Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability

Size: px
Start display at page:

Download "Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability"

Transcription

1 Connectng Multple-uncast and Network Error Correcton: Reducton and Unachevablty Wentao Huang Calforna Insttute of Technology Mchael Langberg Unversty at Buffalo, SUNY Joerg Klewer New Jersey Insttute of Technology arxv: v1 [cs.it] 20 Apr 2015 Abstract We show that solvng a multple-uncast network codng problem can be reduced to solvng a sngle-uncast network error correcton problem, where an adversary may jam at most a sngle edge n the network. Specfcally, we present an effcent reducton that maps a multple-uncast network codng nstance to a network error correcton nstance whle preservng feasblty. The reducton holds for both the zero probablty of error model and the vanshng probablty of error model. Prevous reductons are restrcted to the zero-error case. As an applcaton of the reducton, we present a constructve example showng that the sngle-uncast network error correcton capacty may not be achevable, a result of separate nterest. I. INTRODUCTION Consder the problem that a source wshes to relably communcate to a termnal over a network wth pont-topont noseless channels, n the presence of an adversary. The adversary s characterzed by a collecton A of subsets of channels, so that t may choose an arbtrary A A and controls the channels n set A. Under the assumpton that 1) all channels have unform capacty and 2) A s the collecton of all subsets contanng z channels, Yeung and Ca [1] show that the cut-set bound characterzes the network error correcton capacty. Effcent capacty-achevng network error correcton codes under ths settng are proposed n [2] [5]. In the settngs that ether channel capactes are not unform or A s arbtrary, determnng the network capacty remans an open problem. For both cases t s shown that lnear codes are not suffcent to acheve capacty [6], [7]. Capacty bounds and achevable strateges for network error correcton wth unequal channel capactes are studes n [6]. Achevable strateges for network error correcton wth non-unform A,.e., A ncludes subsets of dfferent szes, are studed n [8] [10]. The sngle-source sngle-termnal network error correcton problem wth arbtrary A s shown n a prevous work of the authors [11] to be at least as hard as the multple-uncast network codng problem (wthout adversaral errors), usng the followng reducton technque. For a general multple-uncast network codng problem I, a correspondng network error correcton problem I c can be constructed, so that a rate s feasble wth zero error n I f and only f a correspondng rate s feasble wth zero error n I c. Therefore, the problem of determnng the zero-error feasblty of a rate n I s reduced to the problem of determnng the zero-error feasblty of a 0 Ths work has been supported n part by NSF grant CCF , CCF , CCF , and CCF rate n I c. Under the model that a vanshng probablty of error s allowed, the connecton between the feasblty n I and I c s also studed n [11]. However, n ths case the result theren s weaker, and has a gap so that the f and only f connecton between I and I c s broken. Hence for ths case the reducton from I to I c s not establshed. In ths paper, we close ths gap and complete the reducton from multple-uncast to network error correcton under the vanshng-error model. For a general multple-uncast network codng problem I, we show that a correspondng network error correcton problem I c can be constructed, so that a rate s feasble wth vanshng error n I f and only f a correspondng rate s feasble wth vanshng error n I c. We construct I c n the same way as n [11]. However, compared to the (mplct) nformaton-theoretc approach used n [11], we present a way to explctly construct the network code for I from the network code for I c. Furthermore, the new approach enables a stronger result, smplfes the proofs and generalzes the result of the zero-error model as a specal case. As there are connectons between I and I c for both zeroerror feasblty and vanshng-error feasblty, t s natural to ask f the connecton extends to the case of asymptotc feasblty. We answer ths queston negatvely by constructng a counter-example. By applyng our analyss to ths example, we further show that the (sngle-source sngle-termnal) network error correcton capacty s not achevable n general, whch s a result of separate nterest. Prevous works [12], [13] have studed the unachevablty of capacty for multple-uncast networks and sum-networks, respectvely. II. MODELS A. Multple-uncast Network Codng A network s a drected graph G = (V, E), where vertces represent network nodes and edges represent channels. Each edge e E has a capacty c e, whch s the number of bts that can be transmtted on e n one transmsson. An nstance I = (G, S, T, B) of the multple-uncast network codng problem, ncludes a network G, a set of source nodes S V, a set of termnal nodes T V and an S by T requrement matrx B. The (, j)-th entry of B equals 1 f termnal j requres the nformaton from source and equals 0 otherwse. B s assumed to be a permutaton matrx so that each source s pared wth a sngle termnal. Denote by s(t) the source requred by termnal t. Denote [n] {1,.., n}, and each source s S s assocated wth an ndependent message,

