Bounds on Binary Locally Repairable Codes Tolerating Multiple Erasures
|
|
- Winfred West
- 5 years ago
- Views:
Transcription
1 Bounds on Binary Locay Repairabe Codes Toerating Mutipe Erasures Matthias Grezet, Ragnar Freij-Hoanti, Thomas Westerbäc, Otay Omez and Camia Hoanti Department of Mathematics and Systems Anaysis, Aato University, Finand, Emai: Department of Eectrica and Computer Engineering, Technica University of Munich, Germany, Emai: Department of Mathematics, Anara University, Turey, Emai: arxiv: v2 [cs.it] 19 Feb 2018 Abstract Recenty, ocay repairabe codes has gained significant interest for their potentia appications in distributed storage systems. However, most constructions in existence are over fieds with size that grows with the number of servers, which maes the systems computationay expensive and difficut to maintain. Here, we study inear ocay repairabe codes over the binary fied, toerating mutipe oca erasures. We derive bounds on the minimum distance on such codes, and give exampes of LRCs achieving these bounds. Our main technica toos come from matroid theory, and as a byproduct of our proofs, we show that the attice of cycic fats of a simpe binary matroid is atomic. I. INTRODUCTION In modern distributed storage systems (DSSs) faiures happen frequenty, whence decreasing the number of connections required for node repair is crucia. Removing even one connection ocay can easiy impy huge gains in the overa system functionaity, thans to shortened queues and improved data avaiabiity. Consequenty, ocay repairabe codes (LRCs) have gained a ot of interest in the past few years [1] [4]. Namey, LRCs aow to repair a sma number of faiures ocay, i.e., by ony contacting few cose-by nodes and hence avoiding congesting the system. Reated Singetontype bounds have been derived for various cases, see [5] [7]. The first bound on the minimum distance for fixed fied size was obtained by Cadambe and Mazumdar in [8]. Recenty, this bound was improved and generaized, via the observation that any og-convex bound on the oca ran of a code can be bown up to obtain a bound on the goba ran [9]. Interestingy, the bounds in [9] do not depend on the inearity of the code. However, a the bounds in [8], [9] are impicit, except for specia casses of codes. In this paper, we consider binary codes motivated by the fact that the computationa compexity when retrieving a fie or repairing a node grows with the fied size. We derive new, improved Singeton-type bounds for this specia case aongside with sporadic exampes, in particuar when the oca repair sets can toerate mutipe faiures. In contrast to the bounds in [8], [9], our bounds are expicit, and do not depend on any prior bounds on binary codes of shorter ength. As our main contribution, in Theorem 6, we obtain a cosedform bound on the minimum distance d of a binary (n, )- code of ength n and dimension and with a-symbo (r, δ)- ocaity, where the oca distance δ > 2. Such bounds were previousy ony nown when δ = 2. The bound is in terms of the ran of the repair sets, but can easiy be transformed to bounds in terms of the size r + δ 1. Interestingy, whie the two parameters r and can be assumed to agree when δ = 2, as we as when the fied size is unbounded, this is no onger the case over the binary fied with δ > 2. Whie both parameters are of independent interest in appications, we have chosen to focus on the number of nodes that need to be contacted for oca repair, rather than on the size of the oca couds 1. In addition, in Section III we prove that every eement of a non-degenerate binary ocay repairabe code without repication is contained in an atomic cycic fat, and hence that the attice of cycic fats is atomic. From a practica point of view, this impies a hierarchy of faiure toerance, as expained in the end of Section III. In particuar, whenever a symbo e fais, we can start by downoading nodes in an atomic cycic fat in order to repair e. If it turns out that some other nodes in this oca set have faied as we, we can repair them whie sti eeping the part that we aready downoaded, and simpy contact some more nodes in the corresponding repair set to repair a the faied symbos. Thus, we do not have to restart from the beginning if we find out during the repair process that a sma amount of other nodes have faied as we. Severa constructions are nown for optima LRCs over the binary fied, for specified ranges of parameters, and amost excusivey in the case δ = 2. The first such construction, for codes with exponentiay ow rate and ocaity r = 2, 3, was obtained by deeting carefuy chosen coumns from the simpex code [10]. These constructions are aso optima when taing the avaiabiity t, i.e., the number of disjoint sets that can recover a given symbo, into consideration. A sighty more fexibe famiy of codes, aowing for higher rate, was given in [11], [12], where aso a sight improvement over the Cadambe-Mazumdar bound was given for inear codes. In the ream of mutipe erasures, i.e., when δ > 2, rateoptima codes were studied in [13]. There, rate-optima codes were characterized when δ = 3, and anaogous constructions without optimaity proof were given for δ > 3. However, to the best of our nowedge, no previous wor has studied bounds on the goba minimum distance in the regime δ > 2. 1 Note that here, whie r sti essentiay bounds the size of the oca sets, we never need to contact that many nodes, since r 1 as shown in Prop. 5. From another point of view, r can be seen as a parameter describing how far one needs to go in order to repair.
2 II. PRELIMINARIES OF LRCS AND MATROIDS As is common practice, we say that C is an (n,, d)-code if it has ength n, dimension, and minimum Hamming distance d. A inear (n,, d)-code C over a finite fied F is a nondegenerate storage code if d 2 and there is no zero coumn in a generator matrix of C. To study LRCs in more detai, we consider punctured codes C Y, where Y [n] is a set of coordinates of the code C. For a fixed code C, we denote by d Y the minimum Hamming distance of the punctured code C Y. Definition 1. Let C be an (n,, d)-code over F n. A symbo x [n] has ocaity (r, δ) if there exists a subset R of [n], caed repair set of x, such that x R, R r + δ 1, and d R δ. Definition 2. A inear (n,, d, r, δ)-lrc over a finite fied F n is a non-degenerate inear (n,, d)-code C over F n such that every coordinate x [n] has ocaity (r, δ). In the iterature, this is specificay caed a-symbo ocaity. The parameters (n,, d, r, δ) can immediatey be defined and studied for matroids in genera, as in [2], [14], [15]. A. Matroid fundamentas Matroids have many equivaent definitions in the iterature. Here, we choose to present matroids via their ran functions. Much of the contents in this section can be found in more detai in [16]. Definition 3. A (finite) matroid M = (E, ρ) is a finite set E together with a ran function ρ : 2 E Z such that for a subsets X, Y E (R.1) 0 ρ(x) X, (R.2) X Y ρ(x) ρ(y ), (R.3) ρ(x) + ρ(y ) ρ(x Y ) + ρ(x Y ). A subset X E is caed independent if ρ(x) = X. If X is independent and ρ(x) = ρ(e), then X is caed a basis. A subset that is not independent is caed dependent. A circuit is a minima dependent subset of E, that is, a dependent set whose proper subsets are a independent. Strongy reated to the ran function is the nuity function η : 2 E Z, defined by η(x) = X ρ(x) for X E. Any matrix G over a fied F generates a matroid M G = (E, ρ), where E is the set of coumns of G, and ρ(x) is the ran of G(X) over F, where G(X) denotes the submatrix of G formed by the coumns indexed by X. As eementary row operations preserve the row space of G(X) for a X E, it foows that row-equivaent matrices generate the same matroid. Thus, there is a straightforward connection between inear codes and matroids. Let C be a inear code over a fied F. Then any two different generator matrices of C wi have the same row space by definition, so they wi generate the same matroid. Therefore, without any inconsistency, we can denote the matroid associated to these generator matrices