Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel
|
|
- Constance May
- 5 years ago
- Views:
Transcription
1 Wang, ISIT 2011 p. 1/15 Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Chih-Chun Wang, Jaemin Han Center of Wireless Systems and Applications (CWSA) School of Electrical and Computer Engineering, Purdue University Presented in ISIT, 08/04/2011 Sponsored by NSF CCF and CNS
2 Wang, ISIT 2011 p. 2/15 Motivation The COPE Principle The COPE protocol 2-hop relay networks [Katti et al. 06] 4 transmissions w/o coding vs. 3 transmissions w. coding r sends [X + Y]; d 1 decodes X by subtraction. Empirically, % throughput improvement.
3 Wang, ISIT 2011 p. 2/15 Motivation The COPE Principle The COPE protocol 2-hop relay networks [Katti et al. 06] 4 transmissions w/o coding vs. 3 transmissions w. coding r sends [X + Y]; d 1 decodes X by subtraction. Empirically, % throughput improvement. The capacity can be defined over the corresponding PEC network.
4 Wang, ISIT 2011 p. 3/15 The Capacity Region for M = 2 Assume round-based schemes, and p r;d1 p r;d2 > 0.
5 Wang, ISIT 2011 p. 3/15 The Capacity Region for M = 2 Assume round-based schemes, and p r;d1 p r;d2 > 0. The capacity region for M = 2, [W, Asilomar 09]: R 1 min ( p s1 ;r, p r;1 (R 2 p s2 ;1) +) ( R 2 min p s2 ;r, p r;2 p ) r;2 (R 1 p s1 ;2) + p r;1
6 Wang, ISIT 2011 p. 3/15 The Capacity Region for M = 2 Assume round-based schemes, and p r;d1 p r;d2 > 0. The capacity region for M = 2, [W, Asilomar 09]: s R 1 min ( r p s1 ;r, p r;1 (R 2 p s2 ;1) +) ( R 2 min p s2 ;r, p r;2 p ) r;2 (R 1 p s1 ;2) + p r;1 Transmit all info from s i to r.
7 Wang, ISIT 2011 p. 3/15 The Capacity Region for M = 2 Assume round-based schemes, and p r;d1 p r;d2 > 0. The capacity region for M = 2, [W, Asilomar 09]: s R 1 min ( r avail. slots min inter. p s1 ;r, p r;1 (R 2 p s2 ;1) +) ( R 2 min p s2 ;r, p r;2 p ) r;2 (R 1 p s1 ;2) + p r;1 Transmit all info from s i to r. The cost of carrying the not overheard info for the other session.
8 Wang, ISIT 2011 p. 3/15 The Capacity Region for M = 2 Assume round-based schemes, and p r;d1 p r;d2 > 0. The capacity region for M = 2, [W, Asilomar 09]: s R 1 min ( r avail. slots min inter. p s1 ;r, p r;1 (R 2 p s2 ;1) +) ( R 2 min p s2 ;r, p r;2 p ) r;2 (R 1 p s1 ;2) + p r;1 Transmit all info from s i to r. The cost of carrying the not overheard info for the other session.
9 Wang, ISIT 2011 p. 3/15 The Capacity Region for M = 2 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info. Assume round-based schemes, and p r;d1 p r;d2 > 0. The capacity region for M = 2, [W, Asilomar 09]: s R 1 min ( r avail. slots min inter. p s1 ;r, p r;1 (R 2 p s2 ;1) +) ( R 2 min p s2 ;r, p r;2 p ) r;2 (R 1 p s1 ;2) + p r;1 Transmit all info from s i to r. The cost of carrying the not overheard info for the other session.
10 A Competing Technique Wang, ISIT 2011 p. 4/15
11 A Competing Technique Wang, ISIT 2011 p. 4/15
12 Wang, ISIT 2011 p. 4/15 A Competing Technique Opportunistic Routing: Allow d 1 to directly hear from s 1. [Chachulski et al. 07]. No (intersession) coding at relay.
13 Wang, ISIT 2011 p. 4/15 A Competing Technique Opportunistic Routing: Allow d 1 to directly hear from s 1. [Chachulski et al. 07]. No (intersession) coding at relay. Capacity of Opp. Routing is characterized by the min-cut/max-flow theorem [Dana et al. 06]. R 1 min(p s1 ;{r or d 1 }, p s1 ;r + p s1 ;d 1 ).
14 Wang, ISIT 2011 p. 4/15 A Competing Technique Opportunistic Routing: Allow d 1 to directly hear from s 1. [Chachulski et al. 07]. No (intersession) coding at relay. Capacity of Opp. Routing is characterized by the min-cut/max-flow theorem [Dana et al. 06]. R 1 min(p s1 ;{r or d 1 }, p s1 ;r + p s1 ;d 1 ). Can we combine the benefits of Network Coding & Opportunistic Routing?
15 Wang, ISIT 2011 p. 5/15 Initial Thoughts Without direct s i d i communication: 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info.