2 represented by a random varable M s unformly dstrbuted over [2 nrs ]. A network code of length n s a set of encodng functons φ e for every e E and a set of decodng functons φ t for each t T. For each e = (u, v), the encodng functon φ e s a functon takng as nput the sgnals receved from the ncomng edges of node u, as well as the random varable M u f u S. φ e evaluates to a value n [2 nce ], whch s the sgnal transmtted on e. For each t T, the decodng functon φ t maps the tuple of sgnals receved from the ncomng edges of t, to an estmated message ˆM s(t) wth values n [2 nr s(t) ]. A network code {φ e, φ t } e E,t T s sad to satsfy a termnal t under transmsson (m s, s S) f ˆMs(t) = m s(t) when (M s, s S) = (m s, s S). A network code s sad to satsfy the multple-uncast network codng problem I wth error probablty ɛ f the probablty that all t T are smultaneously satsfed s at least 1 ɛ. The probablty s taken over the jont dstrbuton on (M s, s S). Formally, the network code satsfes I wth error probablty ɛ f { } Pr (M s,s S) t T t s satsfed under (M s, s S) 1 ɛ. For an nstance I of the multple-uncast network codng problem, rate R s sad to be feasble f R s = R, s S, and for any ɛ > 0, there exsts a network code that satsfes I wth error probablty at most ɛ. Rate R s sad to be feasble wth zero error f R s = R, s S and there exsts a network code that satsfes I wth zero error probablty. Rate R s sad to be asymptotcally feasble f for any δ > 0, rate (1 δ)r s feasble. The model assumes that all sources transmt nformaton at equal rate. There s no loss of generalty n ths assumpton as a varyng rate source s can be modeled by several equal rate sources co-located at s. B. Sngle-source Sngle-termnal Network Error Correcton An nstance I c = (G, s, t, A) of the sngle-source sngletermnal network error correcton problem ncludes a network G, a source node s, a termnal node t and a collecton of subsets of channels A 2 E susceptble to errors. An error occurs n a channel f the output of the channel s dfferent from the nput. More precsely, the output of a channel e s the btwse xor of the nput sgnal and an error sgnal r e. We say there s an error n channel e f r e s not the zero vector. For a subset A A of channels, an A-error s sad to occur f an error occurs n every channel n A. Snce there s only a sngle source and a sngle termnal, n ths problem we suppress the subscrpt and denote by M the random message of the source, by R the rate of M, and by ˆM the output of the decoder at t. Denote by R A the set of error patterns r = {r e } e E that correspond to an A-error, for any A A. A network code {φ e, φ t } e E s sad to satsfy I c under transmsson m f ˆM = m when M = m, regardless of the occurrence of any error pattern r R A. A network code s sad to satsfy problem I c wth error probablty ɛ f the probablty that I c s satsfed s at least 1 ɛ. The probablty s taken over the dstrbuton on the source message M. Note that our model targets the worst-case scenaro n the sense that f M = m s transmtted and m s satsfed by the network code, then correct decodng s guaranteed regardless of the error pattern. For a sngle-source sngle-termnal network error correcton problem I c, rate R s sad to be feasble f for any ɛ > 0, there exsts a network code that satsfes I c wth error probablty at most ɛ. Rate R s sad to be feasble wth zero error f there exsts a network code that satsfes I c wth zero error probablty. Rate R s sad to be asymptotcally feasble f for any δ > 0, rate (1 δ)r s feasble. The capacty of I c s the supremum over all rates that are asymptotcally feasble. III. REDUCTION FROM MULTIPLE-UNICAST TO NETWORK ERROR CORRECTION Fg. 1: In the sngle-uncast network error correcton problem I c, the source s wants to communcate wth the termnal t. N s a general network wth pont-to-pont noseless channels. All edges outsde N (.e., edges for whch at least one of ts end-ponts does not belong to N ) have unt capacty. There s at most one error n ths network, and ths error may occur at any edge except {a, b, 1 k}. Namely, A ncludes all sngleton sets of a sngle edge n the network except {a } and {b }, = 1,..., k. Note that there are k parallel branches n total but only the frst and the k-th branches are drawn explctly. The multple-uncast network codng problem I s defned on the network N, where the k source-destnaton pars are (s, t ), = 1,..., k, and all channels are error-free. The followng theorem s the man result of ths secton. Theorem 1. Gven any multple-uncast network codng problem I wth source-destnaton pars {(s, t ), = 1,..., k}, a correspondng sngle-source sngle-termnal network error correcton problem I c = (G, s, t, A) n whch A ncludes sets wth at most a sngle edge can be constructed as specfed n Fgure 1, such that rate k s feasble n I c f and only f unt rate s feasble n I. The backward drecton of the theorem,.e., unt rate n I mples rate k n I c, s smple and s prove n [11]. In the