by M C = (E, ρ C ). The ran function ρ C can be defined directy from the code without referring to a generator matrix, via ρ C (X) = dim(c X) for X E. One way of defining a new matroid from an existing one is obtained by restricting the matroid to one of its subsets. For a given set X E, we define the restriction of M to X to be the matroid M X = (X, ρ X ) by ρ X (Y ) = ρ(y ) for a subsets Y X. Two matroids M 1 = (E 1, ρ 1 ) and M 2 = (E 2, ρ 2 ) are isomorphic if there exists a bijection ψ : E 1 E 2 such that ρ 2 (ψ(x)) = ρ 1 (X) for a subsets X E 1. Definition 4. A matroid that is isomorphic to M G for some matrix G over F is said to be representabe over F. We aso say that such a matroid is F-representabe. A binary matroid is a matroid that is F 2 -representabe. By the Critica Theorem [17], the matroid M C determines the supports of a inear code C. Consequenty, since binary codes are determined uniquey by the support of the codewords, binary matroids are in one-to-one correspondence with binary codes. This is in sharp contrast to inear codes over arger fieds, where many interesting properties are not determined by the associated matroid. An important exampe of such a property is the covering radius [18]. Definition 5. A matroid is caed simpe if if has no circuits consisting of 1 or 2 eements. A eement e E is caed a co-oop if ρ(e e) < ρ(e). B. Fundamentas on cycic fats The main too from matroid theory in this paper are the cycic fats. We wi define them using the cosure and cycic operators. Let M = (E, ρ) be a matroid. The cosure operator c : 2 E 2 E and cycic operator cyc : 2 E 2 E are defined by (i) (ii) c(x) = X {e E X : ρ(x e) = ρ(x)}, cyc(x) = {e X : ρ(x e) = ρ(x)}. A subset X E is a fat if c(x) = X and a cycic set if cyc(x) = X. Therefore, X is a cycic fat if ρ(x y) > ρ(x) and ρ(x x) = ρ(x) for a y E X and x X. The coection of fats, cycic sets, and cycic fats of M are denoted by F(M), U(M), and Z(M), respectivey. Some more fundamenta properties of fats, cycic sets, and cycic fats are given in [19]. The cycic fats of a inear code C of F E can be described as sets X E such that C (X y) > C X and C (X x) = C X for a y E X and x X. Before going deeper in the study of Z(M), we need a minimum bacground on poset and attice theory. We wi use the standard notation of and for the meet and join operator, we wi denote by 0 L and 1 L the bottom and top eement of a attice L, and we wi denote by the covering
3 reation, i.e., for X, Y (L, ), we say that X Y if X < Y and there is no Z L with X < Z < Y. The atoms and coatoms of a attice (L, ) are defined as A L = {X L \ 0 L : Y L such that 0 L Y X}, coa L = {X L \ 1 L : Y L such that X Y 1 L }, respectivey. A attice L is said to be atomic if every eement of L is the join of atoms. For further information about posets and attices, we refer the reader to [20]. We can now give a crucia property of the set of cycic fats. Proposition 1 (See [19]). Let M = (E, ρ) be a matroid. Then 1) (Z(M), ) is a attice with X Y = c(x Y ) and X Y = cyc(x Y ). 2) 1 Z = cyc(e) and 0 Z = c( ). C. Reation between LRCs and the attice of cycic fats Recenty, some wor has been done to emphasise the reation between cycic fats and inear codes over finite fieds. In [14], the authors proved that the minimum distance can be expressed in terms of the nuity of certain cycic fats: Proposition 2. Let C be a non-degenerate (n,, d)-code and M = (E, ρ) the matroid associated to C. Then, d = η(e) + 1 max{η(z) : Z Z(M) {E}}. Moreover, [21] gives us necessary conditions on the structure of the attice of cycic fats when the code and hence the matroid are binary. The ey resuts from [21] are the foowing proposition and theorem that constrain the edges of the associated Hasse diagram. Proposition 3 ( [21]). Let M = (E, ρ) be a binary matroid. Then, every X, Y Z(M) with X Y satisfy exacty one of the foowing: ρ(y ) ρ(x) = > 1 and η(y ) η(x) = 1. We ca such an edge in the Hasse diagram of Z(M) a ran edge and abe it ρ =. ρ(y ) ρ(x) = 1 and η(y ) η(x) = > 1. We ca such an edge a nuity edge and abe it η =. ρ(y ) ρ(x) = 1 and η(y ) η(x) = 1. We ca such an edge a eementary edge. Theorem 1 (Announced in [21]). Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with d > 2 and without repication. Let M = (E, ρ) be the associated matroid. Then Z = Z(M) satisfies the foowing: 1) and E are cycic fats. 2) Every covering reation Z E is a nuity edge abeed with a number d 1. 3) If δ = 2, then for every i E, there is X Z with i X such that ρ(x) r. 4) If δ > 2, then for every i E, there is X Z with i X such that a) Every covering reation Y X is a nuity edge abeed with a number δ 1. b) Every cycic fat Y with Y X has ran r 2. Proof. From non-degeneracy, it foows that and E are cycic fats. If Z E, then by Proposition 2, d η(e) + 1 η(z). As d > 2, this means that 1 < d 1 η(e) η(z), so Z E is a nuity edge. This proves 1) and 2). Now for every i E, there is R E with i R, d R δ and R δ + 1 r. In particuar, when δ > 1, R must be a cycic set, and its cosure X is a cycic fat with ρ(x) = ρ(r) and d X d R δ. Now, (3) foows as ρ(x) = ρ(r) R d R + 1 R δ + 1 r. Finay, assume δ > 2 et Y X. Since d X = d R δ, it foows from 2) that Y X is a nuity edge abeed with a number δ 1. Consider now the attice Z(M R). We have 0 Z(M R) = and 1 Z(M R) = R since R is cycic. As there is no repication, ρ(r) 2 and η(r) δ 1 2 by Proposition 2. It foows from Proposition 3 that there exists a cycic fat Z c Z(M R) different from and R. Then it foows that max{η(z) : Z Z(M R) {R}} 1, η(r) = d R + max{η(z) : Z Z(M R) {R}} 1 δ, and ρ(r) = R η(r) r 1. Hence, ρ(x) r 1 and a cycic fats Y X have ran r 2. III. LATTICE STRUCTURE AND REPAIR PROPERTIES The first part of this section is devoted to understanding how restricting to binary inear codes affects the structure of the attice of cycic fats. We wi see that Proposition 3 has a strong impact on the structure of the atoms of Z, which in return infuences the whoe attice. Indeed the main resut of this section consists of proving that the attice of cycic fats has the property of being atomic. In the second part, we wi discuss the meaning of these resuts for binary inear codes and LRCs. In particuar, we wi see that every non-degenerate binary inear (n,, d)-code without repication is aready a binary inear (n,, d, r, 2)- LRC for a certain r. Furthermore, for LRCs with δ > 2, we wi see that these codes have a hierarchy in faiure toerance. A. Structura properties of the attice of cycic fats We wi first begin by the reation between binary inear codes and the associated matroid. The foowing proposition is a reformuation of Proposition 8 in [14] together with the easy observation that, in a binary inear code, two symbos are dependent if and ony if they are equa. Proposition 4. Let C be a binary inear (n,, d)-code. Then C is non-degenerate with no repication if and ony if the associated matroid M = (E, ρ) is simpe and contains no co-oops. Now that we have estabish the type of matroids that is reveant to our case, we can study the impications of
