Multiterminal Networks: Rate Regions, Codes, Computations, & Forbidden Minors
|
|
- Aubrey Parrish
- 5 years ago
- Views:
Transcription
1 Multiterminal etworks: Rate Regions, Codes, Computations, & Forbidden Minors Ph D Thesis Proposal Congduan Li ASPITRG & MAL Drexel University congduanli@gmailcom October 5, 204 C Li (ASPITRG & MAL) Thesis Proposal October 5, 204 / 57
2 Problems of interest A multisource multicast network: Sources etwork Destinations Paths In(i) i Out(i) Y s s U ee R e ω s t β(t) S T Rate/capacity region: compute If Shannon outer (LP) bound tight If simple linear codes sufficient S T C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
3 Outline Rate Region 2 Shannon Outer Bounds & Converse Constraints P rojection 3 Matroid Bounds and Achievability Constraints Constraints 4 Forbidden Embedding etworks Motivation Operations Results 5 Proposed Tasks and Timeline In Sources etwork Destinations Insu Insu cient cient In C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
4 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Motivation Operations Results 5 Proposed Tasks and Timeline Constraints P rojection C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
5 etwork Coding: Sources Y s Paths s In(i) Out(i) U ee R e i t S T β(t) S Source Rate Source Independence Source Encoding T H(Y s ) ω s H(Y S ) = H(Y s ) s S H(U Out(s) Y s ) = 0 C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
6 etwork Coding: Edges Y s Paths s In(i) Out(i) U ee R e i t S T β(t) S Coding Rate R e H(U e ), e E T C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
7 etwork Coding: odes Y s Paths s In(i) Out(i) U ee R e i t S T β(t) S Coding Constraints H(U Out(i) U In(i) )=0, i V\(S T ) T C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
8 etwork Coding: Sinks Y s Paths s In(i) Out(i) U ee R e i t S T β(t) S Decoding Constraints H(Y β(t) U In(t) )=0, t T T C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
9 Example: Multilevel Diversity Coding Systems (MDCS) Encoders Prioritized Sources 9 U E X X 2 >= X :K >; X K E E U E Paths Fan(D ) Fan(D D ) Decoders D D i D d D j D D Prioritized sources, no intermediate nodes X X } X :k X :K X :K } } Lev(D )= = Lev(D i )= Lev(D d )=k Lev(D j )= = Lev(D D )=K Decoders are classified to levels: level k, decode X :k otation: (k, E ) MDCS instances C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
10 Rate region Rate region: all possible rate and source entropy vectors satisfying all network constraints Collect the network random variables and their joint entropies Define Γ : 2 -dim cone, region of valid entropy vectors Constraints from network A: L = {h Γ : h Y S = Σ s S h Ys } () L 2 = {h Γ : h X Out(k) Y s = 0} (2) L 3 = {h Γ : h X Out(i) X In(i) = 0} (3) L 4 = {(h T, R T ) T R 2 + E + : R e h Ue, e E} (4) L 5 = {h Γ : h Y β(t) U In(t) = 0} (5) Rate region (cone) in terms of rates and source entropies (derived from [Yan, Yeung, Zhang TranIT 202]): R(A) = proj RE,H(Y S )(con(γ L 23) L 45 ) (6) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
11 Region of Entropic Vectors Γ : ot all points in Euclidean space have distributions h entropic: exists a joint distribution associated with h Region of entropic vector: Γ = {h : h is entropic} Γ not fully characterized for 4: convex but contains non-polyhedral part Entropic: associated P (X,,X )exists Outer bounds Inner bounds C Li (ASPITRG & MAL) Thesis Proposal October 5, 204 / 57
12 Sandwich Bounds Γ ΓOut : R out(a) = proj RE,H(Y S )(Γ Out L 2345) Γ ΓIn : R in(a) = proj RE,H(Y S )(Γ In L 2345) It becomes: Initial polyhedra constraints projections R(A) = R out (A) = R in (A), if R out (A) = R in (A) Our work following this idea: Li, et al, Allerton 202, etcod 203, submission TransIT 204 Constraints P rojection Constraints Constraints In In C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
13 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Constraints Constraints Motivation Operations Results 5 Proposed Tasks and Timeline In In C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
14 Shannon Outer Bound Region determined by Shannon inequalities H(X i \ X i ) 0 and I (X i, X j X K ) 0, i, j, K \{i, j}, equivalent to polymatroid cone: ormalization: f ( ) = 0; 2 Monotonicity: if A B then f (A) f (B); 3 Submodularity: if A, B, f (A B) + f (A B) f (A) + f (B) Shannon ineq C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
15 Converse Proof Recall R out (A) = proj RE,H(Y S )(Γ Out L 2345) Suppose a polyhedral cone P (Γ Out L 2345): Ax 0 An inequality in the projected cone (rate region), b T x 0 Exists a vector λ 0 (weighted sum) s t A T λ = b This is a converse proof (inspired from Tian ISIT 203) 2 4 A X X X 2 X Projection 2 4 A T = 0 b b T X X X 2 X C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57 0
16 Determine Human Readable Converse Proof λ should be as sparse as possible Optimization minimize λ subject to λ 0 A T λ = b λ 0 Approximated by L -norm: λ We observed: redundant inequalities helpful, the order of inequalities determinable by computer Automatic human readable converse (Li, et al submission TransIT 204): Γ Out L b T x 0 LP solver Order determiner Converse proof C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
17 Converse Proof Example X, Y, Z R E R 2 E 2 R 3 E3 D D 2 D3 D 4 X R H(X) R 2 H(X)+H(Y ) R 3 R + R 2 X, Y X, Y, Z X, Y, Z H(X)+H(Y )+H(Z) 2H(X)+H(Y )+H(Z) R + R 2 (,2) H(U )+H(U 2) (3,4) = H(X, U )+H(X, Y, U 2) (5) (6) (7) H(X)+H(X, Y, U,U 2) H(X)+H(U,U 2) H(X)+H(X, Y, Z) (8) = 2H(X)+H(Y )+H(Z) Order Coe cients Inequality or equality R H(U ) 2 R 2 H(U 2 ) 3 H(X U )=0 4 H(X, Y U 2 )=0 5 I(U ; YU 2 X) 0 6 H(X, Y U,U 2 )=0 7 H(X, Y, Z U,U 2 )=0 8 H(X, Y, Z) =H(X)+H(Y )+H(Z) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
18 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Constraints Constraints Motivation Operations Results 5 Proposed Tasks and Timeline In In C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
19 Matroid Definition: Rank Function Matroid: generalization of linear dependence and independence Definition (Matroid rank function) A set function r : 2 S {0,, } is a rank function of a matroid if it obeys the polymatroid axioms and two more conditions: Integrality: r(a) is integer-valued; 2 Cardinality: 0 r(a) A C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