16 Wang, ISIT 2011 p. 5/15 Initial Thoughts Without direct s i d i communication: 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info. With direct s i d i communication: We thus need p r;1, p r;2 : The CH parameters, The total # of to-be-sent symbols: The overheard info.:
17 Wang, ISIT 2011 p. 5/15 Initial Thoughts Without direct s i d i communication: 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info. With direct s i d i communication: We thus need p r;1, p r;2 : The CH parameters, The total # of to-be-sent symbols: [What r has heard] The overheard info.:
18 Wang, ISIT 2011 p. 5/15 Initial Thoughts Without direct s i d i communication: 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info. With direct s i d i communication: We thus need p r;1, p r;2 : The CH parameters, The total # of to-be-sent symbols: [What r has heard] [What r and d 1 both have heard] The overheard info.:
19 Wang, ISIT 2011 p. 5/15 Initial Thoughts Without direct s i d i communication: 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info. With direct s i d i communication: We thus need p r;1, p r;2 : The CH parameters, The total # of to-be-sent symbols: [What r has heard] [What r and d 1 both have heard] The overheard info.: [What r and d 2 have heard]
20 Initial Thoughts Without direct s i d i communication: 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info. With direct s i d i communication: We thus need p r;1, p r;2 : The CH parameters, The total # of to-be-sent symbols: [What r has heard] [What r and d 1 both have heard] The overheard info.: [What r and d 2 have heard] [What r, d 2, and d 1 all have heard] Wang, ISIT 2011 p. 5/15
21 Initial Thoughts Without direct s i d i communication: 2-Stage Scheme takes the following as input: p r;1, p r;2 : The CH parameters, nr 1, nr 2 : The total # of to-be-sent symbols, np s1 ;d 2, np s2 ;d 1 : The overheard info. With direct s i d i communication: We thus need p r;1, p r;2 : The CH parameters, The total # of to-be-sent symbols: [What r has heard] Common Info. [What r and d 1 both have heard] The overheard info.: Common Info. [What r and d 2 have heard] Common Info. [What r, d 2, and d 1 all have heard] Wang, ISIT 2011 p. 5/15
22 Initial Thoughts Without direct s i d i communication: With this motivation, this work studies the Common Info. of Random Linear Network Coding. With direct s i d i communication: We thus need p r;1, p r;2 : The CH parameters, The total # of to-be-sent symbols: [What r has heard] Common Info. [What r and d 1 both have heard] The overheard info.: Common Info. [What r and d 2 have heard] Common Info. [What r, d 2, and d 1 all have heard] Wang, ISIT 2011 p. 5/15
23 Wang, ISIT 2011 p. 6/15 Settings and Definitions Random Linear Network Coding (RLNC) N packets: W = (W 1,, W N ) (GF(q)) N. Each time t, source sends Y t = v t W T via an erasure CH. R t : The set of destinations receive the packet at time t. v t is randomly generated, but is known to all receivers.
24 Wang, ISIT 2011 p. 6/15 Settings and Definitions Random Linear Network Coding (RLNC) N packets: W = (W 1,, W N ) (GF(q)) N. Each time t, source sends Y t = v t W T via an erasure CH. R t : The set of destinations receive the packet at time t. v t is randomly generated, but is known to all receivers. Knowledge Space: Ω k = span{v t : t such that d k R t }. If Z k denotes the pkts rcv d by d k, then I(W; Z k ) = rank(ω k ).
25 Wang, ISIT 2011 p. 6/15 Settings and Definitions Random Linear Network Coding (RLNC) N packets: W = (W 1,, W N ) (GF(q)) N. Each time t, source sends Y t = v t W T via an erasure CH. R t : The set of destinations receive the packet at time t. v t is randomly generated, but is known to all receivers. Knowledge Space: Ω k = span{v t : t such that d k R t }. If Z k denotes the pkts rcv d by d k, then I(W; Z k ) = rank(ω k ). ( Kk=1 ) Common Information (CI): rank Ω k. Gács-Körner CI among Z 1 to Z K is rank ( Kk=1 Ω k ).
26 Settings and Definitions Random Linear Network Coding (RLNC) N packets: W = (W 1,, W N ) (GF(q)) N. Each time t, source sends Y t = v t W T via an erasure CH. R t : The set of destinations receive the packet at time t. v t is randomly generated, but is known to all receivers. Knowledge Space: Ω k = span{v t : t such that d k R t }. If Z k denotes the pkts rcv d by d k, then I(W; Z k ) = rank(ω k ). ( Kk=1 ) Common Information (CI): rank Ω k. Gács-Körner CI among Z 1 to Z K is rank ( Kk=1 Ω k ). Other notations: T S = { t : S Rt : The amount of time when all d k in S receive the pkt; A B = span(v : v A B). Wang, ISIT 2011 p. 6/15
27 Wang, ISIT 2011 p. 7/15 ( Kk=1 ) Our goal: Quantifying rank Ω k for all combinations of K, N, and {R t : t} assuming large GF(q). The total # of to-be-sent symbols: [What r has heard] [What r and d 1 both have heard] The overheard info.: [What r and d 2 have heard] [What r, d 2, and d 1 all have heard]
28 Wang, ISIT 2011 p. 7/15 ( Kk=1 ) Our goal: Quantifying rank Ω k for all combinations of K, N, and {R t : t} assuming large GF(q). The total (# of to-be-sent ) symbols: rank Ω [s 1] r [What r and d 1 both have heard] The overheard info.: [What r and d 2 have heard] [What r, d 2, and d 1 all have heard]
29 Wang, ISIT 2011 p. 7/15 ( Kk=1 ) Our goal: Quantifying rank Ω k for all combinations of K, N, and {R t : t} assuming large GF(q). The total (# of to-be-sent ) symbols: rank Ω [s 1] ( rank r ) Ω [s 1] r Ω [s 1] d 1 The overheard info.: [What r and d 2 have heard] [What r, d 2, and d 1 all have heard]
30 Wang, ISIT 2011 p. 7/15 ( Kk=1 ) Our goal: Quantifying rank Ω k for all combinations of K, N, and {R t : t} assuming large GF(q). The total (# of to-be-sent ) symbols: rank Ω [s 1] ( rank r ) Ω [s 1] r Ω [s 1] d 1 The overheard info.: ( ) rank Ω [s 1] r Ω [s 1] d 2 [What r, d 2, and d 1 all have heard]
31 Wang, ISIT 2011 p. 7/15 ( Kk=1 ) Our goal: Quantifying rank Ω k for all combinations of K, N, and {R t : t} assuming large GF(q). The total (# of to-be-sent ) symbols: rank Ω [s 1] ( rank r ) Ω [s 1] r Ω [s 1] d 1 The overheard ( info.: ) rank Ω [s 1] r Ω [s 1] ( d 2 rank Ω [s 1] r Ω [s 1] d 2 Ω [s 1] d 1 )
