Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes

Size: px
Start display at page:

Download "Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes"

Transcription

1 Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb, Abstract Prouct coes (that are eterministic constructions) an Low-Density-Parity-Check (LDPC) coes (that come from a ranom ensemble of coes on graphs) have ha little overlap in esign an analysis methoology. We show that when nature offers suitable ranomness in the form of the unerlying statistical communications channel (e.g. iscrete symmetric erasure an error channels), these two families of coes can be unifie via their prune resiual Tanner graph post channel-corruption, allowing prouct coes to cross-leverage the esign an analysis literature of LDPC coes. Further, for a subclass of these prouct coes, we can leverage the power of ensity evolution methos use successfully for LDPC coes. In this work, focusing on symmetric erasure channels, we show that -imensional prouct coes are isomorphic to a class of -left regular Generalize Low-Density-Parity-Check (GLDPC) coes. This insight allows us to characterize the performance of -imensional prouct coes with component coes having constant erasure correcting capability, with relative simplicity using ensity evolution methos. The isomorphism also reveals that the choice of 3D prouct coes with a single parity-check per component offers superior performance at asymptotically high rates for the erasure channel to the preominantly-stuie 2D prouct coes. Inee, 3-imensional prouct coes having a single parity check per component perform ientically to 3-left-regular LDPC coes, which for the erasure channel (using ensity evolution methos) are about 22% away from Shannon capacity. This, combine with the simplicity an linear-time encoing an ecoing of prouct coes, makes them attractive to a host of applications, with one particularly exciting one being their key role in performing coe istribute matrix multiplication [] for straggler mitigation in moern large-scale istribute computing platforms. I. INTRODUCTION Prouct Coes an Low-Density-Parity-Check (LDPC) coes have co-existe separately for ecaes with little effort to unify them in esign an analysis. This may have been in part ue to prouct coes being eterministic constructions whereas LDPC coes come from a ranom ensemble of coes on graphs. However, when nature offers suitable ranomness in the form of the unerlying statistical communications channel, these two families of coes can be unifie via their prune tanner graph post channel-corruption. Important examples inclue iscrete symmetric erasure an error channels, an more generally, iscrete channels that rener every subset of encoe symbols equally likely to be corrupte. We show how for these settings it is possible to unify these two isparate families of coes, allowing prouct coes to cross-leverage the esign an analysis literature of LDPC coes. We further show that for a subclass of these prouct coes, we can leverage the power of ensity evolution methos use successfully for LDPC coes. Specifically, focusing on symmetric erasure channels in this work, we show that -imensional prouct coes are isomorphic to a class of -left regular Generalize Low- Density-Parity-Check (GLDPC) coes. This insight allows us to characterize the performance of -imensional prouct coes with component coes having constant erasure correcting capability, with relative simplicity using ensity evolution methos in contrast to the more cumbersome analytical tools typically eploye in this literature. The isomorphism also reveals that while the bulk of the prouct coe literature has focuse on 2D coes with heavy component coes, the choice of 3D coes with a single parity-check per component offers superior performance at asymptotically high rates for the erasure channel. While the rigorous proof is more etaile, the unerlying iea is quite simple; the way we are able to raw such an isomorphism between eterministic an ranom constructions is by utilizing the ranom appearance of the prune resiual graph. Before being sent through the channel, a -imensional prouct coe has a eterministic tanner graph; there is no ensemble of graphs to analyze. However, the channel ranomly corrupting a subset of symbols allows us to analyze the resiual graph with only those corrupte symbols as variable noes. Since a ranom subset is corrupte, the resiual graph appears sufficiently ranom, an so we are able to analyze the ensemble of prune resiual graphs. A. Prouct Coes Prouct coes have a very intuitive an regular structure that makes them easy to conceptualize, implement, an unerstan. In stanar prouct coes, = 2, one selects two systematic linear coes, C = (n, k, ) an C 2 = (n 2, k 2, 2 ). The While -imensional prouct coes are asymptotically rate, the term is misleaing; while using the traitional efinition of rate, a coe of length N with k = N N δ is rate, these constructions aren t simply a point on the spectrum. For any fixe values of N, K, one can fin a δ such that K = N N δ. Practically, these asymptotically rate schemes translate to aroun 0% reunancy, which is very practical in many applications