20 Representable Matroids Definition A matroid M with ground set S of size S = and rank r M = r is representable over a field F if there exists a matrix A F r such that for each independent set I I the corresponding columns in A, viewed as vectors in F r, are linearly independent S,,S i,,s j,,s Mapping 2 i j r(s i,s j )=rank(i, j-th columns) Representable matroids usually can be characterized by forbidden minors (cannot contain such minors) Example: U 2,4 forbidden for binary (Tutte) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
21 Minors of Matroids Definition If M is a matroid on S and T S, a matroid M on T is called a minor of M if M is obtained by any combination of deletion (\) and contraction (/) of M Illustration of contraction and deletion: e Contraction e Deletion C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
22 Inner Bounds from Representable Matroids Observation: Conic hull Γ q of representable matroids form inner bounds on region of entropic vectors Proof: It suffices to show that a rank of representable matroid is entropic Suppose the associated representation matrix is A F k q, from which we can create the random variables (X,,X )=ua, u U(F k q ) S,,S i,,s j,,s Mapping 2 i j r(s i,s j )=rank(i, j-th columns) h i,j = rank(i, j-th columns) h u = r(s i,s j ) log 2 q C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
23 Generalized Inner Bounds Γ q, : Generalize the mapping to: S,, S -partition of, > Tighter inner bounds on Γ S,,S i,,s j,,s Mapping 2 i j 0 r(s i,s j )=rank(i, j-th columns) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
24 otion of sufficiency Recall: R in (A) = proj RE,H(Y S )(Γ In L 2345) Substitute in Γ q : each extreme ray associated with a matroid Variable to matrix: one to one mapping, scalar codes, region R s,q Substitute in Γ q, : each extreme ray associated with a projection of matroids Variable to matrix: one to multiple mapping, vector codes, region R q Scalar sufficiency: General sufficiency: R(A) = R s,q (A) R(A) = R q (A) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
25 Representable Matroids Determine Linear Codes Basic codes: matrices associated with extreme rays A point: conic combination of extreme rays Code for the point: block diagonalize the matrices according to conic coefficients (time sharing), reshuffling columns (details in [Li, et al etcod 203]) Conic combination C, C 2, C 3 : basic codes C 2 C 3 R 2 R 3 R C R C 2 4 X S X S X S 3 R = R + R 2 + R 3 T 2 5C = 4 X S X S X S U E U E U E 3T 2 3 C O O 5 4 O C 2 O 5 O O C 3 C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
26 Matroid extremality Suffice to work on rep matroids that are extreme rays (complexity reduction, Li, et al etcod 203, further work Apte, et al ISIT 204) Extremal ranks relationship: strict containment [Li, et al Allerton 203] Extreme rays of different cones Polymatroid Matroid q-rep matroid Theorem : o matroid here! Theorem 2: o binary matroid here! Γ Γ mat Γ bin C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
27 Revolution Conventional: (special) network, info ineq, manually, paper Computational: 03, 06 (arbitrary) networks, computer, # of papers? Improvement: easy to handle small networks, further work on symmetries, inheritance In(i) In(i) s i U e Re e T T Conventional way i Out(i) t s T S T T S T t U e Re e t S In(i) Out(i) e S S Out(i) S C Li (ASPITRG & MAL) i U e Re s In(i) i In(i) Out(i) i Out(i) t s S T S T S T S T s U e Re U e Re t e e Computational way Thesis Proposal October 5, / 57
28 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Sources etwork Destinations Insu cient Motivation Operations Results 5 Proposed Tasks and Timeline Insu cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
29 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Sources etwork Destinations Insu cient Motivation Operations Results 5 Proposed Tasks and Timeline Insu cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
30 Motivated from matroid theory Inheritance property regarding insufficiency of class of codes Inspired from matroid theory: forbidden minor for linear representability, eg, U 2,4 is the forbidden minor for binary matroids Ground set size F q -representable matroids ot F q -representable matroids 2 C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
31 Similar characterization for networks? If networks have similar characterization? Possible list of forbidden embedded networks for sufficiency of linear codes over a field etwork operations to obtain such embedded networks preserving insufficiency, & region relationships Three operations [Li, et al, Allerton 204] Sources etwork Destinations Insu cient Insu cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
32 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Sources etwork Destinations Insu cient Motivation Operations Results 5 Proposed Tasks and Timeline Insu cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
33 Source deletion A = A \ k Source Y k deleted, source k stops sending information to the network, H(Y k ) = 0 Sinks requiring Y k will no longer demand it Sources etwork Destinations Paths In(i) i Out(i) Y k k U ee R e! k t S T S T (t) \ k C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
34 Example: MDCS source deletion X Y Z E E 2 E 3 D X X, Y D 2 X, Y D 3 X, Y D 4 X, Y, Z D 5 i) A(3, 3) MDCS X Y Z E E 2 E 3 X D X, Y D 2 X, Y D 3 X, Y D 4 X, Y, Z D 5 ii) Delete/contract Z Decoder D 5 no longer requires Z Redundant decoder is deleted X Y E E 2 E 3 X D X, Y D 2 X, Y D 3 X, Y D 4 iii) After deletion of Z C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
35 Source deletion: A = A \ k R(A ) = Proj Y\k,R ({R R(A) H(Y E k) = 0}), (7) R q (A ) = Proj Y\k,R ({R R E q(a) H(Y k ) = 0}), (8) R s,q (A ) = Proj Y\k,R ({R R E s,q(a) H(Y k ) = 0}) (9) Preservation: R q (A) = R(A) R q (A ) = R(A ) Scalar case: R s,q (A) = R(A) R s,q (A ) = R(A ) R(A) r R(A ) r R(A) with H(Y k ) = 0 The code to achieve r is the code to achieve r with sending nothing on source Y k All-zero is valid F q code, can reverse H(Y k )=0 P rojection R(A 0 ) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