4 Proposition 3 for the attice of cycic fats. We begin by an immediate consequence on the atoms of Z(M). Lemma 1. Let M = (E, ρ) be a simpe binary matroid. Then, Z is an atom of Z(M) if and ony if η(z) = 1. Proof. Since M is simpe, it guaranties that = 0 Z. Furthermore, it aso means that, for a cycic fats Z, we have ρ(z) > 1. Hence, by Proposition 3, every atom Z at wi have a ran edge, i.e., η(z at ) = 1. The next two emmas in atoms in Z(M) to certain short circuits in M. Lemma 2. Let M = (E, ρ) be a simpe binary matroid. Let C be a circuit of M. Then c(c) is an atom of Z(M) if and ony if c(c) = C. Proof. By emma 1, c(c) is an atom of Z(M) if and ony if η(c(c)) = 1. But since C is a circuit, we have η(c) = 1. Now η(c(c)) = 1 + c(c) C. Hence c(c) is an atom if and ony if c(c) = C. Lemma 3. Let M = (E, ρ) be a simpe binary matroid that contains no co-oops. Let e E and C be a circuit containing e of minima ength. Then c(c) = C. Proof. First, the existence of a circuit containing e is guaranteed by the fact that M contains no co-oops. Let C be a minimum ength circuit containing e. Now, consider a binary representation {x f } f M of M. We can express x e by a inear combination of eements {x f : f C \{e}}. Since C is a binary circuit, we wi need a eements in C \ {e} with coefficient equa to 1. Hence x e = x f. f C\{e} Assume for a contradiction there exists e c(c) C. Then x e = x f. Since M is binary and simpe, we have f D C 2 D < C. If e D, then we have found a circuit smaer than C containing e which is a contradiction to the minimaity of C. If e / D, then x e = x f + x f = x e + x f. f D f (C\{e})\D f (C\{e})\D Thus, e is in the circuit {e} {e } ((C \ {e}) \ D) with cardinaity {e } (C \ D) < C by the fact that D 2. Again, this is a contradiction to the minimaity of C. Hence c(c) = C. By combining Lemma 2 and 3, we obtain the foowing resut. Lemma 4. Let M = (E, ρ) be a simpe binary matroid that contains no co-oops. Then every eement e E is contained in an atom. Theorem 2. Let M = (E, ρ) be a simpe binary matroid that contains no co-oops. Then the attice of cycic fats Z(M) is atomic. Proof. By Lemma 4, for every e E, there exist an atom Zat e Z(M) with e Zat. e Thus, Zat e Zat e = E. e M e M For Y Z(M), we can restrict the matroid to M Y = (Y, ρ). Since Z(M Y ) = {Z : Z Y, Z Z(M)} and M Y contains no co-oops, we are bac to the previous case. Hence Y = e Y Z e at and this proves that Z(M) is atomic. Indeed, we have proven a sighty stronger property than atomicity. Namey, any eement in Z(M) is equa not ony to the join, but aso to the union of a the atoms that it contains. B. Hierarchy of faiure toerance By Proposition 4, non-degenerate binary inear (n,, d)- codes with no repication are associated with simpe binary matroids that contain no co-oops. Thus, we can reinterpret these resuts for this type of binary codes. Probaby the most significant one is Lemma 4 stating that every eement of a given matroid M is contained in some atoms, meaning that every symbo of the associated code is automaticay contained in a sma dependent set. Furthermore, by Proposition 2, the minimum distance of an atom is 2. Thus, every symbo is directy contained in a sma repair set with δ = 2, i.e., in a repair set that can correct exacty one erasure. Hence we obtain the foowing theorem. Theorem 3. For every non-degenerate binary inear (n,, d)- code C with no repication, C is aso an (n,, d, r, 2)-LRC for some r {2,..., }. Proof. Let M = (E, ρ) be the associated matroid to C. By Proposition 4, M is simpe and contains no co-oops. By Lemma 4, for a e E, there exists an atom Zat e Z(M) with e Zat. e Define r = max e E ρ(ze at). Then the coection {Zat} e gives a ocaity (r, δ = 2) to C. Indeed, by Proposition 3 and 2 we have η(zat) e = 1 and d Z e at = 2, which gives us δ = 2. For the size criterion, we have Z e at = ρ(z e at) + η(z e at) = ρ(z e at) + δ 1 max e E {ρ(ze at)} + δ 1 = r + δ 1. Now, if we want to be abe to correct more than one erasure, then the repair sets cannot be atoms of Z(M) as these have d Z = 2. They have to be at east one eve above some atoms. However, the previous theorem sti hods, meaning that for every symbo, there is aso an atom containing it. Thus, we get a natura hierarchy in faiure toerance. If one node fais, then we can contact the cose-by nodes in the atom to repair
5 it. If more nodes fai, but no more than δ 1, we can contact other repair sets to fix them. And if more than δ 1 nodes fai, then we need to use the goba properties of the code. Moreover, by the remar foowing Theorem 2, it foows that repair sets are unions of a the atoms beow them. Since the coection of repair sets contains every symbo, we can choose the coection of atoms that wi give us the (r, 2) ocaity to be inside repair sets. The foowing coroary summaries the previous observations in one statement. Coroary 1. Let C be a non-degenerate binary inear (n,, d, r, δ)-lrc with no repication and with δ > 2. Let {R i } i I be the ist of repair sets. Then, there exists a coection of sets {X j } j J such that for a X j, there exists R i with X j R i such that C is aso an (n,, d, r, 2)-LRC. From a practica point of view, this reinforces the usefuness of the faiure toerance hierarchy. For exampe, suppose that the symbo e E fais. We can start by downoading nodes in the atom Z e at in order to repair e. Now, if we reaize that some other nodes in Z e at have faied as we, we can eep the part that we aready downoaded from Z e at and contact more nodes in the corresponding repair set to repair a the faied symbos in Z e at. Thus, we do not have to restart from the beginning if we find out during the repair process that a sma amount of other nodes have faied as we. IV. IMPROVING THE SINGLETON-TYPE BOUND FOR δ > 2 The goa of this section is to improve the existing bound for non-degenerate inear (n,, d, r, δ)-codes C when the codes are binary, contain no repication and δ > 2. It has been proven in [22] that, for a inear (n,, d, r, δ)-code over F q, we have d n + 1 ( r 1 ) (δ 1) (1) Since the predominant parameter of this study wi be the ran of the repair sets instead of the size, we assume from now on that repair sets are maxima after fixing its ran or, in matroid terms, that repair sets are cycic fats. We wi denote these repair sets by Z i instead of R i to avoid confusion. Remember that Proposition 2 ins the minimum distance of a code to the coatoms among the cycic fats. So we woud ie to construct a cycic fat that is as cose as possibe to the coatoms eve to give an accurate ower bound on max{η(z) : Z Z(M) {E}}. We wi do this by creating a chain in Z(M) made of joins of repair sets and we wi ca these type of chains repair-setschain or, for short, rps-chain. Definition 6. Let C be a non-degenerate (n,, d, r, δ)-code and {Z i } i I the coection of repair sets. Let M = (E, ρ) the associated matroid. An rps-chain = Y 0 Y 1... Y m = E is a chain in Z(M) defined inductivey by 1) Let Y 0 =. 2) Given Y i 1 E, we choose x i E \ Y i 1 and Z i with x i Z i arbitrariy, and assign Y i = Y i 1 Z i. 3) If Y i = E, we set m = i. Notice that this chain is not uniquey defined since we can choose symbos and corresponding repair sets freey. Now that we have created this chain, we are interested in how the ran and the nuity can increase at each step. This wi be usefu when evauating the ran and the nuity at the end of the chain. First, we wi define a new parameter that represents the maximum ran of a repair set. Definition 7. Let C be an (n,, d, r, δ)-lrc. Let {Z i } i I be the ist of repair sets and M = (E, ρ) the associated matroid to C. We define to be := max i I ρ(z i) Lemma 5. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication and M = (E, ρ) the associated matroid. Then, every rps-chain (Y i ) m i=0 has the foowing properties. 1) ρ(y i ) ρ(y i 1 ) for a i = 1,..., m. 2) η(y i ) η(y i 1 ) δ 1 for a i = 2,..., m. Proof. Let {Z i } i I be the coection of repair sets and (Y i ) m i=0 an arbitrary rps-chain. By ran axioms, cosure property and by Proposition 5, we have ρ(y i ) ρ(y i 1 ) + ρ(z i ) ρ(y i 1 Z i ) ρ(y i 1 ) + for a i = 1,..., m. Moreover, by nuity properties coming from ran axioms and by Proposition 5, we have η(y i ) η(y i 1 Z i ) η(y i 1 ) + η(z i ) η(y i 1 Z i ) η(y i 1 ) + η(z i ) max{η(z) : Z Z(Z i ) Z i } η(y i 1 ) + d Zi 1 η(y i 1 ) + δ 1 for a i = 2,..., m. We are now ready to present the first of our main resuts, a Singeton-type bound on the parameters n,, d, and δ. This wi ater be improved in Section V. Theorem 4. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication. Then, ( ) d n 1 (δ 1). (2) Proof. Let M = M(E, ρ) be the matroid associated to C, {Z i } i I the coection of repair sets and (Y i ) m i=0 an rps-chain. Our goa is to obtain a ower bound on max{η(z) : Z Z(M) {E}} since it wi give us a upper bound for the minimum distance by Proposition 2. To do this, we wi give a ower bound on the nuity of the penutimate set in the rps-chain using Lemma 5. Indeed, we have η(y m 1 ) (m 2)(δ 1) + η(z 1 ).