2 resulting coe is (n n 2, k k 2, 2 ), which is achieve by arranging the ata bits in a k 2 k rectangle, an encoing to a n 2 n rectangle. This is one by encoing the k 2 ata rows with C, etermining the last n k bits of each row, an then encoing all n columns with C 2 to etermine the last n 2 k 2 bits of each column. Since C 2 is linear, the last n 2 k 2 rows are also coewors of C. These prouct coes are very appealing ue to their eterministic construction an linear encoing time. This construction also allows for the use of a peeling ecoer, which yiels simple, linear time ecoing. -Dimensional prouct coes are a natural extension of this 2-imensional framework. For the sake of clarity, we focus on the case where the component coes in each imension are the same, C = (n, k, min ), but our analysis can be extene to the case where ifferent component coes are use in each imension. We aitionally assume that C is a linear coe an has been put in systematic form. To obtain our prouct coe, we form the ata into a -imensional hypercube with sie length k, an inex each ata location with its Cartesian coorinates, (l, l 2,..., l ), with l i = 0,..., k. We encoe this to a -imensional hypercube with sie length n in a similar manner to the 2D case, such that i [(l, l 2,..., l ) : l i = 0,..., n ] C. This means that every "row" is a coewor, with a -imensional row being a set of n elements obtaine by fixing all but inex, an varying that inex 0,..., n. B. LDPC Backgroun Low Density Parity Check (LDPC) coes were first introuce by Gallager in 962 [2]. As they ve evolve, more complex variants have been propose, like Generalize LDPC coes (GLDPC). A GLDPC coe is a low-ensity parity check coe in which the constraint noes of the coe graph are arbitrary linear block coes, rather than just single parity checks [3]. LDPCs are very appealing in their ease of analysis, particularly using ensity evolution. II. RELATED WORK High-imensional prouct coes have been stuie in the literature, e.g. a scheme similar to our Pseuo Prouct Coe one in [4] focusing on the aitive white gaussian noise channel setting using soft-ecision ecoing. However, no isomorphism is mae between these coes an GLDPC coes. 3D prouct coes have been shown to perform empirically better than 2D prouct coes in [5]. However, this is justifie base on an increase minimum-istance of the 3D coe over the 2D coe for finite lengths, rather than a characterization of threshols from Shannon capacity, as we target here using an asymptotic analysis. EXIT chart analysis has been propose for 3D coes in [6], but to the best of our knowlege, ensity evolution has only been applie to the 2D coe setting in [7]. Our paper is motivate by the esire to characterize the funamental performance of eterministic coes in terms of the gol stanar, namely linear time encoing, gap to capacity, an linear time ecoing. We argue that eterministic construction is a highly esirable property in practice ue to its harware-frienliness, an its preictability in esign an performance in contrast with ranom coe constructions like LDPC coes an their variants like the Irregular-Repeat- Accumulate (IRA) coes [8] which can achieve the gol stanar but using a ranom esign. Our construction, at high rates over the erasure channel, asymptotically sacrifices a 22% gap from capacity in orer to gain this ae benefit of eterministic construction, while maintaining linear time encoing an ecoing. A. Ranomness through nature The iea of using a eterministic esign an letting nature supply the ranomness is not new. Work on this ates back to at least [9], with the observation that by erasing ranom variable noes on an erasure channel, a eterministic coe coul be inuce to have its resiual graph appear ranom. A similar observation is mae in [7]. Following in these footsteps, we avoi introucing ranomness in the construction by allowing nature to a ranomness via its ranom erasure of variable noes. III. MAIN RESULT We provie a new lens through which to view -imensional prouct coes, an provie a rigorous asymptotic analysis of their performance over the erasure channel using ensity evolution. We brige the gap between the ranom construction of LDPC coes an the eterministic construction of prouct coes by using the ranomness of the erasure channel in generating the resiual graph. A similar analysis can be one for other iscrete symmetric channels, like the q-ary symmetric channel; the isomorphism will still hol, as there exists a ranom subset of corrupte variable noes, an so the resiual appears to have been generate ranomly. Instea of the simple ensity evolution equation, however, a more complicate message passing algorithm will nee to be analyze. For reaability, we restrict our focus to the erasure channel for the rest of the paper. A. Coe Construction In this paper we present two constructions for -imensional prouct coes. The first we ub a "Pseuo Prouct Coe", which entails a single parity check coe applie to every imensional slice (this can be generalize to a systematic, linear (n, k, ) coe). An example for a 3D Pseuo prouct coe can be foun in Fig. (a), with the colore lines representing the parities for each plane (2 imensional slice). This construction is similar to [4], but where our - imensional pseuo prouct coe has n( ) + parity bits (as one is a global parity, common to all stages), their alternate construction has n parities ae to the outsie of the hypercube of ata, instea of woven into it. A stanar Prouct Coe, can be viewe as having a parity check (or arbitrary systematic linear (n, k, ) component coe) on every imensional slice (row). This translates to Fig. (b), where each colore plane represents the generalize parity checks in a given imension.

3 (a) 3D Pseuo Prouct Coe (b) 3D Prouct Coe Fig.. Visualization of parities of 3D prouct an pseuo prouct coes Lemma : A -imensional prouct coe with a systematic linear C = (n, k, min ) component coe is equivalent to the Tanner graph unerlying a eterministically constructe -left regular GLDPC coe with C at each check noe. Proof: We note that for a prouct coe, in each imension there are n rows, each representing a constraint on the length N coewor. In orer to construct an equivalent GLDPC coe, we simply nee to have n check noes arrange in stages of n check noes each (one representing each "face" of the -imensional hypercube). We take the N coe inices, an for each stage map them to the check noe corresponing to their row in that particular stage. The check noes (colore planes) will apply the constraint implie by the C to the mappe inices. This construction has equivalent checks to the initial imensional prouct coe. We note that an ientical result hols for pseuo prouct coes. A -imensional prouct coe with a linear component coe is linear as well, an can thus be characterize by its generator matrix. Fig. 2 shows such an example generator matrix. n n {}} {{ }} { G = } {{ } Fig. 2. Generator Matrix of -imensional prouct coe with C = (4, 3, 2) For any linear component coe C, the generator matrix of the -imensional prouct coe corresponing to C can be expresse as the tensor prouct of copies of the generator matrix of C. IV. PSEUDO PRODUCT CODE We now show that a class of eterministically constructe GLDPC coes have resiual graphs equivalent to those of a traitional balls an bins moel, after transmission through the BEC. A. Ensemble C l (n, ) of bi-partite graphs constructe using a balls an bins moel Bipartite graphs in the ensemble C l (n, ) have l variable noes on the left, an n check noes on the right. We group these check noes into stages, each containing n check noes. Each variable (left) noe is connecte to check noes, which are selecte uniformly at ranom, from each stage of check noes. B. Ensemble C l 2(n,, Φ) of bipartite graphs constructe using the mapping Φ For a given mapping Φ : Z N Z n... Z n, Φ(v) = (Φ (v),..., Φ (v)), the ensemble C2(n, l, Φ) of left regular bipartite graphs with l variable noes, an n check noes, is efine as follows. As before, we partition the check noes into sets of n check noes each. Now, we consier a set I of l integers, where each element of the set I is between 0 an N. Assign the l integers from the set I to the l variable noes in arbitrary orer. Label the check noes in each set from 0 to n, for all i =,...,. A -left regular bipartite graph with l variable noes an n check noes is then obtaine by connecting a variable noe with an associate integer v to check noe Φ i (v) in stage i, for i =,...,. The ensemble C2(n, l, Φ) is the collection of -left regular bipartite graphs inuce by all possible sets I. Lemma 2: For any isomorphism Φ, the ensembles C(n, l ) an C2(n, l, Φ) are ientical. Proof: It is trivial to see that C2(n, l, Φ) C(n, l ). Now, we show the reverse. Consier a graph G C(n, l ). Suppose a variable noe v G is connecte to the check noes numbere {f i } i=. Since Φ is an isomorphism, we know there exists Φ : Z n Z n, an thus we can fin an integer q = Φ (f,..., f ) between 0 an n such that Φ i (q) = f i i =,.... Thus, for every graph G C(n, l ), there exists a set I of k integers that will result in an ientical graph using the Φ base construction, an so G C2(n, l, Φ). Hence, C(n, l ) = C2(n, l, Φ) Using the cartesian mapping for Φ, we are able to obtain a pseuo prouct coe by mapping to Φ as in C2(n, l, Φ) for Φ(l) = (l//n,..., (l//n i )%n,..., l%n). V. STANDARD PRODUCT CODE Now that we have establishe the above, we continue to a traitional -imensional prouct coe. We can see an example 3D prouct coe in Fig. 3. We can analyze the performance of this scheme in a similar manner to the Pseuo Prouct Coe. Fig. 3. Construction for 3D Prouct Coe from [6] A. Balls-an-Bins Construction We construct a bipartite graph with l variable noes on the left, an n check noes on the right as follows. We partition the check noes into stages of n check noes each, an arrange them in a imensional hypercube with

