Bounds on Binary Locally Repairable Codes Tolerating Multiple Erasures

Size: px
Start display at page:

Download "Bounds on Binary Locally Repairable Codes Tolerating Multiple Erasures"

Transcription

1 Bounds on Binary Locay Repairabe Codes Toerating Mutipe Erasures Matthias Grezet, Ragnar Freij-Hoanti, Thomas Westerbäc, Otay Omez and Camia Hoanti Department of Mathematics and Systems Anaysis, Aato University, Finand, Emai: Department of Eectrica and Computer Engineering, Technica University of Munich, Germany, Emai: Department of Mathematics, Anara University, Turey, Emai: arxiv: v2 [cs.it] 19 Feb 2018 Abstract Recenty, ocay repairabe codes has gained significant interest for their potentia appications in distributed storage systems. However, most constructions in existence are over fieds with size that grows with the number of servers, which maes the systems computationay expensive and difficut to maintain. Here, we study inear ocay repairabe codes over the binary fied, toerating mutipe oca erasures. We derive bounds on the minimum distance on such codes, and give exampes of LRCs achieving these bounds. Our main technica toos come from matroid theory, and as a byproduct of our proofs, we show that the attice of cycic fats of a simpe binary matroid is atomic. I. INTRODUCTION In modern distributed storage systems (DSSs) faiures happen frequenty, whence decreasing the number of connections required for node repair is crucia. Removing even one connection ocay can easiy impy huge gains in the overa system functionaity, thans to shortened queues and improved data avaiabiity. Consequenty, ocay repairabe codes (LRCs) have gained a ot of interest in the past few years [1] [4]. Namey, LRCs aow to repair a sma number of faiures ocay, i.e., by ony contacting few cose-by nodes and hence avoiding congesting the system. Reated Singetontype bounds have been derived for various cases, see [5] [7]. The first bound on the minimum distance for fixed fied size was obtained by Cadambe and Mazumdar in [8]. Recenty, this bound was improved and generaized, via the observation that any og-convex bound on the oca ran of a code can be bown up to obtain a bound on the goba ran [9]. Interestingy, the bounds in [9] do not depend on the inearity of the code. However, a the bounds in [8], [9] are impicit, except for specia casses of codes. In this paper, we consider binary codes motivated by the fact that the computationa compexity when retrieving a fie or repairing a node grows with the fied size. We derive new, improved Singeton-type bounds for this specia case aongside with sporadic exampes, in particuar when the oca repair sets can toerate mutipe faiures. In contrast to the bounds in [8], [9], our bounds are expicit, and do not depend on any prior bounds on binary codes of shorter ength. As our main contribution, in Theorem 6, we obtain a cosedform bound on the minimum distance d of a binary (n, )- code of ength n and dimension and with a-symbo (r, δ)- ocaity, where the oca distance δ > 2. Such bounds were previousy ony nown when δ = 2. The bound is in terms of the ran of the repair sets, but can easiy be transformed to bounds in terms of the size r + δ 1. Interestingy, whie the two parameters r and can be assumed to agree when δ = 2, as we as when the fied size is unbounded, this is no onger the case over the binary fied with δ > 2. Whie both parameters are of independent interest in appications, we have chosen to focus on the number of nodes that need to be contacted for oca repair, rather than on the size of the oca couds 1. In addition, in Section III we prove that every eement of a non-degenerate binary ocay repairabe code without repication is contained in an atomic cycic fat, and hence that the attice of cycic fats is atomic. From a practica point of view, this impies a hierarchy of faiure toerance, as expained in the end of Section III. In particuar, whenever a symbo e fais, we can start by downoading nodes in an atomic cycic fat in order to repair e. If it turns out that some other nodes in this oca set have faied as we, we can repair them whie sti eeping the part that we aready downoaded, and simpy contact some more nodes in the corresponding repair set to repair a the faied symbos. Thus, we do not have to restart from the beginning if we find out during the repair process that a sma amount of other nodes have faied as we. Severa constructions are nown for optima LRCs over the binary fied, for specified ranges of parameters, and amost excusivey in the case δ = 2. The first such construction, for codes with exponentiay ow rate and ocaity r = 2, 3, was obtained by deeting carefuy chosen coumns from the simpex code [10]. These constructions are aso optima when taing the avaiabiity t, i.e., the number of disjoint sets that can recover a given symbo, into consideration. A sighty more fexibe famiy of codes, aowing for higher rate, was given in [11], [12], where aso a sight improvement over the Cadambe-Mazumdar bound was given for inear codes. In the ream of mutipe erasures, i.e., when δ > 2, rateoptima codes were studied in [13]. There, rate-optima codes were characterized when δ = 3, and anaogous constructions without optimaity proof were given for δ > 3. However, to the best of our nowedge, no previous wor has studied bounds on the goba minimum distance in the regime δ > 2. 1 Note that here, whie r sti essentiay bounds the size of the oca sets, we never need to contact that many nodes, since r 1 as shown in Prop. 5. From another point of view, r can be seen as a parameter describing how far one needs to go in order to repair.

2 II. PRELIMINARIES OF LRCS AND MATROIDS As is common practice, we say that C is an (n,, d)-code if it has ength n, dimension, and minimum Hamming distance d. A inear (n,, d)-code C over a finite fied F is a nondegenerate storage code if d 2 and there is no zero coumn in a generator matrix of C. To study LRCs in more detai, we consider punctured codes C Y, where Y [n] is a set of coordinates of the code C. For a fixed code C, we denote by d Y the minimum Hamming distance of the punctured code C Y. Definition 1. Let C be an (n,, d)-code over F n. A symbo x [n] has ocaity (r, δ) if there exists a subset R of [n], caed repair set of x, such that x R, R r + δ 1, and d R δ. Definition 2. A inear (n,, d, r, δ)-lrc over a finite fied F n is a non-degenerate inear (n,, d)-code C over F n such that every coordinate x [n] has ocaity (r, δ). In the iterature, this is specificay caed a-symbo ocaity. The parameters (n,, d, r, δ) can immediatey be defined and studied for matroids in genera, as in [2], [14], [15]. A. Matroid fundamentas Matroids have many equivaent definitions in the iterature. Here, we choose to present matroids via their ran functions. Much of the contents in this section can be found in more detai in [16]. Definition 3. A (finite) matroid M = (E, ρ) is a finite set E together with a ran function ρ : 2 E Z such that for a subsets X, Y E (R.1) 0 ρ(x) X, (R.2) X Y ρ(x) ρ(y ), (R.3) ρ(x) + ρ(y ) ρ(x Y ) + ρ(x Y ). A subset X E is caed independent if ρ(x) = X. If X is independent and ρ(x) = ρ(e), then X is caed a basis. A subset that is not independent is caed dependent. A circuit is a minima dependent subset of E, that is, a dependent set whose proper subsets are a independent. Strongy reated to the ran function is the nuity function η : 2 E Z, defined by η(x) = X ρ(x) for X E. Any matrix G over a fied F generates a matroid M G = (E, ρ), where E is the set of coumns of G, and ρ(x) is the ran of G(X) over F, where G(X) denotes the submatrix of G formed by the coumns indexed by X. As eementary row operations preserve the row space of G(X) for a X E, it foows that row-equivaent matrices generate the same matroid. Thus, there is a straightforward connection between inear codes and matroids. Let C be a inear code over a fied F. Then any two different generator matrices of C wi have the same row space by definition, so they wi generate the same matroid. Therefore, without any inconsistency, we can denote the matroid associated to these generator matrices by M C = (E, ρ C ). The ran function ρ C can be defined directy from the code without referring to a generator matrix, via ρ C (X) = dim(c X) for X E. One way of defining a new matroid from an existing one is obtained by restricting the matroid to one of its subsets. For a given set X E, we define the restriction of M to X to be the matroid M X = (X, ρ X ) by ρ X (Y ) = ρ(y ) for a subsets Y X. Two matroids M 1 = (E 1, ρ 1 ) and M 2 = (E 2, ρ 2 ) are isomorphic if there exists a bijection ψ : E 1 E 2 such that ρ 2 (ψ(x)) = ρ 1 (X) for a subsets X E 1. Definition 4. A matroid that is isomorphic to M G for some matrix G over F is said to be representabe over F. We aso say that such a matroid is F-representabe. A binary matroid is a matroid that is F 2 -representabe. By the Critica Theorem [17], the matroid M C determines the supports of a inear code C. Consequenty, since binary codes are determined uniquey by the support of the codewords, binary matroids are in one-to-one correspondence with binary codes. This is in sharp contrast to inear codes over arger fieds, where many interesting properties are not determined by the associated matroid. An important exampe of such a property is the covering radius [18]. Definition 5. A matroid is caed simpe if if has no circuits consisting of 1 or 2 eements. A eement e E is caed a co-oop if ρ(e e) < ρ(e). B. Fundamentas on cycic fats The main too from matroid theory in this paper are the cycic fats. We wi define them using the cosure and cycic operators. Let M = (E, ρ) be a matroid. The cosure operator c : 2 E 2 E and cycic operator cyc : 2 E 2 E are defined by (i) (ii) c(x) = X {e E X : ρ(x e) = ρ(x)}, cyc(x) = {e X : ρ(x e) = ρ(x)}. A subset X E is a fat if c(x) = X and a cycic set if cyc(x) = X. Therefore, X is a cycic fat if ρ(x y) > ρ(x) and ρ(x x) = ρ(x) for a y E X and x X. The coection of fats, cycic sets, and cycic fats of M are denoted by F(M), U(M), and Z(M), respectivey. Some more fundamenta properties of fats, cycic sets, and cycic fats are given in [19]. The cycic fats of a inear code C of F E can be described as sets X E such that C (X y) > C X and C (X x) = C X for a y E X and x X. Before going deeper in the study of Z(M), we need a minimum bacground on poset and attice theory. We wi use the standard notation of and for the meet and join operator, we wi denote by 0 L and 1 L the bottom and top eement of a attice L, and we wi denote by the covering