3 remander of ths secton we prove the forward drecton of Theorem 1,.e., the feasblty of rate k n I c mples the feasblty of unt rate n I. Suppose n I c a rate of k s acheved by a network code C = {φ e, φ t } e E wth length n, and wth a probablty of error ɛ. Recall that M s the source message unformly dstrbuted over M = [2 kn ], and ˆM s the output of the decoder at the termnal. Let M good = {m [2 kn ] : C satsfes I c under transmsson m} be the subset of messages that can be decoded correctly under any error pattern r R A. Denote by M bad = M\M good, then for any m M bad, there exsts an error pattern r R A such that ˆM m f M = m and r occurs,.e., a decodng error occurs. Because C satsfes I c wth error probablty ɛ, t follows that M bad 2 kn ɛ and thus M good (1 ɛ) 2 kn. We ntroduce some notaton needed n the proof. In problem I c, under the network code C, for = 1,..., k, let x (m, r) : M R A [2 n ] be the sgnal receved from channel x when M = m and the error pattern r happens. Let r = 0 denotes the case that no error has occurred n the network. Let x (m) = x (m, 0), x(m, r) = (x 1 (m, r),..., x k (m, r)) and x(m) = (x 1 (m),..., x k (m)). We defne functons a, b, y, z, z, a, b, y, z, z for problem I c n a smlar way. Notce that the set of edges a 1,..., a k forms a cut-set from s to t, and so does the set of edges b 1,..., b k. Therefore for any m 1, m 2 M good, m 1 m 2, t follows from the decodablty constrant that a(m 1 ) a(m 2 ) and b(m 1 ) b(m 2 ). Settng B good = {b(m) : m M good }, t then follows from M good (1 ɛ) 2 kn that B good (1 ɛ) 2 kn. Settng B err = [2 n ] k \B good, t follows that B err 2 kn ɛ. We defne A good and A err smlarly and so A good (1 ɛ) 2 kn, A err 2 kn ɛ. Let M(ẑ, ˆb ) = {m M good : z (m) = ẑ, b (m) = ˆb }, we defne a functon ψ : [2 n ] [2 n ] as: ψ (ẑ ) = arg max ˆb M(ẑ, ˆb ) ˆb,ẑ (1) Functon ψ wll be useful later, when we desgn the network codes n I. Intutvely, n the absence of adversaral errors, ψ estmates the sgnal transmtted on edge b gven that the sgnal transmtted on edge z s ẑ. In the followng we analyze how often wll ψ make a mstake. Defne M ψ = {m M good : ψ (z (m)) b (m)}. Notce that M ψ s the set of messages that, when they are transmtted by the source, ψ wll make a mstake n guessng the sgnal transmtted on b. Lemma 1 shows that the sze of ths set s small. Lemma 1. M ψ 2ɛ 2kn. We make the followng combnatoral observaton before provng Lemma 1. Lemma 2 s a varaton of [11, Lemma 4] Lemma 2. Let M(ẑ ) = {m Mgood : z (m) = ẑ }, then for any m 1, m 2 M(ẑ ) such that b (m 1 ) b (m 2 ), there exsts an element of B err that wll be decoded by termnal t to ether m 1 or m 2. Proof: Consder any m 1, m 2 M(ẑ ) such that b (m 1 ) b (m 2 ). Let r 1 be the error pattern that changes the sgnal on x to be x (m 2 ), and let r 2 be the error pattern that changes the sgnal on y to be y (m 1 ). Then f m 1 s transmtted by the source and r 1 happens, node B wll receve the same nputs (x (m 2 ), y (m 1 ), z (m 1) = z (m 2)) as n the stuaton that m 2 s transmtted and r 2 happens. Therefore b (m 1, r 1 ) = b (m 2, r 2 ), and so ether b (m 1, r 1 ) b (m 1 ) or b (m 2, r 2 ) b (m 2 ) because by hypothess b (m 1 ) b (m 2 ). Consder the frst case that b (m 1, r 1 ) b (m 1 ), then the tuple of sgnals (b 1 (m 1, r 1 ),..., b k (m 1, r 1 )) = (b 1 (m 1 ),..., b (m 1, r 1 ),..., b k (m 1 )) wll be decoded by the termnal to message m 1 because of the fact that m 1 M good whch s correctly decodable under any error pattern r R A. Therefore ths tuple of sgnals s an element of B err snce t does not equals b(m 1 ) = (b 1 (m 1 ),..., b k (m 1 )) and t does not equal b(m), for any m m 1, m M good, because otherwse t wll be decoded by the termnal to m. Smlarly n the latter case that b 1 (m 2, r 2 ) b 1 (m 2 ), then (b 2 (m 2, r 2 ),..., b k (m 2, r 2 )) = (b 2 (m 2 ),..., b (m 2, r 2 ),..., b k (m 2 )) s an element of B err and wll be decoded by the termnal to m 2. Therefore n both cases we are able to fnd an element of B err that wll be decoded by the termnal to ether m 1 or m 2. Proof (of Lemma 1): We can partton M ψ as M ψ = ( M(ẑ )\M(ẑ, ˆb ),ẑ ), ẑ and so M ψ = ẑ ( M(ẑ ) M(ẑ, ˆb ),ẑ ). (2) Consder an arbtrary ẑ and the set M(ẑ ). We defne an teratve procedure as follows. Intalze W := M(ẑ ). If there exst two messages m 1, m 2 W such that b (m 1 ) b (m 2 ), then delete both m 1, m 2 from W. Repeat the operaton untl there does not exst m 1, m 2 W such that b (m 1 ) b (m 2 ). After the procedure termnates, t follows that W M(ẑ, ˆb,ẑ ), otherwse by the defnton of ˆb,ẑ there must exst m 1, m 2 W such that b (m 1 ) b (m 2 ). Therefore at least M(ẑ ) M(ẑ, ˆb,ẑ ) elements are deleted from M(ẑ ). By Lemma 2, each par of elements deleted corresponds to an element of B err. Also by Lemma 2 the elements of B err correspondng to dfferent deleted pars are dstnct. Summng over all possble values of ẑ, t follows that the total number of deleted pars s smaller than the sze of B err : 1 ( M(ẑ 2 ) M(ẑ, ˆb ),ẑ ) ẑ # of pars deleted from M(ẑ ) ẑ B err = ɛ 2 kn. (3) Combnng (2) and (3) we have M ψ 2ɛ 2kn.

