Computing Linear Functions by Linear Coding Over Networks

Size: px
Start display at page:

Download "Computing Linear Functions by Linear Coding Over Networks"

Transcription

1 422 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 1, JANUARY 2014 Computing Linear Functions by Linear Coding Over Networks Rathinakumar Appuswamy, Member, IEEE, and Massimo Franceschetti Abstract We consider the scenario in which a set of sources generates messages in a network and a receiver node demands an arbitrary linear function of these messages We formulate an algebraic test to determine whether an arbitrary network can compute linear functions using linear codes We identify a class of linear functions that can be computed using linear codes in every network that satisfies a natural cut-based condition Conversely, for another class of linear functions, we show that the cut-based condition does not guarantee the existence of a linear coding solution For linear functions over the binary field, the two classes are complements of each other Index Terms Function computation, linear coding, network coding, network computing I INTRODUCTION I N many practical networks, including sensor networks and vehicular networks, receivers demand a function of the messages generated by the sources that are distributed across the network, rather than the generated messages Several information-theoretic variations of this problem have been studied in the framework of network computing [3] [6], [8], [10], [11], [16] [19] The classic network coding model of Ahlswede et al [1] is a special case of network computing in which the function to be computed at the receivers corresponds to the set of the source messages The works [16], [17] introduced the notions of linear, nonlinear, and routing computing capacities andusedthemtostudy network computing over single-receiver networks with noiseless links These notions of capacity refer to the ability to perform routing, linear, or nonlinear coding operations at the nodes in the network The nonlinear computing capacity is also simply referred to as the computing capacity of the network The focus of [16] was to derive upper and lower bounds on the computing capacity and to study the tightness of these bounds for a number of example functions The focus of [17] was to compare the linear, routing, and computing capacities Manuscript received February 23, 2011; revised March 10, 2013; accepted June 06, 2013 Date of publication September 27, 2013; date of current version December 20, 2013 This work was supported in part by the National Science Foundation under Award CNS and in part by the UCSD Center for Wireless Communications This paper was presented in part at the Allerton Conference on Communication, Control, and Computing, Monticello, IL, USA, September 2010 R Appuswamy is with IBM Research Almaden, San Jose, CA USA ( rathnam@ieeeorg) M Franceschetti is with the Department of Electrical and Computer Engineering, University of California, San Diego, La Jolla, CA USA ( massimo@eceucsdedu) Communicated by M Gastpar, Associate Editor for Shannon Theory Digital Object Identifier /TIT Following the works [16], [17], this paper considers the scenario in which a set of source nodes generates messages over a finite field, a single receiver node computes a linear function of these messages, and communication occurs over a network with noiseless links We ask whether this linear function can be computed by performing linear coding operations at the intermediate nodes In the special case, when the linear function is scalar valued, it was already shown in [17] that linear codes are sufficient to achieve the computing capacity The same result has been independently obtained in [6] using a different technique, and we shall deal with the vector case here Different from [16], [17], we focus on thesolvability of networks rather than capacity Since, bydefinition, a computing solution achieves a rate of one, the problem of solvability is equivalent to the problem of finding rate-1 solutions This was the original setup where network coding was developed We also restrict to scalar-linear solvability as opposed to vector-linear solvability; namely the nodes in the network are restricted to perform scalar linear encoding operations These codes were introduced and studied in [2] A more general class of linear codes was defined and studied in [14] and [15] Clearly, a network that does not have a scalar-linear solution may permit a vector-linear solution for the class of problems under consideration On the other hand, our limited consideration is motivated by our demonstration that the existence of scalar-linear solutions is computationally decidable whereas, the existence of a vector-linear solution may be undecidable asnotedin[13] In multiple-receiver networks, if each receiver node demands a subset of the source messages (which is an example of a linear function), then Dougherty, et al [14] showed that linear codes are not sufficient to recover the source messages Similarly, if each receiver node demands the sum of the source messages, then Rai and Dey [6] showed that linear codes are also not sufficient to recover the source messages In contrast, in single-receiver networks linear codes are sufficient for both of the aforementioned problems and a simple cut-based condition can be used to test whether a linear solution exists In the former case, when the receiver demands a subset of source messages, if the network satisfies the appropriate min-cut condition, then the sources can simply route the source messages to the receiver as argued in [13] On the other hand, if the source demands a linear sum of the sources, then [8] argued that as long as all the sources are connected to the receiver one can construct a spanning tree with the receiver as the root and sum the source message along the leaves We investigate if a similar cut-based condition guarantees the existence of a linear solution when the receiver node demands an arbitrary linear function of the source messages Our contributions are the following We identify two classes of functions, one for which the cut-based condition is sufficient IEEE

2 APPUSWAMY AND FRANCESCHETTI: COMPUTING LINEAR FUNCTIONS BY LINEAR CODING OVER NETWORKS 423 for solvability and the other for which it is not These classes are complements of each other when the source messages are over the binary field Along the way, we develop an algebraic framework to study linear codes and provide an algebraic condition to test whether a linear solution exists, similar to the one given by Koetter and Médard [2] for classical network coding This paper is organized as follows We formally introduce the network computation model in Section I-A In Section II, we develop the necessary algebraic tools to study linear codes and introduce the cut-based condition In Section III, we show the main results for the two classes of functions Section IV concludes the paper, mentioning some open problems A Network Model and Preliminaries In this paper, a network consists of a finite, directed acyclic multigraph, a set of source nodes,andareceiver Such a network is denoted by We use the word graph to mean a multigraph, and network to mean a single-receiver network We assume that, and that the graph contains a directed path from every node in to the receiver For each node,let and denote the in-edges and out-edges of, respectively We also assume (without loss of generality) that if a network node has no in-edges, then it is a source node We use to denote the number of sources in the network An alphabet is a nonzero finite field with For any positive integer, any vector,andany,let denote the th component of For any index set with, let denote the vector The network computing problem consists of a network,a source alphabet,andatarget function where is the decoding alphabet Atarget function is linear if there exists a matrix over such that 1) Every edge carries an element of and this element is denoted by For any node and any out-edge, the network code specifies an encoding function of the form: if otherwise where for all 2) The decoding function outputs a vector of length whose th component is of the form where for all The arithmetic in (1) and (2) is performed over Note that by (1), In this paper, by a network code, we always mean a linear network code In the literature, the class of network codes we define here is referred to as scalar linear codes These codes were introduced and studied in [2] A more general class of linear codes over were defined and studied in [14] and [15] Depending on the context, we may view as a vector of length- over or as an element of Without explicit mention, we use the fact that the addition of as elements of a finite field coincides with their sum as elements of a vector space over Furthermore, we also view as a subfield of without explicitly stating the inclusion map Let denote the vectors carried by the in-edges of the receiver Definition I2: A linear network code over is called a linear solution for computing in (or simply a linear solution if and are clear from the context) if the decoding function is such that for every choice of message vectors, (1) (2) (3) where denotes matrix transposition For linear target functions the decoding alphabet is of the form,with Without loss of generality, we assume that is full rank (over ) and has no zero columns For example, if is the identity matrix, then the receiver demands the complete set of source messages, and this corresponds to the classical network coding problem On the other hand, if is the row vector of 1 s, then the receiver demands a sum (over ) of the source values Let be a positive integer Given a network with source set and alphabet,amessage vector of length for source will be denoted by 1 We may frequently view as an element of Definition I1: A linear network code in a network consists of the following: 1 We assume that each source node has access to only one message However, the model can be directly generalized to allow source nodes to access more than one source message Remark I3: Each source generates symbols over (viewing as a vector space over ) and the decoder computes the target function for each set of source symbols This simple extension of over the larger finite field is motivated by our intention to keep the function along with the network topology fixed as we explore the coding problem A set of edges is said to separate sources from the receiver, if for each, every path from to contains at least one edge in Aset is said to be a cut if it separates at least one source from the receiver Let denote the set of all cuts in network For any matrix,let denote its th column For an index set,let denote the submatrix of obtained by choosing the columns of indexed by If is a cut in a network,wedefine the set