4 sie length n. We inex the check noes for a given stage by a length tuple, with inices ranging from 0 n, representing its coorinates (like the cartesian coorinates above). Each variable noe selects a tuple uniformly at ranom from Z n = (v, v 2,..., v ). These tuples are chosen uniformly at ranom an with replacement for all l variable noes. For each variable noe (v, v 2,..., v ), we connect it to the check noe inexe by (v,..., v i, v i+,..., v ) in stage i for i =,...,. We refer to this ensemble as C l (n, ). B. Φ Guie Construction For any Φ : Z N Z n... Z n with Φ(v) = (Φ (v),..., Φ (v)), we generate graphs in the following manner: choose l integers at ranom, with replacement, from 0,..., N. Call this set I. Partition the n check noes into stages as before, arrange an inexe in a imensional hypercube with sie length n. For convenience, we efine Φ j (v) (Φ (v),..., Φ i (v), Φ i+ (v),..., Φ (v)) For each inex v I, we attach noe v to check noe Φ j (v) in stage j, for j =,...,. We refer to this ensemble as C l 2(n,, Φ) Lemma 3: For any isomorphism Φ, the ensembles C l (n, ) an C l 2(n,, Φ) are equivalent. Proof: The proof is ientical to Lemma 2. C. Implication Theorem : For any isomorphism Φ : Z N Z n... Z n, the eterministically constructe GLDPC coe constructe by mapping each variable noe v = 0,..., n to check noes Φ (v) in stages,..., as in C l 2(n,, Φ) can be analyze using ensity evolution. This also hols using the mapping Φ as in C l 2(n,, Φ) Proof: For any isomorphism Φ : Z N Z n... Z n, picking a resiual graph at ranom from C l 2(n,, Φ) is equivalent to picking a graph at ranom from the ensemble C l (n, ) generate using the balls an bins moel, as the two ensembles are equivalent by Lemma 3. Similarly, by Lemma 2, C l (n, ) = C l 2(n,, Φ). This means we can use ensity evolution to analyze graphs eterministically generate by Φ an ranomly erase by nature. Again, we use the cartesian mapping for Φ, an are able to obtain a stanar prouct coe by mapping to Φ, as in Cl 2 (n,, Φ), using same Φ(l) = (l//n,..., (l//n i )%n,..., l%n). VI. PERFORMANCE ANALYSIS We procee to analyze the asymptotic performance of such a -imensional prouct coe. We restrict our performance analysis to (n, k, r + ) component coes with constant r. Theorem 2: -imensional prouct coes with (n, k, r + ) component coes with linear encoing an ecoing time have the following properties: ) Can asymptotically correct for n k erasures 2) Can be encoe an ecoe in linear time For constants.22 < η(, r) < 2 for most useful regimes, Table I. Proof: The ensemble of resiual graphs of these - imensional prouct coes is equivalent to C l 2(n,, Φ) by Lemma 2, which by Theorem is equivalent to the ensemble of resiual graphs generate with the balls-an-bins moel. Thus, we raw conclusions about the performance of prouct coes (or pseuo prouct coes) by analyzing the ensemble of balls an bins resiual graphs. There are three main steps to analyzing the performance of this ensemble of balls-anbins graphs, which we will briefly outline in the following subsections. More etaile proofs can be foun in [9]. A. Density Evolution We analyze a message-passing algorithm s performance over a typical graph from the ensemble. We assume the graph has local neighborhoos that are cycle free up to epth 2l. Thus, for the first l rouns of message passing, messages are inepenent. B. Convergence to Cycle-free Case We can show that the expecte behavior of graphs in the ensemble C l (n, ) converges to cycle-free. Furthermore, the proportion of eges left unecoe after l iterations is tightly concentrate aroun p l, the proportion ensity evolution tells us shoul be unecoe. C. Expaner Graph We show that graphs in the ensemble C l (n, ) are expaners with high probability. This means that if our peeling ecoer ecoes all but a small fraction of variable noes, then it will ecoe all the variable noes. For =2, we cannot prove this last portion. In fact, we can show that the ensemble of graphs C l (n, 2) are not expaner graphs with probability boune away from zero. We can see that our peeling ecoer will not be able to resolve a graph G C l (n, ) if there are two variable noes in G that share all the same check noes. We examine this scenario by relating it to the birthay paraox. If l people have birthays ranomly selecte between 0,..., n, then the probability that at least two people have the same birthay is approximately e l2 /2n. In our scenario, the number of erase variable noes is l = O(n ), an so for 2, the probability that two people have the same birthay, i.e. share all the same check noes, is boune away from zero. This means that the expaner graph conition is not met, yieling an error floor. A. Threshols VII. SIMULATION RESULTS Now that we have establishe an isomorphism between - imensional prouct coes an -left regular GLDPC coes, we can analyze the asymptotic performance of -imensional prouct coes through ensity evolution analysis on -left regular GLDPC coes. 2 We note that there is a ifference between rawing the set I with an without replacement, but this ifference oes not affect the analysis as in Proposition 5 in [0].