4 Next, let M(â, ˆb ) = {m M good : a (m) = â, b (m) = ˆb }, we defne a functon π : [2 n ] [2 n ] as: π (ˆb ) = arg max â M(â, ˆb ) â,ˆb (4) Functon π wll be useful later for desgnng the network codes n I. Intutvely, n the absence of adversaral errors, π estmates the sgnal transmtted on edge a gven that the sgnal transmtted on edge b s ˆb. In the followng we analyze how often wll π make a mstake. Defne M π = {m M good : π (b (m)) a (m)}. Notce that M π s the set of messages that, when they are transmtted by the source, π wll make a mstake n guessng the sgnal transmtted on a. Lemma 3 shows that the sze of ths set s small. Lemma 3. M π 3ɛ 2kn. We make the followng combnatoral observaton before provng Lemma 3. Lemma 4 s a varaton of [11, Lemma 3]. Lemma 4. Defne M(â ) = {m M good : a (m) = â }. If {b (m) : m M(â )} = L, then there exst (L 1) M(â ) dstnct elements of B err such that each of them wll be decoded by termnal t to some message m M(â ). Proof: Assume for concreteness that {b (m) : m M(â )} = {ˆb (1) (L),..., ˆb }, then there exst L messages (j) m 1,..., m L M(â ) such that b (m j ) = ˆb, j = 1,..., L. For j = 1,..., L, let r j be the error pattern that changes the sgnal on z to be z (m j). Then f a message m 0 M(â ) s transmtted by the source and r j happens, the node B wll receve the same nputs (x (m 0 ), y (m 0 ), z (m j)) as n the stuaton that m j s sent and no error happens. (j) Therefore b (m 0, r j ) = ˆb, and so {b(m 0, r j )} j [L] = {b (m 0, r j )} j [L] = L. Snce m 0 M good, t s correctly decodable under any error pattern r R A, and so all elements of {b(m 0, r j )} j [L] wll be decoded by the termnal to m 0. Except the element b(m 0 ), the other L 1 elements of {b(m 0, r j )} j [L] are elements of B err. Sum over all m 0 M(â ) and the asserton s proved. Proof (of Lemma 3): Defne A π,1 = {â [2 n ] : M(â ) 1 2 2(k 1)n }, and A π,2 = {â [2 n ]\A π,1 : {b (m) : m M(â )} > 1}. Then defne M π,1 = {m M good : a (m) A π,1 }, and Mπ,2 = {m Mgood : a (m) A π,2 }. Notce that by constructon Aπ,1 and Aπ,2 are dsjont, and M π,1 and Mπ,2 are dsjont. We clam that, M π M π,1 M π,2. (5) To prove the clam, consder any m M good such that m / M π,1 Mπ,2. We wll show that π(b (m)) = a (m). Suppose for the sake of contradcton that π(b (m)) = â a (m), then t follows that M(â, b (m)) (a) > M(a (m), b (m)) (b) = M(a (m)) (c) > 1 2 2(k 1)n, (6) where (a) s due to the defnton of π, (b) s due to the fact that m / M π,2 and (c) s due to the fact that m / M π,1. Let M(ˆb ) = {m M good : b (m ) = ˆb }, then M(â, b (m)) M(a (m)) M(b (m)). Snce â a (m), M(â, b (m)) and M(a (m)) are dsjont, and t follows that M(b (m)) M(â, b (m)) + M(a (m)) > 2 (k 1)n. However, because {(ˆb 1,..., ˆb k ) [2 n ] k : ˆb = b (m)} = 2 (k 1)n, by the pgeonhole prncple there must exst two messages m 1, m 2 M(b (m)) such that b(m 1 ) = b(m 2 ). Ths s a contradcton snce the termnal cannot dstngush m 1 from m 2. Ths proves π(b (m)) = a (m) as well as (5). We next bound the sze of M π,1 and Mπ,2. For any â A π,1, by defnton {(â 1,..., â k ) [2 n ] k : â = â }\{(a(m) : m M(â )} s a subset of Aerr wth sze at least 1 2 2(k 1)n. Therefore each element of A π,1 wll contrbute to at least 1 2 2(k 1)n dstnct elements of A err. Hence A π, (k 1)n A err = ɛ 2 kn, and so A π,1 2ɛ 2n. It then follows that M π, (k 1)n A π,1 = ɛ 2kn. By Lemma 4, each elements of A π,2 wll contrbute to at 1 least 2 2(k 1)n dstnct elements n B err. Therefore A π, (k 1)n B err = ɛ 2 kn, and so A π,2 2ɛ 2n. It then follows that M π,2 2(k 1)n A π,2 = 2ɛ 2kn. Fnally, by (5) we have M π Mπ,1 + Mπ,2 3ɛ 2kn. We are now ready to prove Theorem 1. Proof ( part of Theorem 1): We show the feasblty of rate k n I c mples the feasblty of unt rate n I. Let {φ e, φ t } e E be the network error correcton code of length n that acheves rate k n I c, wth probablty of error ɛ. We assume that n ths code edge z smply relays the sgnal from edge a. Ths s wthout loss of generalty because for any network code that needs to process the sgnal on edge a to obtan the sgnal to be transmtted on edge z, t s equvalent to relay the sgnal on edge z and perform the processng work at the head node of edge z. Let E N E be the set of edges of the embedded graph N. For the multple-uncast problem I, we defne a length-n network code {τ e, τ t : e E N, [k]} as follows. τ e = φ e, e E N τ t = φ z π ψ φ z, = 1,..., k. where denotes functon composton; φ z and φ z are the encodng functons of edges z and z n problem I c; ψ s defned n (1); and π s defned n (4). In the followng we show that {τ e, τ t : e E N, [k]} acheves unt rate n I wth probablty of error upper bounded by 6kɛ. In problem I, let M be the random message assocated wth source s, then M, = 1,..., k are..d. unformly dstrbuted over [2 n ]. Denote for short M = (M 1,..., M k ), then slghtly abusng notatons we denote by τ t (M) the output of the decoder τ t under transmsson M. The probablty of decodng error s gven by k Pr{ τ t (M) M }, =1 where the probablty s taken over the jont dstrbuton of the random messages. Let m = (m 1,..., m k ) be the realzaton