32 Wang, ISIT 2011 p. 8/15 The Main Challenge rank ( Kk=1 Ω k )
33 Wang, ISIT 2011 p. 8/15 The Main Challenge rank ( Kk=1 Ω k ) When K = 1, then rank (Ω 1 ) = min(t 1, N).
34 Wang, ISIT 2011 p. 8/15 The Main Challenge rank ( Kk=1 Ω k ) When K = 1, then rank (Ω 1 ) = min(t 1, N). When K = 2, we have rank (Ω 1 Ω 2 ) =rank (Ω 1 ) + rank (Ω 2 ) rank (Ω 1 Ω 2 ) = min(t 1, N) + min(t 2, N) min(t 1 + T 2 T {1,2}, N)
35 Wang, ISIT 2011 p. 8/15 The Main Challenge rank ( Kk=1 Ω k ) When K = 1, then rank (Ω 1 ) = min(t 1, N). When K = 2, we have rank (Ω 1 Ω 2 ) =rank (Ω 1 ) + rank (Ω 2 ) rank (Ω 1 Ω 2 ) = min(t 1, N) + min(t 2, N) min(t 1 + T 2 T {1,2}, N) Our first thought was when K = 3, we should have rank ( 3 k=1 Ω k ) = K k=1 rank (Ω k ) rank ( ) Ω i Ω j + rank (Ω1 Ω 2 Ω 3 ) i<j
36 Wang, ISIT 2011 p. 8/15 The Main Challenge rank ( Kk=1 Ω k ) When K = 1, then rank (Ω 1 ) = min(t 1, N). When K = 2, we have rank (Ω 1 Ω 2 ) =rank (Ω 1 ) + rank (Ω 2 ) rank (Ω 1 Ω 2 ) = min(t 1, N) + min(t 2, N) min(t 1 + T 2 T {1,2}, N) Our first thought was when K = 3, we should have rank ( 3 k=1 Ω k ) = K k=1 rank (Ω k ) rank ( ) Ω i Ω j + rank (Ω1 Ω 2 Ω 3 ) i<j DOES NOT HOLD!! An example is provided in the paper.
37 Wang, ISIT 2011 p. 9/15 Main Result A partition of {1,, K} is a collection of disjoint subsets {S m } = {S 1, S 2,, S M } such that M m=1 S m = {1,, K}. Theorem 1 Define ( ) + = max(, 0). For any receiving sets {R t : t}, with sufficiently large GF(q) we have ( ) { } K M rank Ω k = max N (N T Sm ) + : partition {S m } m=1 k=1.
38 Wang, ISIT 2011 p. 10/15 Proof of A Simplified Example We prove a degenerate case in this presentation. Assume N max k [K] T k S [K], ( k S ( Kk=1 ) We will prove that rank Ω k T k ) ( S 1)N T S. = K k=1 T k (K 1)N.
39 Proof of A Simplified Example We prove a degenerate case in this presentation. Assume N max k [K] T k S [K], ( k S ( Kk=1 ) We will prove that rank Ω k T k ) ( S 1)N T S. = K k=1 T k (K 1)N. An illustrative example w. K = 3: N = 5 dimensional vector space. 7 vectors with reception status 001, 010, 011, 100, 101, 110, 111. T 1 = T 2 = T 3 = 4, T {1,2} = T {1,3} = T {2,3} = 2, and T {1,2,3} = 1. Wang, ISIT 2011 p. 10/15
40 Proof of A Simplified Example We prove a degenerate case in this presentation. Assume N max k [K] T k S [K], ( k S ( Kk=1 ) We will prove that rank Ω k T k ) ( S 1)N T S. = K k=1 T k (K 1)N. ( 3k=1 ) An illustrative example w. K = 3: We will prove rank Ω k = N = 5 dimensional vector space (3 1) 5 = 2. 7 vectors with reception status 001, 010, 011, 100, 101, 110, 111. T 1 = T 2 = T 3 = 4, T {1,2} = T {1,3} = T {2,3} = 2, and T {1,2,3} = 1. Wang, ISIT 2011 p. 10/15
41 Proof (Cont d) Wang, ISIT 2011 p. 11/15
42 Proof (Cont d) Wang, ISIT 2011 p. 11/15
43 Proof (Cont d) Wang, ISIT 2011 p. 11/15
44 Proof (Cont d) Wang, ISIT 2011 p. 11/15
45 Proof (Cont d) Wang, ISIT 2011 p. 11/15
46 Proof (Cont d) Wang, ISIT 2011 p. 11/15
47 Proof (Cont d) Wang, ISIT 2011 p. 11/15
48 Proof (Cont d) Wang, ISIT 2011 p. 11/15
49 Proof (Cont d) Wang, ISIT 2011 p. 11/15
50 Proof (Cont d) Wang, ISIT 2011 p. 11/15
51 Proof (Cont d) Wang, ISIT 2011 p. 11/15
52 Proof (Cont d) Wang, ISIT 2011 p. 11/15
53 Proof (Cont d) Wang, ISIT 2011 p. 11/15
54 Proof (Cont d) Wang, ISIT 2011 p. 11/15
55 Proof (Cont d) Wang, ISIT 2011 p. 11/15
56 Proof (Cont d) Wang, ISIT 2011 p. 11/15
57 Proof (Cont d) Wang, ISIT 2011 p. 11/15
58 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5.
59 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5.
60 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond.
61 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned
62 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned
63 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned Fully Intersected Cond.
64 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned Fully Spanned Fully Intersected Cond.
65 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned Fully Spanned Fully Intersected Cond.
66 Wang, ISIT 2011 p. 12/15 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned Fully Spanned Fully Intersected Cond. then for almost all rand. choices of the 7 vectors, rank((ω 1 Ω 2 ) Ω 3 ) = 5.