3 424 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 1, JANUARY 2014 Finally, for any network and matrix,wedefine (4) The aforementioned definition is motivated by the fact that the subspace as varies over all possible values for,while fixing the remaining elements of will have a dimension equal to 2 II ALGEBRAIC FRAMEWORK A Algebraic Test for the Existence of a Linear Solution Linear solvability for the classical network coding problem was shown in [2] to be equivalent to the existence of a nonempty algebraic variety In the following, we present an analogous characterization for computing linear functions, providing an algebraic test to determine whether a linear solution for computing a linear function exists The reverse problem of constructing a multiple-receiver network coding (respectively, network computing) problem given an arbitrary set of polynomials, which is solvable if and only if the corresponding set of polynomials is simultaneously solvable is considered in [15] (respectively, [6]) Webeginbygivingsomedefinitions and stating a technical lemma, followed by the main theorem below For any edge,let and Associated with a linear code over,wedefine the following three types of matrices: 1) For each source,define the matrix as follows: if otherwise 2) Similarly define the matrix as follows: if otherwise 3) Define the matrix as follows: if otherwise Since the graph associated with the network is acyclic, we can assume that the edges are ordered such that the matrix is strictly upper-triangular Let denote the identity matrix of suitable dimension Consider a network with alphabet and consider a linear code over with associated matrices,and For every,define the matrix 2 Our definition here also coincides with the one given in [16] for the class of functions considered in this paper (5) (6) (7) (8) Fig 1 Single-receiver network with three sources Now let be a vector containing all the nonzero entries of the matrices,andlet (respectively, ) be a vector containing all the nonzero entries of the matrix (respectively, ) By a slight abuse of notation, depending on the context we may view,, as elements of or as indeterminates Thus, each of the matrices defined previously may either be a matrix over or a matrix over the polynomial ring The context should make it clear which of these two notions is being referred to at any given point Lemma II1: The following two statements hold: 1) The matrix has a polynomial inverse with coefficients in, the ring of polynomials in the variables constituting 2) The decoding function can be written as Proof: The first assertion is a restatement of [2, Lemma 2] and the second assertion follows from [2, Th 3] Definition II2: Let be a polynomial ring The ideal generated by a subset and denoted by is the smallest ideal in containing Let be a network with alphabet Let and Consider a linear network code for computing the linear function corresponding to in and the associated matrices over Let denote the ideal generated by the elements of the vectors over the ring We denote the Gröbner basis of an ideal generated by subset of a polynomial ring by The following theorem is a consequence of Hilbert Nullstellensatz (see [21, Lemma VIII72] and the remark after [21, Proposition VIII74]) The matrices being central to many of the arguments to follow, we illustrate their computation for the network shown in Fig 1 in the following example

4 APPUSWAMY AND FRANCESCHETTI: COMPUTING LINEAR FUNCTIONS BY LINEAR CODING OVER NETWORKS 425 Example II3: Consider the network shown in Fig 1 and choose Wehave and the matrices defined in (5) (7) can be written as By utilizing the identity and the observation that for we also get Substituting these matrices in (8), we obtain B Minimum Cut Condition It is clear that the set of linear functions that can be solved in a network depends on the network topology It is easily seen that a linear solution for computing a linear target function corresponding to exists only if the network is such that for every, the value of the cut is at least the rank of the submatrix (recall that is the index set of the sources separated by the cut ) This observation is stated in the following lemma which is an immediate consequence of the cut-based bound in [16, Th 21] Lemma II5: For a network, a necessary condition for the existence of a linear solution for computing the target function corresponding to is We now consider two special cases First, consider the case in which the receiver demands all the source messages The corresponding is given by the identity matrix and the condition reduces to Theorem II4: Consider a network with alphabet and the linear target function corresponding to a matrix There exists an and a linear solution over for computing in if and only if Proof: From Lemma II1, the vector computed at the receiver can be written as (9) On the other hand, to compute the linear function corresponding to, the decoding function must satisfy (10) It follows that the encoding coefficients in a linear solution must be such that (11) If we view the coding coefficients as variables, then it follows that a solution must simultaneously solve the generating polynomials of the corresponding ideal By [21, Lemma VIII72], such a solution exists over the algebraic closure of if and only if Furthermore, if and only if Moreover, a solution exists over the algebraic closure of if and only if it exists over some extension field of and the proof is now complete ie, the number of edges in the cut be at least equal to the number of sources separated by the cut Second, consider the case in which the receiver demands the sum of the source messages The corresponding matrix is an row vector and the requirement that reduces to ie, all the sources have a directed path to the receiver For both of the aforementioned cases, the cut condition in Lemma II5 is also sufficient for the existence of a solution This is shown in [7] and [12, Th 42], and is reported in the following Lemma: Lemma II6: Let Foranetwork with the linear target function corresponding to a matrix, a linear solution exists if and only if The focus in the rest of this paper is to extend aforementioned results to the case by using the algebraic test of Theorem II4 III COMPUTING LINEAR FUNCTIONS In the following, we first define an equivalence relation among matrices and then use it to identify a set of functions that are linearly solvable in every network satisfying the condition We then construct a linear function outside this set, and a corresponding network with, on which such a function cannot be computed with linear codes Finally, we use this example as a building block to identify a set of linear functions for which there exist networks satisfying the min-cut condition and on which these functions are not linearly solvable Notice that for a linear function with matrix, each column of corresponds to a single-source node Hence, for