5 We use the accepte notation for the ege-egree istribution polynomials of the bipartite graphs in the ensemble as λ(α) i= λ iα i an ρ(α) i= ρ iα i where λ i (resp. ρ i ) enotes the probability that an ege of the graph is connecte to a left (resp. right) noe of egree i. Thus for the resiual graphs of a -imensional prouct coe, equivalently the ensemble C (n, l ) constructe using the balls-an-bins proceure, λ(α) = α, as the graph is -left regular. The ege egree istribution ρ(α) can be erive as in [9] to be ρ(α) = exp( ( α)/η(, r)). Uner the tree-like (cyclefree) assumption that we make, we can write an equation for p j, the probability that an ege in the tanner graph is left unecoe after j iterations, starting with p 0 =. ( ) r p j+ = λ ρ( p j ) i=0 We can specialize this ensity evolution equation to the case of C l (n, ), obtaining the upate equation. r p j+ = l=0 ( ) l pj e p j l! This ensity evolution process () will converge to 0 in l iterations for sufficiently large η(, r). We list minimum values of η(, r) for various (, r) in Table I. r TABLE I THRESHOLDS: η(, r) Asymptotically, a sharp phase transition can be observe in η(, r), an thus the coe will be able to correct for n k erasures, for component coe (n, k, r + ). We can see from ensity evolution fixe point analysis that out of all 3, r, it is optimal for a given rate to choose =3, r=. We ignore = 2 ue to the inherent error floor of C (n, l ), as explaine with the birthay paraox () VIII. CONCLUSIONS AND FUTURE WORK We have shown that when nature supplies suitable ranomness in the form of the communication channel, prouct coes an LDPC coes can be unifie in their esign an analysis via their prune resiual Tanner graph, allowing prouct coes to leverage the esign an analysis tools of LDPC coes. Concretely, we have shown that uner a iscrete symmetric channel, the ensemble of resiual graphs generate by transmitting eterministically constructe prouct coes is isomorphic to the ensemble of resiual graphs generate by transmitting ranomly constructe GLDPC coes using a balls an bins moel. We have further shown that the subset of these with component coes that correct for a constant number of erasures can be analyze using the powerful an elegant metho of Density Evolution. Our isomorphism provies new insights into the esign an performance analysis of -imensional prouct coes, an unveils the superiority of 3D prouct coes over the well-stuie class of 2D prouct coes for the erasure channel at high rates. While we have limite our isomorphism to the equivalence of the ensemble of prune Tanner graphs in this work, we conjecture that this isomorphism can be extene to more general settings as well, which will be part of our future work. Further, while we have limite our ensity evolution analysis of - imensional prouct coes at high rates, we believe that this can be extene to more general rate settings as well. We are excite about the potential for further insights, an will explore this as part of future work. REFERENCES [] T. Baharav, K. Lee, O. Ocal, an K. Ramchanran. (208, Jan.) Straggler-proofing massive-scale istribute matrix multiplication with -imensional prouct coes. [Online]. Available: berkeley.eu/~kannanr/assets/pro-coes-ist-comp.pf [2] R. Gallager, Low-ensity parity-check coes, IRE Trans. on Inf. Theory, vol. 8, no., pp. 2 28, 962. [3] R. M. Tanner, A Recursive Approach to Low Complexity Coes, IEEE Trans. Inf. Theory, vol. 27, no. 5, pp , 98. [4] J. M. Shea an T. F. Wong, Multiimensional coes, Encyclopeia of Telecommunications, [5] X. Wu, Y. He, an G. Zhu, Performance of improve three-imensional turbo prouct coe ecoer, in Integration Technology, ICIT 07. IEEE International Conference on. IEEE, 2007, pp [6] Y. He, G. Sun, J. Yang, an F. C. Lau, D-GLDPC coes with 3-D single parity-check prouct coes as super check noes, International Conference on Wireless Communications an Signal Processing, 204. [7] C. Häger, H. D. Pfister, A. G. i Amat, an F. Brännström, Density evolution for eterministic generalize prouct coes on the binary erasure channel at high rates, IEEE Trans. Inf. Theory, vol. 63, no. 7, p. 4357, 207. [8] H. Jin, A. Khanekar, an R. McEliece, Irregular repeat-accumulate coes, in Proc. 2n Int. Symp. Turbo coes an relate topics, [9] S. Pawar an K. Ramchanran, Computing a k-sparse n-length Discrete Fourier Transform using at most 4k samples an O(k log k) complexity, in IEEE Int. Symp. on Inf. Theory, may 203, pp [0] R. Scheibler, S. Haghighatshoar, an M. Vetterli, A fast haamar transform for signals with sublinear sparsity in the transform omain, IEEE Trans. Inf. Theory, vol. 6, no. 4, pp , Fig. 4. Heatmap Representationr of Table I: η(, r) for imension, erasure correcting capability r

Error Floors in LDPC Codes: Fast Simulation, Bounds and Hardware Emulation

Error Floors in LDPC Codes: Fast Simulation, Bounds and Hardware Emulation Error Floors in LDPC Coes: Fast Simulation, Bouns an Harware Emulation Pamela Lee, Lara Dolecek, Zhengya Zhang, Venkat Anantharam, Borivoje Nikolic, an Martin J. Wainwright EECS Department University of

More information

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Coes Kaiann Fu an Achilleas Anastasopoulos Electrical Engineering an Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Capacity-approaching codes

Capacity-approaching codes Chapter 3 Capacity-approaching coes We have previously iscusse coes on graphs an the sum-prouct ecoing algorithm in general terms. In this chapter we will give a brief overview of some particular classes

More information

Capacity-approaching codes

Capacity-approaching codes Chapter 3 Capacity-approaching coes We have previously iscusse coes on graphs an the sum-prouct ecoing algorithm in general terms. In this chapter we will give a brief overview of some particular classes

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward An Analytical Expression of the Probability of Error for Relaying with Decoe-an-forwar Alexanre Graell i Amat an Ingmar Lan Department of Electronics, Institut TELECOM-TELECOM Bretagne, Brest, France Email:

More information

Multi-edge Optimization of Low-Density Parity-Check Codes for Joint Source-Channel Coding