67 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. Fully Spanned Cond. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned Fully Spanned Fully Intersected Cond. then for almost all rand. choices of the 7 vectors, rank((ω 1 Ω 2 ) Ω 3 ) = 5. The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Wang, ISIT 2011 p. 12/15
68 Proof (Cont d) [Koetter et al. 03, Ho et al. 06]: If we can find deterministically 7 vectors s.t. It does not matter how we choose v 1, v 2, v 3, plus 7, Fully Spanned Cond. and in what order we construct the vectors. then for almost all random choices of the 7 vectors, rank(ω 1 Ω 2 ) = 5. Any deterministic construction will suffice! The rank problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned Cond. [New]: If we can find deterministically 10 vectors: v 1, v 2, v 3, plus 7, s.t. Fully Spanned Fully Spanned Fully Intersected Cond. then for almost all rand. choices of the 7 vectors, rank((ω 1 Ω 2 ) Ω 3 ) = 5. The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Wang, ISIT 2011 p. 12/15
69 A Deterministic Assignment Wang, ISIT 2011 p. 13/15
70 A Deterministic Assignment Wang, ISIT 2011 p. 13/15
71 A Deterministic Assignment Wang, ISIT 2011 p. 13/15
72 A Deterministic Assignment Wang, ISIT 2011 p. 13/15
73 A Deterministic Assignment Wang, ISIT 2011 p. 13/15
74 A Deterministic Assignment Wang, ISIT 2011 p. 13/15
75 A Deterministic Assignment Wang, ISIT 2011 p. 13/15
76 A Deterministic Assignment Wang, ISIT 2011 p. 13/15
77 A Deterministic Assignment Wang, ISIT 2011 p. 13/15
78 A Deterministic Assignment Wang, ISIT 2011 p. 13/15
79 A Deterministic Assignment Wang, ISIT 2011 p. 13/15
80 Wang, ISIT 2011 p. 14/15 Intuition of the FS and FI Conds. The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Let x denote the input coding vectors and the local mixing kernels. Then in RLNC, each message along an edge has the form of M = ( f 1 (x), f 2 (x),, f N (x)) where f i (x) are polynomials of x. [Koetter et al. 03].
81 Wang, ISIT 2011 p. 14/15 Intuition of the FS and FI Conds. The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Let x denote the input coding vectors and the local mixing kernels. Then in RLNC, each message along an edge has the form of M = ( f 1 (x), f 2 (x),, f N (x)) where f i (x) are polynomials of x. [Koetter et al. 03]. When constructing the basis vectors of k Ω k, we need to solve linear equations (i.e., being in( all marginal spaces), which results in the form f1 (x) v = g 1 (x), f 2(x) g 2 (x),, f ) N(x). g N (x)
82 Wang, ISIT 2011 p. 14/15 Intuition of the FS and FI Conds. The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Let x denote the input coding vectors and the local mixing kernels. Then in RLNC, each message along an edge has the form of M = ( f 1 (x), f 2 (x),, f N (x)) where f i (x) are polynomials of x. [Koetter et al. 03]. When constructing the basis vectors of k Ω k, we need to solve linear equations (i.e., being in( all marginal spaces), which results in the form f1 (x) v = g 1 (x), f 2(x) g 2 (x),, f ) N(x). g N (x) [Fully Intersected] associates a deterministic x 0 assignment with the corresponding fractional expressions; [Fully Spanned] guarantees both g n (x) and det ([v i ]) are non-zero.
83 Wang, ISIT 2011 p. 15/15 Conclusion & Future Works The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds.
84 Wang, ISIT 2011 p. 15/15 Conclusion & Future Works The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Main Results rank ( K k=1 Ω k ) = max { N } M (N T Sm ) + : partition {S m }. m=1
85 Wang, ISIT 2011 p. 15/15 Conclusion & Future Works The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Main Results rank ( K k=1 Ω k ) = max { N } M (N T Sm ) + : partition {S m }. m=1 Main motivation: The total (# of to-be-sent ) symbols: rank Ω [s 1] ( rank r ) Ω [s 1] r Ω [s 1] d 1 The overheard ( info.: ) rank Ω [s 1] r Ω [s 1] ( d 2 rank Ω [s 1] r Ω [s 1] d 2 Ω [s 1] d 1 )
86 Conclusion & Future Works The Common Info. problem of RLNC is reduced to finding a deterministic assignment satisfying the Fully Spanned and Fully Intersected Conds. Main Results rank ( K k=1 Ω k ) = max { N } M (N T Sm ) + : partition {S m }. m=1 Main motivation: The total (# of to-be-sent ) symbols: rank Ω [s 1] ( rank r ) Ω [s 1] r Ω [s 1] d 1 The overheard ( info.: ) rank Ω [s 1] r Ω [s 1] ( d 2 rank Ω [s 1] r Ω [s 1] d 2 Ω [s 1] d 1 ) Future works: (i) Arbitrary combinations: Ex: (Ω 1 Ω 2 ) Ω 3. (ii) Common Information of RLNC over multi-hop networks. Wang, ISIT 2011 p. 15/15
On the Capacity of Wireless 1-Hop Intersession Network Coding A Broadcast Packet Erasure Channel Approach
1 On the Capacity of Wireless 1-Hop Intersession Networ Coding A Broadcast Pacet Erasure Channel Approach Chih-Chun Wang, Member, IEEE Abstract Motivated by practical wireless networ protocols, this paper
More informationCapacity of 1-to-K Broadcast Packet Erasure Channels with Channel Output Feedback
Capacity of 1-to-K Broadcast Packet Erasure Channels with Channel Output Feedback Chih-Chun Wang Center of Wireless Systems and Applications (CWSA School of Electrical and Computer Engineering, Purdue
More informationLocal network coding on packet erasure channels -- From Shannon capacity to stability region
Purdue University Purdue e-pubs Open Access Dissertations Theses and Dissertations Spring 2015 Local network coding on packet erasure channels -- From Shannon capacity to stability region Wei-Chung Wang
More informationRandom Linear Intersession Network Coding With Selective Cancelling
2009 IEEE Information Theory Workshop Random Linear Intersession Network Coding With Selective Cancelling Chih-Chun Wang Center of Wireless Systems and Applications (CWSA) School of ECE, Purdue University
More informationLOCAL NETWORK CODING ON PACKET ERASURE CHANNELS FROM SHANNON CAPACITY TO STABILITY REGION. A Preliminary Report. Submitted to the Faculty
LOCAL NETWORK CODING ON PACKET ERASURE CHANNELS FROM SHANNON CAPACITY TO STABILITY REGION A Preliminary Report Submitted to the Faculty of Purdue University by Wei-Cheng Kuo In Partial Fulfillment of the
More informationInterference, Cooperation and Connectivity A Degrees of Freedom Perspective
Interference, Cooperation and Connectivity A Degrees of Freedom Perspective Chenwei Wang, Syed A. Jafar, Shlomo Shamai (Shitz) and Michele Wigger EECS Dept., University of California Irvine, Irvine, CA,