3 reation, i.e., for X, Y (L, ), we say that X Y if X < Y and there is no Z L with X < Z < Y. The atoms and coatoms of a attice (L, ) are defined as A L = {X L \ 0 L : Y L such that 0 L Y X}, coa L = {X L \ 1 L : Y L such that X Y 1 L }, respectivey. A attice L is said to be atomic if every eement of L is the join of atoms. For further information about posets and attices, we refer the reader to [20]. We can now give a crucia property of the set of cycic fats. Proposition 1 (See [19]). Let M = (E, ρ) be a matroid. Then 1) (Z(M), ) is a attice with X Y = c(x Y ) and X Y = cyc(x Y ). 2) 1 Z = cyc(e) and 0 Z = c( ). C. Reation between LRCs and the attice of cycic fats Recenty, some wor has been done to emphasise the reation between cycic fats and inear codes over finite fieds. In [14], the authors proved that the minimum distance can be expressed in terms of the nuity of certain cycic fats: Proposition 2. Let C be a non-degenerate (n,, d)-code and M = (E, ρ) the matroid associated to C. Then, d = η(e) + 1 max{η(z) : Z Z(M) {E}}. Moreover, [21] gives us necessary conditions on the structure of the attice of cycic fats when the code and hence the matroid are binary. The ey resuts from [21] are the foowing proposition and theorem that constrain the edges of the associated Hasse diagram. Proposition 3 ( [21]). Let M = (E, ρ) be a binary matroid. Then, every X, Y Z(M) with X Y satisfy exacty one of the foowing: ρ(y ) ρ(x) = > 1 and η(y ) η(x) = 1. We ca such an edge in the Hasse diagram of Z(M) a ran edge and abe it ρ =. ρ(y ) ρ(x) = 1 and η(y ) η(x) = > 1. We ca such an edge a nuity edge and abe it η =. ρ(y ) ρ(x) = 1 and η(y ) η(x) = 1. We ca such an edge a eementary edge. Theorem 1 (Announced in [21]). Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with d > 2 and without repication. Let M = (E, ρ) be the associated matroid. Then Z = Z(M) satisfies the foowing: 1) and E are cycic fats. 2) Every covering reation Z E is a nuity edge abeed with a number d 1. 3) If δ = 2, then for every i E, there is X Z with i X such that ρ(x) r. 4) If δ > 2, then for every i E, there is X Z with i X such that a) Every covering reation Y X is a nuity edge abeed with a number δ 1. b) Every cycic fat Y with Y X has ran r 2. Proof. From non-degeneracy, it foows that and E are cycic fats. If Z E, then by Proposition 2, d η(e) + 1 η(z). As d > 2, this means that 1 < d 1 η(e) η(z), so Z E is a nuity edge. This proves 1) and 2). Now for every i E, there is R E with i R, d R δ and R δ + 1 r. In particuar, when δ > 1, R must be a cycic set, and its cosure X is a cycic fat with ρ(x) = ρ(r) and d X d R δ. Now, (3) foows as ρ(x) = ρ(r) R d R + 1 R δ + 1 r. Finay, assume δ > 2 et Y X. Since d X = d R δ, it foows from 2) that Y X is a nuity edge abeed with a number δ 1. Consider now the attice Z(M R). We have 0 Z(M R) = and 1 Z(M R) = R since R is cycic. As there is no repication, ρ(r) 2 and η(r) δ 1 2 by Proposition 2. It foows from Proposition 3 that there exists a cycic fat Z c Z(M R) different from and R. Then it foows that max{η(z) : Z Z(M R) {R}} 1, η(r) = d R + max{η(z) : Z Z(M R) {R}} 1 δ, and ρ(r) = R η(r) r 1. Hence, ρ(x) r 1 and a cycic fats Y X have ran r 2. III. LATTICE STRUCTURE AND REPAIR PROPERTIES The first part of this section is devoted to understanding how restricting to binary inear codes affects the structure of the attice of cycic fats. We wi see that Proposition 3 has a strong impact on the structure of the atoms of Z, which in return infuences the whoe attice. Indeed the main resut of this section consists of proving that the attice of cycic fats has the property of being atomic. In the second part, we wi discuss the meaning of these resuts for binary inear codes and LRCs. In particuar, we wi see that every non-degenerate binary inear (n,, d)-code without repication is aready a binary inear (n,, d, r, 2)- LRC for a certain r. Furthermore, for LRCs with δ > 2, we wi see that these codes have a hierarchy in faiure toerance. A. Structura properties of the attice of cycic fats We wi first begin by the reation between binary inear codes and the associated matroid. The foowing proposition is a reformuation of Proposition 8 in [14] together with the easy observation that, in a binary inear code, two symbos are dependent if and ony if they are equa. Proposition 4. Let C be a binary inear (n,, d)-code. Then C is non-degenerate with no repication if and ony if the associated matroid M = (E, ρ) is simpe and contains no co-oops. Now that we have estabish the type of matroids that is reveant to our case, we can study the impications of