Multi-edge Optimization of Low-Density Parity-Check Codes for Joint Source-Channel Coding Multi-ege Optimization of Low-Density Parity-Check Coes for Joint Source-Channel Coing H. V. Beltrão Neto an W. Henkel Jacobs University Bremen Campus Ring 1 D-28759 Bremen, Germany Email: {h.beltrao,

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

Lecture 5. Symmetric Shearer s Lemma

Lecture 5. Symmetric Shearer s Lemma Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here

More information

Convergence of Random Walks

Convergence of Random Walks Chapter 16 Convergence of Ranom Walks This lecture examines the convergence of ranom walks to the Wiener process. This is very important both physically an statistically, an illustrates the utility of

More information

Linear First-Order Equations

Linear First-Order Equations 5 Linear First-Orer Equations Linear first-orer ifferential equations make up another important class of ifferential equations that commonly arise in applications an are relatively easy to solve (in theory)

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

Space-time Linear Dispersion Using Coordinate Interleaving

Space-time Linear Dispersion Using Coordinate Interleaving Space-time Linear Dispersion Using Coorinate Interleaving Jinsong Wu an Steven D Blostein Department of Electrical an Computer Engineering Queen s University, Kingston, Ontario, Canaa, K7L3N6 Email: wujs@ieeeorg

More information

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21 Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting

More information

Permanent vs. Determinant

Permanent vs. Determinant Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION

LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION The Annals of Statistics 1997, Vol. 25, No. 6, 2313 2327 LATTICE-BASED D-OPTIMUM DESIGN FOR FOURIER REGRESSION By Eva Riccomagno, 1 Rainer Schwabe 2 an Henry P. Wynn 1 University of Warwick, Technische

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

PDE Notes, Lecture #11

PDE Notes, Lecture #11 PDE Notes, Lecture # from Professor Jalal Shatah s Lectures Febuary 9th, 2009 Sobolev Spaces Recall that for u L loc we can efine the weak erivative Du by Du, φ := udφ φ C0 If v L loc such that Du, φ =

More information

Chromatic number for a generalization of Cartesian product graphs

Chromatic number for a generalization of Cartesian product graphs Chromatic number for a generalization of Cartesian prouct graphs Daniel Král Douglas B. West Abstract Let G be a class of graphs. The -fol gri over G, enote G, is the family of graphs obtaine from -imensional

More information

arxiv: v1 [cs.it] 21 Aug 2017

arxiv: v1 [cs.it] 21 Aug 2017 Performance Gains of Optimal Antenna Deployment for Massive MIMO ystems Erem Koyuncu Department of Electrical an Computer Engineering, University of Illinois at Chicago arxiv:708.06400v [cs.it] 2 Aug 207

More information

Pseudo-Free Families of Finite Computational Elementary Abelian p-groups

Pseudo-Free Families of Finite Computational Elementary Abelian p-groups Pseuo-Free Families of Finite Computational Elementary Abelian p-groups Mikhail Anokhin Information Security Institute, Lomonosov University, Moscow, Russia anokhin@mccme.ru Abstract We initiate the stuy

More information

A Sketch of Menshikov s Theorem

A Sketch of Menshikov s Theorem A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p

More information

Relative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation

Relative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation Relative Entropy an Score Function: New Information Estimation Relationships through Arbitrary Aitive Perturbation Dongning Guo Department of Electrical Engineering & Computer Science Northwestern University

More information

Sharp Thresholds. Zachary Hamaker. March 15, 2010

Sharp Thresholds. Zachary Hamaker. March 15, 2010 Sharp Threshols Zachary Hamaker March 15, 2010 Abstract The Kolmogorov Zero-One law states that for tail events on infinite-imensional probability spaces, the probability must be either zero or one. Behavior

More information

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k

Robust Forward Algorithms via PAC-Bayes and Laplace Distributions. ω Q. Pr (y(ω x) < 0) = Pr A k A Proof of Lemma 2 B Proof of Lemma 3 Proof: Since the support of LL istributions is R, two such istributions are equivalent absolutely continuous with respect to each other an the ivergence is well-efine

More information

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels.

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels. Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Constraine Coes for Two-Dimensional Channels Keren Censor Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Technion

More information

Generalizing Kronecker Graphs in order to Model Searchable Networks

Generalizing Kronecker Graphs in order to Model Searchable Networks Generalizing Kronecker Graphs in orer to Moel Searchable Networks Elizabeth Boine, Babak Hassibi, Aam Wierman California Institute of Technology Pasaena, CA 925 Email: {eaboine, hassibi, aamw}@caltecheu

More information

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device Close an Open Loop Optimal Control of Buffer an Energy of a Wireless Device V. S. Borkar School of Technology an Computer Science TIFR, umbai, Inia. borkar@tifr.res.in A. A. Kherani B. J. Prabhu INRIA

More information

Approximate Constraint Satisfaction Requires Large LP Relaxations

Approximate Constraint Satisfaction Requires Large LP Relaxations Approximate Constraint Satisfaction Requires Large LP Relaxations oah Fleming April 19, 2018 Linear programming is a very powerful tool for attacking optimization problems. Techniques such as the ellipsoi

More information

Delay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy

Delay Limited Capacity of Ad hoc Networks: Asymptotically Optimal Transmission and Relaying Strategy Delay Limite Capacity of A hoc Networks: Asymptotically Optimal Transmission an Relaying Strategy Eugene Perevalov Lehigh University Bethlehem, PA 85 Email: eup2@lehigh.eu Rick Blum Lehigh University Bethlehem,

More information

KNN Particle Filters for Dynamic Hybrid Bayesian Networks

KNN Particle Filters for Dynamic Hybrid Bayesian Networks KNN Particle Filters for Dynamic Hybri Bayesian Networs H. D. Chen an K. C. Chang Dept. of Systems Engineering an Operations Research George Mason University MS 4A6, 4400 University Dr. Fairfax, VA 22030

More information

Necessary and Sufficient Conditions for Sketched Subspace Clustering

Necessary and Sufficient Conditions for Sketched Subspace Clustering Necessary an Sufficient Conitions for Sketche Subspace Clustering Daniel Pimentel-Alarcón, Laura Balzano 2, Robert Nowak University of Wisconsin-Maison, 2 University of Michigan-Ann Arbor Abstract This