More informationOn queueing in coded networks queue size follows degrees of freedom
On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,
More informationSecrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View
Secrecy in the 2-User Symmetric Interference Channel with Transmitter Cooperation: Deterministic View P. Mohapatra 9 th March 2013 Outline Motivation Problem statement Achievable scheme 1 Weak interference
More informationHalf-Duplex Gaussian Relay Networks with Interference Processing Relays
Half-Duplex Gaussian Relay Networks with Interference Processing Relays Bama Muthuramalingam Srikrishna Bhashyam Andrew Thangaraj Department of Electrical Engineering Indian Institute of Technology Madras
More informationCooperative HARQ with Poisson Interference and Opportunistic Routing
Cooperative HARQ with Poisson Interference and Opportunistic Routing Amogh Rajanna & Mostafa Kaveh Department of Electrical and Computer Engineering University of Minnesota, Minneapolis, MN USA. Outline
More informationInter-Session Network Coding Schemes for 1-to-2 Downlink Access-Point Networks with Sequential Hard Deadline Constraints
Inter-Session Network Coding Schemes for -to- Downlink Access-Point Networks with Sequential Hard Deadline Constraints Xiaohang Li, Chih-Chun Wang, and Xiaojun Lin Center for Wireless Systems and Applications,
More informationEvent-triggered stabilization of linear systems under channel blackouts
Event-triggered stabilization of linear systems under channel blackouts Pavankumar Tallapragada, Massimo Franceschetti & Jorge Cortés Allerton Conference, 30 Sept. 2015 Acknowledgements: National Science
More informationWeakly Secure Data Exchange with Generalized Reed Solomon Codes
Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,
More informationOn the Capacity of the Interference Channel with a Relay
On the Capacity of the Interference Channel with a Relay Ivana Marić, Ron Dabora and Andrea Goldsmith Stanford University, Stanford, CA {ivanam,ron,andrea}@wsl.stanford.edu Abstract Capacity gains due
More informationContinuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks
Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer
More informationBeyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions
Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Chih-Chun Wang Center for Wireless Systems and Applications (CWSA) School of
More informationCERIAS Tech Report Analysis and Design of Intersession Network Coding in Communication Networks by Abdallah Khreishah Center for Education
CERIAS Tech Report 2010-33 Analysis and Design of Intersession Network Coding in Communication Networks by Abdallah Khreishah Center for Education and Research Information Assurance and Security Purdue
More informationGeneralized Network Sharing Outer Bound and the Two-Unicast Problem
Generalized Network Sharing Outer Bound and the Two-Unicast Problem Sudeep U. Kamath, David N. C. Tse and Venkat Anantharam Wireless Foundations, Dept of EECS, University of California at Berkeley, Berkeley,
More informationSecure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel
Secure Degrees of Freedom of the MIMO Multiple Access Wiretap Channel Pritam Mukherjee Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 074 pritamm@umd.edu
More informationThe Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedback
IEEE TRANSACTIONS ON INFORMATION THEORY, ONLINE PREPRINT 2014 1 The Capacity Region of 2-Receiver Multiple-Input Broadcast Packet Erasure Channels with Channel Output Feedack Chih-Chun Wang, Memer, IEEE,
More informationNetwork Error Correction From Matrix Network Coding
Network Error Correction From Matrix Network Coding Kwang Taik Kim Communication and Networking Group, Samsung Advanced Institute of Technology Yongin, Republic of Korea Email: kwangtaik.kim@samsung.com
More informationEquivalence for Networks with Adversarial State
Equivalence for Networks with Adversarial State Oliver Kosut Department of Electrical, Computer and Energy Engineering Arizona State University Tempe, AZ 85287 Email: okosut@asu.edu Jörg Kliewer Department
More informationRandom Access: An Information-Theoretic Perspective
Random Access: An Information-Theoretic Perspective Paolo Minero, Massimo Franceschetti, and David N. C. Tse Abstract This paper considers a random access system where each sender can be in two modes of
More informationII. THE TWO-WAY TWO-RELAY CHANNEL
An Achievable Rate Region for the Two-Way Two-Relay Channel Jonathan Ponniah Liang-Liang Xie Department of Electrical Computer Engineering, University of Waterloo, Canada Abstract We propose an achievable
More informationCapacity Region of the Permutation Channel
Capacity Region of the Permutation Channel John MacLaren Walsh and Steven Weber Abstract We discuss the capacity region of a degraded broadcast channel (DBC) formed from a channel that randomly permutes
More informationMessage Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs
01 7th International ICST Conference on Communications and Networking in China (CHINACOM) Message Delivery Probability of Two-Hop Relay with Erasure Coding in MANETs Jiajia Liu Tohoku University Sendai,
More informationDEDI: A Framework for Analyzing Rank Evolution of Random Network Coding in a Wireless Network
DEDI: A Framework for Analyzing Rank Evolution of Random Network Coding in a Wireless Network Dan Zhang Narayan Mandayam and Shyam Parekh WINLAB, Rutgers University 671 Route 1 South, North Brunswick,
More informationAn Ins t Ins an t t an Primer
An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,
More informationLecture 8: MIMO Architectures (II) Theoretical Foundations of Wireless Communications 1. Overview. Ragnar Thobaben CommTh/EES/KTH
MIMO : MIMO Theoretical Foundations of Wireless Communications 1 Wednesday, May 25, 2016 09:15-12:00, SIP 1 Textbook: D. Tse and P. Viswanath, Fundamentals of Wireless Communication 1 / 20 Overview MIMO
More informationGroup Secret Key Agreement over State-Dependent Wireless Broadcast Channels
Group Secret Key Agreement over State-Dependent Wireless Broadcast Channels Mahdi Jafari Siavoshani Sharif University of Technology, Iran Shaunak Mishra, Suhas Diggavi, Christina Fragouli Institute of