4 Proposition 3 for the attice of cycic fats. We begin by an immediate consequence on the atoms of Z(M). Lemma 1. Let M = (E, ρ) be a simpe binary matroid. Then, Z is an atom of Z(M) if and ony if η(z) = 1. Proof. Since M is simpe, it guaranties that = 0 Z. Furthermore, it aso means that, for a cycic fats Z, we have ρ(z) > 1. Hence, by Proposition 3, every atom Z at wi have a ran edge, i.e., η(z at ) = 1. The next two emmas in atoms in Z(M) to certain short circuits in M. Lemma 2. Let M = (E, ρ) be a simpe binary matroid. Let C be a circuit of M. Then c(c) is an atom of Z(M) if and ony if c(c) = C. Proof. By emma 1, c(c) is an atom of Z(M) if and ony if η(c(c)) = 1. But since C is a circuit, we have η(c) = 1. Now η(c(c)) = 1 + c(c) C. Hence c(c) is an atom if and ony if c(c) = C. Lemma 3. Let M = (E, ρ) be a simpe binary matroid that contains no co-oops. Let e E and C be a circuit containing e of minima ength. Then c(c) = C. Proof. First, the existence of a circuit containing e is guaranteed by the fact that M contains no co-oops. Let C be a minimum ength circuit containing e. Now, consider a binary representation {x f } f M of M. We can express x e by a inear combination of eements {x f : f C \{e}}. Since C is a binary circuit, we wi need a eements in C \ {e} with coefficient equa to 1. Hence x e = x f. f C\{e} Assume for a contradiction there exists e c(c) C. Then x e = x f. Since M is binary and simpe, we have f D C 2 D < C. If e D, then we have found a circuit smaer than C containing e which is a contradiction to the minimaity of C. If e / D, then x e = x f + x f = x e + x f. f D f (C\{e})\D f (C\{e})\D Thus, e is in the circuit {e} {e } ((C \ {e}) \ D) with cardinaity {e } (C \ D) < C by the fact that D 2. Again, this is a contradiction to the minimaity of C. Hence c(c) = C. By combining Lemma 2 and 3, we obtain the foowing resut. Lemma 4. Let M = (E, ρ) be a simpe binary matroid that contains no co-oops. Then every eement e E is contained in an atom. Theorem 2. Let M = (E, ρ) be a simpe binary matroid that contains no co-oops. Then the attice of cycic fats Z(M) is atomic. Proof. By Lemma 4, for every e E, there exist an atom Zat e Z(M) with e Zat. e Thus, Zat e Zat e = E. e M e M For Y Z(M), we can restrict the matroid to M Y = (Y, ρ). Since Z(M Y ) = {Z : Z Y, Z Z(M)} and M Y contains no co-oops, we are bac to the previous case. Hence Y = e Y Z e at and this proves that Z(M) is atomic. Indeed, we have proven a sighty stronger property than atomicity. Namey, any eement in Z(M) is equa not ony to the join, but aso to the union of a the atoms that it contains. B. Hierarchy of faiure toerance By Proposition 4, non-degenerate binary inear (n,, d)- codes with no repication are associated with simpe binary matroids that contain no co-oops. Thus, we can reinterpret these resuts for this type of binary codes. Probaby the most significant one is Lemma 4 stating that every eement of a given matroid M is contained in some atoms, meaning that every symbo of the associated code is automaticay contained in a sma dependent set. Furthermore, by Proposition 2, the minimum distance of an atom is 2. Thus, every symbo is directy contained in a sma repair set with δ = 2, i.e., in a repair set that can correct exacty one erasure. Hence we obtain the foowing theorem. Theorem 3. For every non-degenerate binary inear (n,, d)- code C with no repication, C is aso an (n,, d, r, 2)-LRC for some r {2,..., }. Proof. Let M = (E, ρ) be the associated matroid to C. By Proposition 4, M is simpe and contains no co-oops. By Lemma 4, for a e E, there exists an atom Zat e Z(M) with e Zat. e Define r = max e E ρ(ze at). Then the coection {Zat} e gives a ocaity (r, δ = 2) to C. Indeed, by Proposition 3 and 2 we have η(zat) e = 1 and d Z e at = 2, which gives us δ = 2. For the size criterion, we have Z e at = ρ(z e at) + η(z e at) = ρ(z e at) + δ 1 max e E {ρ(ze at)} + δ 1 = r + δ 1. Now, if we want to be abe to correct more than one erasure, then the repair sets cannot be atoms of Z(M) as these have d Z = 2. They have to be at east one eve above some atoms. However, the previous theorem sti hods, meaning that for every symbo, there is aso an atom containing it. Thus, we get a natura hierarchy in faiure toerance. If one node fais, then we can contact the cose-by nodes in the atom to repair

5 it. If more nodes fai, but no more than δ 1, we can contact other repair sets to fix them. And if more than δ 1 nodes fai, then we need to use the goba properties of the code. Moreover, by the remar foowing Theorem 2, it foows that repair sets are unions of a the atoms beow them. Since the coection of repair sets contains every symbo, we can choose the coection of atoms that wi give us the (r, 2) ocaity to be inside repair sets. The foowing coroary summaries the previous observations in one statement. Coroary 1. Let C be a non-degenerate binary inear (n,, d, r, δ)-lrc with no repication and with δ > 2. Let {R i } i I be the ist of repair sets. Then, there exists a coection of sets {X j } j J such that for a X j, there exists R i with X j R i such that C is aso an (n,, d, r, 2)-LRC. From a practica point of view, this reinforces the usefuness of the faiure toerance hierarchy. For exampe, suppose that the symbo e E fais. We can start by downoading nodes in the atom Z e at in order to repair e. Now, if we reaize that some other nodes in Z e at have faied as we, we can eep the part that we aready downoaded from Z e at and contact more nodes in the corresponding repair set to repair a the faied symbos in Z e at. Thus, we do not have to restart from the beginning if we find out during the repair process that a sma amount of other nodes have faied as we. IV. IMPROVING THE SINGLETON-TYPE BOUND FOR δ > 2 The goa of this section is to improve the existing bound for non-degenerate inear (n,, d, r, δ)-codes C when the codes are binary, contain no repication and δ > 2. It has been proven in [22] that, for a inear (n,, d, r, δ)-code over F q, we have d n + 1 ( r 1 ) (δ 1) (1) Since the predominant parameter of this study wi be the ran of the repair sets instead of the size, we assume from now on that repair sets are maxima after fixing its ran or, in matroid terms, that repair sets are cycic fats. We wi denote these repair sets by Z i instead of R i to avoid confusion. Remember that Proposition 2 ins the minimum distance of a code to the coatoms among the cycic fats. So we woud ie to construct a cycic fat that is as cose as possibe to the coatoms eve to give an accurate ower bound on max{η(z) : Z Z(M) {E}}. We wi do this by creating a chain in Z(M) made of joins of repair sets and we wi ca these type of chains repair-setschain or, for short, rps-chain. Definition 6. Let C be a non-degenerate (n,, d, r, δ)-code and {Z i } i I the coection of repair sets. Let M = (E, ρ) the associated matroid. An rps-chain = Y 0 Y 1... Y m = E is a chain in Z(M) defined inductivey by 1) Let Y 0 =. 2) Given Y i 1 E, we choose x i E \ Y i 1 and Z i with x i Z i arbitrariy, and assign Y i = Y i 1 Z i. 3) If Y i = E, we set m = i. Notice that this chain is not uniquey defined since we can choose symbos and corresponding repair sets freey. Now that we have created this chain, we are interested in how the ran and the nuity can increase at each step. This wi be usefu when evauating the ran and the nuity at the end of the chain. First, we wi define a new parameter that represents the maximum ran of a repair set. Definition 7. Let C be an (n,, d, r, δ)-lrc. Let {Z i } i I be the ist of repair sets and M = (E, ρ) the associated matroid to C. We define to be := max i I ρ(z i) Lemma 5. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication and M = (E, ρ) the associated matroid. Then, every rps-chain (Y i ) m i=0 has the foowing properties. 1) ρ(y i ) ρ(y i 1 ) for a i = 1,..., m. 2) η(y i ) η(y i 1 ) δ 1 for a i = 2,..., m. Proof. Let {Z i } i I be the coection of repair sets and (Y i ) m i=0 an arbitrary rps-chain. By ran axioms, cosure property and by Proposition 5, we have ρ(y i ) ρ(y i 1 ) + ρ(z i ) ρ(y i 1 Z i ) ρ(y i 1 ) + for a i = 1,..., m. Moreover, by nuity properties coming from ran axioms and by Proposition 5, we have η(y i ) η(y i 1 Z i ) η(y i 1 ) + η(z i ) η(y i 1 Z i ) η(y i 1 ) + η(z i ) max{η(z) : Z Z(Z i ) Z i } η(y i 1 ) + d Zi 1 η(y i 1 ) + δ 1 for a i = 2,..., m. We are now ready to present the first of our main resuts, a Singeton-type bound on the parameters n,, d, and δ. This wi ater be improved in Section V. Theorem 4. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication. Then, ( ) d n 1 (δ 1). (2) Proof. Let M = M(E, ρ) be the matroid associated to C, {Z i } i I the coection of repair sets and (Y i ) m i=0 an rps-chain. Our goa is to obtain a ower bound on max{η(z) : Z Z(M) {E}} since it wi give us a upper bound for the minimum distance by Proposition 2. To do this, we wi give a ower bound on the nuity of the penutimate set in the rps-chain using Lemma 5. Indeed, we have η(y m 1 ) (m 2)(δ 1) + η(z 1 ).