5 426 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 1, JANUARY 2014 every permutation matrix, computing is equivalent to computing after appropriately renaming the source nodes, ie, a solution exists for computing in a network if and only if a solution exists for computing in network which is obtained from by renaming the sources appropriately Furthermore, for every full-rank matrix over, computing is equivalent to computing These observations motivate the following definition: Definition III1: Let and Wesay if there exist an invertible matrix of size and a permutation matrix of size such that,and if such and do not exist Since is assumed to be a full-rank matrix, can be chosen such that the first columns of are linearly independent Let denote the first columns of By choosing,we have where is an matrix So for an arbitrary linear target function and an associated matrix, there exists an matrix such that Without loss of generality, we assume that each column of associated with a target function is nonzero Recall that sarebydefinition row vectors of the length We show that as long as the constraints of the following theorem are satisfied, the network variables can be chosen such that any set of vectors from are linearly independent This part of the proof is similar in flavor to the proof of the multicast theorem in [2] Once such a choice of is made, we then carefully realign the encoding matrices s and the decoding matrix to guarantee the computation of the linear function of choice The fact that the receiver does not require to recover all the source messages is exploited in this last step Theorem III2: Consider a network with a linear target function corresponding to a matrix (ie, ) If where is a column vector whose elements are nonzero elements of the finite field, then, a necessary and sufficient condition for the existence of a linear solution is Proof: Let The necessary part is clear from Lemma II5 We now focus on the sufficiency part Notice that for each, the matrix [computed as in (8)] is a row vector of length Stack these row vectors to form an matrix as follows: Let denote the submatrix of obtained by deleting its th row Claim 1: The matrix such that are full rank over Define two diagonal matrices and such that for (12) Now define the following realigned encoding and decoding matrices over : (13) By Claim 2 it follows that exists If the matrices, and define a linear network code, then by Lemma II1, the vector received by can be written as where We have where (a) follows from from of (14) (15) (16), (b) follows, and (c) follows from the definition Substituting (13) into (16), we get has a nonzero determinant over the ring Claim 2: For each, we have over By Claim 1 and the Schwartz--Zippel lemma [2], [20], it follows that there exists an,andachoiceof from (17)

6 APPUSWAMY AND FRANCESCHETTI: COMPUTING LINEAR FUNCTIONS BY LINEAR CODING OVER NETWORKS 427 Putting together (15) and (17), we now have ProofofClaim2: Let If there exists a such that ;then, (18) By substituting (17) into (14), we conclude that the receiver computes the desired linear function by employing the network code defined by the encoding matrices,, and The proof of the theorem is now complete for the case when If ; then, there exists a full-rank matrix and a column vector of nonzero elements over such that Since a full-rank linear operator preserves linear-independence among vectors, for every such full-rank matrix,wehave (19) Equation (19) implies that Since, from the first part of the proof, there exist an and coding matrices,,and over such that the receiver can compute the linear target function corresponding to ifandonlyif It immediately follows that by utilizing a code corresponding to the coding matrices,,and, the receiver can compute the target function corresponding to All that remains to be done is to provide proofs of claims 1 and 2 ProofofClaim1: If a cut is such that, then Thus, as argued in [13], there exists a routing solution to compute the identity function of the sources at the receiver Let and let for some (arbitrary) By Lemma II1, after fixing, the vector received by can be written as The existence of a routing solution for computing the identity function guarantees that there exist such that the matrix has a nonzero determinant over Itfollows that the determinant of is nonzero over Since was arbitrary in the previous argument, it follows that the determinant of each is nonzero over and the claim follows which implies that is not full rank---a contradiction Remark III3: We provide the following communication-theoretic interpretation of our method of proof above We may view the computation problem as a multiple-input multiple-output channel, where the multiple inputs are given by the vector of symbols generated by the sources, the output is the vector decoded by the receiver, and the channel is characterized by the network topology and the choice of s Our objective is to choose, encoding and decoding matrices to guarantee the desired output The channel gain from source to the receiver is given by the vector of length Thefirstpartofthe proof utilizes the Schwartz--Zippel lemma to establish that there exists a choice of s such that the channel between every set of sources and the receiver is invertible This is similar to the proof of the multicast theorem in [2] In the second part of the proof, we recognize that the sources must combine (or interfere ) coherently for the receiver to be able to compute the function of interest Accordingly, we first rotate the decoding matrix to point to a favorable subspace The encoding matrices are tweaked subsequently to achieve the necessary coherent combination We now show the existence of a linear function that cannot be computed on a network satisfying the min-cut condition This network will then be used as a building block to show an analogous result for a larger class of functions Let denote the matrix (20) and let denote the corresponding linear function It is possible to show with some algebra that for any column vector each of whose elements are nonzero elements of the finite field, so that the conclusion of Theorem III2 does not hold Indeed, for the function, the opposite conclusion is true, namely cannot be computed over using linear codes This is shown by the following Lemma Lemma III4: Let be the network shown in Fig 1 with alphabet Wehave 1) 2) There does not exist a linear solution for computing corresponding to the matrix in Proof: That is easily verified by considering the cut which attains the minimum We now proceed to show, using Theorem II4, that a linear solution does not exist We may assume, without loss of generality, that the node sends its message directly to nodes and (ie, ) The matrices,and were computed in

7 428 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 1, JANUARY 2014 Fig 2 Network with min-cut 1 that does not have an -linear solution for computing Example II3 Substituting and subtracting sfromthecolumnsof,weget Since the elements of these matrices generate the ideal,we have one element of is zero, then there exists a network such that 1) 2) There does not exist a linear solution for computing in Proof: It is clear from Definition III1 and the comment preceding the definition that we can assume without loss in generality Let function Since Define denote the corresponding linear target has at least one zero element, there exists a such that has a zero in th column Denote the elements of by Furthermore, implies that ByTheoremII4, a linear solution does not exist for computing in We now identify a much larger class of linear functions for which there exist networks satisfying the min-cut condition but for which linear solutions do not exist Let be an matrix with at least one zero element and For each in this equivalence class, we show that there exist a network that does not have a solution for computing the linear target function corresponding to but satisfies the cut condition in Lemma II5 The main idea of the proof is to establish that a solution for computing such a function in network implies a solution for computing the function corresponding to in, andthentouselemmaiii4 Theorem III5: Consider a linear target function corresponding to a matrix If such that at least Let be an element of (such a exists from the fact that the th column contains at least one zero) and define and denote the elements of by Since does not contain an all zero column, Now, let denote the network shown in Fig 2 where, denotes a relay node It follows from the construction that which is equal to the transfer matrix definedin(20) (21)