More informationOnline Scheduling for Energy Harvesting Broadcast Channels with Finite Battery
Online Scheduling for Energy Harvesting Broadcast Channels with Finite Battery Abdulrahman Baknina Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park,
More informationMulticast Packing for Coding across Multiple Unicasts
Multicast Packing for Coding across Multiple Unicasts Chun Meng INC, CUHK & EECS, UC Irvine cmeng1@uci.edu Hulya Seferoglu LIDS, MIT hseferog@mit.edu Athina Markopoulou EECS, UC Irvine athina@uci.edu Kenneth
More informationRepresentation of Correlated Sources into Graphs for Transmission over Broadcast Channels
Representation of Correlated s into Graphs for Transmission over Broadcast s Suhan Choi Department of Electrical Eng. and Computer Science University of Michigan, Ann Arbor, MI 80, USA Email: suhanc@eecs.umich.edu
More informationInformation in Aloha Networks
Achieving Proportional Fairness using Local Information in Aloha Networks Koushik Kar, Saswati Sarkar, Leandros Tassiulas Abstract We address the problem of attaining proportionally fair rates using Aloha
More informationLinear Codes, Target Function Classes, and Network Computing Capacity
Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:
More informationSecret Key Agreement Using Asymmetry in Channel State Knowledge
Secret Key Agreement Using Asymmetry in Channel State Knowledge Ashish Khisti Deutsche Telekom Inc. R&D Lab USA Los Altos, CA, 94040 Email: ashish.khisti@telekom.com Suhas Diggavi LICOS, EFL Lausanne,
More informationA Polynomial-Time Algorithm for Pliable Index Coding
1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n
More informationGraph-Theoretic Characterization of The Feasibility of The Precoding-Based 3-Unicast Interference Alignment Scheme
1 Graph-Theoretic Characterization of The Feasibility of The Precoding-Based 3-Unicast Interference Alignment Scheme arxiv:1305.0503v1 [cs.it] 2 May 2013 Jaemin Han, Chih-Chun Wang Center of Wireless Systems
More informationComputing and Communicating Functions over Sensor Networks
Computing and Communicating Functions over Sensor Networks Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University solmaz.t@drexel.edu Advisor: Dr. John M. Walsh 1/35 1 Refrences [1]
More informationHDR - A Hysteresis-Driven Routing Algorithm for Energy Harvesting Tag Networks
HDR - A Hysteresis-Driven Routing Algorithm for Energy Harvesting Tag Networks Adrian Segall arxiv:1512.06997v1 [cs.ni] 22 Dec 2015 March 12, 2018 Abstract The work contains a first attempt to treat the
More informationGraph-based Codes for Quantize-Map-and-Forward Relaying
20 IEEE Information Theory Workshop Graph-based Codes for Quantize-Map-and-Forward Relaying Ayan Sengupta, Siddhartha Brahma, Ayfer Özgür, Christina Fragouli and Suhas Diggavi EPFL, Switzerland, UCLA,
More informationReverse Edge Cut-Set Bounds for Secure Network Coding
Reverse Edge Cut-Set Bounds for Secure Network Coding Wentao Huang and Tracey Ho California Institute of Technology Michael Langberg University at Buffalo, SUNY Joerg Kliewer New Jersey Institute of Technology
More informationOn Secure Index Coding with Side Information
On Secure Index Coding with Side Information Son Hoang Dau Division of Mathematical Sciences School of Phys. and Math. Sciences Nanyang Technological University 21 Nanyang Link, Singapore 637371 Email:
More informationDecodability Analysis of Finite Memory Random Linear Coding in Line Networks
Decodability Analysis of Finite Memory Random Linear Coding in Line Networks Nima Torabkhani, Faramarz Fekri School of Electrical and Computer Engineering Georgia Institute of Technology, Atlanta GA 30332,
More informationRobust Network Codes for Unicast Connections: A Case Study
Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,
More informationInterference Channel aided by an Infrastructure Relay
Interference Channel aided by an Infrastructure Relay Onur Sahin, Osvaldo Simeone, and Elza Erkip *Department of Electrical and Computer Engineering, Polytechnic Institute of New York University, Department
More informationOn the Capacity of Secure Network Coding
On the Capacity of Secure Network Coding Jon Feldman Dept. of IEOR Tal Malkin Dept. of CS Rocco A. Servedio Dept. of CS Columbia University, New York, NY {jonfeld@ieor, tal@cs, rocco@cs, cliff@ieor}.columbia.edu
More informationInterplay of security and clock synchronization"
July 13, 2010, P. R. Kumar " This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License." See http://creativecommons.org/licenses/by-nc-nd/3.0/" Interplay
More informationApproximately achieving Gaussian relay. network capacity with lattice-based QMF codes
Approximately achieving Gaussian relay 1 network capacity with lattice-based QMF codes Ayfer Özgür and Suhas Diggavi Abstract In [1], a new relaying strategy, quantize-map-and-forward QMF scheme, has been
More informationNetwork coding for resource optimization and error correction
Network coding for resource optimization and error correction Thesis by Sukwon Kim In Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy California Institute of Technology Pasadena,
More informationCognitive Multiple Access Networks
Cognitive Multiple Access Networks Natasha Devroye Email: ndevroye@deas.harvard.edu Patrick Mitran Email: mitran@deas.harvard.edu Vahid Tarokh Email: vahid@deas.harvard.edu Abstract A cognitive radio can
More informationLayered Error-Correction Codes for Real-Time Streaming over Erasure Channels
Layered Error-Correction Codes for Real-Time Streaming over Erasure Channels Ashish Khisti University of Toronto Joint Work: Ahmed Badr (Toronto), Wai-Tian Tan (Cisco), John Apostolopoulos (Cisco). Sequential
More informationQueue length analysis for multicast: Limits of performance and achievable queue length with random linear coding
Queue length analysis for multicast: Limits of performance and achievable queue length with random linear coding The MIT Faculty has made this article openly available Please share how this access benefits
More informationBroadcasting With Side Information
Department of Electrical and Computer Engineering Texas A&M Noga Alon, Avinatan Hasidim, Eyal Lubetzky, Uri Stav, Amit Weinstein, FOCS2008 Outline I shall avoid rigorous math and terminologies and be more
More informationThroughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting
Throughput-Delay Analysis of Random Linear Network Coding for Wireless Broadcasting Swapna B.T., Atilla Eryilmaz, and Ness B. Shroff Departments of ECE and CSE The Ohio State University Columbus, OH 43210
More informationECE Information theory Final (Fall 2008)
ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1
More informationInteractive Decoding of a Broadcast Message
In Proc. Allerton Conf. Commun., Contr., Computing, (Illinois), Oct. 2003 Interactive Decoding of a Broadcast Message Stark C. Draper Brendan J. Frey Frank R. Kschischang University of Toronto Toronto,
More informationBounds on Achievable Rates for General Multi-terminal Networks with Practical Constraints
Bounds on Achievable Rates for General Multi-terminal Networs with Practical Constraints Mohammad Ali Khojastepour, Ashutosh Sabharwal, and Behnaam Aazhang Department of Electrical and Computer Engineering
More informationCapacity of the Discrete Memoryless Energy Harvesting Channel with Side Information
204 IEEE International Symposium on Information Theory Capacity of the Discrete Memoryless Energy Harvesting Channel with Side Information Omur Ozel, Kaya Tutuncuoglu 2, Sennur Ulukus, and Aylin Yener
More informationK User Interference Channel with Backhaul
1 K User Interference Channel with Backhaul Cooperation: DoF vs. Backhaul Load Trade Off Borna Kananian,, Mohammad A. Maddah-Ali,, Babak H. Khalaj, Department of Electrical Engineering, Sharif University
More informationDegrees-of-Freedom for the 4-User SISO Interference Channel with Improper Signaling
Degrees-of-Freedom for the -User SISO Interference Channel with Improper Signaling C Lameiro and I Santamaría Dept of Communications Engineering University of Cantabria 9005 Santander Cantabria Spain Email:
More informationFlow-level performance of wireless data networks
Flow-level performance of wireless data networks Aleksi Penttinen Department of Communications and Networking, TKK Helsinki University of Technology CLOWN seminar 28.8.08 1/31 Outline 1. Flow-level model
More informationDiscrete Random Variables
CPSC 53 Systems Modeling and Simulation Discrete Random Variables Dr. Anirban Mahanti Department of Computer Science University of Calgary mahanti@cpsc.ucalgary.ca Random Variables A random variable is
More informationEnergy Harvesting Multiple Access Channel with Peak Temperature Constraints
Energy Harvesting Multiple Access Channel with Peak Temperature Constraints Abdulrahman Baknina, Omur Ozel 2, and Sennur Ulukus Department of Electrical and Computer Engineering, University of Maryland,
More informationStrong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach
Strong Converse Theorems for Classes of Multimessage Multicast Networks: A Rényi Divergence Approach Silas Fong (Joint work with Vincent Tan) Department of Electrical & Computer Engineering National University
More informationLecture 14 February 28
EE/Stats 376A: Information Theory Winter 07 Lecture 4 February 8 Lecturer: David Tse Scribe: Sagnik M, Vivek B 4 Outline Gaussian channel and capacity Information measures for continuous random variables
More informationCode Construction for Two-Source Interference Networks
Code Construction for Two-Source Interference Networks Elona Erez and Meir Feder Dept. of Electrical Engineering-Systems, Tel Aviv University, Tel Aviv, 69978, Israel, E-mail:{elona, meir}@eng.tau.ac.il
More informationOn Randomized Network Coding
On Randomized Network Coding Tracey Ho, Muriel Médard, Jun Shi, Michelle Effros and David R. Karger Massachusetts Institute of Technology, University of California, Los Angeles, California Institute of
More informationLecture 4 : Introduction to Low-density Parity-check Codes
Lecture 4 : Introduction to Low-density Parity-check Codes LDPC codes are a class of linear block codes with implementable decoders, which provide near-capacity performance. History: 1. LDPC codes were
More informationcs/ee/ids 143 Communication Networks
cs/ee/ids 143 Communication Networks Chapter 5 Routing Text: Walrand & Parakh, 2010 Steven Low CMS, EE, Caltech Warning These notes are not self-contained, probably not understandable, unless you also
More informationIN a wireless broadcast network, a source node distributes a
674 IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, VOL. 63, NO. 2, FEBRUARY 2014 Scheduling and Network Coding for Relay-Aided Wireless Broadcast: Optimality and Heuristic Linyu Huang, Student Member, IEEE,
More informationInformation Theory for Wireless Communications. Lecture 10 Discrete Memoryless Multiple Access Channel (DM-MAC): The Converse Theorem
Information Theory for Wireless Communications. Lecture 0 Discrete Memoryless Multiple Access Channel (DM-MAC: The Converse Theorem Instructor: Dr. Saif Khan Mohammed Scribe: Antonios Pitarokoilis I. THE
More informationMultiple Access Network Information-flow And Correction codes
Multiple Access Network Information-flow And Correction codes Hongyi Yao 1, Theodoros K. Dikaliotis, Sidharth Jaggi, Tracey Ho 1 Tsinghua University California Institute of Technology Chinese University
More informationA Comparison of Superposition Coding Schemes
A Comparison of Superposition Coding Schemes Lele Wang, Eren Şaşoğlu, Bernd Bandemer, and Young-Han Kim Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA
More informationSecret Message Capacity of Erasure Broadcast Channels with Feedback
Secret Message Capacity of Erasure Broadcast Channels with Feedback László Czap Vinod M. Prabhakaran Christina Fragouli École Polytechnique Fédérale de Lausanne, Switzerland Email: laszlo.czap vinod.prabhakaran
More informationOn Common Information and the Encoding of Sources that are Not Successively Refinable
On Common Information and the Encoding of Sources that are Not Successively Refinable Kumar Viswanatha, Emrah Akyol, Tejaswi Nanjundaswamy and Kenneth Rose ECE Department, University of California - Santa
More informationShannon s noisy-channel theorem
Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for
More informationMulticast Packing for Coding across Multiple Unicasts
Multicast Packing for Coding across Multiple Unicasts Chun Meng INC, CUHK & EECS, UC Irvine cmeng@uci.edu Athina Markopoulou EECS, UC Irvine athina@uci.edu Hulya Seferoglu LIDS, MIT hseferog@mit.edu Kenneth