6 Now, by Theorem 2, there exists an atom Z at beow Z i. Then, max{η(z) : Z Z(Z i ) Z i } η(z at ) = 1. Thus, by Proposition 2, we have η(z i ) δ 1 + max{η(z) : Z Z(Z i ) Z i } δ. (3) Hence, η(y m 1 ) (m 2)(δ 1) + δ = (m 1)(δ 1) + 1. To evauate m, we use the upper bound on the ran. We have = ρ(y m ) m m. Combining the two previous resuts, we get ( ) η(y m 1 ) 1 (δ 1) + 1. Appying this and Proposition 2, we obtain d C = n + 1 max{η(z) : Z Z(M) {E}} n + 1 η(y m 1 ) ( ) n 1 (δ 1). Even if this bound oos graphicay the same as the previous nown bound with an extra 1, the meaning is truy different since the ceiing depends on the maximum ran of the repair sets and not on the parameter r reated to the size. To iustrate this, and to mae the comparison easier, we wi give a bound on the ran with r. This wi aso aow us to give as a coroary a new version of the ast bound that ony depends on n,, d, r and δ. Proposition 5. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication. Let {Z i } i I be the coection of repair sets. Then, ρ(z i ) r 1 for a i I. In particuar, this impies that r 1. Proof. We aready saw in Equation (3) that η(z i ) δ. Now, using the definition of a repair set and the ower bound for η(z i ), we get ρ(z i ) = Z i η(z i ) r 1. We can now reformuate the bound in Theorem 4: Coroary 2. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication. Then, ( ) d n 1 (δ 1) r 1 Compared to the previous bound (1), we have improved by dropping the +1 and by repacing r by r 1. V. TOOL FOR ACHIEVING A BETTER BOUND This section is an attempt to be more precise on the evauation of rps-chains which wi ead to a further improvement in the bound. We wi first discuss about the proof of Theorem 4 and Lemma 5. The main ingredient in the previous section is the evauation of the ran and nuity difference at each step on rps-chains in Lemma 5. Indeed, if ρ(y i ) ρ(y i 1 ) =, then we must have Y i 1 Z i = and ρ(z i ) =. In particuar, the intersection condition means that η(y i ) η(y i 1 ) δ 1. Hence, there is no code nor an rps-chain that can simutaneousy achieve both bounds in Lemma 5. The idea is to introduce an indicator function that wi capture when the intersection is a coatom of a repair set. To be more concise, we wi denote by A i the event when Y i 1 Z i coa Z(M Zi). First, this is a necessary condition to have η(y i ) η(y i 1 ) = δ 1. Secondy, this wi aso impy that ρ(y i ) ρ(y i 1 ) = 1 since every covering reation of a repair set has a nuity edge. Thus, this indicator wi be abe to separate the two previous extrema cases impossibe to reach at the same time and aows us to have a more precise view of each of the chain step. Thus, the foowing emma with the new indicator is an improvement of Lemma 5. Lemma 6. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication, and et M = (E, ρ) be the associated matroid. Let {Z i } i I be the coection of repair sets and (Y i ) m i=0 an associated rps-chain. Then (Y i ) m i=0 has the foowing properties: 1) ρ(y i ) ρ(y i 1 ) ( 1)1 Ai for a i = 2,..., m. 2) η(y i ) η(y i 1 ) δ 1 Ai for a i = 2,..., m. Proof. Let i {2,..., m}. We wi begin by proving the upper bound for the ran. By ran axioms, cosure property and by Proposition 5, we have ρ(y i ) ρ(y i 1 ) ρ(z i ) ρ(y i 1 Z i ) ρ(y i 1 Z i ). When the intersection is not an coatom, we obtain the same bound as in Lemma 5. However, if Y i 1 Z i coa Z(M Zi), then, by Theorem 1.4, we have ρ(y i 1 Z i ) = ρ(z i ) 1. Thus ρ(y i ) ρ(y i 1 ) = 1. Hence, we have ρ(y i ) ρ(y i 1 ) ( 1)1 Ai. We wi now prove the ower bound for the nuity. By nuity properties coming from ran axioms, we have η(y i ) η(y i 1 ) η(z i ) η(y i 1 Z i ). If Y i 1 Z i coa Z(M Zi), then η(z i ) η(y i 1 Z i ) d Zi 1 δ 1. Thus, we obtain the same bound as in Lemma 5. However, if Y i 1 Z i / coa Z(M Zi), then it impies that η(y i 1 Z i ) max{η(z) : Z coa Z(M Zi)} 1 Therefore, = max{η(z) : Z Z(M Z i )} 1. η(z i ) η(y i 1 Z i ) d Zi δ,

7 and η(y i ) η(y i 1 ) δ 1 Ai. In order to use Lemma 6 to get a Singeton-type bound with these assumptions, we need to define a new parameter that wi count the number of times the intersection Y i 1 Z i is a coatom of Z i. Since we aso want to compare different codes, we wi focus on the proportion of atom intersections instead of the actua number of atom intersections. Definition 8. Let (Y i ) m i=0 be an rps-chain. Define 0 α 1 by αm = #{i : Y i 1 Z i coa Z(M Zi)}. We say that (Y i ) m i=0 is an rps α -chain. We can now derive a new Singeton-type bound with the extra parameter α. Theorem 5. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication. Let α [0, 1] be such that C has an rps α -chain. Then, d n δ ( 1)α (δ α) Proof. Let M = M(E, ρ) be the matroid associated to C, {Z i } i I the coection of repair sets and (Y i ) m i=0 an rps α- chain. We can use Lemma 6 to get a ower bound on m and η(y m 1 ). Now, the indicator 1 Ai = 1 exacty αm times in the rps α -chain. We first need to get a ower bound on m. We have, Thus, = ρ(y m ) (m αm) + αm = m( ( 1)α) m ( 1)α Next, we can obtain a ower bound on η(y m 1 ). We have, η(y m 1 ) δ(m 1) αm = m(δ α) δ (δ α) δ ( 1)α Finay, by Proposition 2, we obtain d n δ ( 1)α (δ α) Since the bound is vaid for a α, we can optimize α to get a bound for a type of rps-chain. Theorem 6. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication. Then, ( ) d n δ + 1 ( 1). Proof. Seect any rps-chain in C, and observe that this is an rpsᾱ-chain for some ᾱ [0, 1]. By Theorem 5, we then have d n δ (δ ᾱ) ( 1)ᾱ n δ min (δ α). α [0,1] ( 1)α For fixed vaue of h α := ( 1)α, the expression h α (δ α) is ceary minimized when α taes its argest possibe vaue, i.e.when ( 1)α = h α, so α = 1 h( 1). Now, when 0 α 1, h α can tae any integer vaue between and. So we can rewrite the bound as ( d n δ min h δ ) h Z [,] 1 + h( 1) ( = n δ min h δ ) +. h Z [,] 1 1 The coefficient of h is ceary positive, so the minimum is achieved when h =. Hence, we get the bound ( d n δ δ ) = n δ δ ( ) 1. 1 ( 1 It is straightforward to verify that the term 1 ) evauates to 1 if = 1 mod, and 0 otherwise. Thus, we can write the bound as ( ) d n δ + 1 ( 1). Now, since we have two bounds with the same assumptions, we can compare them and find the minimum of the two, to get the best bound. It turns out that the atter of the two bounds is aways at east as strong as the first one, expect when r =. In that case ony, the first bound is stronger, and the difference between the two bounds is one. Hence, we obtain the foowing goba bound. Theorem 7. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication. Then, ( ) d n δ + 1 ( 1) and (+1). (4) We can appy the bound from Proposition 5 to obtain a bound on the parameters n,, d, r and δ ony. Coroary 3. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication. Then, ( ) d n δ + 1 (r 1) ( 1) and r r 1