36 Edge deletion A = A \ e Edge U e deleted, nothing on U e, R e = H(U e ) = 0 Sources etwork Destinations Paths In(i) i Out(i) Y s s U ee R e! s t S T (t) S T C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
37 Example: MDCS encoder deletion X Y Z E E 2 E 3 E 4 D X X, Y D 2 X, Y D 3 X, Y, Z D 4 X, Y, Z D 5 i) A(3, 4) MDCS X Y Z E E 2 E 3 E 4 X D X, Y D 2 X, Y D 3 X, Y, Z D 4 X, Y, Z D 5 ii) DeleteencoderE 4 X Y Z D X E X, Y D 3 E 2 X, Y, Z D 4 E 3 X, Y, Z D 5 iii) After deletion of E 4 Decoders connected to E 4 keep same decoding ability without E 4 Redundant decoders deleted C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
38 Edge deletion: A = A \ Y k R(A ) = Proj H(YS ),R ({R R E q(a) R e = 0}), (0) R q (A ) = Proj H(YS ),R ({R R E q(a) R e = 0}), () R s,q (A ) = Proj H(YS ),R ({R R E s,q(a) R e = 0}) (2) Preservation: R q (A) = R(A) R q (A ) = R(A ) Scalar case: R s,q (A) = R(A) R s,q (A ) = R(A ) r R(A ) r R(A) with R e = H(U e ) = 0 The code to achieve r is the code to achieve r with deleting column(s) for U e, ie, sending nothing on edge e All-zero is valid F q code, can reverse R(A) R e =0 P rojection R(A 0 ) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
39 Edge contraction A = A/e Edge e contracted, input to tail of e available for head of e, R e =, H(U e ) free Sources etwork Destinations Paths In(i) i Out(i) Y s s U ee R t U e R e! s S R e 0 = T S T (t) C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
40 Example: MDCS encoder contraction X Y Z E E 2 E 3 E 4 X D X, Y D 2 X, Y D 3 X, Y D 4 X, Y, Z D 5 X, Y, Z D 6 X Y Z E E 2 E 3 E 4 X D X, Y D 2 X, Y X D 3 Y X, Y D 4 Z X, Y, Z D 5 X, Y, Z D 6 X D X, Y D 2 X, Y D 3 X, Y, Z D 5 i) A(3, 4) MDCS ii) Contract encoder E 4 iii) After contraction of E 4 Decoders connected to E 4 directly access to all sources Requirements trivially satisfied, deleted E E 2 E 3 C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
41 Edge contraction: A = A/e R(A ) = Proj H(Yk ),k S,R E R(A), (3) R q (A ) = Proj H(Yk ),k S,R R E q(a), (4) R s,q (A ) Proj H(Yk ),k S,R E R s,q(a), (5) Preservation: R q (A) = R(A) R q (A ) = R(A ) Scalar case: R s,q (A) = R(A) R s,q (A ) = R(A ) r R(A ) r R(A) with some H(U e ) (not of interest in A ) The code to achieve r is the code to achieve r with deleting column(s) for U e, sending possibly everything available on e, possibly violating scalar code R(A 0 ) R e = R(A) Project on dimensions other than R e C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
42 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Sources etwork Destinations Insu cient Motivation Operations Results 5 Proposed Tasks and Timeline Insu cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
43 Example: Forbidden embedded networks Goal: minimal forbidden networks for sufficiency Scalar binary codes considered k =, 2, 3; E = 2, 3, 4, 7360 non-isomorphic MDCS 922 sufficient, 5438 insufficient 2 forbidden embedded networks (Li, et al submission TransIT 204) Open questions: complete list? Finite number for F q? 5438 / 7360 insu cient 922 / 7360 su cient 2 forbidden embedded networks C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
44 Summary of work thus far Enumerate > 0 5 networks Find > 7000 non-isomorphic ones Calculate outer bounds Calculate inner bounds Yes Obtain exact rate region &su ciency of codes Match? o Insu ciency for networks with arbitrary size? Operations preserving insu ciency Thousands of insu cient networks boiled down to 2 forbidden embedded networks C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
45 Publication List Steven Weber, Congduan Li, and John Walsh, Rate Region for a class of delay mitigatting codes and P2P networks, 46th Annual Conference on Information Sciences and Systems, Princeton University, March, 202, Invited Paper 2 Congduan Li, John Walsh, and Steven Weber, A Computational Approach for Determining Rate Regions and Codes using Entropic Vector Bounds, 50th Allerton Conference, UIUC, Oct Congduan Li, Jayant Apte, John M Walsh, and Steven Weber, A new computational approach for determining rate regions and optimal codes for coded networks, The 203 IEEE International Symposium on etwork Coding (etcod 203), Calgary, Canada, Jun 7-9, Congduan Li, John M Walsh, and Steven Weber, Matroid bounds on region of entropic vectors, 5th Allerton conference on Communication, Control and Computation, UIUC, IL, Oct Jayant Apte, Congduan Li, John MacLaren Walsh, and Steven Weber, Exact pepair problems with multiple sources, in The 48th annual IEEE Conference on Information Sciences and Systems(CISS), Mar Jayant Apte, Congduan Li, and John MacLaren Walsh, Algorithms for Computing etwork Coding Rate Regions via Single Element Extensions of Matroids, IEEE International Symposium on Information Theory (ISIT) 204, Honolulu, Hawaii 7 Congduan Li, Steven Weber, and John M Walsh, etwork Embedding Operations Preserving the Insufficiency of Linear etwork Codes, 52th Allerton conference on Communication, Control and Computation, UIUC, IL, Oct Congduan Li, Steven Weber, and John M Walsh, Multilevel Diversity Coding Systems: Rate Regions, Codes, Computation, & Forbidden Minors, IEEE Transactions on Information Theory, 204, SUBMITTED C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
46 Outline Rate Region 2 Shannon Outer Bounds & Converse 3 Matroid Bounds and Achievability 4 Forbidden Embedding etworks Motivation Operations Results 5 Proposed Tasks and Timeline C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
47 Task : network combination operations Recall: embedding operations (tools) to certify insufficiency of class of codes in arbitrary size networks but not sufficiency (no tools) Extension: certify sufficiency of class of codes ew operations: combine smaller networks into a bigger network Preserving: sufficiency of class of codes Existence: concatenation of two independent sufficient networks Sources etwork Destinations Su cient Su cient Su cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
48 Task : network combination operations Objectives: other operations preserving sufficiency Source Union? Sources etwork Destinations Su cient Su cient Su cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