More informationNetwork coding for online and dynamic networking problems. Tracey Ho Center for the Mathematics of Information California Institute of Technology
Network coding for online and dynamic networking problems Tracey Ho Center for the Mathematics of Information California Institute of Technology 1 Work done in collaboration with: Harish Viswanathan: Bell
More informationOn Network Interference Management
On Network Interference Management Aleksandar Jovičić, Hua Wang and Pramod Viswanath March 3, 2008 Abstract We study two building-block models of interference-limited wireless networks, motivated by the
More informationEfficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel
Efficient Use of Joint Source-Destination Cooperation in the Gaussian Multiple Access Channel Ahmad Abu Al Haija ECE Department, McGill University, Montreal, QC, Canada Email: ahmad.abualhaija@mail.mcgill.ca
More informationOn Multiple User Channels with State Information at the Transmitters
On Multiple User Channels with State Information at the Transmitters Styrmir Sigurjónsson and Young-Han Kim* Information Systems Laboratory Stanford University Stanford, CA 94305, USA Email: {styrmir,yhk}@stanford.edu
More informationMulti-Layer Hybrid-ARQ for an Out-of-Band Relay Channel
203 IEEE 24th International Symposium on Personal Indoor and Mobile Radio Communications: Fundamentals and PHY Track Multi-Layer Hybrid-ARQ for an Out-of-Band Relay Channel Seok-Hwan Park Osvaldo Simeone
More informationEnergy State Amplification in an Energy Harvesting Communication System
Energy State Amplification in an Energy Harvesting Communication System Omur Ozel Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 20742 omur@umd.edu
More informationRandomized Algorithms. Zhou Jun
Randomized Algorithms Zhou Jun 1 Content 13.1 Contention Resolution 13.2 Global Minimum Cut 13.3 *Random Variables and Expectation 13.4 Randomized Approximation Algorithm for MAX 3- SAT 13.6 Hashing 13.7
More informationEE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing
EE 550: Notes on Markov chains, Travel Times, and Opportunistic Routing Michael J. Neely University of Southern California http://www-bcf.usc.edu/ mjneely 1 Abstract This collection of notes provides a
More informationOn the Capacity of the Two-Hop Half-Duplex Relay Channel
On the Capacity of the Two-Hop Half-Duplex Relay Channel Nikola Zlatanov, Vahid Jamali, and Robert Schober University of British Columbia, Vancouver, Canada, and Friedrich-Alexander-University Erlangen-Nürnberg,
More informationA digital interface for Gaussian relay and interference networks: Lifting codes from the discrete superposition model
A digital interface for Gaussian relay and interference networks: Lifting codes from the discrete superposition model M. Anand, Student Member, IEEE, and P. R. Kumar, Fellow, IEEE Abstract For every Gaussian
More informationCapacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel
Capacity of All Nine Models of Channel Output Feedback for the Two-user Interference Channel Achaleshwar Sahai, Vaneet Aggarwal, Melda Yuksel and Ashutosh Sabharwal 1 Abstract arxiv:1104.4805v3 [cs.it]
More informationAsymptotics, asynchrony, and asymmetry in distributed consensus
DANCES Seminar 1 / Asymptotics, asynchrony, and asymmetry in distributed consensus Anand D. Information Theory and Applications Center University of California, San Diego 9 March 011 Joint work with Alex
More informationDecentralized Control across Bit-Limited Communication Channels: An Example
Decentralized Control across Bit-Limited Communication Channels: An Eample Ling Shi, Chih-Kai Ko, Zhipu Jin, Dennice Gayme, Vijay Gupta, Steve Waydo and Richard M. Murray Abstract We formulate a simple
More informationTrust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems
Introduction Main Results Simulation Conclusions Trust Degree Based Beamforming for Multi-Antenna Cooperative Communication Systems Mojtaba Vaezi joint work with H. Inaltekin, W. Shin, H. V. Poor, and
More informationMultiuser broadcast erasure channel with feedback capacity and algorithms
Multiuser broadcast erasure channel with feedback capacity and algorithms Marios Gatzianas, Leonidas Georgiadis, Leandros Tassiulas To cite this version: Marios Gatzianas, Leonidas Georgiadis, Leandros
More informationInstantly Decodable Network Codes for Real-Time Applications
Instantly Decodable Network Codes for Real-Time Applications Anh Le, Arash S. Tehrani +, Alexandros G. Dimakis, Athina Markopoulou {anh.le, athina}@uci.edu University of California, Irvine + arash.sabertehrani@usc.edu
More informationRadio Network Clustering from Scratch
Radio Network Clustering from Scratch Fabian Kuhn, Thomas Moscibroda, Roger Wattenhofer {kuhn,moscitho,wattenhofer}@inf.ethz.ch Department of Computer Science, ETH Zurich, 8092 Zurich, Switzerland Abstract.
More informationDistributed Reed-Solomon Codes
Distributed Reed-Solomon Codes Farzad Parvaresh f.parvaresh@eng.ui.ac.ir University of Isfahan Institute for Network Coding CUHK, Hong Kong August 216 Research interests List-decoding of algebraic codes
More informationApproximately achieving the feedback interference channel capacity with point-to-point codes
Approximately achieving the feedback interference channel capacity with point-to-point codes Joyson Sebastian*, Can Karakus*, Suhas Diggavi* Abstract Superposition codes with rate-splitting have been used
More informationApproximate Capacity of Fast Fading Interference Channels with no CSIT
Approximate Capacity of Fast Fading Interference Channels with no CSIT Joyson Sebastian, Can Karakus, Suhas Diggavi Abstract We develop a characterization of fading models, which assigns a number called
More informationGraph-based codes for flash memory
1/28 Graph-based codes for flash memory Discrete Mathematics Seminar September 3, 2013 Katie Haymaker Joint work with Professor Christine Kelley University of Nebraska-Lincoln 2/28 Outline 1 Background
More informationCapacity Theorems for Relay Channels
Capacity Theorems for Relay Channels Abbas El Gamal Department of Electrical Engineering Stanford University April, 2006 MSRI-06 Relay Channel Discrete-memoryless relay channel [vm 7] Relay Encoder Y n
More information