8 APPUSWAMY AND FRANCESCHETTI: COMPUTING LINEAR FUNCTIONS BY LINEAR CODING OVER NETWORKS 429 1) If, then it is easy to see that Similarly, if and,thenagain Consequently, we have (25) 2) If and,thenfromfig3, and Moreover, the index set was constructed such that (26) Fig 3 Subnetwork of used to show the equivalence between solving network and solving network Consequently, we have We now show that if the network has a solution for computing, then such a solution induces a solution for computing in network, contradicting Lemma III4 Let there exist an for which there is a linear solution for computing over over In any such solution, for each,the encoding function on the edge must be of the form From (25) and (27), we conclude that if (27),then (28) (22) for some Since istheonlypathfrom source to the receiver, it is obvious that We choose the following message vectors: Let be arbitrary elements of and let For an arbitrary cut,let denote the number of sources in that are separated from the receiver by (ie, ) We have for for (23) (29) Note that has been chosen such that for any choice of, and, every edge carries the zero vector Furthermore, for the above choice of, the target function associated with reduces to Since each source in is directly connected to the receiver, is equal to the number of edges in separating the sources in from the receiver Consequently, from (28), it follows that: (30) (24) Substituting (30) into (29), we conclude that for all Substituting and into (24), it follows that the receiver can compute from the vectors received on edges and,which implies a solution over for computing the linear target function in (21) for the network shown in Fig 3 It is easy to see that the existence of such a code implies a scalar linear solution for computing in This establishes the desired contradiction Finally, we show that Let be a cut such that (ie, separates sources from only the top and middle rows in the network ) We have the following two cases: Since the edge disconnects the source from the receiver, is immediate and the proof of the theorem is now complete We now consider the case in which the source alphabet is the binary field In this case, we have the two function classes identified by Theorems III2 and III5 are complements of each other, namely either or with containing at least one zero element In particular, if such that is a matrix of 1s, then we show that with containing at least one zero element Theorem III6: Let and let If, then there exists an matrix such that has at least one zero element and

9 430 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 60, NO 1, JANUARY 2014 Proof: Since is assumed to have a full-row rank, for some matrix over If has 0 s, then we are done Assume to the contrary that is a matrix of 1s We only need to consider the case when (since ) For,let denote the th column vector of the identity matrix Define and let be a permutation matrix that interchanges the th and th columns and leaves the remaining columns unchanged It is now easy to verify that (31) where is an matrix with at least one zero element: for Thus, and by transitivity we conclude that which proves the claim Remark III7: It is possible to extend Theorem II4 to the more general scenario where there are more than one receivers each computing its own linear function By simply stacking the polynomials corresponding to every receiver as in (11) and defining a larger ideal, the arguments in the proof of Theorem II4 can be generalized However, the remaining part of the story falls apart in a multireceiver setting Particularly, the achievability proof of Theorem III2 breaks down for the following reason: The encoding matrices are constructed in (13) after a specific choice of the decoding matrix at the receiver If there are multiple receivers, then this step cannot be carried out except in trivial cases When the receiver demands just the sum of the source messages, [9] treats networks with up to three receivers IV CONCLUSION We wish to mention the following open problems arising from this study 1) Is there a graph-theoretic condition that allows to determine whether a given network is solvable with reference to a given linear function? We have provided an algebraic test in terms of the Gröbner basis of a corresponding ideal, but we wish to know whether there is an algorithmically more efficient test 2) We showed that is not sufficient to guarantee solvability for a certain class of linear functions It is interesting to ask whether there is a constant such that guarantees solvability Conversely, one could ask whether for every constant there exist a network and a matrix such that and does not have a linear solution for computing the linear target function associated with APPENDIX Lemma A1: Let If is a column vector of nonzero elements and, then there exists a full-rank matrix and a column vector of nonzero elements over such that Proof: Let denote the matrix obtained by collecting the first columns of Wewillfirst show that the matrix is full rank After factoring out, we then prove that the last column must have nonzero entries Since, there exists a full-rank matrix and a permutation matrix such that (32) From (32), the columns of are constituted by the columns of in which case is full rank, or columns of contains columns of and We will now show that the vector cannot be written as a linear combination of any set of column vectors of Assume to the contrary that there exist for such that (33) where denotes the th column of Let denote the vector such that,and Wehave (34) Equation (34) contradicts the fact that is full rank Hence, s satisfying (33) do not exist and consequently, is a full-rank matrix We now have where, and hence, Furthermore, and implies that Thus, there exists a full-rank matrix and a permutation matrix such that (35) Let denote the th column of It follows from (35) that either and itself is an permutation matrix, or For some, th column of is, and the remaining columns must constitute the columns of for some If is true, then and the elements of are nonzero since is another permutation matrix If is true, then anditmustbethat (if,then which contradicts ) Let Wemusthave (36)