49 Task : network combination operations Objectives: other operations preserving sufficiency Edge Connection? Deliverable: ISIT/etCod 205, journal with [Li, et al Allerton 204] Sources etwork Destinations Su cient Su cient Su cient C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
50 Task 2: asymmetric distributed storage exact repair Computation tools work for general networks, will try storage exact repair problems Common setup: symmetric, (n, k, d, α, β) Source n storage disks k disks reconstruct k k k d helpers repair C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
51 Task 2: asymmetric distributed storage exact repair Will investigate asymmetric setups with prioritized data Initial work with Jayant Apte [6, CISS 204]: symmetric in disks and repair, asymmetric in reconstruction Deliverable: etcod 205 n storage disks with distinct capacities asymmetric reconstruction: access not necessarily k disks; hot data, cold data R Hot Cold R m R n F m,n F,n asymmetric repair: not necessarily d helpers distinct repair bandwidth C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
52 Task 3: polymatroid extremality Recall: computation cares exclusively about matroids that are extreme rays, Connected matroids are extremal: r(a) + r(e \ A) > r(e), A E Extremal matroids are extremal polymatroids Connected polymatroid = extremal polymatroids? C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
53 Task 3: polymatroid extremality Extremal polymatroids Connected: otherwise separable, sum of two polymatroids Connected polymatroid extremal polymatroids Investigate the sufficient condition for polymatroid extremality Potential reduction in computation complexity Deliverable: ISIT 205, journal with [Li, et al Allerton 203] [H(X) H(Y ) H(XY ) H(Z) H(XZ) H(YZ) H(XY Z)] [ ] = [ ] + [ ] Connected but ot extremal ot connected Connected C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
54 Task 4: necessity of non-shannon inequalities Tighter outer bound on Γ : Shannon + non-shannon on-shannon to close the gap? Investigate necessity of non-shannon: try to construct distributed storage exact repair network associated with Vámos matroid Preserving property: if a network requires non-shannon, what about its extensions? Deliverable: ISIT/etCod 205 on-shannon ineq Shannon ineq Constraints non-shannon In C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
55 Timeline Time Task Task 2 Task 3 Task 4 Thesis Defense 0/204 Enumeration Construction /204 Start Calculation Reading Proof 2/204 Proof Writing Proof Writing 0/205 Writing Writing Writing 02/205 Writing Writing 03/205 Journal 04/205 Journal 05/205 Writing 06/205 Present Visit IC at CUHK: ov, Dec, 204 ISIT due Jan 9, 205, etcod due Feb 20, 205 C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
56 References X Yan, RW Yeung, and Z Zhang (202) An Implicit Characterization of the Achievable Rate Region for Acyclic Multisource Multisink etwork Coding IEEE Transactions on Information Theory 58(9), C Tian (203) Rate region of the (4, 3, 3) exact-repair regenerating codes IEEE International Symposium on Information Theory (ISIT), C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
57 Q & A Thank you! C Li (ASPITRG & MAL) Thesis Proposal October 5, / 57
Symmetry in Network Coding
Symmetry in Network Coding Formalization, Graph-theoretic Characterization, and Computation Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia ISIT,
More informationNetwork Combination Operations Preserving the Sufficiency of Linear Network Codes
Network Combination Operations Preserving the Sufficiency of Linear Network Codes Congduan Li, Steven Weber, John MacLaren Walsh ECE Department, Drexel University Philadelphia, PA 904 Abstract Operations
More informationMatroid Bounds on the Region of Entropic Vectors
Matroid Bounds on the Region of Entropic Vectors Congduan Li, John MacLaren Walsh, Steven Weber Drexel University, Dept of ECE, Philadelphia, PA 19104, USA congduanli@drexeledu, jwalsh@coedrexeledu, sweber@coedrexeledu
More informationA computational approach for determining rate regions and codes using entropic vector bounds
1 A computational approach for determining rate regions and codes using entropic vector bounds Congduan Li, John MacLaren Walsh, Steven Weber Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA
More informationOn Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region. Computation, and Hierarchy. A Thesis. Submitted to the Faculty
On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region Computation, and Hierarchy A Thesis Submitted to the Faculty of Drexel University by Congduan Li in partial fulfillment of the requirements
More informationOn Multi-source Multi-sink Hyperedge Networks: Enumeration, Rate Region Computation, & Hierarchy
On Multi-ource Multi-ink Hyperedge Network: Enumeration, Rate Region Computation, & Hierarchy Ph D Diertation Defene Congduan Li ASPITRG & MANL Drexel Univerity congduanli@gmailcom May 9, 05 C Li (ASPITRG
More informationExploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions
Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia NetCod, 205 NSF
More informationA new computational approach for determining rate regions and optimal codes for coded networks
A new computational approach for determining rate regions and optimal codes for coded networks Congduan Li, Jayant Apte, John MacLaren Walsh, Steven Weber Drexel University, Dept. of ECE, Philadelphia,
More informationSymmetries in the Entropy Space
Symmetries in the Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Abstract This paper investigates when Shannon-type inequalities completely characterize the part of the closure of the entropy
More informationNetwork Coding on Directed Acyclic Graphs
Network Coding on Directed Acyclic Graphs John MacLaren Walsh, Ph.D. Multiterminal Information Theory, Spring Quarter, 0 Reference These notes are directly derived from Chapter of R. W. Yeung s Information
More informationAlgorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids
Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids Jayant Apte, Congduan Li, John MacLaren Walsh Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA
More informationEntropic Vectors: Polyhedral Computation & Information Geometry
