala Lehman MIT Collaborators: Nick Harvey and Robert Kleinberg MIT What is the Capacity of a Network? Source a Source b c d e Sink f Sink What is the Capacity of a Network?

More information

15. Conic optimization

15. Conic optimization L. Vandenberghe EE236C (Spring 216) 15. Conic optimization conic linear program examples modeling duality 15-1 Generalized (conic) inequalities Conic inequality: a constraint x K where K is a convex cone

More information

Network Coding for Computing

Network Coding for Computing Networ Coding for Computing Rathinaumar Appuswamy, Massimo Franceschetti, Nihil Karamchandani, and Kenneth Zeger Abstract The following networ computation problem is considered A set of source nodes in

More information

Simplified Composite Coding for Index Coding

Simplified Composite Coding for Index Coding Simplified Composite Coding for Index Coding Yucheng Liu, Parastoo Sadeghi Research School of Engineering Australian National University {yucheng.liu, parastoo.sadeghi}@anu.edu.au Fatemeh Arbabjolfaei,

More information

Matroid Optimisation Problems with Nested Non-linear Monomials in the Objective Function

Matroid Optimisation Problems with Nested Non-linear Monomials in the Objective Function atroid Optimisation Problems with Nested Non-linear onomials in the Objective Function Anja Fischer Frank Fischer S. Thomas ccormick 14th arch 2016 Abstract Recently, Buchheim and Klein [4] suggested to

More information

Tight Upper Bounds on the Redundancy of Optimal Binary AIFV Codes

Tight Upper Bounds on the Redundancy of Optimal Binary AIFV Codes Tight Upper Bounds on the Redundancy of Optimal Binary AIFV Codes Weihua Hu Dept. of Mathematical Eng. Email: weihua96@gmail.com Hirosuke Yamamoto Dept. of Complexity Sci. and Eng. Email: Hirosuke@ieee.org

More information

Explicit MBR All-Symbol Locality Codes

Explicit MBR All-Symbol Locality Codes Explicit MBR All-Symbol Locality Codes Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, and Sriram Vishwanath 1 Abstract arxiv:1302.0744v2

More information

SHANNON S information measures refer to entropies, conditional

SHANNON S information measures refer to entropies, conditional 1924 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO. 6, NOVEMBER 1997 A Framework for Linear Information Inequalities Raymond W. Yeung, Senior Member, IEEE Abstract We present a framework for information

More information

Inderjit Dhillon The University of Texas at Austin

Inderjit Dhillon The University of Texas at Austin Inderjit Dhillon The University of Texas at Austin ( Universidad Carlos III de Madrid; 15 th June, 2012) (Based on joint work with J. Brickell, S. Sra, J. Tropp) Introduction 2 / 29 Notion of distance

More information

Succinct Data Structures for Approximating Convex Functions with Applications

Succinct Data Structures for Approximating Convex Functions with Applications Succinct Data Structures for Approximating Convex Functions with Applications Prosenjit Bose, 1 Luc Devroye and Pat Morin 1 1 School of Computer Science, Carleton University, Ottawa, Canada, K1S 5B6, {jit,morin}@cs.carleton.ca

More information

Computational Integer Programming. Lecture 2: Modeling and Formulation. Dr. Ted Ralphs

Computational Integer Programming. Lecture 2: Modeling and Formulation. Dr. Ted Ralphs Computational Integer Programming Lecture 2: Modeling and Formulation Dr. Ted Ralphs Computational MILP Lecture 2 1 Reading for This Lecture N&W Sections I.1.1-I.1.6 Wolsey Chapter 1 CCZ Chapter 2 Computational

More information

Multimedia Communications. Scalar Quantization

Multimedia Communications. Scalar Quantization Multimedia Communications Scalar Quantization Scalar Quantization In many lossy compression applications we want to represent source outputs using a small number of code words. Process of representing

More information

An Algorithmic Framework for Wireless Information Flow

An Algorithmic Framework for Wireless Information Flow An Algorithmic Framework for Wireless Information Flow The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher

More information

Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik. Combinatorial Optimization (MA 4502)

Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik. Combinatorial Optimization (MA 4502) Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik Combinatorial Optimization (MA 4502) Dr. Michael Ritter Problem Sheet 1 Homework Problems Exercise

More information

On MBR codes with replication

On MBR codes with replication On MBR codes with replication M. Nikhil Krishnan and P. Vijay Kumar, Fellow, IEEE Department of Electrical Communication Engineering, Indian Institute of Science, Bangalore. Email: nikhilkrishnan.m@gmail.com,

More information

Capacity Theorems for Distributed Index Coding

Capacity Theorems for Distributed Index Coding Capacity Theorems for Distributed Index Coding 1 Yucheng Liu, Parastoo Sadeghi, Fatemeh Arbabjolfaei, and Young-Han Kim Abstract arxiv:1801.09063v1 [cs.it] 27 Jan 2018 In index coding, a server broadcasts

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 2303 Linear Network Codes and Systems of Polynomial Equations Randall Dougherty, Chris Freiling, and Kenneth Zeger, Fellow, IEEE Abstract

More information

On the Capacity Region of the Gaussian Z-channel

On the Capacity Region of the Gaussian Z-channel On the Capacity Region of the Gaussian Z-channel Nan Liu Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 nkancy@eng.umd.edu ulukus@eng.umd.edu

More information

An Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets

An Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets An Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets Jing Guo University of Cambridge jg582@cam.ac.uk Jossy Sayir University of Cambridge j.sayir@ieee.org Minghai Qin

More information

An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel

An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2427 An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel Ersen Ekrem, Student Member, IEEE,

More information

On the Tradeoff Region of Secure Exact-Repair Regenerating Codes

On the Tradeoff Region of Secure Exact-Repair Regenerating Codes 1 On the Tradeoff Region of Secure Exact-Repair Regenerating Codes Shuo Shao, Tie Liu, Chao Tian, and Cong Shen any k out of the total n storage nodes; 2 when a node failure occurs, the failed node can

More information

Network Flows. 6. Lagrangian Relaxation. Programming. Fall 2010 Instructor: Dr. Masoud Yaghini

Network Flows. 6. Lagrangian Relaxation. Programming. Fall 2010 Instructor: Dr. Masoud Yaghini In the name of God Network Flows 6. Lagrangian Relaxation 6.3 Lagrangian Relaxation and Integer Programming Fall 2010 Instructor: Dr. Masoud Yaghini Integer Programming Outline Branch-and-Bound Technique

More information

A Dual Fano, and Dual Non-Fano Matroidal Network

A Dual Fano, and Dual Non-Fano Matroidal Network California State University, San Bernardino CSUSB ScholarWorks Electronic Theses, Projects, and Dissertations Office of Graduate Studies 6-2016 A Dual Fano, and Dual Non-Fano Matroidal Network Stephen

More information

The Inflation Technique for Causal Inference with Latent Variables

The Inflation Technique for Causal Inference with Latent Variables The Inflation Technique for Causal Inference with Latent Variables arxiv:1609.00672 (Elie Wolfe, Robert W. Spekkens, Tobias Fritz) September 2016 Introduction Given some correlations between the vocabulary

More information