5 of M. We clam that f there exsts a message m of problem I c (not to be confused wth m, a message of I) such that m M good, m / M ψ, m / Mπ and m = z(m), then τ t (m) = m. To prove the clam, suppose m = z(m) s transmtted n I. Notce that all edges n N perform the same codng scheme n I as n I c, therefore for termnal node t, by nvokng the functon φ z, t obtans z (m). Then by the defnton of M ψ, t follows that ψ (z (m)) = b (m). And by the defnton of M π, t follows that π(ψ (z (m))) = a (m). Fnally snce m = z(m), t follows that φ z (π(ψ (z (m)))) = φ z (a (m)) = z (m) = m. Therefore τ t (m) = m f m {z(m) [2 n ] k : m M good, m / M ψ, m / Mπ }. The probablty that τ t makes an error,.e., Pr{τ t (M) M }, s upper bounded by the probablty of the unon of the followng three events. E 1 = {M = m : m / {z(m) [2 n ] k : m M good }} E 2 = {M = m : m {z(m) [2 n ] k : m M ψ }} E 3 = {M = m : m {z(m) [2 n ] k : m M π }}. We upper bound the probablty of E 1, E 2, E 3, respectvely. Pr{E 1 } = 1 {z(m) : m Mgood } 2 kn (d) = 1 Mgood 2 kn 1 (1 ɛ) 2kn 2 kn = ɛ, (7) where (d) follows from the fact that z(m) = a(m) a(m ) = z(m ) for any m, m M good, m m. By Lemma 1, Pr{E 2 } = Mψ 2ɛ. (8) 2kn And by Lemma 3, we have Pr{E 3 } = Mπ 3ɛ. (9) 2kn Combnng (7), (8) and (9), t follows that Pr{τ t (M) M } Pr{E 1 } + Pr{E 2 } + Pr{E 3 } 6ɛ. Fnally, by takng the unon bound over the k termnals, k Pr{ τ t (M) M } 6kɛ. =1 Hence the probablty of error s arbtrarly small and ths establshes the feasblty of unt rate n I. The proof above suggests that the feasblty of rate k wth error probablty ɛ n I c mples the feasblty of unt rate wth error probablty 6kɛ n I. By settng ɛ = 0, we generalze the result n [11] regardng the zero-error model as a specal case. Corollary 1. Gven any multple-uncast network codng problem I wth source-destnaton pars {(s, t ), = 1,..., k}, a correspondng sngle-source sngle-termnal network error correcton problem I c = (G, s, t, A) n whch A ncludes sets wth at most a sngle edge can be constructed as specfed n Fgure 1, such that rate k s feasble wth zero error n I c f and only f unt rate s feasble wth zero error n I. IV. UNACHIEVABILITY OF NETWORK ERROR CORRECTION CAPACITY Theorem 1 and Corollary 1 suggest that there are strong f and only f connectons between I c and I for both zero-error feasblty and vanshng-error feasblty. It s natural to ask f ths connecton extends to the case of asymptotc feasblty,.e., f t s true that rate k s asymptotcally feasble n I c f and only f unt rate s asymptotcally feasble n I. We answer ths queston negatvely by constructng a counter-example. Fg. 2: Constructon of I c and I. In I c, the source s s and the termnal s t. A ncludes all sngleton sets of a sngle edge except {a } and {b }, = 1,..., k. In I, the source-destnaton pars are (s, t ), = 1,..., k. All edges have unt capacty. Theorem 2. There exsts a multple-uncast network codng problem I and a correspondng sngle-source sngle-termnal network error correcton problem I c, constructed from I as specfed n Fgure 2, such that rate k s asymptotcally feasble n I c, but unt rate s not asymptotcally feasble n I. Proof: The constructon of I and the correspondng I c are shown n Fgure 2. By the cut-set bounds, any rate larger than 1/k s not feasble n I. Ths shows the second statement of the theorem. We prove the frst statement of the theorem by descrbng a network code wth length n that acheves rate k k/n n I c. Frst dvde the source message of rate k k/n nto k peces M = (M 1,..., M k ), such that M, = 1,..., k are..d. unformly dstrbuted over [2 n 1 ]. We denote φ e : [2 k(n 1) ] [2 n ] as the encodng functon 1 of edge e, whch takes the source message M as nput, and outputs the sgnal to be transmtted on e when there s no error n the network. For all = 1,..., k, we let φ a (M) = φ x (M) = φ y (M) = φ z (M) = φ (s,c)(m) = M 1 Ths s called the global encodng fucton n the context of network codng.

6 Furthermore, we let φ (C,D) (M) = φ (D,t)(M) = φ z (M) = k M j, j=1 = 1,..., k where the summaton s btwse xor. Note that the edges a, x, y, z, (s, C), (C, D), (D, t ), z each has a capacty to transmt n bts. But we only requre each of them to transmt n 1 bts. Hence each edge reserves one unused bt. Node B, by observng the (possbly corrupted) sgnals receved from edges x, y, z, performs error correcton n the followng way. If the sgnal (of n 1 bts) receved from x equals the sgnal receved from y, forward the sgnal to edge b, and then transmt one bt of 0 usng the reserved bt. Otherwse, forward the sgnal receved from z to b, and then transmt one bt of 1 usng the reserved bt. Fnally, termnal t recovers the source message n the followng way. For = 1,..., k, such that the reserved bt on b equals 0, decode the remanng n 1 bts receved from b as ˆM. If ˆM 1,..., ˆM k are all obtaned n ths way then decodng s completed. If two or more peces of the ˆM s are not obtaned, then a decodng falure s declared. Otherwse, let ˆMl be the unque pece that s not obtaned, then subtract k j=1,j l ˆM j from the sgnal receved from b l, and decode the result as ˆM l. It remans to be shown that ˆM = M, = 1,..., k regardless of the error patterns, and that a decodng falure wll not be declared. Notce that the reserved bt on b equals 1 only f an error occurs to ether x or y. Snce there s at most a sngle error edge, for = 1,..., k there s at most one b wth reserved bt 1. Therefore the decoder s able to obtan at least k 1 peces of ˆM1,..., ˆM k durng the frst phase of decodng and wll never declare falure. Next notce that f the reserved bt on b s 0, then ˆM M only f errors occur to both x and y. Ths s not possble by hypothess and therefore ˆM = M f the reserved bt on b s 0. Fnally, suppose the reserved bt on b s 1, then an error must occur to ether x or y, and so z s not n error. Therefore ˆM = k j=1 M j k j=1,j ˆM j = M. Ths proves the correctness of decodng and the second statement of the theorem. By applyng the reducton result n Theorem 1 to the example constructed n Theorem 2, t follows that the same example shows the unachevablty of sngle-uncast network error correcton capacty. Corollary 2. There exsts a sngle-source sngle-termnal network error correcton problem whose capacty s not feasble. Proof: The constructon of the network error correcton problem I c s shown n Fgure 2. By the cut-set bounds, the capacty of I c s upper bounded by k. By Theorem 2, rate k s asymptotcally feasble n I c, and so the capacty of I c s k. Also by Theorem 2, unt rate n not feasble n I, and so by Theorem 1, rate k s not feasble n I c. Ths shows that the capacty of I c s not feasble. Corollary 2 suggests that although the network error correcton capacty s (by defnton) asymptotcally feasble, n general t may not be exactly feasble. Ths s n contrast to the scenaro of network error correcton wth unform A,.e., A s the collecton of all subsets contanng z channels. In ths case the network capacty can be acheved by lnear codes. Unachevablty of capacty s also studed for multpleuncast networks [12] and sum networks [13]. For both cases example networks for whch the capacty s not achevable are constructed usng matrod theory. V. CONCLUDING REMARKS We show that determnng the feasblty of a rate tuple n a multple-uncast network codng problem can be effcently reduced to determnng the feasblty of a correspondng rate n a correspondng sngle-uncast network error correcton problem, where an adversary may jam at most a sngle edge. Note that though our analyss assumes all source-destnaton pars n the multple-uncast transmt at equal rate, ths restrcton can be relaxed by modelng a varyng rate source s as several equal rate sources co-located at s. Fnally we apply the reducton to show the unachevablty of sngle-uncast network error correcton capacty. We note that our results do not mply that fndng the capacty of a multple-uncast network codng problem can be reduced to fndng the capacty of a sngle-uncast network error correcton problem. Whether t s possble to construct such a reducton would be an nterestng open problem. REFERENCES [1] R. W. Yeung and N. Ca, Network Error Correcton, I: Basc Concepts and Upper Bounds, Communcatons n Informaton & Systems, vol. 6, no. 1, pp , [2] Z. Zhang, Lnear network error correcton codes n packet networks, IEEE Trans. Info. Theory, vol. 54, no. 1, pp , Jan [3] S. Jagg, M. Langberg, S. Katt, T. Ho, D. Katab, M. Medard, and M. Effros, Reslent Network Codng n the Presence of Byzantne Adversares, IEEE Trans. on Info. Theory, vol. 54, no. 6, pp , [4] D. Slva, F. R. Kschschang, and R. Kotter, A Rank-Metrc Approach to Error Control n Random Network Codng, IEEE Trans. Info. Theory, vol. 54, no. 9, pp , [5] R. Koetter and F. R. Kschschang, Codng for Errors and Erasures n Random Network Codng, IEEE Trans. on Info. Theory, vol. 54, no. 8, pp , [6] S. Km, T. Ho, M. Effros, and A. S. Avestmehr, Network Error Correcton Wth Unequal Lnk Capactes, IEEE Trans. Info. Theory, vol. 57, no. 2, pp , Feb [7] O. Kosut, L. Tong, and D. Tse, Nonlnear Network Codng s Necessary to Combat General Byzantne Attacks, n Allerton Conference on Communcaton, Control, and Computng, 2009, pp [8] O. Kosut, L. Tong, and D. N. C. Tse, Polytope codes aganst adversares n networks, n IEEE ISIT, 2010, pp [9] D. Wang, D. Slva, and F. R. Kschschang, Robust Network Codng n the Presence of Untrusted Nodes, IEEE Trans. Info. Theory, vol. 56, no. 9, pp , [10] P. H. Che, M. Chen, T. Ho, S. Jagg, and M. Langberg, Routng for Securty n Networks wth Adversaral Nodes, n IEEE NetCod, [11] W. Huang, T. Ho, M. Langberg, and J. Klewer, Sngle-source/snk network error correcton s as hard as multple-uncast, n Allerton Conference on Communcaton, Control, and Computng, [12] R. Dougherty, C. Frelng, and K. Zeger, Unachevablty of network codng capacty, IEEE Trans. Info. Theory, vol. 52, no. 6, pp , Jun [13] B. K. Ra and B. K. Dey, On Network Codng for Sum-Networks, IEEE Trans. Info. Theory, vol. 58, no. 1, pp , Jan