Entropic Vectors: Polyhedral Computation & Information Geometry John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks to
More informationSymmetry in Network Coding
Symmetry in Network Coding Jayant Apte, John MacLaren Walsh Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA jsa46@drexel.edu, jwalsh@coe.drexel.edu Abstract We establish connections between
More informationRate region for a class of delay mitigating codes and P2P networks
Rate region for a class of delay mitigating codes and P2P networks Steven Weber, Congduan Li, John MacLaren Walsh Drexel University, Dept of ECE, Philadelphia, PA 19104 Abstract This paper identifies the
More informationSymmetries in Entropy Space
1 Symmetries in Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks to NSF CCF-1421828
More informationCharacterizing the Region of Entropic Vectors via Information Geometry
Characterizing the Region of Entropic Vectors via Information Geometry John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks
More information. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables
. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables John MacLaren Walsh and Steven Weber Department of Electrical and Computer Engineering, Drexel University, Philadelphia,
More informationExtremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences.
Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences A Thesis Submitted to the Faculty of Drexel University by Yunshu
More informationThe Capacity Region for Multi-source Multi-sink Network Coding
The Capacity Region for Multi-source Multi-sink Network Coding Xijin Yan Dept. of Electrical Eng. - Systems University of Southern California Los Angeles, CA, U.S.A. xyan@usc.edu Raymond W. Yeung Dept.
More informationBounding the Entropic Region via Information Geometry
Bounding the ntropic Region via Information Geometry Yunshu Liu John MacLaren Walsh Dept. of C, Drexel University, Philadelphia, PA 19104, USA yunshu.liu@drexel.edu jwalsh@coe.drexel.edu Abstract This
More informationGeneralized Network Sharing Outer Bound and the Two-Unicast Problem
Generalized Network Sharing Outer Bound and the Two-Unicast Problem Sudeep U. Kamath, David N. C. Tse and Venkat Anantharam Wireless Foundations, Dept of EECS, University of California at Berkeley, Berkeley,
More informationLinearly Representable Entropy Vectors and their Relation to Network Coding Solutions
2009 IEEE Information Theory Workshop Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions Asaf Cohen, Michelle Effros, Salman Avestimehr and Ralf Koetter Abstract In this
More informationCapacity Region of the Permutation Channel
Capacity Region of the Permutation Channel John MacLaren Walsh and Steven Weber Abstract We discuss the capacity region of a degraded broadcast channel (DBC) formed from a channel that randomly permutes
More informationNetworks and Matroids
Adaptive Signal Processing and Information Theory Research Group ECE Department, Drexel University June 1, 2012 Outline 1 Mappings and Definitions Source Mapping: S : V 2 µ, µ is message set. Message Assignment:
More informationNon-isomorphic Distribution Supports for Calculating Entropic Vectors
Non-isomorphic Distribution Supports for Calculating Entropic Vectors Yunshu Liu & John MacLaren Walsh Adaptive Signal Processing and Information Theory Research Group Department of Electrical and Computer
More informationAmobile satellite communication system, like Motorola s
I TRANSACTIONS ON INFORMATION THORY, VOL. 45, NO. 4, MAY 1999 1111 Distributed Source Coding for Satellite Communications Raymond W. Yeung, Senior Member, I, Zhen Zhang, Senior Member, I Abstract Inspired
More informationPartition Symmetrical Entropy Functions*
Partition Symmetrical Entropy Functions* Jayant Apte ASPITRG *Chen, Qi; Yeung, Raymond W., Partition Symmetrical Entropy Functions, arxiv:1407.7405v1 [cs.it] Outline Sneak Peak Background: Basic facts
More informationCapacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel
Capacity Region of Reversely Degraded Gaussian MIMO Broadcast Channel Jun Chen Dept. of Electrical and Computer Engr. McMaster University Hamilton, Ontario, Canada Chao Tian AT&T Labs-Research 80 Park
More information2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse
Two-unicast is hard Sudeep Kamath ECE Department, University of California, San Diego, CA, USA sukamath@ucsd.edu David N.C. Tse EECS Department, University of California, Berkeley, CA, USA dtse@eecs.berkeley.edu
More informationIN FUTURE communication networks, say next-generation
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 36, NO. 4, APRIL 2018 737 Fundamental Limits on a Class of Secure Asymmetric Multilevel Diversity Coding Systems Congduan Li, Member, IEEE, Xuan Guang,
More informationOn Secret Sharing Schemes, Matroids and Polymatroids
On Secret Sharing Schemes, Matroids and Polymatroids Jaume Martí-Farré, Carles Padró Dep. de Matemàtica Aplicada 4, Universitat Politècnica de Catalunya, Barcelona, Spain {jaumem,cpadro}@ma4.upc.edu June
More informationCharacterising Probability Distributions via Entropies
1 Characterising Probability Distributions via Entropies Satyajit Thakor, Terence Chan and Alex Grant Indian Institute of Technology Mandi University of South Australia Myriota Pty Ltd arxiv:1602.03618v2
More informationCayley s Hyperdeterminant, the Principal Minors of a Symmetric Matrix and the Entropy Region of 4 Gaussian Random Variables
Forty-Sixth Annual Allerton Conference Allerton House, UIUC, Illinois, USA September 23-26, 2008 Cayley s Hyperdeterminant, the Principal Minors of a Symmetric Matrix and the Entropy Region of 4 Gaussian
More informationCharacteristic-Dependent Linear Rank Inequalities and Network Coding Applications
haracteristic-ependent Linear Rank Inequalities and Network oding pplications Randall ougherty, Eric Freiling, and Kenneth Zeger bstract Two characteristic-dependent linear rank inequalities are given
More informationQuasi-linear Network Coding
Quasi-linear Network Coding Moshe Schwartz Electrical and Computer Engineering Ben-Gurion University of the Negev Beer Sheva 8410501, Israel schwartz@ee.bgu.ac.il Abstract We present a heuristic for designing
More informationThis document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.