6 Now, by Theorem 2, there exists an atom Z at beow Z i. Then, max{η(z) : Z Z(Z i ) Z i } η(z at ) = 1. Thus, by Proposition 2, we have η(z i ) δ 1 + max{η(z) : Z Z(Z i ) Z i } δ. (3) Hence, η(y m 1 ) (m 2)(δ 1) + δ = (m 1)(δ 1) + 1. To evauate m, we use the upper bound on the ran. We have = ρ(y m ) m m. Combining the two previous resuts, we get ( ) η(y m 1 ) 1 (δ 1) + 1. Appying this and Proposition 2, we obtain d C = n + 1 max{η(z) : Z Z(M) {E}} n + 1 η(y m 1 ) ( ) n 1 (δ 1). Even if this bound oos graphicay the same as the previous nown bound with an extra 1, the meaning is truy different since the ceiing depends on the maximum ran of the repair sets and not on the parameter r reated to the size. To iustrate this, and to mae the comparison easier, we wi give a bound on the ran with r. This wi aso aow us to give as a coroary a new version of the ast bound that ony depends on n,, d, r and δ. Proposition 5. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication. Let {Z i } i I be the coection of repair sets. Then, ρ(z i ) r 1 for a i I. In particuar, this impies that r 1. Proof. We aready saw in Equation (3) that η(z i ) δ. Now, using the definition of a repair set and the ower bound for η(z i ), we get ρ(z i ) = Z i η(z i ) r 1. We can now reformuate the bound in Theorem 4: Coroary 2. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication. Then, ( ) d n 1 (δ 1) r 1 Compared to the previous bound (1), we have improved by dropping the +1 and by repacing r by r 1. V. TOOL FOR ACHIEVING A BETTER BOUND This section is an attempt to be more precise on the evauation of rps-chains which wi ead to a further improvement in the bound. We wi first discuss about the proof of Theorem 4 and Lemma 5. The main ingredient in the previous section is the evauation of the ran and nuity difference at each step on rps-chains in Lemma 5. Indeed, if ρ(y i ) ρ(y i 1 ) =, then we must have Y i 1 Z i = and ρ(z i ) =. In particuar, the intersection condition means that η(y i ) η(y i 1 ) δ 1. Hence, there is no code nor an rps-chain that can simutaneousy achieve both bounds in Lemma 5. The idea is to introduce an indicator function that wi capture when the intersection is a coatom of a repair set. To be more concise, we wi denote by A i the event when Y i 1 Z i coa Z(M Zi). First, this is a necessary condition to have η(y i ) η(y i 1 ) = δ 1. Secondy, this wi aso impy that ρ(y i ) ρ(y i 1 ) = 1 since every covering reation of a repair set has a nuity edge. Thus, this indicator wi be abe to separate the two previous extrema cases impossibe to reach at the same time and aows us to have a more precise view of each of the chain step. Thus, the foowing emma with the new indicator is an improvement of Lemma 5. Lemma 6. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication, and et M = (E, ρ) be the associated matroid. Let {Z i } i I be the coection of repair sets and (Y i ) m i=0 an associated rps-chain. Then (Y i ) m i=0 has the foowing properties: 1) ρ(y i ) ρ(y i 1 ) ( 1)1 Ai for a i = 2,..., m. 2) η(y i ) η(y i 1 ) δ 1 Ai for a i = 2,..., m. Proof. Let i {2,..., m}. We wi begin by proving the upper bound for the ran. By ran axioms, cosure property and by Proposition 5, we have ρ(y i ) ρ(y i 1 ) ρ(z i ) ρ(y i 1 Z i ) ρ(y i 1 Z i ). When the intersection is not an coatom, we obtain the same bound as in Lemma 5. However, if Y i 1 Z i coa Z(M Zi), then, by Theorem 1.4, we have ρ(y i 1 Z i ) = ρ(z i ) 1. Thus ρ(y i ) ρ(y i 1 ) = 1. Hence, we have ρ(y i ) ρ(y i 1 ) ( 1)1 Ai. We wi now prove the ower bound for the nuity. By nuity properties coming from ran axioms, we have η(y i ) η(y i 1 ) η(z i ) η(y i 1 Z i ). If Y i 1 Z i coa Z(M Zi), then η(z i ) η(y i 1 Z i ) d Zi 1 δ 1. Thus, we obtain the same bound as in Lemma 5. However, if Y i 1 Z i / coa Z(M Zi), then it impies that η(y i 1 Z i ) max{η(z) : Z coa Z(M Zi)} 1 Therefore, = max{η(z) : Z Z(M Z i )} 1. η(z i ) η(y i 1 Z i ) d Zi δ,
7 and η(y i ) η(y i 1 ) δ 1 Ai. In order to use Lemma 6 to get a Singeton-type bound with these assumptions, we need to define a new parameter that wi count the number of times the intersection Y i 1 Z i is a coatom of Z i. Since we aso want to compare different codes, we wi focus on the proportion of atom intersections instead of the actua number of atom intersections. Definition 8. Let (Y i ) m i=0 be an rps-chain. Define 0 α 1 by αm = #{i : Y i 1 Z i coa Z(M Zi)}. We say that (Y i ) m i=0 is an rps α -chain. We can now derive a new Singeton-type bound with the extra parameter α. Theorem 5. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication. Let α [0, 1] be such that C has an rps α -chain. Then, d n δ ( 1)α (δ α) Proof. Let M = M(E, ρ) be the matroid associated to C, {Z i } i I the coection of repair sets and (Y i ) m i=0 an rps α- chain. We can use Lemma 6 to get a ower bound on m and η(y m 1 ). Now, the indicator 1 Ai = 1 exacty αm times in the rps α -chain. We first need to get a ower bound on m. We have, Thus, = ρ(y m ) (m αm) + αm = m( ( 1)α) m ( 1)α Next, we can obtain a ower bound on η(y m 1 ). We have, η(y m 1 ) δ(m 1) αm = m(δ α) δ (δ α) δ ( 1)α Finay, by Proposition 2, we obtain d n δ ( 1)α (δ α) Since the bound is vaid for a α, we can optimize α to get a bound for a type of rps-chain. Theorem 6. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication. Then, ( ) d n δ + 1 ( 1). Proof. Seect any rps-chain in C, and observe that this is an rpsᾱ-chain for some ᾱ [0, 1]. By Theorem 5, we then have d n δ (δ ᾱ) ( 1)ᾱ n δ min (δ α). α [0,1] ( 1)α For fixed vaue of h α := ( 1)α, the expression h α (δ α) is ceary minimized when α taes its argest possibe vaue, i.e.when ( 1)α = h α, so α = 1 h( 1). Now, when 0 α 1, h α can tae any integer vaue between and. So we can rewrite the bound as ( d n δ min h δ ) h Z [,] 1 + h( 1) ( = n δ min h δ ) +. h Z [,] 1 1 The coefficient of h is ceary positive, so the minimum is achieved when h =. Hence, we get the bound ( d n δ δ ) = n δ δ ( ) 1. 1 ( 1 It is straightforward to verify that the term 1 ) evauates to 1 if = 1 mod, and 0 otherwise. Thus, we can write the bound as ( ) d n δ + 1 ( 1). Now, since we have two bounds with the same assumptions, we can compare them and find the minimum of the two, to get the best bound. It turns out that the atter of the two bounds is aways at east as strong as the first one, expect when r =. In that case ony, the first bound is stronger, and the difference between the two bounds is one. Hence, we obtain the foowing goba bound. Theorem 7. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication. Then, ( ) d n δ + 1 ( 1) and (+1). (4) We can appy the bound from Proposition 5 to obtain a bound on the parameters n,, d, r and δ ony. Coroary 3. Let C be a non-degenerate, binary inear (n,, d, r, δ)-lrc with δ > 2 and without repication. Then, ( ) d n δ + 1 (r 1) ( 1) and r r 1