10 APPUSWAMY AND FRANCESCHETTI: COMPUTING LINEAR FUNCTIONS BY LINEAR CODING OVER NETWORKS 431 If we denote the number of nonzero entries in a vector by, then we have (37) From (37), it follows that and consequently that every element of is nonzero The proof of the lemma is now complete REFERENCES [1] RAhlswede,NCai,S-YRLi,andRWYeung, Network information flow, IEEE Trans Inf Theory, vol 46, no 4, pp , Jul 2000 [2] R Koetter and M Médard, An algebraic approachtonetworkcoding, IEEE/ACM Trans Netw, vol 11, no 5, pp , Oct 2003 [3] HKowshikandPRKumar, Optimalfunction computation in directed and undirected graphs, IEEE TransInfTheory,vol58,no6, pp , Jun 2012 [4] A Giridhar and P R Kumar, Towards a theory of in-network computation in wireless sensor networks, IEEE Commun Mag, vol44, no 4, pp , Apr 2006 [5] A Giridhar and P R Kumar, Computing and communicating functions over sensor networks, IEEE J Sel Areas Commun, vol 23, no 4, pp , Apr 2005 [6] BKRaiandBKDey, Onnetworkcodingforsum-networks, IEEE Trans Inf Theory, vol 58, no 1, pp 50 63, Jan 2012 [7] BKRai,BKDey,andSShenvi, Somebounds on the capacity of communicating the sum of sources, presented at the presented at the IEEE Inf Theory Workshop, Cairo, Egypt, 2010 [8] A Ramamoorthy, Communicating the sum of sources over a network, presented at the presented at the IEEE Int Symp Inf Theory, Toronto, ON, Canada, 2008 [9] A Ramamoorthy and M Langberg, Communicating the sum of sources over a network, IEEE J Sel Areas Commun, vol 31, no 4, pp , Apr 2013, to be published [10] NMa,PIshwar,andPGupta, Information-theoretic bounds for multiround function computation in collocated networks, in Proc IEEE Int Symp Inf Theory, 2009, pp [11] B Nazer and M Gastpar, Computing over multiple-access channels, IEEE Trans Inf Theory, vol53,no 10, pp , Oct 2007 [12] A R Lehman and E Lehman, Complexity classification of network information flow problems, in Proc 15th Annu ACM-SIAM Symp Discrete Algorithms, 2003, pp [13] A Rasala Lehman, Network Coding, PhD dissertation, Dept Elect Eng Comput Sci, Massachusetts Inst Technol, Cambridge, MA,USA,2005 [14] R Dougherty, C Freiling, and K Zeger, Insufficiency of linear coding in network information flow, IEEE Trans Inf Theory, vol 51, no 8, pp , Aug 2005 [15] R Dougherty, C Freiling, and K Zeger, Linear network codes and systems of polynomial equations, IEEE Trans Inf Theory, vol 54, no 5, pp , May 2008 [16] R Appuswamy, M Franceschetti, N Karamchandani, and K Zeger, Network coding for computing: Cut-set bounds, IEEE Trans Inf Theory, vol 57, no 2, pp , Feb 2011, to be published [17] R Appuswamy, M Franceschetti, N Karamchandani, and K Zeger, Network coding for computing: Linear codes, IEEE Trans Inf Theory, tobepublished [18] N Karamchandani, R Appuswamy, and M Franceschetti, Time and energy complexity of function computation over networks, IEEE Trans Inf Theory, vol 57, no 12, pp , Dec 2011 [19] L Ying, R Srikant, and G E Dullerud, Distributed symmetric function computation in noisy wireless sensor networks, IEEE Trans Inf Theory, vol 53, no 12, pp , Dec 2007 [20] J T Schwartz, Fast probabilistic algorithms for verification of polynomial identities, J ACM, vol 27, pp , 1980 [21] T W Hungerford, Algebra New York, NY, USA: Springer-Verlag, 1997 Rathinakumar Appuswamy (S 05 M 13) received the BTech degree from Anna University, Chennai, India, and the MTech degree from the Indian Institute of Technology, Kanpur, India, both in electrical engineering in 2002, and 2004, respectively He received the MA degree in mathematics and the PhD in Electrical and Computer Engineering both from the University of California, San Diego in 2008, and 2011, respectively He was a postdoctoral researcher at IBM Research Almaden from July 2011 to March 2012 and a Research Staff Member there since April 2012 His research interests include multi-modal learning, network coding, communication for computing, and network information theory Massimo Franceschetti is associate professor in the Department of Electrical and Computer Engineering of University of California at San Diego He received the Laurea degree, magna cum laude, in Computer Engineering from the University of Naples in 1997, and the MS and PhD degrees in Electrical Engineering from the California Institute of Technology in 1999, and 2003 Before joining UCSD, he was a post-doctoral scholar at University of California at Berkeley for two years Prof Franceschetti was awarded the C H Wilts Prize in 2003 for best doctoral thesis in Electrical Engineering at Caltech; the S A Schelkunoff award in 2005 for best paper in the IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION; an NSF CAREER award in 2006, an ONR Young Investigator award in 2007; the IEEE Communications society best tutorial paper award in 2010; and the IEEE Control theory society Ruberti young researcher award in 2012 He has held visiting positions at the Vrije Universiteit Amsterdam in the Netherlands, the Ecole Polytechnique Federale de Lausanne in Switzerland, and the University of Trento in Italy He was associate editor for communication networks for of the IEEE TRANSACTIONS ON INFORMATION THEORY and has served as guest editor for two issues of the IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATION He is currently serving as associate editor for the IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS His research interests are in communication systems theory and include random networks, wave propagation in random media, wireless communication, and control over networks

Computing linear functions by linear coding over networks

Computing linear functions by linear coding over networks Computing linear functions by linear coding over networks Rathinakumar Appuswamy, Massimo Franceschetti Abstract We consider the scenario in which a set of sources generate messages in a network and a

More information

Linear Codes, Target Function Classes, and Network Computing Capacity

Linear Codes, Target Function Classes, and Network Computing Capacity Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:

More information

Network Coding for Computing

Network Coding for Computing Networ Coding for Computing Rathinaumar Appuswamy, Massimo Franceschetti, Nihil Karamchandani, and Kenneth Zeger Abstract The following networ computation problem is considered A set of source nodes in

More information

Network Routing Capacity

Network Routing Capacity 1 Network Routing Capacity Jillian Cannons (University of California, San Diego) Randy Dougherty (Center for Communications Research, La Jolla) Chris Freiling (California State University, San Bernardino)

More information

Network Routing Capacity

Network Routing Capacity 1 Network Routing Capacity Jillian Cannons (University of California, San Diego) Randy Dougherty (Center for Communications Research, La Jolla) Chris Freiling (California State University, San Bernardino)

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 2303 Linear Network Codes and Systems of Polynomial Equations Randall Dougherty, Chris Freiling, and Kenneth Zeger, Fellow, IEEE Abstract

More information

Amulticast network is a directed multigraph containing a

Amulticast network is a directed multigraph containing a IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 10, OCTOBER 2004 2243 Linearity and Solvability in Multicast Networks Randall Dougherty, Christopher Freiling, and Kenneth Zeger, Fellow, IEEE Abstract

More information

LQG Control Approach to Gaussian Broadcast Channels With Feedback

LQG Control Approach to Gaussian Broadcast Channels With Feedback IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 8, AUGUST 2012 5267 LQG Control Approach to Gaussian Broadcast Channels With Feedback Ehsan Ardestanizadeh, Member, IEEE, Paolo Minero, Member, IEEE,

More information

Communicating the sum of sources in a 3-sources/3-terminals network

Communicating the sum of sources in a 3-sources/3-terminals network Communicating the sum of sources in a 3-sources/3-terminals network Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel Email: mikel@openu.ac.il Aditya Ramamoorthy

More information

Sum-networks from undirected graphs: Construction and capacity analysis

Sum-networks from undirected graphs: Construction and capacity analysis Electrical and Computer Engineering Conference Papers Posters and Presentations Electrical and Computer Engineering 014 Sum-networks from undirected graphs: Construction and capacity analysis Ardhendu

More information

A Relation Between Weight Enumerating Function and Number of Full Rank Sub-matrices

A Relation Between Weight Enumerating Function and Number of Full Rank Sub-matrices A Relation Between Weight Enumerating Function and Number of Full Ran Sub-matrices Mahesh Babu Vaddi and B Sundar Rajan Department of Electrical Communication Engineering, Indian Institute of Science,

More information

2012 IEEE International Symposium on Information Theory Proceedings

2012 IEEE International Symposium on Information Theory Proceedings Decoding of Cyclic Codes over Symbol-Pair Read Channels Eitan Yaakobi, Jehoshua Bruck, and Paul H Siegel Electrical Engineering Department, California Institute of Technology, Pasadena, CA 9115, USA Electrical