8 The foowing graph is a comparison of the previous nown bound (1) and the new one from Coroary 3 for two different vaues of r. We can see that the new bound is aways better than (or equivaenty, smaer) or equa to the previous bound. Fig. 1: Comparison of the previous bound and the new bound for n = 50 and δ = 3. Finay, we provide one sma exampe that achieves the bound from Coroary 3. Exampe 1. Let C be the binary inear (10, 4, 4)-code given by the foowing generator matrix: G = We can define three repair sets by their corresponding coumns in G. Z 1 = {1, 2, 3, 5, 6, 8}, Z 2 = {2, 3, 6, 7, 9, 10}, and For a i {1, 2, 3}, we have Z 3 = {1, 4, 6, 7, 8, 10}. Z i = 6, ρ(z i ) = 3, and d Zi = 3. Hence we obtain a binary inear (10, 4, 4, 4, 3)-LRC that achieves the bound from Coroary 3. First, even if this code has not the most interesting parameters, mainy because the rate of the code is under onehaf, it proves the achievabiity of the bound. Secondy, it iustrates perfecty the notion of faiure toerance hierarchy mentioned in Section III. To avoid confusion, we denote now by {c 1, c 2,..., c 10 } the set of coumns of G. Suppose that the coumn c 1 fais. Then, we can repair it by summing coumns c 2 and c 4 in the corresponding atom. If c 1 and c 2 fai, then we form a basis in the repair set Z 1 and we repair both coumns via the basis. For exampe the set {c 3, c 6, c 8 } is a basis of the first repair set Z 1, and c 1 = c 6 c 8 and c 2 = c 3 c 6. Finay, if the three coumns c 1, c 2 and c 5 fai, we use the goba correcting properties of the code. Here, we can choose the basis {c 3, c 4, c 6, c 7 } and we have c 1 = c 4 c 7, c 2 = c 3 c 6, and c 5 = c 3 c 4 c 6 c 7. The most commony used fied-dependent distance bound for LRCs is the Cadambe Mazumdar bound [8], which is ony stated without reference to the oca minimum distance (or equivaenty, for δ = 2). It can straightforwardy be generaized to codes toerating more than one oca erasure. To the best of our nowedge, this generaization has not previousy appeared in the iterature. An unfortunate confict of notation in the iterature caused an erroneous version of Proposition 6 to occur in [23, Proposition 6]. In [24], a simiar bound was presented when more than one erasure is toerated, but the system assumptions used there are quite different from those in the present paper, and hence the bounds are not directy comparabe, Proposition 6. Let C be a non-degenerate inear (n,, d, r, δ)-lrc over F q. Then, [ ] min tr + opt(n (q) t(r + δ 1), d), (5) t Z + where (q) opt(n, d) is the maximum ran of a inear code of ength n and minimum distance d over F q. However, the determination of (q) opt is a cassica open probem in coding theory. Moreover, even given a formua for opt, (q) evauating (5) may be a tedious tas. In that sense, the bound (4) is more expicit than this one. In order to compare the bounds (4) and (5) for binary codes, we choose to estimate opt in (5) via the Potin bound for binary inear codes with specific vaues of n, d, r, δ and, and denote by max the maximum dimension given by (5). Then we have, on one hand + (5) max + δ 1 ( 1) and 1 max δ 1 (max 1) and max 1 (6) and on the other hand Thm.6 + δ 1 ( 1) and 1 n d δ, (7) so the eft hand side in (6) and (7) is bounded by the minimum of the right hand sides of these inequaities. The best bound wi be the one that gives the minimum of the two aternative right hand sides. This aows for a partia but computabe comparison of (4) and (5). Using this method, we found parameters vaues for which (6) is tighter than (7) and vice-versa. In particuar, the parameters from exampe 1 achieve (7) with equaity whie it is one off in (6). This shows that for certain parameters vaues, Theorem 7 is stronger than Proposition 6. In [23], it was erroneousy caimed that Proposition 6 is aways stronger than Theorem 7, due to an error in the statement of Proposition 6. However, this wor is ony a first step toward an expicit bound for binary LRCs and further improvements can be done by expoiting the techniques deveoped in this paper, via more detaied study of the cycic fats. Such improvements can be made to give stronger versions both of Theorem 7 and of

9 Proposition 6. Due to interest of space, this is eft to an extended version of this artice. VI. CONCLUSION We have derived new expicit tradeoffs between the oca and goba minimum distances of binary ocay repairabe codes, together with an exampe of a code meeting this bound with equaity. Appications to distributed data storage were discussed, with the motivation to decrease computationa compexity thans to a sma fied size. Moreover, we demonstrated an intrinsic hierarchy of repair sets that naturay occurs for binary inear storage codes. Acnowedgment. This wor is supported in part by the Academy of Finand (grants #276031, # and # to C. Hoanti), and by the TU Munich Institute for Advanced Study, funded by the German Exceence Initiative and the EU 7th Framewor Programme (grant #291763). [18] T. Britz and C. G. Rutherford, Covering radii are not matroid invariants, Discrete Mathematics, vo. 296, pp , [19] J. E. Bonin and A. de Mier, The attice of cycic fats of a matroid, Annas of Combinatorics, vo. 12, pp , [20] R. P. Staney, Enumerative combinatorics, 2nd ed. Cambridge University Press, 2011, vo. 1. [21] M. Grezet, R. Freij-Hoanti, T. Westerbäc, and C. Hoanti, On binary matroid minors and appications to data storage over sma fieds, in Internationa Caste Meeting on Coding Theory and Appications, 2017, pp [22] G. M. Kamath, N. Praash, V. Laitha, and P. V. Kumar, Codes with oca regeneration and erasure correction, IEEE Transactions on Information Theory, vo. 60, no. 8, pp , [23] M. Grezet, R. Freij-Hoanti, T. Westerbäc, O. Omez, and C. Hoanti, Bounds on binary ocay repairabe codes toerating mutipe erasures, in Internationa Zürich Seminar on Information and Communication. IEEE/ETH, [24] A. S. Rawat, A. Mazumdar, and S. Vishwanath, Cooperative oca repair in distributed storage, EURASIP J. Adv. Signa Proc., pp. 1 17, REFERENCES [1] P. Gopaan, C. Huang, H. Simitci, and S. Yehanin, On the ocaity of codeword symbos, IEEE Transactions on Information Theory, vo. 58, no. 11, pp , [2] I. Tamo, D. Papaiiopouos, and A. Dimais, Optima ocay repairabe codes and connections to matroid theory, IEEE Transactions on Information Theory, vo. 62, pp , [3] I. Tamo and A. Barg, A famiy of optima ocay recoverabe codes, IEEE Transactions on Information Theory, vo. 60, no. 8, pp , [4] A. Wang and Z. Zhang, Repair ocaity with mutipe erasure toerance, IEEE Transactions on Information Theory, vo. 60, no. 11, pp , [5] I. Tamo, A. Barg, and A. Froov, Bounds on the parameters of ocay recoverabe codes, IEEE Transactions on Information Theory, vo. 62, no. 6, pp , [6] A. Pöänen, T. Westerbäc, R. Freij-Hoanti, and C. Hoanti, Improved singeton-type bounds for ocay repairabe codes, in Internationa Symposium on Information Theory. IEEE, 2016, pp [7] A. Wang and Z. Zhang, An integer programming-based bound for ocay repairabe codes, IEEE Transactions on Information Theory, vo. 61, no. 10, pp , [8] V. Cadambe and A. Mazumdar, An upper bound on the size of ocay recoverabe codes, in Internationa Symposium on Networ Coding, 2013, pp [9] A. Agarwa, A. Barg, S. Hu, A. Mazumdar, and I. Tamo, Combinatoria aphabet-dependent bounds for ocay repairabe codes, 2017, arxiv: [10] N. Siberstein and A. Zeh, Optima binary ocay repairabe codes via anticodes, in Internationa Symposium on Information Theory. IEEE, 2015, pp [11] P. Huang, E. Yaaobi, H. Uchiawa, and P. Siege, Cycic inear binary ocay repairabe codes, in Information Theory Worshop. IEEE, [12], Binary inear ocay repairabe codes, IEEE Transactions on Information Theory, vo. 62, pp , [13] S. Baaji, K. Prashant, and P. V. Kumar, Binary codes with ocaity for mutipe erasures having short boc ength, in Internationa Symposium on Information Theory, 2016, pp [14] T. Westerbäc, R. Freij-Hoanti, T. Ernva, and C. Hoanti, On the combinatorics of ocay repairabe codes via matroid theory, IEEE Transactions on Information Theory, vo. 62, pp , [15] R. Freij-Hoanti, T. Westerbäc, and C. Hoanti, Locay repairabe codes with avaiabiity and hierarchy: matroid theory via exampes, in Internationa Zürich Seminar on Communications (invited paper). IEEE/ETH, 2016, pp [16] R. Freij-Hoanti, C. Hoanti, and T. Westerbäc, Matroid theory and storage codes: bounds and constructions, 2017, invited boo chapter in Networ Coding and Subspace Designs, Springer, to appear. [17] H. Crapo and G. C. Rota, On the Foundations of Combinatoria Theory: Combinatoria Geometries,, preiminary edition ed. MIT Press, Cambridge, MA, London 1970.