8 The foowing graph is a comparison of the previous nown bound (1) and the new one from Coroary 3 for two different vaues of r. We can see that the new bound is aways better than (or equivaenty, smaer) or equa to the previous bound. Fig. 1: Comparison of the previous bound and the new bound for n = 50 and δ = 3. Finay, we provide one sma exampe that achieves the bound from Coroary 3. Exampe 1. Let C be the binary inear (10, 4, 4)-code given by the foowing generator matrix: G = We can define three repair sets by their corresponding coumns in G. Z 1 = {1, 2, 3, 5, 6, 8}, Z 2 = {2, 3, 6, 7, 9, 10}, and For a i {1, 2, 3}, we have Z 3 = {1, 4, 6, 7, 8, 10}. Z i = 6, ρ(z i ) = 3, and d Zi = 3. Hence we obtain a binary inear (10, 4, 4, 4, 3)-LRC that achieves the bound from Coroary 3. First, even if this code has not the most interesting parameters, mainy because the rate of the code is under onehaf, it proves the achievabiity of the bound. Secondy, it iustrates perfecty the notion of faiure toerance hierarchy mentioned in Section III. To avoid confusion, we denote now by {c 1, c 2,..., c 10 } the set of coumns of G. Suppose that the coumn c 1 fais. Then, we can repair it by summing coumns c 2 and c 4 in the corresponding atom. If c 1 and c 2 fai, then we form a basis in the repair set Z 1 and we repair both coumns via the basis. For exampe the set {c 3, c 6, c 8 } is a basis of the first repair set Z 1, and c 1 = c 6 c 8 and c 2 = c 3 c 6. Finay, if the three coumns c 1, c 2 and c 5 fai, we use the goba correcting properties of the code. Here, we can choose the basis {c 3, c 4, c 6, c 7 } and we have c 1 = c 4 c 7, c 2 = c 3 c 6, and c 5 = c 3 c 4 c 6 c 7. The most commony used fied-dependent distance bound for LRCs is the Cadambe Mazumdar bound [8], which is ony stated without reference to the oca minimum distance (or equivaenty, for δ = 2). It can straightforwardy be generaized to codes toerating more than one oca erasure. To the best of our nowedge, this generaization has not previousy appeared in the iterature. An unfortunate confict of notation in the iterature caused an erroneous version of Proposition 6 to occur in [23, Proposition 6]. In [24], a simiar bound was presented when more than one erasure is toerated, but the system assumptions used there are quite different from those in the present paper, and hence the bounds are not directy comparabe, Proposition 6. Let C be a non-degenerate inear (n,, d, r, δ)-lrc over F q. Then, [ ] min tr + opt(n (q) t(r + δ 1), d), (5) t Z + where (q) opt(n, d) is the maximum ran of a inear code of ength n and minimum distance d over F q. However, the determination of (q) opt is a cassica open probem in coding theory. Moreover, even given a formua for opt, (q) evauating (5) may be a tedious tas. In that sense, the bound (4) is more expicit than this one. In order to compare the bounds (4) and (5) for binary codes, we choose to estimate opt in (5) via the Potin bound for binary inear codes with specific vaues of n, d, r, δ and, and denote by max the maximum dimension given by (5). Then we have, on one hand + (5) max + δ 1 ( 1) and 1 max δ 1 (max 1) and max 1 (6) and on the other hand Thm.6 + δ 1 ( 1) and 1 n d δ, (7) so the eft hand side in (6) and (7) is bounded by the minimum of the right hand sides of these inequaities. The best bound wi be the one that gives the minimum of the two aternative right hand sides. This aows for a partia but computabe comparison of (4) and (5). Using this method, we found parameters vaues for which (6) is tighter than (7) and vice-versa. In particuar, the parameters from exampe 1 achieve (7) with equaity whie it is one off in (6). This shows that for certain parameters vaues, Theorem 7 is stronger than Proposition 6. In [23], it was erroneousy caimed that Proposition 6 is aways stronger than Theorem 7, due to an error in the statement of Proposition 6. However, this wor is ony a first step toward an expicit bound for binary LRCs and further improvements can be done by expoiting the techniques deveoped in this paper, via more detaied study of the cycic fats. Such improvements can be made to give stronger versions both of Theorem 7 and of
9 Proposition 6. Due to interest of space, this is eft to an extended version of this artice. VI. CONCLUSION We have derived new expicit tradeoffs between the oca and goba minimum distances of binary ocay repairabe codes, together with an exampe of a code meeting this bound with equaity. Appications to distributed data storage were discussed, with the motivation to decrease computationa compexity thans to a sma fied size. Moreover, we demonstrated an intrinsic hierarchy of repair sets that naturay occurs for binary inear storage codes. Acnowedgment. This wor is supported in part by the Academy of Finand (grants #276031, # and # to C. Hoanti), and by the TU Munich Institute for Advanced Study, funded by the German Exceence Initiative and the EU 7th Framewor Programme (grant #291763). [18] T. Britz and C. G. Rutherford, Covering radii are not matroid invariants, Discrete Mathematics, vo. 296, pp , [19] J. E. Bonin and A. de Mier, The attice of cycic fats of a matroid, Annas of Combinatorics, vo. 12, pp , [20] R. P. Staney, Enumerative combinatorics, 2nd ed. Cambridge University Press, 2011, vo. 1. [21] M. Grezet, R. Freij-Hoanti, T. Westerbäc, and C. Hoanti, On binary matroid minors and appications to data storage over sma fieds, in Internationa Caste Meeting on Coding Theory and Appications, 2017, pp [22] G. M. Kamath, N. Praash, V. Laitha, and P. V. Kumar, Codes with oca regeneration and erasure correction, IEEE Transactions on Information Theory, vo. 60, no. 8, pp , [23] M. Grezet, R. Freij-Hoanti, T. Westerbäc, O. Omez, and C. Hoanti, Bounds on binary ocay repairabe codes toerating mutipe erasures, in Internationa Zürich Seminar on Information and Communication. IEEE/ETH, [24] A. S. Rawat, A. Mazumdar, and S. Vishwanath, Cooperative oca repair in distributed storage, EURASIP J. Adv. Signa Proc., pp. 1 17, REFERENCES [1] P. Gopaan, C. Huang, H. Simitci, and S. Yehanin, On the ocaity of codeword symbos, IEEE Transactions on Information Theory, vo. 58, no. 11, pp , [2] I. Tamo, D. Papaiiopouos, and A. Dimais, Optima ocay repairabe codes and connections to matroid theory, IEEE Transactions on Information Theory, vo. 62, pp , [3] I. Tamo and A. Barg, A famiy of optima ocay recoverabe codes, IEEE Transactions on Information Theory, vo. 60, no. 8, pp , [4] A. Wang and Z. Zhang, Repair ocaity with mutipe erasure toerance, IEEE Transactions on Information Theory, vo. 60, no. 11, pp , [5] I. Tamo, A. Barg, and A. Froov, Bounds on the parameters of ocay recoverabe codes, IEEE Transactions on Information Theory, vo. 62, no. 6, pp , [6] A. Pöänen, T. Westerbäc, R. Freij-Hoanti, and C. Hoanti, Improved singeton-type bounds for ocay repairabe codes, in Internationa Symposium on Information Theory. IEEE, 2016, pp [7] A. Wang and Z. Zhang, An integer programming-based bound for ocay repairabe codes, IEEE Transactions on Information Theory, vo. 61, no. 10, pp , [8] V. Cadambe and A. Mazumdar, An upper bound on the size of ocay recoverabe codes, in Internationa Symposium on Networ Coding, 2013, pp [9] A. Agarwa, A. Barg, S. Hu, A. Mazumdar, and I. Tamo, Combinatoria aphabet-dependent bounds for ocay repairabe codes, 2017, arxiv: [10] N. Siberstein and A. Zeh, Optima binary ocay repairabe codes via anticodes, in Internationa Symposium on Information Theory. IEEE, 2015, pp [11] P. Huang, E. Yaaobi, H. Uchiawa, and P. Siege, Cycic inear binary ocay repairabe codes, in Information Theory Worshop. IEEE, [12], Binary inear ocay repairabe codes, IEEE Transactions on Information Theory, vo. 62, pp , [13] S. Baaji, K. Prashant, and P. V. Kumar, Binary codes with ocaity for mutipe erasures having short boc ength, in Internationa Symposium on Information Theory, 2016, pp [14] T. Westerbäc, R. Freij-Hoanti, T. Ernva, and C. Hoanti, On the combinatorics of ocay repairabe codes via matroid theory, IEEE Transactions on Information Theory, vo. 62, pp , [15] R. Freij-Hoanti, T. Westerbäc, and C. Hoanti, Locay repairabe codes with avaiabiity and hierarchy: matroid theory via exampes, in Internationa Zürich Seminar on Communications (invited paper). IEEE/ETH, 2016, pp [16] R. Freij-Hoanti, C. Hoanti, and T. Westerbäc, Matroid theory and storage codes: bounds and constructions, 2017, invited boo chapter in Networ Coding and Subspace Designs, Springer, to appear. [17] H. Crapo and G. C. Rota, On the Foundations of Combinatoria Theory: Combinatoria Geometries,, preiminary edition ed. MIT Press, Cambridge, MA, London 1970.