More information

Comments on Cut-Set Bounds on Network Function Computation

Comments on Cut-Set Bounds on Network Function Computation 1 Comments on Cut-Set Bounds on Network Function Computation Cupjin Huang, Zihan Tan, Shenghao Yang, and Xuan Guang arxiv:1501.01084v3 [cs.it] 28 Mar 2017 Abstract A function computation problem in directed

More information

UNIVERSITY OF CALIFORNIA, SAN DIEGO. Network coding for function computation

UNIVERSITY OF CALIFORNIA, SAN DIEGO. Network coding for function computation UNIVERSITY OF CALIFORNIA, SAN DIEGO Network coding for function computation A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Electrical Engineering

More information

IN this paper, we consider the capacity of sticky channels, a

IN this paper, we consider the capacity of sticky channels, a 72 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 1, JANUARY 2008 Capacity Bounds for Sticky Channels Michael Mitzenmacher, Member, IEEE Abstract The capacity of sticky channels, a subclass of insertion

More information

Scalar-linear Solvability of Matroidal Networks Associated with Representable Matroids

Scalar-linear Solvability of Matroidal Networks Associated with Representable Matroids Scalar-linear Solvability of Matroidal Networks Associated with Representable Matroids Anthony Kim and Muriel Medard Research Laboratory of Electronics Massachusetts Institute of Technology Email: {tonyekim,

More information

Quasi-linear Network Coding

Quasi-linear Network Coding Quasi-linear Network Coding Moshe Schwartz Electrical and Computer Engineering Ben-Gurion University of the Negev Beer Sheva 8410501, Israel schwartz@ee.bgu.ac.il Abstract We present a heuristic for designing

More information

Generalized Network Sharing Outer Bound and the Two-Unicast Problem

Generalized Network Sharing Outer Bound and the Two-Unicast Problem Generalized Network Sharing Outer Bound and the Two-Unicast Problem Sudeep U. Kamath, David N. C. Tse and Venkat Anantharam Wireless Foundations, Dept of EECS, University of California at Berkeley, Berkeley,

More information

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated

On the Cross-Correlation of a p-ary m-sequence of Period p 2m 1 and Its Decimated IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 3, MARCH 01 1873 On the Cross-Correlation of a p-ary m-sequence of Period p m 1 Its Decimated Sequences by (p m +1) =(p +1) Sung-Tai Choi, Taehyung Lim,

More information

A Generalized Uncertainty Principle and Sparse Representation in Pairs of Bases

A Generalized Uncertainty Principle and Sparse Representation in Pairs of Bases 2558 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 48, NO 9, SEPTEMBER 2002 A Generalized Uncertainty Principle Sparse Representation in Pairs of Bases Michael Elad Alfred M Bruckstein Abstract An elementary

More information

Error Correcting Index Codes and Matroids

Error Correcting Index Codes and Matroids Error Correcting Index Codes and Matroids Anoop Thomas and B Sundar Rajan Dept of ECE, IISc, Bangalore 5612, India, Email: {anoopt,bsrajan}@eceiiscernetin arxiv:15156v1 [csit 21 Jan 215 Abstract The connection

More information

THE idea of network coding over error-free networks,

THE idea of network coding over error-free networks, Path Gain Algebraic Formulation for the Scalar Linear Network Coding Problem Abhay T. Subramanian and Andrew Thangaraj, Member, IEEE arxiv:080.58v [cs.it] 9 Jun 00 Abstract In the algebraic view, the solution

More information

Weakly Secure Data Exchange with Generalized Reed Solomon Codes

Weakly Secure Data Exchange with Generalized Reed Solomon Codes Weakly Secure Data Exchange with Generalized Reed Solomon Codes Muxi Yan, Alex Sprintson, and Igor Zelenko Department of Electrical and Computer Engineering, Texas A&M University Department of Mathematics,

More information

CLASSICAL error control codes have been designed

CLASSICAL error control codes have been designed IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 56, NO 3, MARCH 2010 979 Optimal, Systematic, q-ary Codes Correcting All Asymmetric and Symmetric Errors of Limited Magnitude Noha Elarief and Bella Bose, Fellow,

More information

ANALYTICAL MATHEMATICS FOR APPLICATIONS 2018 LECTURE NOTES 3

ANALYTICAL MATHEMATICS FOR APPLICATIONS 2018 LECTURE NOTES 3 ANALYTICAL MATHEMATICS FOR APPLICATIONS 2018 LECTURE NOTES 3 ISSUED 24 FEBRUARY 2018 1 Gaussian elimination Let A be an (m n)-matrix Consider the following row operations on A (1) Swap the positions any

More information

On Network Coding Capacity - Matroidal Networks and Network Capacity Regions. Anthony Eli Kim

On Network Coding Capacity - Matroidal Networks and Network Capacity Regions. Anthony Eli Kim On Network Coding Capacity - Matroidal Networks and Network Capacity Regions by Anthony Eli Kim S.B., Electrical Engineering and Computer Science (2009), and S.B., Mathematics (2009) Massachusetts Institute

More information

FULL rate and full diversity codes for the coherent

FULL rate and full diversity codes for the coherent 1432 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 4, APRIL 2005 The Golden Code: A 2 2 Full-Rate Space Time Code With Nonvanishing Determinants Jean-Claude Belfiore, Member, IEEE, Ghaya Rekaya,

More information

On queueing in coded networks queue size follows degrees of freedom

On queueing in coded networks queue size follows degrees of freedom On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,

More information

Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach

Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach ALPHABET SIZE REDUCTION FOR SECURE NETWORK CODING: A GRAPH THEORETIC APPROACH 1 Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach Xuan Guang, Member, IEEE, and Raymond W. Yeung,

More information

Nonreversibility of Multiple Unicast Networks

Nonreversibility of Multiple Unicast Networks Nonreversibility of Multiple Uniast Networks Randall Dougherty and Kenneth Zeger September 27, 2005 Abstrat We prove that for any finite direted ayli network, there exists a orresponding multiple uniast

More information

Interactive Interference Alignment

Interactive Interference Alignment Interactive Interference Alignment Quan Geng, Sreeram annan, and Pramod Viswanath Coordinated Science Laboratory and Dept. of ECE University of Illinois, Urbana-Champaign, IL 61801 Email: {geng5, kannan1,

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel

An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 4, APRIL 2012 2427 An Alternative Proof for the Capacity Region of the Degraded Gaussian MIMO Broadcast Channel Ersen Ekrem, Student Member, IEEE,

More information

ONE of the main applications of wireless sensor networks

ONE of the main applications of wireless sensor networks 2658 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 Coverage by Romly Deployed Wireless Sensor Networks Peng-Jun Wan, Member, IEEE, Chih-Wei Yi, Member, IEEE Abstract One of the main