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

Acute sets in Euclidean spaces

Acute sets in Euclidean spaces Acute sets in Eucliean spaces Viktor Harangi April, 011 Abstract A finite set H in R is calle an acute set if any angle etermine by three points of H is acute. We examine the maximal carinality α() of

More information

Ramsey numbers of some bipartite graphs versus complete graphs

Ramsey numbers of some bipartite graphs versus complete graphs Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer

More information

New Bounds for Distributed Storage Systems with Secure Repair

New Bounds for Distributed Storage Systems with Secure Repair New Bouns for Distribute Storage Systems with Secure Repair Ravi Tanon 1 an Soheil Mohajer 1 Discovery Analytics Center & Department of Computer Science, Virginia Tech, Blacksburg, VA Department of Electrical

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

A New Minimum Description Length

A New Minimum Description Length A New Minimum Description Length Soosan Beheshti, Munther A. Dahleh Laboratory for Information an Decision Systems Massachusetts Institute of Technology soosan@mit.eu,ahleh@lis.mit.eu Abstract The minimum

More information

Topic 7: Convergence of Random Variables

Topic 7: Convergence of Random Variables Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information

More information

Final Exam Study Guide and Practice Problems Solutions

Final Exam Study Guide and Practice Problems Solutions Final Exam Stuy Guie an Practice Problems Solutions Note: These problems are just some of the types of problems that might appear on the exam. However, to fully prepare for the exam, in aition to making

More information

Iterated Point-Line Configurations Grow Doubly-Exponentially

Iterated Point-Line Configurations Grow Doubly-Exponentially Iterate Point-Line Configurations Grow Doubly-Exponentially Joshua Cooper an Mark Walters July 9, 008 Abstract Begin with a set of four points in the real plane in general position. A to this collection

More information

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics This moule is part of the Memobust Hanbook on Methoology of Moern Business Statistics 26 March 2014 Metho: Balance Sampling for Multi-Way Stratification Contents General section... 3 1. Summary... 3 2.

More information

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite

More information

Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners

Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners Lower Bouns for Local Monotonicity Reconstruction from Transitive-Closure Spanners Arnab Bhattacharyya Elena Grigorescu Mahav Jha Kyomin Jung Sofya Raskhonikova Davi P. Wooruff Abstract Given a irecte

More information

Regular tree languages definable in FO and in FO mod

Regular tree languages definable in FO and in FO mod Regular tree languages efinable in FO an in FO mo Michael Beneikt Luc Segoufin Abstract We consier regular languages of labele trees. We give an effective characterization of the regular languages over

More information

Separation of Variables

Separation of Variables Physics 342 Lecture 1 Separation of Variables Lecture 1 Physics 342 Quantum Mechanics I Monay, January 25th, 2010 There are three basic mathematical tools we nee, an then we can begin working on the physical

More information

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition

More information

Qubit channels that achieve capacity with two states

Qubit channels that achieve capacity with two states Qubit channels that achieve capacity with two states Dominic W. Berry Department of Physics, The University of Queenslan, Brisbane, Queenslan 4072, Australia Receive 22 December 2004; publishe 22 March

More information

Analyzing Tensor Power Method Dynamics in Overcomplete Regime

Analyzing Tensor Power Method Dynamics in Overcomplete Regime Journal of Machine Learning Research 18 (2017) 1-40 Submitte 9/15; Revise 11/16; Publishe 4/17 Analyzing Tensor Power Metho Dynamics in Overcomplete Regime Animashree Ananumar Department of Electrical

More information

Capacity Analysis of MIMO Systems with Unknown Channel State Information

Capacity Analysis of MIMO Systems with Unknown Channel State Information Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,

More information

Algorithms and matching lower bounds for approximately-convex optimization

Algorithms and matching lower bounds for approximately-convex optimization Algorithms an matching lower bouns for approximately-convex optimization Yuanzhi Li Department of Computer Science Princeton University Princeton, NJ, 08450 yuanzhil@cs.princeton.eu Anrej Risteski Department

More information

Summary: Differentiation

Summary: Differentiation Techniques of Differentiation. Inverse Trigonometric functions The basic formulas (available in MF5 are: Summary: Differentiation ( sin ( cos The basic formula can be generalize as follows: Note: ( sin

More information

The new concepts of measurement error s regularities and effect characteristics

The new concepts of measurement error s regularities and effect characteristics The new concepts of measurement error s regularities an effect characteristics Ye Xiaoming[1,] Liu Haibo [3,,] Ling Mo[3] Xiao Xuebin [5] [1] School of Geoesy an Geomatics, Wuhan University, Wuhan, Hubei,

More information

On combinatorial approaches to compressed sensing

On combinatorial approaches to compressed sensing On combinatorial approaches to compresse sensing Abolreza Abolhosseini Moghaam an Hayer Raha Department of Electrical an Computer Engineering, Michigan State University, East Lansing, MI, U.S. Emails:{abolhos,raha}@msu.eu

More information

Introduction to the Vlasov-Poisson system

Introduction to the Vlasov-Poisson system Introuction to the Vlasov-Poisson system Simone Calogero 1 The Vlasov equation Consier a particle with mass m > 0. Let x(t) R 3 enote the position of the particle at time t R an v(t) = ẋ(t) = x(t)/t its

More information

Robustness and Perturbations of Minimal Bases

Robustness and Perturbations of Minimal Bases Robustness an Perturbations of Minimal Bases Paul Van Dooren an Froilán M Dopico December 9, 2016 Abstract Polynomial minimal bases of rational vector subspaces are a classical concept that plays an important

More information

Equilibrium in Queues Under Unknown Service Times and Service Value

Equilibrium in Queues Under Unknown Service Times and Service Value University of Pennsylvania ScholarlyCommons Finance Papers Wharton Faculty Research 1-2014 Equilibrium in Queues Uner Unknown Service Times an Service Value Laurens Debo Senthil K. Veeraraghavan University

More information

Robust Low Rank Kernel Embeddings of Multivariate Distributions

Robust Low Rank Kernel Embeddings of Multivariate Distributions Robust Low Rank Kernel Embeings of Multivariate Distributions Le Song, Bo Dai College of Computing, Georgia Institute of Technology lsong@cc.gatech.eu, boai@gatech.eu Abstract Kernel embeing of istributions