Codes between MBR and MSR Points with Exact Repair Property
Codes between MBR and MSR Points with Exact Repair Property 1 Toni Ernva arxiv:1312.5106v1 [cs.it] 18 Dec 2013 Abstract In this paper distributed storage systems with exact repair are studied. A construction
More informationThe Group Structure on a Smooth Tropical Cubic
The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,
More informationProblem set 6 The Perron Frobenius theorem.
Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator
More informationFRIEZE GROUPS IN R 2
FRIEZE GROUPS IN R 2 MAXWELL STOLARSKI Abstract. Focusing on the Eucidean pane under the Pythagorean Metric, our goa is to cassify the frieze groups, discrete subgroups of the set of isometries of the
More informationXSAT of linear CNF formulas
XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open
More informationPartial permutation decoding for MacDonald codes
Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics
More informationA Brief Introduction to Markov Chains and Hidden Markov Models
A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,
More informationGeneralized Bell polynomials and the combinatorics of Poisson central moments
Generaized Be poynomias and the combinatorics of Poisson centra moments Nicoas Privaut Division of Mathematica Sciences Schoo of Physica and Mathematica Sciences Nanyang Technoogica University SPMS-MAS-05-43,
More informationCryptanalysis of PKP: A New Approach
Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in
More informationEfficient Generation of Random Bits from Finite State Markov Chains
Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown
More informationarxiv: v1 [math.fa] 23 Aug 2018
An Exact Upper Bound on the L p Lebesgue Constant and The -Rényi Entropy Power Inequaity for Integer Vaued Random Variabes arxiv:808.0773v [math.fa] 3 Aug 08 Peng Xu, Mokshay Madiman, James Mebourne Abstract
More informationUniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete
Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity
More informationarxiv: v1 [math.co] 12 May 2013
EMBEDDING CYCLES IN FINITE PLANES FELIX LAZEBNIK, KEITH E. MELLINGER, AND SCAR VEGA arxiv:1305.2646v1 [math.c] 12 May 2013 Abstract. We define and study embeddings of cyces in finite affine and projective
More informationEfficiently Generating Random Bits from Finite State Markov Chains
1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown
More informationCS229 Lecture notes. Andrew Ng
CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view
More informationIterative Decoding Performance Bounds for LDPC Codes on Noisy Channels
Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University
More informationCoded Caching for Files with Distinct File Sizes
Coded Caching for Fies with Distinct Fie Sizes Jinbei Zhang iaojun Lin Chih-Chun Wang inbing Wang Department of Eectronic Engineering Shanghai Jiao ong University China Schoo of Eectrica and Computer Engineering
More informationarxiv: v1 [math.co] 17 Dec 2018
On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic
More informationORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION
J. Korean Math. Soc. 46 2009, No. 2, pp. 281 294 ORHOGONAL MLI-WAVELES FROM MARIX FACORIZAION Hongying Xiao Abstract. Accuracy of the scaing function is very crucia in waveet theory, or correspondingy,
More informationA Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes
A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr
More informationTheory of Generalized k-difference Operator and Its Application in Number Theory
Internationa Journa of Mathematica Anaysis Vo. 9, 2015, no. 19, 955-964 HIKARI Ltd, www.m-hiari.com http://dx.doi.org/10.12988/ijma.2015.5389 Theory of Generaized -Difference Operator and Its Appication
More informationC. Fourier Sine Series Overview
12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a
More informationCONGRUENCES. 1. History
CONGRUENCES HAO BILLY LEE Abstract. These are notes I created for a seminar tak, foowing the papers of On the -adic Representations and Congruences for Coefficients of Moduar Forms by Swinnerton-Dyer and
More informationHomogeneity properties of subadditive functions
Annaes Mathematicae et Informaticae 32 2005 pp. 89 20. Homogeneity properties of subadditive functions Pá Burai and Árpád Száz Institute of Mathematics, University of Debrecen e-mai: buraip@math.kte.hu
More informationPattern Frequency Sequences and Internal Zeros
Advances in Appied Mathematics 28, 395 420 (2002 doi:10.1006/aama.2001.0789, avaiabe onine at http://www.ideaibrary.com on Pattern Frequency Sequences and Interna Zeros Mikós Bóna Department of Mathematics,
More informationNearly Optimal Constructions of PIR and Batch Codes
arxiv:700706v [csit] 5 Jun 07 Neary Optima Constructions of PIR and Batch Codes Hia Asi Technion - Israe Institute of Technoogy Haifa 3000, Israe shea@cstechnionaci Abstract In this work we study two famiies
More informationOn colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018
On coorings of the Booean attice avoiding a rainbow copy of a poset arxiv:1812.09058v1 [math.co] 21 Dec 2018 Baázs Patkós Afréd Rényi Institute of Mathematics, Hungarian Academy of Scinces H-1053, Budapest,
More informationBASIC NOTIONS AND RESULTS IN TOPOLOGY. 1. Metric spaces. Sets with finite diameter are called bounded sets. For x X and r > 0 the set
BASIC NOTIONS AND RESULTS IN TOPOLOGY 1. Metric spaces A metric on a set X is a map d : X X R + with the properties: d(x, y) 0 and d(x, y) = 0 x = y, d(x, y) = d(y, x), d(x, y) d(x, z) + d(z, y), for a
More informationare left and right inverses of b, respectively, then: (b b 1 and b 1 = b 1 b 1 id T = b 1 b) b 1 so they are the same! r ) = (b 1 r = id S b 1 r = b 1
Lecture 1. The Category of Sets PCMI Summer 2015 Undergraduate Lectures on Fag Varieties Lecture 1. Some basic set theory, a moment of categorica zen, and some facts about the permutation groups on n etters.
More information(f) is called a nearly holomorphic modular form of weight k + 2r as in [5].