More information

Stabilization, Pole Placement, and Regular Implementability

Stabilization, Pole Placement, and Regular Implementability IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 47, NO. 5, MAY 2002 735 Stabilization, Pole Placement, and Regular Implementability Madhu N. Belur and H. L. Trentelman, Senior Member, IEEE Abstract In this

More information

Feasibility Conditions for Interference Alignment

Feasibility Conditions for Interference Alignment Feasibility Conditions for Interference Alignment Cenk M. Yetis Istanbul Technical University Informatics Inst. Maslak, Istanbul, TURKEY Email: cenkmyetis@yahoo.com Tiangao Gou, Syed A. Jafar University

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes

More information

Product-matrix Construction

Product-matrix Construction IERG60 Coding for Distributed Storage Systems Lecture 0-9//06 Lecturer: Kenneth Shum Product-matrix Construction Scribe: Xishi Wang In previous lectures, we have discussed about the minimum storage regenerating

More information

Index coding with side information

Index coding with side information Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated

More information

On Randomized Network Coding

On Randomized Network Coding On Randomized Network Coding Tracey Ho, Muriel Médard, Jun Shi, Michelle Effros and David R. Karger Massachusetts Institute of Technology, University of California, Los Angeles, California Institute of

More information

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage 1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,

More information

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and

More information

WE study the capacity of peak-power limited, single-antenna,

WE study the capacity of peak-power limited, single-antenna, 1158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 56, NO. 3, MARCH 2010 Gaussian Fading Is the Worst Fading Tobias Koch, Member, IEEE, and Amos Lapidoth, Fellow, IEEE Abstract The capacity of peak-power

More information

Codes for Partially Stuck-at Memory Cells

Codes for Partially Stuck-at Memory Cells 1 Codes for Partially Stuck-at Memory Cells Antonia Wachter-Zeh and Eitan Yaakobi Department of Computer Science Technion Israel Institute of Technology, Haifa, Israel Email: {antonia, yaakobi@cs.technion.ac.il

More information

Chapter 2. Error Correcting Codes. 2.1 Basic Notions

Chapter 2. Error Correcting Codes. 2.1 Basic Notions Chapter 2 Error Correcting Codes The identification number schemes we discussed in the previous chapter give us the ability to determine if an error has been made in recording or transmitting information.

More information

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse Two-unicast is hard Sudeep Kamath ECE Department, University of California, San Diego, CA, USA sukamath@ucsd.edu David N.C. Tse EECS Department, University of California, Berkeley, CA, USA dtse@eecs.berkeley.edu

More information

A Polynomial-Time Algorithm for Pliable Index Coding

A Polynomial-Time Algorithm for Pliable Index Coding 1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n

More information

Equivalence for Networks with Adversarial State

Equivalence for Networks with Adversarial State Equivalence for Networks with Adversarial State Oliver Kosut Department of Electrical, Computer and Energy Engineering Arizona State University Tempe, AZ 85287 Email: okosut@asu.edu Jörg Kliewer Department

More information

On Random Network Coding for Multicast

On Random Network Coding for Multicast On Random Network Coding for Multicast Adrian Tauste Campo Universitat Pompeu Fabra Barcelona, Spain Alex Grant Institute for Telecommunications Research University of South Australia arxiv:cs/7252v [cs.it]

More information

CONSIDER a joint stationary and memoryless process

CONSIDER a joint stationary and memoryless process 4006 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 9, SEPTEMBER 2009 On the Duality Between Slepian Wolf Coding and Channel Coding Under Mismatched Decoding Jun Chen, Member, IEEE, Da-ke He, and

More information

An Equivalence between Network Coding and Index Coding

An Equivalence between Network Coding and Index Coding An Equivalence between Network Coding and Index Coding Michelle Effros, Fellow, IEEE, Salim El Rouayheb, Member, IEEE, Michael Langberg, Member, IEEE 1 Abstract We show that the network coding and index

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2)

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY Uplink Downlink Duality Via Minimax Duality. Wei Yu, Member, IEEE (1) (2) IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 361 Uplink Downlink Duality Via Minimax Duality Wei Yu, Member, IEEE Abstract The sum capacity of a Gaussian vector broadcast channel

More information

On Linear Subspace Codes Closed under Intersection

On Linear Subspace Codes Closed under Intersection On Linear Subspace Codes Closed under Intersection Pranab Basu Navin Kashyap Abstract Subspace codes are subsets of the projective space P q(n), which is the set of all subspaces of the vector space F

More information

Random Linear Intersession Network Coding With Selective Cancelling

Random Linear Intersession Network Coding With Selective Cancelling 2009 IEEE Information Theory Workshop Random Linear Intersession Network Coding With Selective Cancelling Chih-Chun Wang Center of Wireless Systems and Applications (CWSA) School of ECE, Purdue University

More information

On the Duality between Multiple-Access Codes and Computation Codes

On the Duality between Multiple-Access Codes and Computation Codes On the Duality between Multiple-Access Codes and Computation Codes Jingge Zhu University of California, Berkeley jingge.zhu@berkeley.edu Sung Hoon Lim KIOST shlim@kiost.ac.kr Michael Gastpar EPFL michael.gastpar@epfl.ch

More information

Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions

Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions 2009 IEEE Information Theory Workshop Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions Asaf Cohen, Michelle Effros, Salman Avestimehr and Ralf Koetter Abstract In this

More information

A Combinatorial Bound on the List Size

A Combinatorial Bound on the List Size 1 A Combinatorial Bound on the List Size Yuval Cassuto and Jehoshua Bruck California Institute of Technology Electrical Engineering Department MC 136-93 Pasadena, CA 9115, U.S.A. E-mail: {ycassuto,bruck}@paradise.caltech.edu

More information

Bare-bones outline of eigenvalue theory and the Jordan canonical form

Bare-bones outline of eigenvalue theory and the Jordan canonical form Bare-bones outline of eigenvalue theory and the Jordan canonical form April 3, 2007 N.B.: You should also consult the text/class notes for worked examples. Let F be a field, let V be a finite-dimensional

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

Unit 2, Section 3: Linear Combinations, Spanning, and Linear Independence Linear Combinations, Spanning, and Linear Independence

Unit 2, Section 3: Linear Combinations, Spanning, and Linear Independence Linear Combinations, Spanning, and Linear Independence Linear Combinations Spanning and Linear Independence We have seen that there are two operations defined on a given vector space V :. vector addition of two vectors and. scalar multiplication of a vector

More information

Explicit MBR All-Symbol Locality Codes

Explicit MBR All-Symbol Locality Codes Explicit MBR All-Symbol Locality Codes Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, and Sriram Vishwanath 1 Abstract arxiv:1302.0744v2