Codes between MBR and MSR Points with Exact Repair Property

Codes between MBR and MSR Points with Exact Repair Property Codes between MBR and MSR Points with Exact Repair Property 1 Toni Ernva arxiv:1312.5106v1 [cs.it] 18 Dec 2013 Abstract In this paper distributed storage systems with exact repair are studied. A construction

More information

The Group Structure on a Smooth Tropical Cubic

The Group Structure on a Smooth Tropical Cubic The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

FRIEZE GROUPS IN R 2

FRIEZE GROUPS IN R 2 FRIEZE GROUPS IN R 2 MAXWELL STOLARSKI Abstract. Focusing on the Eucidean pane under the Pythagorean Metric, our goa is to cassify the frieze groups, discrete subgroups of the set of isometries of the

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

Partial permutation decoding for MacDonald codes

Partial permutation decoding for MacDonald codes Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Generalized Bell polynomials and the combinatorics of Poisson central moments

Generalized Bell polynomials and the combinatorics of Poisson central moments Generaized Be poynomias and the combinatorics of Poisson centra moments Nicoas Privaut Division of Mathematica Sciences Schoo of Physica and Mathematica Sciences Nanyang Technoogica University SPMS-MAS-05-43,

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

arxiv: v1 [math.fa] 23 Aug 2018

arxiv: v1 [math.fa] 23 Aug 2018 An Exact Upper Bound on the L p Lebesgue Constant and The -Rényi Entropy Power Inequaity for Integer Vaued Random Variabes arxiv:808.0773v [math.fa] 3 Aug 08 Peng Xu, Mokshay Madiman, James Mebourne Abstract

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

arxiv: v1 [math.co] 12 May 2013

arxiv: v1 [math.co] 12 May 2013 EMBEDDING CYCLES IN FINITE PLANES FELIX LAZEBNIK, KEITH E. MELLINGER, AND SCAR VEGA arxiv:1305.2646v1 [math.c] 12 May 2013 Abstract. We define and study embeddings of cyces in finite affine and projective

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

Coded Caching for Files with Distinct File Sizes

Coded Caching for Files with Distinct File Sizes Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

ORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION

ORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION J. Korean Math. Soc. 46 2009, No. 2, pp. 281 294 ORHOGONAL MLI-WAVELES FROM MARIX FACORIZAION Hongying Xiao Abstract. Accuracy of the scaing function is very crucia in waveet theory, or correspondingy,

More information

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr

More information

Theory of Generalized k-difference Operator and Its Application in Number Theory

Theory of Generalized k-difference Operator and Its Application in Number Theory Internationa Journa of Mathematica Anaysis Vo. 9, 2015, no. 19, 955-964 HIKARI Ltd, www.m-hiari.com http://dx.doi.org/10.12988/ijma.2015.5389 Theory of Generaized -Difference Operator and Its Appication

More information

C. Fourier Sine Series Overview

C. Fourier Sine Series Overview 12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a

More information

CONGRUENCES. 1. History

CONGRUENCES. 1. History CONGRUENCES HAO BILLY LEE Abstract. These are notes I created for a seminar tak, foowing the papers of On the -adic Representations and Congruences for Coefficients of Moduar Forms by Swinnerton-Dyer and

More information

Homogeneity properties of subadditive functions

Homogeneity properties of subadditive functions Annaes Mathematicae et Informaticae 32 2005 pp. 89 20. Homogeneity properties of subadditive functions Pá Burai and Árpád Száz Institute of Mathematics, University of Debrecen e-mai: buraip@math.kte.hu

More information

Pattern Frequency Sequences and Internal Zeros

Pattern Frequency Sequences and Internal Zeros Advances in Appied Mathematics 28, 395 420 (2002 doi:10.1006/aama.2001.0789, avaiabe onine at http://www.ideaibrary.com on Pattern Frequency Sequences and Interna Zeros Mikós Bóna Department of Mathematics,

More information

Nearly Optimal Constructions of PIR and Batch Codes

Nearly Optimal Constructions of PIR and Batch Codes arxiv:700706v [csit] 5 Jun 07 Neary Optima Constructions of PIR and Batch Codes Hia Asi Technion - Israe Institute of Technoogy Haifa 3000, Israe shea@cstechnionaci Abstract In this work we study two famiies

More information

On colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018

On colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018 On coorings of the Booean attice avoiding a rainbow copy of a poset arxiv:1812.09058v1 [math.co] 21 Dec 2018 Baázs Patkós Afréd Rényi Institute of Mathematics, Hungarian Academy of Scinces H-1053, Budapest,

More information

BASIC NOTIONS AND RESULTS IN TOPOLOGY. 1. Metric spaces. Sets with finite diameter are called bounded sets. For x X and r > 0 the set

BASIC NOTIONS AND RESULTS IN TOPOLOGY. 1. Metric spaces. Sets with finite diameter are called bounded sets. For x X and r > 0 the set BASIC NOTIONS AND RESULTS IN TOPOLOGY 1. Metric spaces A metric on a set X is a map d : X X R + with the properties: d(x, y) 0 and d(x, y) = 0 x = y, d(x, y) = d(y, x), d(x, y) d(x, z) + d(z, y), for a

More information

are left and right inverses of b, respectively, then: (b b 1 and b 1 = b 1 b 1 id T = b 1 b) b 1 so they are the same! r ) = (b 1 r = id S b 1 r = b 1

are left and right inverses of b, respectively, then: (b b 1 and b 1 = b 1 b 1 id T = b 1 b) b 1 so they are the same! r ) = (b 1 r = id S b 1 r = b 1 Lecture 1. The Category of Sets PCMI Summer 2015 Undergraduate Lectures on Fag Varieties Lecture 1. Some basic set theory, a moment of categorica zen, and some facts about the permutation groups on n etters.

More information

(f) is called a nearly holomorphic modular form of weight k + 2r as in [5].

(f) is called a nearly holomorphic modular form of weight k + 2r as in [5]. PRODUCTS OF NEARLY HOLOMORPHIC EIGENFORMS JEFFREY BEYERL, KEVIN JAMES, CATHERINE TRENTACOSTE, AND HUI XUE Abstract. We prove that the product of two neary hoomorphic Hece eigenforms is again a Hece eigenform

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

On the Goal Value of a Boolean Function

On the Goal Value of a Boolean Function On the Goa Vaue of a Booean Function Eric Bach Dept. of CS University of Wisconsin 1210 W. Dayton St. Madison, WI 53706 Lisa Heerstein Dept of CSE NYU Schoo of Engineering 2 Metrotech Center, 10th Foor

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

Completion. is dense in H. If V is complete, then U(V) = H.