IN THE paradigm of network coding, a set of source nodes

IN THE paradigm of network coding, a set of source nodes 4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 Sngle-Uncast Secure Network Codng and Network Error Correcton are as Hard as Multple-Uncast Network Codng Wentao Huang, Tracey Ho,

More information

Refined Coding Bounds for Network Error Correction

Refined Coding Bounds for Network Error Correction Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department

More information

Single-Source/Sink Network Error Correction Is as Hard as Multiple-Unicast

Single-Source/Sink Network Error Correction Is as Hard as Multiple-Unicast Snge-Source/Snk Network Error Correcton Is as Hard as Mutpe-Uncast Wentao Huang and Tracey Ho Department of Eectrca Engneerng Caforna Insttute of Technoogy Pasadena, CA {whuang,tho}@catech.edu Mchae Langberg

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem. Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

find (x): given element x, return the canonical element of the set containing x;

find (x): given element x, return the canonical element of the set containing x; COS 43 Sprng, 009 Dsjont Set Unon Problem: Mantan a collecton of dsjont sets. Two operatons: fnd the set contanng a gven element; unte two sets nto one (destructvely). Approach: Canoncal element method:

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

Stanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7

Stanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7 Stanford Unversty CS54: Computatonal Complexty Notes 7 Luca Trevsan January 9, 014 Notes for Lecture 7 1 Approxmate Countng wt an N oracle We complete te proof of te followng result: Teorem 1 For every

More information

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016 CS 29-128: Algorthms and Uncertanty Lecture 17 Date: October 26, 2016 Instructor: Nkhl Bansal Scrbe: Mchael Denns 1 Introducton In ths lecture we wll be lookng nto the secretary problem, and an nterestng

More information

On Network Coding of Independent and Dependent Sources in Line Networks

On Network Coding of Independent and Dependent Sources in Line Networks On Network Codng of Independent and Dependent Sources n Lne Networks Mayank Baksh, Mchelle Effros, WeHsn Gu, Ralf Koetter Department of Electrcal Engneerng Department of Electrcal Engneerng Calforna Insttute

More information

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

n ). This is tight for all admissible values of t, k and n. k t + + n t

n ). This is tight for all admissible values of t, k and n. k t + + n t MAXIMIZING THE NUMBER OF NONNEGATIVE SUBSETS NOGA ALON, HAROUT AYDINIAN, AND HAO HUANG Abstract. Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what

More information

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction

The Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also

More information

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA

4 Analysis of Variance (ANOVA) 5 ANOVA. 5.1 Introduction. 5.2 Fixed Effects ANOVA 4 Analyss of Varance (ANOVA) 5 ANOVA 51 Introducton ANOVA ANOVA s a way to estmate and test the means of multple populatons We wll start wth one-way ANOVA If the populatons ncluded n the study are selected

More information

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness.

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness. 20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The frst dea s connectedness. Essentally, we want to say that a space cannot be decomposed

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.