This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Finite nilpotent metacyclic groups never violate the Ingleton inequality Author(s) Stancu, Radu; Oggier,
More informationAnalyzing Large Communication Networks
Analyzing Large Communication Networks Shirin Jalali joint work with Michelle Effros and Tracey Ho Dec. 2015 1 The gap Fundamental questions: i. What is the best achievable performance? ii. How to communicate
More informationReverse Edge Cut-Set Bounds for Secure Network Coding
Reverse Edge Cut-Set Bounds for Secure Network Coding Wentao Huang and Tracey Ho California Institute of Technology Michael Langberg University at Buffalo, SUNY Joerg Kliewer New Jersey Institute of Technology
More informationLinear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach
Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Mehran Elyasi Department of ECE University of Minnesota melyasi@umn.edu Soheil Mohajer Department of ECE University
More informationLossy Distributed Source Coding
Lossy Distributed Source Coding John MacLaren Walsh, Ph.D. Multiterminal Information Theory, Spring Quarter, 202 Lossy Distributed Source Coding Problem X X 2 S {,...,2 R } S 2 {,...,2 R2 } Ẑ Ẑ 2 E d(z,n,
More informationDesign of linear Boolean network codes for combination networks
Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2006 Design of linear Boolean network codes for combination networks Shoupei Li Louisiana State University and Agricultural
More informationIndex Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago
Index Coding Algorithms for Constructing Network Codes Salim El Rouayheb Illinois Institute of Technology, Chicago Matlab Code with GUI for Constructing Linear Network Codes Matlab outputs network code
More informationOn The Binary Lossless Many-Help-One Problem with Independently Degraded Helpers
On The Binary Lossless Many-Help-One Problem with Independently Degraded Helpers Albrecht Wolf, Diana Cristina González, Meik Dörpinghaus, José Cândido Silveira Santos Filho, and Gerhard Fettweis Vodafone
More informationPolar codes for the m-user MAC and matroids
Research Collection Conference Paper Polar codes for the m-user MAC and matroids Author(s): Abbe, Emmanuel; Telatar, Emre Publication Date: 2010 Permanent Link: https://doi.org/10.3929/ethz-a-005997169
More informationOptimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction
Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes
More informationEntropy Vectors and Network Information Theory
Entropy Vectors and Network Information Theory Sormeh Shadbakht and Babak Hassibi Department of Electrical Engineering Caltech Lee Center Workshop May 25, 2007 1 Sormeh Shadbakht and Babak Hassibi Entropy
More informationEntropic and informatic matroids
Entropic and informatic matroids Emmanuel Abbe Abstract This paper studies dependencies between random variables by means of information theoretic functionals such as the entropy and the mutual information.
More informationOn Network Coding Capacity - Matroidal Networks and Network Capacity Regions. Anthony Eli Kim
On Network Coding Capacity - Matroidal Networks and Network Capacity Regions by Anthony Eli Kim S.B., Electrical Engineering and Computer Science (2009), and S.B., Mathematics (2009) Massachusetts Institute
More informationUpper Bounds on the Capacity of Binary Intermittent Communication
Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,
More informationAlgebraic matroids are almost entropic
accepted to Proceedings of the AMS June 28, 2017 Algebraic matroids are almost entropic František Matúš Abstract. Algebraic matroids capture properties of the algebraic dependence among elements of extension
More informationMultiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets
Multiaccess Channels with State Known to One Encoder: A Case of Degraded Message Sets Shivaprasad Kotagiri and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame,
More informationPolar Codes for Arbitrary DMCs and Arbitrary MACs
Polar Codes for Arbitrary DMCs and Arbitrary MACs Rajai Nasser and Emre Telatar, Fellow, IEEE, School of Computer and Communication Sciences, EPFL Lausanne, Switzerland Email: rajainasser, emretelatar}@epflch
More informationSparse Solutions of Systems of Equations and Sparse Modelling of Signals and Images
Sparse Solutions of Systems of Equations and Sparse Modelling of Signals and Images Alfredo Nava-Tudela ant@umd.edu John J. Benedetto Department of Mathematics jjb@umd.edu Abstract In this project we are
More informationSymmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching
entropy Article Symmetry, Outer Bounds, and Code Constructions: A Computer-Aided Investigation on the Fundamental Limits of Caching Chao Tian Department of Electrical and Computer Engineering, Texas A&M
More information1 Matroid intersection
CS 369P: Polyhedral techniques in combinatorial optimization Instructor: Jan Vondrák Lecture date: October 21st, 2010 Scribe: Bernd Bandemer 1 Matroid intersection Given two matroids M 1 = (E, I 1 ) and
More informationReceived: 1 September 2018; Accepted: 10 October 2018; Published: 12 October 2018
entropy Article Entropy Inequalities for Lattices Peter Harremoës Copenhagen Business College, Nørre Voldgade 34, 1358 Copenhagen K, Denmark; harremoes@ieee.org; Tel.: +45-39-56-41-71 Current address:
More informationRank-one Generated Spectral Cones Defined by Two Homogeneous Linear Matrix Inequalities
Rank-one Generated Spectral Cones Defined by Two Homogeneous Linear Matrix Inequalities C.J. Argue Joint work with Fatma Kılınç-Karzan October 22, 2017 INFORMS Annual Meeting Houston, Texas C. Argue, F.