Completion. is dense in H. If V is complete, then U(V) = H. Competion Theorem 1 (Competion) If ( V V ) is any inner product space then there exists a Hibert space ( H H ) and a map U : V H such that (i) U is 1 1 (ii) U is inear (iii) UxUy H xy V for a xy V (iv)

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence

More information

THE REACHABILITY CONES OF ESSENTIALLY NONNEGATIVE MATRICES

THE REACHABILITY CONES OF ESSENTIALLY NONNEGATIVE MATRICES THE REACHABILITY CONES OF ESSENTIALLY NONNEGATIVE MATRICES by Michae Neumann Department of Mathematics, University of Connecticut, Storrs, CT 06269 3009 and Ronad J. Stern Department of Mathematics, Concordia

More information

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC (January 8, 2003) A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC DAMIAN CLANCY, University of Liverpoo PHILIP K. POLLETT, University of Queensand Abstract

More information

Lecture Note 3: Stationary Iterative Methods

Lecture Note 3: Stationary Iterative Methods MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Agorithmic Operations Research Vo.4 (29) 49 57 Approximated MLC shape matrix decomposition with intereaf coision constraint Antje Kiese and Thomas Kainowski Institut für Mathematik, Universität Rostock,

More information

arxiv:math/ v2 [math.pr] 6 Mar 2005

arxiv:math/ v2 [math.pr] 6 Mar 2005 ASYMPTOTIC BEHAVIOR OF RANDOM HEAPS arxiv:math/0407286v2 [math.pr] 6 Mar 2005 J. BEN HOUGH Abstract. We consider a random wa W n on the ocay free group or equivaenty a signed random heap) with m generators

More information

K a,k minors in graphs of bounded tree-width *

K a,k minors in graphs of bounded tree-width * K a,k minors in graphs of bounded tree-width * Thomas Böhme Institut für Mathematik Technische Universität Imenau Imenau, Germany E-mai: tboehme@theoinf.tu-imenau.de and John Maharry Department of Mathematics

More information

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES ANDRZEJ DUDEK AND ANDRZEJ RUCIŃSKI Abstract. For positive integers k and, a k-uniform hypergraph is caed a oose path of ength, and denoted by

More information

An Exponential Lower Bound for Homogeneous Depth Four Arithmetic Formulas

An Exponential Lower Bound for Homogeneous Depth Four Arithmetic Formulas An Exponentia Lower Bound for Homogeneous Depth Four Arithmetic Formuas Neeraj Kaya Microsoft Research India neeraa@microsoft.com Chandan Saha Indian Institute of Science chandan@csa.iisc.ernet.in Nutan

More information

Restricted weak type on maximal linear and multilinear integral maps.

Restricted weak type on maximal linear and multilinear integral maps. Restricted weak type on maxima inear and mutiinear integra maps. Oscar Basco Abstract It is shown that mutiinear operators of the form T (f 1,..., f k )(x) = R K(x, y n 1,..., y k )f 1 (y 1 )...f k (y

More information

Reichenbachian Common Cause Systems

Reichenbachian Common Cause Systems Reichenbachian Common Cause Systems G. Hofer-Szabó Department of Phiosophy Technica University of Budapest e-mai: gszabo@hps.ete.hu Mikós Rédei Department of History and Phiosophy of Science Eötvös University,

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Rate-Distortion Theory of Finite Point Processes

Rate-Distortion Theory of Finite Point Processes Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

Selmer groups and Euler systems

Selmer groups and Euler systems Semer groups and Euer systems S. M.-C. 21 February 2018 1 Introduction Semer groups are a construction in Gaois cohomoogy that are cosey reated to many objects of arithmetic importance, such as cass groups

More information

Discrete Techniques. Chapter Introduction

Discrete Techniques. Chapter Introduction Chapter 3 Discrete Techniques 3. Introduction In the previous two chapters we introduced Fourier transforms of continuous functions of the periodic and non-periodic (finite energy) type, as we as various

More information

2M2. Fourier Series Prof Bill Lionheart

2M2. Fourier Series Prof Bill Lionheart M. Fourier Series Prof Bi Lionheart 1. The Fourier series of the periodic function f(x) with period has the form f(x) = a 0 + ( a n cos πnx + b n sin πnx ). Here the rea numbers a n, b n are caed the Fourier

More information

NIKOS FRANTZIKINAKIS. N n N where (Φ N) N N is any Følner sequence

NIKOS FRANTZIKINAKIS. N n N where (Φ N) N N is any Følner sequence SOME OPE PROBLEMS O MULTIPLE ERGODIC AVERAGES IKOS FRATZIKIAKIS. Probems reated to poynomia sequences In this section we give a ist of probems reated to the study of mutipe ergodic averages invoving iterates

More information

Smoothness equivalence properties of univariate subdivision schemes and their projection analogues

Smoothness equivalence properties of univariate subdivision schemes and their projection analogues Numerische Mathematik manuscript No. (wi be inserted by the editor) Smoothness equivaence properties of univariate subdivision schemes and their projection anaogues Phiipp Grohs TU Graz Institute of Geometry

More information

Biometrics Unit, 337 Warren Hall Cornell University, Ithaca, NY and. B. L. Raktoe

Biometrics Unit, 337 Warren Hall Cornell University, Ithaca, NY and. B. L. Raktoe NONISCMORPHIC CCMPLETE SETS OF ORTHOGONAL F-SQ.UARES, HADAMARD MATRICES, AND DECCMPOSITIONS OF A 2 4 DESIGN S. J. Schwager and w. T. Federer Biometrics Unit, 337 Warren Ha Corne University, Ithaca, NY

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Generalised colouring sums of graphs

Generalised colouring sums of graphs PURE MATHEMATICS RESEARCH ARTICLE Generaised coouring sums of graphs Johan Kok 1, NK Sudev * and KP Chithra 3 Received: 19 October 015 Accepted: 05 January 016 First Pubished: 09 January 016 Corresponding

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

are left and right inverses of b, respectively, then: (b b 1 and b 1 = b 1 b 1 id T = b 1 b) b 1 so they are the same! r ) = (b 1 r = id S b 1 r = b 1

are left and right inverses of b, respectively, then: (b b 1 and b 1 = b 1 b 1 id T = b 1 b) b 1 so they are the same! r ) = (b 1 r = id S b 1 r = b 1 Lecture 1. The Category of Sets PCMI Summer 2015 Undergraduate Lectures on Fag Varieties Lecture 1. Some basic set theory, a moment of categorica zen, and some facts about the permutation groups on n etters.

More information

A UNIVERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIVE ALGEBRAIC MANIFOLDS

A UNIVERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIVE ALGEBRAIC MANIFOLDS A UNIERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIE ALGEBRAIC MANIFOLDS DROR AROLIN Dedicated to M Saah Baouendi on the occasion of his 60th birthday 1 Introduction In his ceebrated

More information

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm 1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete

More information

Discrete Techniques. Chapter Introduction

Discrete Techniques. Chapter Introduction Chapter 3 Discrete Techniques 3. Introduction In the previous two chapters we introduced Fourier transforms of continuous functions of the periodic and non-periodic (finite energy) type, we as various

More information

The distribution of the number of nodes in the relative interior of the typical I-segment in homogeneous planar anisotropic STIT Tessellations

The distribution of the number of nodes in the relative interior of the typical I-segment in homogeneous planar anisotropic STIT Tessellations Comment.Math.Univ.Caroin. 51,3(21) 53 512 53 The distribution of the number of nodes in the reative interior of the typica I-segment in homogeneous panar anisotropic STIT Tesseations Christoph Thäe Abstract.