PRODUCTS OF NEARLY HOLOMORPHIC EIGENFORMS JEFFREY BEYERL, KEVIN JAMES, CATHERINE TRENTACOSTE, AND HUI XUE Abstract. We prove that the product of two neary hoomorphic Hece eigenforms is again a Hece eigenform
More informationLimited magnitude error detecting codes over Z q
Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica
More informationOn the Goal Value of a Boolean Function
On the Goa Vaue of a Booean Function Eric Bach Dept. of CS University of Wisconsin 1210 W. Dayton St. Madison, WI 53706 Lisa Heerstein Dept of CSE NYU Schoo of Engineering 2 Metrotech Center, 10th Foor
More informationAsynchronous Control for Coupled Markov Decision Systems
INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of
More informationCompletion. is dense in H. If V is complete, then U(V) = H.
Competion Theorem 1 (Competion) If ( V V ) is any inner product space then there exists a Hibert space ( H H ) and a map U : V H such that (i) U is 1 1 (ii) U is inear (iii) UxUy H xy V for a xy V (iv)
More informationApproximated MLC shape matrix decomposition with interleaf collision constraint
Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence
More informationTHE REACHABILITY CONES OF ESSENTIALLY NONNEGATIVE MATRICES
THE REACHABILITY CONES OF ESSENTIALLY NONNEGATIVE MATRICES by Michae Neumann Department of Mathematics, University of Connecticut, Storrs, CT 06269 3009 and Ronad J. Stern Department of Mathematics, Concordia
More informationA NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC
(January 8, 2003) A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC DAMIAN CLANCY, University of Liverpoo PHILIP K. POLLETT, University of Queensand Abstract
More informationLecture Note 3: Stationary Iterative Methods
MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or
More informationApproximated MLC shape matrix decomposition with interleaf collision constraint
Agorithmic Operations Research Vo.4 (29) 49 57 Approximated MLC shape matrix decomposition with intereaf coision constraint Antje Kiese and Thomas Kainowski Institut für Mathematik, Universität Rostock,
More informationarxiv:math/ v2 [math.pr] 6 Mar 2005
ASYMPTOTIC BEHAVIOR OF RANDOM HEAPS arxiv:math/0407286v2 [math.pr] 6 Mar 2005 J. BEN HOUGH Abstract. We consider a random wa W n on the ocay free group or equivaenty a signed random heap) with m generators
More informationK a,k minors in graphs of bounded tree-width *
K a,k minors in graphs of bounded tree-width * Thomas Böhme Institut für Mathematik Technische Universität Imenau Imenau, Germany E-mai: tboehme@theoinf.tu-imenau.de and John Maharry Department of Mathematics
More informationMONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES
MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES ANDRZEJ DUDEK AND ANDRZEJ RUCIŃSKI Abstract. For positive integers k and, a k-uniform hypergraph is caed a oose path of ength, and denoted by
More informationAn Exponential Lower Bound for Homogeneous Depth Four Arithmetic Formulas
An Exponentia Lower Bound for Homogeneous Depth Four Arithmetic Formuas Neeraj Kaya Microsoft Research India neeraa@microsoft.com Chandan Saha Indian Institute of Science chandan@csa.iisc.ernet.in Nutan
More informationRestricted weak type on maximal linear and multilinear integral maps.
Restricted weak type on maxima inear and mutiinear integra maps. Oscar Basco Abstract It is shown that mutiinear operators of the form T (f 1,..., f k )(x) = R K(x, y n 1,..., y k )f 1 (y 1 )...f k (y
More informationReichenbachian Common Cause Systems
Reichenbachian Common Cause Systems G. Hofer-Szabó Department of Phiosophy Technica University of Budapest e-mai: gszabo@hps.ete.hu Mikós Rédei Department of History and Phiosophy of Science Eötvös University,
More informationMARKOV CHAINS AND MARKOV DECISION THEORY. Contents
MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After
More informationRate-Distortion Theory of Finite Point Processes
Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information
More informationExplicit overall risk minimization transductive bound
1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,
More informationT.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA
ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network
More informationSelmer groups and Euler systems
Semer groups and Euer systems S. M.-C. 21 February 2018 1 Introduction Semer groups are a construction in Gaois cohomoogy that are cosey reated to many objects of arithmetic importance, such as cass groups
More informationDiscrete Techniques. Chapter Introduction
Chapter 3 Discrete Techniques 3. Introduction In the previous two chapters we introduced Fourier transforms of continuous functions of the periodic and non-periodic (finite energy) type, as we as various
More information2M2. Fourier Series Prof Bill Lionheart
M. Fourier Series Prof Bi Lionheart 1. The Fourier series of the periodic function f(x) with period has the form f(x) = a 0 + ( a n cos πnx + b n sin πnx ). Here the rea numbers a n, b n are caed the Fourier
More informationNIKOS FRANTZIKINAKIS. N n N where (Φ N) N N is any Følner sequence
SOME OPE PROBLEMS O MULTIPLE ERGODIC AVERAGES IKOS FRATZIKIAKIS. Probems reated to poynomia sequences In this section we give a ist of probems reated to the study of mutipe ergodic averages invoving iterates
More informationSmoothness equivalence properties of univariate subdivision schemes and their projection analogues
Numerische Mathematik manuscript No. (wi be inserted by the editor) Smoothness equivaence properties of univariate subdivision schemes and their projection anaogues Phiipp Grohs TU Graz Institute of Geometry
More informationBiometrics Unit, 337 Warren Hall Cornell University, Ithaca, NY and. B. L. Raktoe
NONISCMORPHIC CCMPLETE SETS OF ORTHOGONAL F-SQ.UARES, HADAMARD MATRICES, AND DECCMPOSITIONS OF A 2 4 DESIGN S. J. Schwager and w. T. Federer Biometrics Unit, 337 Warren Ha Corne University, Ithaca, NY
More information8 Digifl'.11 Cth:uits and devices
8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,
More informationGeneralised colouring sums of graphs
PURE MATHEMATICS RESEARCH ARTICLE Generaised coouring sums of graphs Johan Kok 1, NK Sudev * and KP Chithra 3 Received: 19 October 015 Accepted: 05 January 016 First Pubished: 09 January 016 Corresponding
More informationExpectation-Maximization for Estimating Parameters for a Mixture of Poissons
Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating
More informationare left and right inverses of b, respectively, then: (b b 1 and b 1 = b 1 b 1 id T = b 1 b) b 1 so they are the same! r ) = (b 1 r = id S b 1 r = b 1
Lecture 1. The Category of Sets PCMI Summer 2015 Undergraduate Lectures on Fag Varieties Lecture 1. Some basic set theory, a moment of categorica zen, and some facts about the permutation groups on n etters.
More informationA UNIVERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIVE ALGEBRAIC MANIFOLDS
A UNIERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIE ALGEBRAIC MANIFOLDS DROR AROLIN Dedicated to M Saah Baouendi on the occasion of his 60th birthday 1 Introduction In his ceebrated
More informationAsymptotic Properties of a Generalized Cross Entropy Optimization Algorithm
1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete
More informationDiscrete Techniques. Chapter Introduction
Chapter 3 Discrete Techniques 3. Introduction In the previous two chapters we introduced Fourier transforms of continuous functions of the periodic and non-periodic (finite energy) type, we as various
More informationThe distribution of the number of nodes in the relative interior of the typical I-segment in homogeneous planar anisotropic STIT Tessellations
Comment.Math.Univ.Caroin. 51,3(21) 53 512 53 The distribution of the number of nodes in the reative interior of the typica I-segment in homogeneous panar anisotropic STIT Tesseations Christoph Thäe Abstract.