More informationNetwork Routing Capacity
1 Network Routing Capacity Jillian Cannons (University of California, San Diego) Randy Dougherty (Center for Communications Research, La Jolla) Chris Freiling (California State University, San Bernardino)
More informationProduct-matrix Construction
IERG60 Coding for Distributed Storage Systems Lecture 0-9//06 Lecturer: Kenneth Shum Product-matrix Construction Scribe: Xishi Wang In previous lectures, we have discussed about the minimum storage regenerating
More informationExtremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences
Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences Ph.D. Dissertation Defense Yunshu Liu Adaptive Signal Processing
More informationA Numerical Study on the Wiretap Network with a Simple Network Topology
1 A Numerical Study on the Wiretap Network with a Simple Network Topology Fan Cheng, Member, IEEE and Vincent Y. F. Tan, Senior Member, IEEE arxiv:1505.02862v3 [cs.it] 15 Jan 2016 Fig. 1. Abstract In this
More informationNetwork Routing Capacity
1 Network Routing Capacity Jillian Cannons (University of California, San Diego) Randy Dougherty (Center for Communications Research, La Jolla) Chris Freiling (California State University, San Bernardino)
More informationDistributed Storage Systems with Secure and Exact Repair - New Results
Distributed torage ystems with ecure and Exact Repair - New Results Ravi Tandon, aidhiraj Amuru, T Charles Clancy, and R Michael Buehrer Bradley Department of Electrical and Computer Engineering Hume Center
More informationError Correcting Index Codes and Matroids
Error Correcting Index Codes and Matroids Anoop Thomas and B Sundar Rajan Dept of ECE, IISc, Bangalore 5612, India, Email: {anoopt,bsrajan}@eceiiscernetin arxiv:15156v1 [csit 21 Jan 215 Abstract The connection
More informationCut-Set Bound and Dependence Balance Bound
Cut-Set Bound and Dependence Balance Bound Lei Xiao lxiao@nd.edu 1 Date: 4 October, 2006 Reading: Elements of information theory by Cover and Thomas [1, Section 14.10], and the paper by Hekstra and Willems
More informationVariable-Rate Universal Slepian-Wolf Coding with Feedback
Variable-Rate Universal Slepian-Wolf Coding with Feedback Shriram Sarvotham, Dror Baron, and Richard G. Baraniuk Dept. of Electrical and Computer Engineering Rice University, Houston, TX 77005 Abstract
More informationSuperposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels
Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:
More informationBeyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions
Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Chih-Chun Wang Center for Wireless Systems and Applications (CWSA) School of
More informationA New Achievable Region for Gaussian Multiple Descriptions Based on Subset Typicality
0 IEEE Information Theory Workshop A New Achievable Region for Gaussian Multiple Descriptions Based on Subset Typicality Kumar Viswanatha, Emrah Akyol and Kenneth Rose ECE Department, University of California
More informationOn Scalable Source Coding for Multiple Decoders with Side Information
On Scalable Source Coding for Multiple Decoders with Side Information Chao Tian School of Computer and Communication Sciences Laboratory for Information and Communication Systems (LICOS), EPFL, Lausanne,
More informationSum-networks from undirected graphs: Construction and capacity analysis
Electrical and Computer Engineering Conference Papers Posters and Presentations Electrical and Computer Engineering 014 Sum-networks from undirected graphs: Construction and capacity analysis Ardhendu
More informationAlphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach
ALPHABET SIZE REDUCTION FOR SECURE NETWORK CODING: A GRAPH THEORETIC APPROACH 1 Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach Xuan Guang, Member, IEEE, and Raymond W. Yeung,
More informationThe Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel
The Capacity of the Semi-Deterministic Cognitive Interference Channel and its Application to Constant Gap Results for the Gaussian Channel Stefano Rini, Daniela Tuninetti, and Natasha Devroye Department
More informationLattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function
Lattices for Distributed Source Coding: Jointly Gaussian Sources and Reconstruction of a Linear Function Dinesh Krithivasan and S. Sandeep Pradhan Department of Electrical Engineering and Computer Science,
More informationRandom Linear Intersession Network Coding With Selective Cancelling
2009 IEEE Information Theory Workshop Random Linear Intersession Network Coding With Selective Cancelling Chih-Chun Wang Center of Wireless Systems and Applications (CWSA) School of ECE, Purdue University
More informationDistributed Lossy Interactive Function Computation
Distributed Lossy Interactive Function Computation Solmaz Torabi & John MacLaren Walsh Dept. of Electrical and Computer Engineering Drexel University Philadelphia, PA 19104 Email: solmaz.t@drexel.edu &
More informationThe Capacity of a Network
The Capacity of a Network April Rasala Lehman MIT Collaborators: Nick Harvey and Robert Kleinberg MIT What is the Capacity of a Network? Source a Source b c d e Sink f Sink What is the Capacity of a Network?