More information

Periods and Borders of Random Words

Periods and Borders of Random Words Periods and Borders of Random Words Štěpán Houb and Jeffrey Shait 2 Department of Agebra, Facuty of Mathematics and Physics, Chares University, Prague, Czech Repubic houb@karin.mff.cuni.cz 2 Schoo of Computer

More information

arxiv: v1 [cs.db] 25 Jun 2013

arxiv: v1 [cs.db] 25 Jun 2013 Communication Steps for Parae Query Processing Pau Beame, Paraschos Koutris and Dan Suciu {beame,pkoutris,suciu}@cs.washington.edu University of Washington arxiv:1306.5972v1 [cs.db] 25 Jun 2013 June 26,

More information

Linear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach

Linear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach Linear Network Coding for Mutipe Groupcast Sessions: An Interference Aignment Approach Abhik Kumar Das, Siddhartha Banerjee and Sriram Vishwanath Dept. of ECE, The University of Texas at Austin, TX, USA

More information

Mat 1501 lecture notes, penultimate installment

Mat 1501 lecture notes, penultimate installment Mat 1501 ecture notes, penutimate instament 1. bounded variation: functions of a singe variabe optiona) I beieve that we wi not actuay use the materia in this section the point is mainy to motivate the

More information

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems

Componentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems Componentwise Determination of the Interva Hu Soution for Linear Interva Parameter Systems L. V. Koev Dept. of Theoretica Eectrotechnics, Facuty of Automatics, Technica University of Sofia, 1000 Sofia,

More information

Limits on Support Recovery with Probabilistic Models: An Information-Theoretic Framework

Limits on Support Recovery with Probabilistic Models: An Information-Theoretic Framework Limits on Support Recovery with Probabiistic Modes: An Information-Theoretic Framewor Jonathan Scarett and Voan Cevher arxiv:5.744v3 cs.it 3 Aug 6 Abstract The support recovery probem consists of determining

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process

More information

Combining reaction kinetics to the multi-phase Gibbs energy calculation

Combining reaction kinetics to the multi-phase Gibbs energy calculation 7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation

More information

CHAPTER 2 AN INTRODUCTION TO WAVELET ANALYSIS

CHAPTER 2 AN INTRODUCTION TO WAVELET ANALYSIS CHAPTER 2 AN INTRODUCTION TO WAVELET ANALYSIS [This chapter is based on the ectures of Professor D.V. Pai, Department of Mathematics, Indian Institute of Technoogy Bombay, Powai, Mumbai - 400 076, India.]

More information

Construction of Supersaturated Design with Large Number of Factors by the Complementary Design Method

Construction of Supersaturated Design with Large Number of Factors by the Complementary Design Method Acta Mathematicae Appicatae Sinica, Engish Series Vo. 29, No. 2 (2013) 253 262 DOI: 10.1007/s10255-013-0214-6 http://www.appmath.com.cn & www.springerlink.com Acta Mathema cae Appicatae Sinica, Engish

More information

The Complete Hierarchical Locality of the Punctured Simplex Code

The Complete Hierarchical Locality of the Punctured Simplex Code The Complete Hierarchical Locality of the Punctured Simplex Code Matthias Grezet and Camilla Hollanti Department of Mathematics and Systems Analysis Aalto University Finland Emails: firstname.lastname@aalto.fi

More information

Continued fractions with low complexity: Transcendence measures and quadratic approximation. Yann BUGEAUD

Continued fractions with low complexity: Transcendence measures and quadratic approximation. Yann BUGEAUD Continued fractions with ow compexity: Transcendence measures and quadratic approximation Yann BUGEAUD Abstract. We estabish measures of non-quadraticity and transcendence measures for rea numbers whose

More information

How many random edges make a dense hypergraph non-2-colorable?

How many random edges make a dense hypergraph non-2-colorable? How many random edges make a dense hypergraph non--coorabe? Benny Sudakov Jan Vondrák Abstract We study a mode of random uniform hypergraphs, where a random instance is obtained by adding random edges

More information

A CLUSTERING LAW FOR SOME DISCRETE ORDER STATISTICS

A CLUSTERING LAW FOR SOME DISCRETE ORDER STATISTICS J App Prob 40, 226 241 (2003) Printed in Israe Appied Probabiity Trust 2003 A CLUSTERING LAW FOR SOME DISCRETE ORDER STATISTICS SUNDER SETHURAMAN, Iowa State University Abstract Let X 1,X 2,,X n be a sequence

More information

Another Class of Admissible Perturbations of Special Expressions

Another Class of Admissible Perturbations of Special Expressions Int. Journa of Math. Anaysis, Vo. 8, 014, no. 1, 1-8 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.1988/ijma.014.31187 Another Cass of Admissibe Perturbations of Specia Expressions Jerico B. Bacani

More information

arxiv:quant-ph/ v3 6 Jan 1995

arxiv:quant-ph/ v3 6 Jan 1995 arxiv:quant-ph/9501001v3 6 Jan 1995 Critique of proposed imit to space time measurement, based on Wigner s cocks and mirrors L. Diósi and B. Lukács KFKI Research Institute for Partice and Nucear Physics

More information

A simple reliability block diagram method for safety integrity verification

A simple reliability block diagram method for safety integrity verification Reiabiity Engineering and System Safety 92 (2007) 1267 1273 www.esevier.com/ocate/ress A simpe reiabiity bock diagram method for safety integrity verification Haitao Guo, Xianhui Yang epartment of Automation,

More information

6 Wave Equation on an Interval: Separation of Variables

6 Wave Equation on an Interval: Separation of Variables 6 Wave Equation on an Interva: Separation of Variabes 6.1 Dirichet Boundary Conditions Ref: Strauss, Chapter 4 We now use the separation of variabes technique to study the wave equation on a finite interva.

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Nonlinear Analysis of Spatial Trusses

Nonlinear Analysis of Spatial Trusses Noninear Anaysis of Spatia Trusses João Barrigó October 14 Abstract The present work addresses the noninear behavior of space trusses A formuation for geometrica noninear anaysis is presented, which incudes

More information

<C 2 2. λ 2 l. λ 1 l 1 < C 1

<C 2 2. λ 2 l. λ 1 l 1 < C 1 Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima

More information

STABLE GRAPHS BENJAMIN OYE

STABLE GRAPHS BENJAMIN OYE STABLE GRAPHS BENJAMIN OYE Abstract. In Reguarity Lemmas for Stabe Graphs [1] Maiaris and Sheah appy toos from mode theory to obtain stronger forms of Ramsey's theorem and Szemeredi's reguarity emma for

More information

More Scattering: the Partial Wave Expansion

More Scattering: the Partial Wave Expansion More Scattering: the Partia Wave Expansion Michae Fower /7/8 Pane Waves and Partia Waves We are considering the soution to Schrödinger s equation for scattering of an incoming pane wave in the z-direction

More information

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries

First-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea- Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process Management,

More information

$, (2.1) n="# #. (2.2)

$, (2.1) n=# #. (2.2) Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

Transcendence of stammering continued fractions. Yann BUGEAUD

Transcendence of stammering continued fractions. Yann BUGEAUD Transcendence of stammering continued fractions Yann BUGEAUD To the memory of Af van der Poorten Abstract. Let θ = [0; a 1, a 2,...] be an agebraic number of degree at east three. Recenty, we have estabished

More information

Degrees of orders on torsion-free Abelian groups

Degrees of orders on torsion-free Abelian groups Weesey Coege Weesey Coege Digita Schoarship and Archive Facuty Research and Schoarship 8-2013 Degrees of orders on torsion-free Abeian groups Asher M. Kach Karen Lange ange2@weesey.edu Reed Soomon Foow

More information

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE KATIE L. MAY AND MELISSA A. MITCHELL Abstract. We show how to identify the minima path network connecting three fixed points on

More information

Relaxed Highest Weight Modules from D-Modules on the Kashiwara Flag Scheme. Claude Eicher, ETH Zurich November 29, 2016

Relaxed Highest Weight Modules from D-Modules on the Kashiwara Flag Scheme. Claude Eicher, ETH Zurich November 29, 2016 Reaxed Highest Weight Modues from D-Modues on the Kashiwara Fag Scheme Caude Eicher, ETH Zurich November 29, 2016 1 Reaxed highest weight modues for ŝ 2 after Feigin, Semikhatov, Sirota,Tipunin Introduction

More information

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS ISEE 1 SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS By Yingying Fan and Jinchi Lv University of Southern Caifornia This Suppementary Materia

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

Stat 155 Game theory, Yuval Peres Fall Lectures 4,5,6

Stat 155 Game theory, Yuval Peres Fall Lectures 4,5,6 Stat 155 Game theory, Yuva Peres Fa 2004 Lectures 4,5,6 In the ast ecture, we defined N and P positions for a combinatoria game. We wi now show more formay that each starting position in a combinatoria

More information

Reliability: Theory & Applications No.3, September 2006

Reliability: Theory & Applications No.3, September 2006 REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate

More information