More informationPeriods and Borders of Random Words
Periods and Borders of Random Words Štěpán Houb and Jeffrey Shait 2 Department of Agebra, Facuty of Mathematics and Physics, Chares University, Prague, Czech Repubic houb@karin.mff.cuni.cz 2 Schoo of Computer
More informationarxiv: v1 [cs.db] 25 Jun 2013
Communication Steps for Parae Query Processing Pau Beame, Paraschos Koutris and Dan Suciu {beame,pkoutris,suciu}@cs.washington.edu University of Washington arxiv:1306.5972v1 [cs.db] 25 Jun 2013 June 26,
More informationLinear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach
Linear Network Coding for Mutipe Groupcast Sessions: An Interference Aignment Approach Abhik Kumar Das, Siddhartha Banerjee and Sriram Vishwanath Dept. of ECE, The University of Texas at Austin, TX, USA
More informationMat 1501 lecture notes, penultimate installment
Mat 1501 ecture notes, penutimate instament 1. bounded variation: functions of a singe variabe optiona) I beieve that we wi not actuay use the materia in this section the point is mainy to motivate the
More informationComponentwise Determination of the Interval Hull Solution for Linear Interval Parameter Systems
Componentwise Determination of the Interva Hu Soution for Linear Interva Parameter Systems L. V. Koev Dept. of Theoretica Eectrotechnics, Facuty of Automatics, Technica University of Sofia, 1000 Sofia,
More informationLimits on Support Recovery with Probabilistic Models: An Information-Theoretic Framework
Limits on Support Recovery with Probabiistic Modes: An Information-Theoretic Framewor Jonathan Scarett and Voan Cevher arxiv:5.744v3 cs.it 3 Aug 6 Abstract The support recovery probem consists of determining
More informationSchedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness
1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process
More informationCombining reaction kinetics to the multi-phase Gibbs energy calculation
7 th European Symposium on Computer Aided Process Engineering ESCAPE7 V. Pesu and P.S. Agachi (Editors) 2007 Esevier B.V. A rights reserved. Combining reaction inetics to the muti-phase Gibbs energy cacuation
More informationCHAPTER 2 AN INTRODUCTION TO WAVELET ANALYSIS
CHAPTER 2 AN INTRODUCTION TO WAVELET ANALYSIS [This chapter is based on the ectures of Professor D.V. Pai, Department of Mathematics, Indian Institute of Technoogy Bombay, Powai, Mumbai - 400 076, India.]
More informationConstruction of Supersaturated Design with Large Number of Factors by the Complementary Design Method
Acta Mathematicae Appicatae Sinica, Engish Series Vo. 29, No. 2 (2013) 253 262 DOI: 10.1007/s10255-013-0214-6 http://www.appmath.com.cn & www.springerlink.com Acta Mathema cae Appicatae Sinica, Engish
More informationThe Complete Hierarchical Locality of the Punctured Simplex Code
The Complete Hierarchical Locality of the Punctured Simplex Code Matthias Grezet and Camilla Hollanti Department of Mathematics and Systems Analysis Aalto University Finland Emails: firstname.lastname@aalto.fi
More informationContinued fractions with low complexity: Transcendence measures and quadratic approximation. Yann BUGEAUD
Continued fractions with ow compexity: Transcendence measures and quadratic approximation Yann BUGEAUD Abstract. We estabish measures of non-quadraticity and transcendence measures for rea numbers whose
More informationHow many random edges make a dense hypergraph non-2-colorable?
How many random edges make a dense hypergraph non--coorabe? Benny Sudakov Jan Vondrák Abstract We study a mode of random uniform hypergraphs, where a random instance is obtained by adding random edges
More informationA CLUSTERING LAW FOR SOME DISCRETE ORDER STATISTICS
J App Prob 40, 226 241 (2003) Printed in Israe Appied Probabiity Trust 2003 A CLUSTERING LAW FOR SOME DISCRETE ORDER STATISTICS SUNDER SETHURAMAN, Iowa State University Abstract Let X 1,X 2,,X n be a sequence
More informationAnother Class of Admissible Perturbations of Special Expressions
Int. Journa of Math. Anaysis, Vo. 8, 014, no. 1, 1-8 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.1988/ijma.014.31187 Another Cass of Admissibe Perturbations of Specia Expressions Jerico B. Bacani
More informationarxiv:quant-ph/ v3 6 Jan 1995
arxiv:quant-ph/9501001v3 6 Jan 1995 Critique of proposed imit to space time measurement, based on Wigner s cocks and mirrors L. Diósi and B. Lukács KFKI Research Institute for Partice and Nucear Physics
More informationA simple reliability block diagram method for safety integrity verification
Reiabiity Engineering and System Safety 92 (2007) 1267 1273 www.esevier.com/ocate/ress A simpe reiabiity bock diagram method for safety integrity verification Haitao Guo, Xianhui Yang epartment of Automation,
More information6 Wave Equation on an Interval: Separation of Variables
6 Wave Equation on an Interva: Separation of Variabes 6.1 Dirichet Boundary Conditions Ref: Strauss, Chapter 4 We now use the separation of variabes technique to study the wave equation on a finite interva.
More informationA. Distribution of the test statistic
A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch
More informationNonlinear Analysis of Spatial Trusses
Noninear Anaysis of Spatia Trusses João Barrigó October 14 Abstract The present work addresses the noninear behavior of space trusses A formuation for geometrica noninear anaysis is presented, which incudes
More information<C 2 2. λ 2 l. λ 1 l 1 < C 1
Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima
More informationSTABLE GRAPHS BENJAMIN OYE
STABLE GRAPHS BENJAMIN OYE Abstract. In Reguarity Lemmas for Stabe Graphs [1] Maiaris and Sheah appy toos from mode theory to obtain stronger forms of Ramsey's theorem and Szemeredi's reguarity emma for
More informationMore Scattering: the Partial Wave Expansion
More Scattering: the Partia Wave Expansion Michae Fower /7/8 Pane Waves and Partia Waves We are considering the soution to Schrödinger s equation for scattering of an incoming pane wave in the z-direction
More informationFirst-Order Corrections to Gutzwiller s Trace Formula for Systems with Discrete Symmetries
c 26 Noninear Phenomena in Compex Systems First-Order Corrections to Gutzwier s Trace Formua for Systems with Discrete Symmetries Hoger Cartarius, Jörg Main, and Günter Wunner Institut für Theoretische
More informationSchedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness
1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea- Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process Management,
More information$, (2.1) n="# #. (2.2)
Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier
More informationSequential Decoding of Polar Codes with Arbitrary Binary Kernel
Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient
More informationTranscendence of stammering continued fractions. Yann BUGEAUD
Transcendence of stammering continued fractions Yann BUGEAUD To the memory of Af van der Poorten Abstract. Let θ = [0; a 1, a 2,...] be an agebraic number of degree at east three. Recenty, we have estabished
More informationDegrees of orders on torsion-free Abelian groups
Weesey Coege Weesey Coege Digita Schoarship and Archive Facuty Research and Schoarship 8-2013 Degrees of orders on torsion-free Abeian groups Asher M. Kach Karen Lange ange2@weesey.edu Reed Soomon Foow
More informationTHE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE
THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE KATIE L. MAY AND MELISSA A. MITCHELL Abstract. We show how to identify the minima path network connecting three fixed points on
More informationRelaxed Highest Weight Modules from D-Modules on the Kashiwara Flag Scheme. Claude Eicher, ETH Zurich November 29, 2016
Reaxed Highest Weight Modues from D-Modues on the Kashiwara Fag Scheme Caude Eicher, ETH Zurich November 29, 2016 1 Reaxed highest weight modues for ŝ 2 after Feigin, Semikhatov, Sirota,Tipunin Introduction
More informationSUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS
ISEE 1 SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS By Yingying Fan and Jinchi Lv University of Southern Caifornia This Suppementary Materia
More informationSome Measures for Asymmetry of Distributions
Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester
More informationRecursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines
Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One
More informationMATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES
MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is
More informationStat 155 Game theory, Yuval Peres Fall Lectures 4,5,6
Stat 155 Game theory, Yuva Peres Fa 2004 Lectures 4,5,6 In the ast ecture, we defined N and P positions for a combinatoria game. We wi now show more formay that each starting position in a combinatoria
More informationReliability: Theory & Applications No.3, September 2006
REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate
More information