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

II. First variation of functionals

II. First variation of functionals II. First variation of functionals The erivative of a function being zero is a necessary conition for the etremum of that function in orinary calculus. Let us now tackle the question of the equivalent

More information

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x)

The derivative of a function f(x) is another function, defined in terms of a limiting expression: f(x + δx) f(x) Y. D. Chong (2016) MH2801: Complex Methos for the Sciences 1. Derivatives The erivative of a function f(x) is another function, efine in terms of a limiting expression: f (x) f (x) lim x δx 0 f(x + δx)

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

Analysis on a Localized Pruning Method for Connected Dominating Sets

Analysis on a Localized Pruning Method for Connected Dominating Sets JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 23, 1073-1086 (2007) Analysis on a Localize Pruning Metho for Connecte Dominating Sets JOHN SUM 1, JIE WU 2 AND KEVIN HO 3 1 Department of Information Management

More information

A Modification of the Jarque-Bera Test. for Normality

A Modification of the Jarque-Bera Test. for Normality Int. J. Contemp. Math. Sciences, Vol. 8, 01, no. 17, 84-85 HIKARI Lt, www.m-hikari.com http://x.oi.org/10.1988/ijcms.01.9106 A Moification of the Jarque-Bera Test for Normality Moawa El-Fallah Ab El-Salam

More information

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy

IPA Derivatives for Make-to-Stock Production-Inventory Systems With Backorders Under the (R,r) Policy IPA Derivatives for Make-to-Stock Prouction-Inventory Systems With Backorers Uner the (Rr) Policy Yihong Fan a Benamin Melame b Yao Zhao c Yorai Wari Abstract This paper aresses Infinitesimal Perturbation

More information

Balancing Expected and Worst-Case Utility in Contracting Models with Asymmetric Information and Pooling

Balancing Expected and Worst-Case Utility in Contracting Models with Asymmetric Information and Pooling Balancing Expecte an Worst-Case Utility in Contracting Moels with Asymmetric Information an Pooling R.B.O. erkkamp & W. van en Heuvel & A.P.M. Wagelmans Econometric Institute Report EI2018-01 9th January

More information

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz A note on asymptotic formulae for one-imensional network flow problems Carlos F. Daganzo an Karen R. Smilowitz (to appear in Annals of Operations Research) Abstract This note evelops asymptotic formulae

More information

Optimal CDMA Signatures: A Finite-Step Approach

Optimal CDMA Signatures: A Finite-Step Approach Optimal CDMA Signatures: A Finite-Step Approach Joel A. Tropp Inst. for Comp. Engr. an Sci. (ICES) 1 University Station C000 Austin, TX 7871 jtropp@ices.utexas.eu Inerjit. S. Dhillon Dept. of Comp. Sci.

More information

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y Ph195a lecture notes, 1/3/01 Density operators for spin- 1 ensembles So far in our iscussion of spin- 1 systems, we have restricte our attention to the case of pure states an Hamiltonian evolution. Toay

More information

3.2 Shot peening - modeling 3 PROCEEDINGS

3.2 Shot peening - modeling 3 PROCEEDINGS 3.2 Shot peening - moeling 3 PROCEEDINGS Computer assiste coverage simulation François-Xavier Abaie a, b a FROHN, Germany, fx.abaie@frohn.com. b PEENING ACCESSORIES, Switzerlan, info@peening.ch Keywors:

More information

Hyperbolic Moment Equations Using Quadrature-Based Projection Methods

Hyperbolic Moment Equations Using Quadrature-Based Projection Methods Hyperbolic Moment Equations Using Quarature-Base Projection Methos J. Koellermeier an M. Torrilhon Department of Mathematics, RWTH Aachen University, Aachen, Germany Abstract. Kinetic equations like the

More information

On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks

On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM proceeings This paper was presente as part of the main Technical

More information

Transmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency

Transmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency Transmission Line Matrix (TLM network analogues of reversible trapping processes Part B: scaling an consistency Donar e Cogan * ANC Eucation, 308-310.A. De Mel Mawatha, Colombo 3, Sri Lanka * onarecogan@gmail.com

More information

ERROR-detecting codes and error-correcting codes work

ERROR-detecting codes and error-correcting codes work 1 Convolutional-Coe-Specific CRC Coe Design Chung-Yu Lou, Stuent Member, IEEE, Babak Daneshra, Member, IEEE, an Richar D. Wesel, Senior Member, IEEE arxiv:1506.02990v1 [cs.it] 9 Jun 2015 Abstract Cyclic

More information

A Review of Multiple Try MCMC algorithms for Signal Processing

A Review of Multiple Try MCMC algorithms for Signal Processing A Review of Multiple Try MCMC algorithms for Signal Processing Luca Martino Image Processing Lab., Universitat e València (Spain) Universia Carlos III e Mari, Leganes (Spain) Abstract Many applications

More information

A PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks

A PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks A PAC-Bayesian Approach to Spectrally-Normalize Margin Bouns for Neural Networks Behnam Neyshabur, Srinah Bhojanapalli, Davi McAllester, Nathan Srebro Toyota Technological Institute at Chicago {bneyshabur,

More information

Lecture 12: November 6, 2013

Lecture 12: November 6, 2013 Information an Coing Theory Autumn 204 Lecturer: Mahur Tulsiani Lecture 2: November 6, 203 Scribe: Davi Kim Recall: We were looking at coes of the form C : F k q F n q, where q is prime, k is the message

More information

arxiv: v1 [math.mg] 10 Apr 2018

arxiv: v1 [math.mg] 10 Apr 2018 ON THE VOLUME BOUND IN THE DVORETZKY ROGERS LEMMA FERENC FODOR, MÁRTON NASZÓDI, AND TAMÁS ZARNÓCZ arxiv:1804.03444v1 [math.mg] 10 Apr 2018 Abstract. The classical Dvoretzky Rogers lemma provies a eterministic

More information

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control

19 Eigenvalues, Eigenvectors, Ordinary Differential Equations, and Control 19 Eigenvalues, Eigenvectors, Orinary Differential Equations, an Control This section introuces eigenvalues an eigenvectors of a matrix, an iscusses the role of the eigenvalues in etermining the behavior