More information

REAL ANALYSIS I HOMEWORK 1

REAL ANALYSIS I HOMEWORK 1 REAL ANALYSIS I HOMEWORK CİHAN BAHRAN The questons are from Tao s text. Exercse 0.0.. If (x α ) α A s a collecton of numbers x α [0, + ] such that x α

More information

State Amplification and State Masking for the Binary Energy Harvesting Channel

State Amplification and State Masking for the Binary Energy Harvesting Channel State Amplfcaton and State Maskng for the Bnary Energy Harvestng Channel Kaya Tutuncuoglu, Omur Ozel 2, Ayln Yener, and Sennur Ulukus 2 Department of Electrcal Engneerng, The Pennsylvana State Unversty,

More information

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2]. Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland

More information

Estimation: Part 2. Chapter GREG estimation

Estimation: Part 2. Chapter GREG estimation Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the

More information

Anti-van der Waerden numbers of 3-term arithmetic progressions.

Anti-van der Waerden numbers of 3-term arithmetic progressions. Ant-van der Waerden numbers of 3-term arthmetc progressons. Zhanar Berkkyzy, Alex Schulte, and Mchael Young Aprl 24, 2016 Abstract The ant-van der Waerden number, denoted by aw([n], k), s the smallest

More information

The Minimum Universal Cost Flow in an Infeasible Flow Network

The Minimum Universal Cost Flow in an Infeasible Flow Network Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

Approximately achieving Gaussian relay network capacity with lattice codes

Approximately achieving Gaussian relay network capacity with lattice codes Approxmately achevng Gaussan relay network capacty wth lattce codes Ayfer Özgür EFL, Lausanne, Swtzerland ayfer.ozgur@epfl.ch Suhas Dggav UCLA, USA and EFL, Swtzerland suhas@ee.ucla.edu Abstract Recently,

More information

763622S ADVANCED QUANTUM MECHANICS Solution Set 1 Spring c n a n. c n 2 = 1.

763622S ADVANCED QUANTUM MECHANICS Solution Set 1 Spring c n a n. c n 2 = 1. 7636S ADVANCED QUANTUM MECHANICS Soluton Set 1 Sprng 013 1 Warm-up Show that the egenvalues of a Hermtan operator  are real and that the egenkets correspondng to dfferent egenvalues are orthogonal (b)

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

Composite Hypotheses testing

Composite Hypotheses testing Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

Learning Theory: Lecture Notes

Learning Theory: Lecture Notes Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

The Fundamental Theorem of Distributed Storage Systems Revisited

The Fundamental Theorem of Distributed Storage Systems Revisited The Fundamental Theorem of Dstrbuted Storage Systems Revsted Png Hu Department of Electronc Engneerng Cty Unversty of Hong Kong Emal: png.hu@my.ctyu.edu.h Kenneth W. Shum Insttute of Networ Codng the Chnese

More information

Canonical transformations

Canonical transformations Canoncal transformatons November 23, 2014 Recall that we have defned a symplectc transformaton to be any lnear transformaton M A B leavng the symplectc form nvarant, Ω AB M A CM B DΩ CD Coordnate transformatons,

More information

18.1 Introduction and Recap

18.1 Introduction and Recap CS787: Advanced Algorthms Scrbe: Pryananda Shenoy and Shjn Kong Lecturer: Shuch Chawla Topc: Streamng Algorthmscontnued) Date: 0/26/2007 We contnue talng about streamng algorthms n ths lecture, ncludng

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

Chapter 8 Indicator Variables

Chapter 8 Indicator Variables Chapter 8 Indcator Varables In general, e explanatory varables n any regresson analyss are assumed to be quanttatve n nature. For example, e varables lke temperature, dstance, age etc. are quanttatve n

More information

CHAPTER 17 Amortized Analysis

CHAPTER 17 Amortized Analysis CHAPTER 7 Amortzed Analyss In an amortzed analyss, the tme requred to perform a sequence of data structure operatons s averaged over all the operatons performed. It can be used to show that the average

More information

Matrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD

Matrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD Matrx Approxmaton va Samplng, Subspace Embeddng Lecturer: Anup Rao Scrbe: Rashth Sharma, Peng Zhang 0/01/016 1 Solvng Lnear Systems Usng SVD Two applcatons of SVD have been covered so far. Today we loo

More information

Exercise Solutions to Real Analysis

Exercise Solutions to Real Analysis xercse Solutons to Real Analyss Note: References refer to H. L. Royden, Real Analyss xersze 1. Gven any set A any ɛ > 0, there s an open set O such that A O m O m A + ɛ. Soluton 1. If m A =, then there

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or Sgnal Compresson Sgnal Compresson Entropy Codng Entropy codng s also known as zero-error codng, data compresson or lossless compresson. Entropy codng s wdely used n vrtually all popular nternatonal multmeda

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

x i1 =1 for all i (the constant ).

x i1 =1 for all i (the constant ). Chapter 5 The Multple Regresson Model Consder an economc model where the dependent varable s a functon of K explanatory varables. The economc model has the form: y = f ( x,x,..., ) xk Approxmate ths by

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

On Information Theoretic Games for Interference Networks

On Information Theoretic Games for Interference Networks On Informaton Theoretc Games for Interference Networks Suvarup Saha and Randall A. Berry Dept. of EECS Northwestern Unversty e-mal: suvarups@u.northwestern.edu rberry@eecs.northwestern.edu Abstract The

More information

Introductory Cardinality Theory Alan Kaylor Cline

Introductory Cardinality Theory Alan Kaylor Cline Introductory Cardnalty Theory lan Kaylor Clne lthough by name the theory of set cardnalty may seem to be an offshoot of combnatorcs, the central nterest s actually nfnte sets. Combnatorcs deals wth fnte

More information

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family

Using T.O.M to Estimate Parameter of distributions that have not Single Exponential Family IOSR Journal of Mathematcs IOSR-JM) ISSN: 2278-5728. Volume 3, Issue 3 Sep-Oct. 202), PP 44-48 www.osrjournals.org Usng T.O.M to Estmate Parameter of dstrbutons that have not Sngle Exponental Famly Jubran