More information15. Conic optimization
L. Vandenberghe EE236C (Spring 216) 15. Conic optimization conic linear program examples modeling duality 15-1 Generalized (conic) inequalities Conic inequality: a constraint x K where K is a convex cone
More informationNetwork Coding for Computing
Networ Coding for Computing Rathinaumar Appuswamy, Massimo Franceschetti, Nihil Karamchandani, and Kenneth Zeger Abstract The following networ computation problem is considered A set of source nodes in
More informationSimplified Composite Coding for Index Coding
Simplified Composite Coding for Index Coding Yucheng Liu, Parastoo Sadeghi Research School of Engineering Australian National University {yucheng.liu, parastoo.sadeghi}@anu.edu.au Fatemeh Arbabjolfaei,
More informationMatroid Optimisation Problems with Nested Non-linear Monomials in the Objective Function
atroid Optimisation Problems with Nested Non-linear onomials in the Objective Function Anja Fischer Frank Fischer S. Thomas ccormick 14th arch 2016 Abstract Recently, Buchheim and Klein [4] suggested to
More informationTight Upper Bounds on the Redundancy of Optimal Binary AIFV Codes
Tight Upper Bounds on the Redundancy of Optimal Binary AIFV Codes Weihua Hu Dept. of Mathematical Eng. Email: weihua96@gmail.com Hirosuke Yamamoto Dept. of Complexity Sci. and Eng. Email: Hirosuke@ieee.org
More informationExplicit MBR All-Symbol Locality Codes
Explicit MBR All-Symbol Locality Codes Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, and Sriram Vishwanath 1 Abstract arxiv:1302.0744v2
More informationSHANNON S information measures refer to entropies, conditional
1924 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO. 6, NOVEMBER 1997 A Framework for Linear Information Inequalities Raymond W. Yeung, Senior Member, IEEE Abstract We present a framework for information
More informationInderjit Dhillon The University of Texas at Austin
Inderjit Dhillon The University of Texas at Austin ( Universidad Carlos III de Madrid; 15 th June, 2012) (Based on joint work with J. Brickell, S. Sra, J. Tropp) Introduction 2 / 29 Notion of distance
More informationSuccinct Data Structures for Approximating Convex Functions with Applications
Succinct Data Structures for Approximating Convex Functions with Applications Prosenjit Bose, 1 Luc Devroye and Pat Morin 1 1 School of Computer Science, Carleton University, Ottawa, Canada, K1S 5B6, {jit,morin}@cs.carleton.ca
More informationComputational Integer Programming. Lecture 2: Modeling and Formulation. Dr. Ted Ralphs
Computational Integer Programming Lecture 2: Modeling and Formulation Dr. Ted Ralphs Computational MILP Lecture 2 1 Reading for This Lecture N&W Sections I.1.1-I.1.6 Wolsey Chapter 1 CCZ Chapter 2 Computational
More informationMultimedia Communications. Scalar Quantization
Multimedia Communications Scalar Quantization Scalar Quantization In many lossy compression applications we want to represent source outputs using a small number of code words. Process of representing
More informationAn Algorithmic Framework for Wireless Information Flow
An Algorithmic Framework for Wireless Information Flow The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation As Published Publisher
More informationTechnische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik. Combinatorial Optimization (MA 4502)
Technische Universität München, Zentrum Mathematik Lehrstuhl für Angewandte Geometrie und Diskrete Mathematik Combinatorial Optimization (MA 4502) Dr. Michael Ritter Problem Sheet 1 Homework Problems Exercise
More informationOn MBR codes with replication
On MBR codes with replication M. Nikhil Krishnan and P. Vijay Kumar, Fellow, IEEE Department of Electrical Communication Engineering, Indian Institute of Science, Bangalore. Email: nikhilkrishnan.m@gmail.com,
More informationCapacity Theorems for Distributed Index Coding
Capacity Theorems for Distributed Index Coding 1 Yucheng Liu, Parastoo Sadeghi, Fatemeh Arbabjolfaei, and Young-Han Kim Abstract arxiv:1801.09063v1 [cs.it] 27 Jan 2018 In index coding, a server broadcasts
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 2303 Linear Network Codes and Systems of Polynomial Equations Randall Dougherty, Chris Freiling, and Kenneth Zeger, Fellow, IEEE Abstract
More informationOn the Capacity Region of the Gaussian Z-channel
On the Capacity Region of the Gaussian Z-channel Nan Liu Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 74 nkancy@eng.umd.edu ulukus@eng.umd.edu
More informationAn Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets
An Alternative Proof of Channel Polarization for Channels with Arbitrary Input Alphabets Jing Guo University of Cambridge jg582@cam.ac.uk Jossy Sayir University of Cambridge j.sayir@ieee.org Minghai Qin
More informationAn Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2427 An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel Ersen Ekrem, Student Member, IEEE,
More informationOn the Tradeoff Region of Secure Exact-Repair Regenerating Codes
1 On the Tradeoff Region of Secure Exact-Repair Regenerating Codes Shuo Shao, Tie Liu, Chao Tian, and Cong Shen any k out of the total n storage nodes; 2 when a node failure occurs, the failed node can
More informationNetwork Flows. 6. Lagrangian Relaxation. Programming. Fall 2010 Instructor: Dr. Masoud Yaghini
In the name of God Network Flows 6. Lagrangian Relaxation 6.3 Lagrangian Relaxation and Integer Programming Fall 2010 Instructor: Dr. Masoud Yaghini Integer Programming Outline Branch-and-Bound Technique
More informationA Dual Fano, and Dual Non-Fano Matroidal Network
California State University, San Bernardino CSUSB ScholarWorks Electronic Theses, Projects, and Dissertations Office of Graduate Studies 6-2016 A Dual Fano, and Dual Non-Fano Matroidal Network Stephen
More informationThe Inflation Technique for Causal Inference with Latent Variables
The Inflation Technique for Causal Inference with Latent Variables arxiv:1609.00672 (Elie Wolfe, Robert W. Spekkens, Tobias Fritz) September 2016 Introduction Given some correlations between the vocabulary
More information