More information

The total derivative. Chapter Lagrangian and Eulerian approaches

The total derivative. Chapter Lagrangian and Eulerian approaches Chapter 5 The total erivative 51 Lagrangian an Eulerian approaches The representation of a flui through scalar or vector fiels means that each physical quantity uner consieration is escribe as a function

More information

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1

d dx But have you ever seen a derivation of these results? We ll prove the first result below. cos h 1 Lecture 5 Some ifferentiation rules Trigonometric functions (Relevant section from Stewart, Seventh Eition: Section 3.3) You all know that sin = cos cos = sin. () But have you ever seen a erivation of

More information

arxiv: v2 [math.st] 29 Oct 2015

arxiv: v2 [math.st] 29 Oct 2015 EXPONENTIAL RANDOM SIMPLICIAL COMPLEXES KONSTANTIN ZUEV, OR EISENBERG, AND DMITRI KRIOUKOV arxiv:1502.05032v2 [math.st] 29 Oct 2015 Abstract. Exponential ranom graph moels have attracte significant research

More information

3.7 Implicit Differentiation -- A Brief Introduction -- Student Notes

3.7 Implicit Differentiation -- A Brief Introduction -- Student Notes Fin these erivatives of these functions: y.7 Implicit Differentiation -- A Brief Introuction -- Stuent Notes tan y sin tan = sin y e = e = Write the inverses of these functions: y tan y sin How woul we

More information

arxiv: v1 [math.co] 29 May 2009

arxiv: v1 [math.co] 29 May 2009 arxiv:0905.4913v1 [math.co] 29 May 2009 simple Havel-Hakimi type algorithm to realize graphical egree sequences of irecte graphs Péter L. Erős an István Miklós. Rényi Institute of Mathematics, Hungarian

More information

Least Distortion of Fixed-Rate Vector Quantizers. High-Resolution Analysis of. Best Inertial Profile. Zador's Formula Z-1 Z-2

Least Distortion of Fixed-Rate Vector Quantizers. High-Resolution Analysis of. Best Inertial Profile. Zador's Formula Z-1 Z-2 High-Resolution Analysis of Least Distortion of Fixe-Rate Vector Quantizers Begin with Bennett's Integral D 1 M 2/k Fin best inertial profile Zaor's Formula m(x) λ 2/k (x) f X(x) x Fin best point ensity

More information

arxiv: v2 [cond-mat.stat-mech] 11 Nov 2016

arxiv: v2 [cond-mat.stat-mech] 11 Nov 2016 Noname manuscript No. (will be inserte by the eitor) Scaling properties of the number of ranom sequential asorption iterations neee to generate saturate ranom packing arxiv:607.06668v2 [con-mat.stat-mech]

More information

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,

More information

7.1 Support Vector Machine

7.1 Support Vector Machine 67577 Intro. to Machine Learning Fall semester, 006/7 Lecture 7: Support Vector Machines an Kernel Functions II Lecturer: Amnon Shashua Scribe: Amnon Shashua 7. Support Vector Machine We return now to

More information

Node Density and Delay in Large-Scale Wireless Networks with Unreliable Links

Node Density and Delay in Large-Scale Wireless Networks with Unreliable Links Noe Density an Delay in Large-Scale Wireless Networks with Unreliable Links Shizhen Zhao, Xinbing Wang Department of Electronic Engineering Shanghai Jiao Tong University, China Email: {shizhenzhao,xwang}@sjtu.eu.cn

More information

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering,

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering, On the Queue-Overflow Probability of Wireless Systems : A New Approach Combining Large Deviations with Lyapunov Functions V. J. Venkataramanan an Xiaojun Lin Center for Wireless Systems an Applications

More information

On non-antipodal binary completely regular codes

On non-antipodal binary completely regular codes Discrete Mathematics 308 (2008) 3508 3525 www.elsevier.com/locate/isc On non-antipoal binary completely regular coes J. Borges a, J. Rifà a, V.A. Zinoviev b a Department of Information an Communications

More information

Monte Carlo Methods with Reduced Error

Monte Carlo Methods with Reduced Error Monte Carlo Methos with Reuce Error As has been shown, the probable error in Monte Carlo algorithms when no information about the smoothness of the function is use is Dξ r N = c N. It is important for

More information

Sparse Reconstruction of Systems of Ordinary Differential Equations

Sparse Reconstruction of Systems of Ordinary Differential Equations Sparse Reconstruction of Systems of Orinary Differential Equations Manuel Mai a, Mark D. Shattuck b,c, Corey S. O Hern c,a,,e, a Department of Physics, Yale University, New Haven, Connecticut 06520, USA

More information

Table of Common Derivatives By David Abraham

Table of Common Derivatives By David Abraham Prouct an Quotient Rules: Table of Common Derivatives By Davi Abraham [ f ( g( ] = [ f ( ] g( + f ( [ g( ] f ( = g( [ f ( ] g( g( f ( [ g( ] Trigonometric Functions: sin( = cos( cos( = sin( tan( = sec

More information

Power Generation and Distribution via Distributed Coordination Control

Power Generation and Distribution via Distributed Coordination Control Power Generation an Distribution via Distribute Coorination Control Byeong-Yeon Kim, Kwang-Kyo Oh, an Hyo-Sung Ahn arxiv:407.4870v [math.oc] 8 Jul 204 Abstract This paper presents power coorination, power

More information

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation

Thermal conductivity of graded composites: Numerical simulations and an effective medium approximation JOURNAL OF MATERIALS SCIENCE 34 (999)5497 5503 Thermal conuctivity of grae composites: Numerical simulations an an effective meium approximation P. M. HUI Department of Physics, The Chinese University

More information

Asymptotic determination of edge-bandwidth of multidimensional grids and Hamming graphs

Asymptotic determination of edge-bandwidth of multidimensional grids and Hamming graphs Asymptotic etermination of ege-banwith of multiimensional gris an Hamming graphs Reza Akhtar Tao Jiang Zevi Miller. Revise on May 7, 007 Abstract The ege-banwith B (G) of a graph G is the banwith of the

More information