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that

More information

FREQUENCY DISTRIBUTIONS Page 1 of The idea of a frequency distribution for sets of observations will be introduced,

FREQUENCY DISTRIBUTIONS Page 1 of The idea of a frequency distribution for sets of observations will be introduced, FREQUENCY DISTRIBUTIONS Page 1 of 6 I. Introducton 1. The dea of a frequency dstrbuton for sets of observatons wll be ntroduced, together wth some of the mechancs for constructng dstrbutons of data. Then

More information

Introduction to Algorithms

Introduction to Algorithms Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

Vapnik-Chervonenkis theory

Vapnik-Chervonenkis theory Vapnk-Chervonenks theory Rs Kondor June 13, 2008 For the purposes of ths lecture, we restrct ourselves to the bnary supervsed batch learnng settng. We assume that we have an nput space X, and an unknown

More information

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006) ECE 534: Elements of Informaton Theory Solutons to Mdterm Eam (Sprng 6) Problem [ pts.] A dscrete memoryless source has an alphabet of three letters,, =,, 3, wth probabltes.4,.4, and., respectvely. (a)

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Appendix B. The Finite Difference Scheme

Appendix B. The Finite Difference Scheme 140 APPENDIXES Appendx B. The Fnte Dfference Scheme In ths appendx we present numercal technques whch are used to approxmate solutons of system 3.1 3.3. A comprehensve treatment of theoretcal and mplementaton

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Supplement to Clustering with Statistical Error Control

Supplement to Clustering with Statistical Error Control Supplement to Clusterng wth Statstcal Error Control Mchael Vogt Unversty of Bonn Matthas Schmd Unversty of Bonn In ths supplement, we provde the proofs that are omtted n the paper. In partcular, we derve

More information

# c i. INFERENCE FOR CONTRASTS (Chapter 4) It's unbiased: Recall: A contrast is a linear combination of effects with coefficients summing to zero:

# c i. INFERENCE FOR CONTRASTS (Chapter 4) It's unbiased: Recall: A contrast is a linear combination of effects with coefficients summing to zero: 1 INFERENCE FOR CONTRASTS (Chapter 4 Recall: A contrast s a lnear combnaton of effects wth coeffcents summng to zero: " where " = 0. Specfc types of contrasts of nterest nclude: Dfferences n effects Dfferences

More information

Lecture 10: May 6, 2013

Lecture 10: May 6, 2013 TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,

More information

General viscosity iterative method for a sequence of quasi-nonexpansive mappings

General viscosity iterative method for a sequence of quasi-nonexpansive mappings Avalable onlne at www.tjnsa.com J. Nonlnear Sc. Appl. 9 (2016), 5672 5682 Research Artcle General vscosty teratve method for a sequence of quas-nonexpansve mappngs Cuje Zhang, Ynan Wang College of Scence,

More information

A new construction of 3-separable matrices via an improved decoding of Macula s construction

A new construction of 3-separable matrices via an improved decoding of Macula s construction Dscrete Optmzaton 5 008 700 704 Contents lsts avalable at ScenceDrect Dscrete Optmzaton journal homepage: wwwelsevercom/locate/dsopt A new constructon of 3-separable matrces va an mproved decodng of Macula

More information

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class

More information

The Second Eigenvalue of Planar Graphs

The Second Eigenvalue of Planar Graphs Spectral Graph Theory Lecture 20 The Second Egenvalue of Planar Graphs Danel A. Spelman November 11, 2015 Dsclamer These notes are not necessarly an accurate representaton of what happened n class. The

More information

Quantum Network Code for Multiple-Unicast Network with Quantum Invertible Linear Operations

Quantum Network Code for Multiple-Unicast Network with Quantum Invertible Linear Operations Quantum Network Code for Multple-Uncast Network wth Quantum Invertble Lnear Operatons Seunghoan Song Graduate School of Mathematcs, Nagoya Unversty, Nagoya, Japan m702a@mathnagoya-uacjp Masahto Hayash

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

Salmon: Lectures on partial differential equations. Consider the general linear, second-order PDE in the form. ,x 2

Salmon: Lectures on partial differential equations. Consider the general linear, second-order PDE in the form. ,x 2 Salmon: Lectures on partal dfferental equatons 5. Classfcaton of second-order equatons There are general methods for classfyng hgher-order partal dfferental equatons. One s very general (applyng even to

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

Exact-Regenerating Codes between MBR and MSR Points

Exact-Regenerating Codes between MBR and MSR Points Exact-Regeneratng Codes between BR SR Ponts arxv:1304.5357v1 [cs.dc] 19 Apr 2013 Abstract In ths paper we study dstrbuted storage systems wth exact repar. We gve a constructon for regeneratng codes between

More information

On the Correlation between Boolean Functions of Sequences of Random Variables

On the Correlation between Boolean Functions of Sequences of Random Variables On the Correlaton between Boolean Functons of Sequences of Random Varables Farhad Shran Chaharsoogh Electrcal Engneerng and Computer Scence Unversty of Mchgan Ann Arbor, Mchgan, 48105 Emal: fshran@umch.edu

More information

The Geometry of Logit and Probit

The Geometry of Logit and Probit The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.

More information

Solutions to exam in SF1811 Optimization, Jan 14, 2015

Solutions to exam in SF1811 Optimization, Jan 14, 2015 Solutons to exam n SF8 Optmzaton, Jan 4, 25 3 3 O------O -4 \ / \ / The network: \/ where all lnks go from left to rght. /\ / \ / \ 6 O------O -5 2 4.(a) Let x = ( x 3, x 4, x 23, x 24 ) T, where the varable

More information

Lecture 4. Instructor: Haipeng Luo

Lecture 4. Instructor: Haipeng Luo Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

System in Weibull Distribution

System in Weibull Distribution Internatonal Matheatcal Foru 4 9 no. 9 94-95 Relablty Equvalence Factors of a Seres-Parallel Syste n Webull Dstrbuton M. A. El-Dacese Matheatcs Departent Faculty of Scence Tanta Unversty Tanta Egypt eldacese@yahoo.co

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information