More information

QUALITATIVE CONTROLLABILITY AND UNCONTROLLABILITY BY A SINGLE ENTRY

QUALITATIVE CONTROLLABILITY AND UNCONTROLLABILITY BY A SINGLE ENTRY QUALITATIVE CONTROLLABILITY AND UNCONTROLLABILITY BY A SINGLE ENTRY D.D. Olesky 1 Department of Computer Science University of Victoria Victoria, B.C. V8W 3P6 Michael Tsatsomeros Department of Mathematics

More information

Solving Homogeneous Systems with Sub-matrices

Solving Homogeneous Systems with Sub-matrices Pure Mathematical Sciences, Vol 7, 218, no 1, 11-18 HIKARI Ltd, wwwm-hikaricom https://doiorg/112988/pms218843 Solving Homogeneous Systems with Sub-matrices Massoud Malek Mathematics, California State

More information

What is A + B? What is A B? What is AB? What is BA? What is A 2? and B = QUESTION 2. What is the reduced row echelon matrix of A =

What is A + B? What is A B? What is AB? What is BA? What is A 2? and B = QUESTION 2. What is the reduced row echelon matrix of A = STUDENT S COMPANIONS IN BASIC MATH: THE ELEVENTH Matrix Reloaded by Block Buster Presumably you know the first part of matrix story, including its basic operations (addition and multiplication) and row

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

Rigidity of a simple extended lower triangular matrix

Rigidity of a simple extended lower triangular matrix Rigidity of a simple extended lower triangular matrix Meena Mahajan a Jayalal Sarma M.N. a a The Institute of Mathematical Sciences, Chennai 600 113, India. Abstract For the all-ones lower triangular matrices,

More information

Optimal Block-Type-Decodable Encoders for Constrained Systems

Optimal Block-Type-Decodable Encoders for Constrained Systems IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 5, MAY 2003 1231 Optimal Block-Type-Decodable Encoders for Constrained Systems Panu Chaichanavong, Student Member, IEEE, Brian H. Marcus, Fellow, IEEE

More information

On Lossless Coding With Coded Side Information Daniel Marco, Member, IEEE, and Michelle Effros, Fellow, IEEE

On Lossless Coding With Coded Side Information Daniel Marco, Member, IEEE, and Michelle Effros, Fellow, IEEE 3284 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 7, JULY 2009 On Lossless Coding With Coded Side Information Daniel Marco, Member, IEEE, Michelle Effros, Fellow, IEEE Abstract This paper considers

More information

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems Regenerating Codes and Locally Recoverable 1 Codes for Distributed Storage Systems Yongjune Kim and Yaoqing Yang Abstract We survey the recent results on applying error control coding to distributed storage

More information

Reverse mathematics of some topics from algorithmic graph theory

Reverse mathematics of some topics from algorithmic graph theory F U N D A M E N T A MATHEMATICAE 157 (1998) Reverse mathematics of some topics from algorithmic graph theory by Peter G. C l o t e (Chestnut Hill, Mass.) and Jeffry L. H i r s t (Boone, N.C.) Abstract.

More information

Analyzing Large Communication Networks

Analyzing Large Communication Networks Analyzing Large Communication Networks Shirin Jalali joint work with Michelle Effros and Tracey Ho Dec. 2015 1 The gap Fundamental questions: i. What is the best achievable performance? ii. How to communicate

More information

Study Guide for Linear Algebra Exam 2

Study Guide for Linear Algebra Exam 2 Study Guide for Linear Algebra Exam 2 Term Vector Space Definition A Vector Space is a nonempty set V of objects, on which are defined two operations, called addition and multiplication by scalars (real

More information

Black Box Linear Algebra

Black Box Linear Algebra Black Box Linear Algebra An Introduction to Wiedemann s Approach William J. Turner Department of Mathematics & Computer Science Wabash College Symbolic Computation Sometimes called Computer Algebra Symbols

More information

VECTORIZED signals are often considered to be rich if

VECTORIZED signals are often considered to be rich if 1104 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 54, NO 3, MARCH 2006 Theoretical Issues on LTI Systems That Preserve Signal Richness Borching Su, Student Member, IEEE, and P P Vaidyanathan, Fellow, IEEE

More information

arxiv: v1 [math.ra] 13 Jan 2009

arxiv: v1 [math.ra] 13 Jan 2009 A CONCISE PROOF OF KRUSKAL S THEOREM ON TENSOR DECOMPOSITION arxiv:0901.1796v1 [math.ra] 13 Jan 2009 JOHN A. RHODES Abstract. A theorem of J. Kruskal from 1977, motivated by a latent-class statistical

More information

Linear Algebra II. 2 Matrices. Notes 2 21st October Matrix algebra

Linear Algebra II. 2 Matrices. Notes 2 21st October Matrix algebra MTH6140 Linear Algebra II Notes 2 21st October 2010 2 Matrices You have certainly seen matrices before; indeed, we met some in the first chapter of the notes Here we revise matrix algebra, consider row

More information

Variable Length Codes for Degraded Broadcast Channels

Variable Length Codes for Degraded Broadcast Channels Variable Length Codes for Degraded Broadcast Channels Stéphane Musy School of Computer and Communication Sciences, EPFL CH-1015 Lausanne, Switzerland Email: stephane.musy@ep.ch Abstract This paper investigates

More information

1 Introduction A one-dimensional burst error of length t is a set of errors that are conned to t consecutive locations [14]. In this paper, we general

1 Introduction A one-dimensional burst error of length t is a set of errors that are conned to t consecutive locations [14]. In this paper, we general Interleaving Schemes for Multidimensional Cluster Errors Mario Blaum IBM Research Division 650 Harry Road San Jose, CA 9510, USA blaum@almaden.ibm.com Jehoshua Bruck California Institute of Technology

More information

Part III. 10 Topological Space Basics. Topological Spaces

Part III. 10 Topological Space Basics. Topological Spaces Part III 10 Topological Space Basics Topological Spaces Using the metric space results above as motivation we will axiomatize the notion of being an open set to more general settings. Definition 10.1.

More information

Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions

Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Chih-Chun Wang Center for Wireless Systems and Applications (CWSA) School of

More information

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE

4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER /$ IEEE 4488 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 10, OCTOBER 2008 List Decoding of Biorthogonal Codes the Hadamard Transform With Linear Complexity Ilya Dumer, Fellow, IEEE, Grigory Kabatiansky,

More information

The decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t

The decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t The decomposability of simple orthogonal arrays on 3 symbols having t + 1 rows and strength t Wiebke S. Diestelkamp Department of Mathematics University of Dayton Dayton, OH 45469-2316 USA wiebke@udayton.edu

More information

A Comparison of Superposition Coding Schemes

A Comparison of Superposition Coding Schemes A Comparison of Superposition Coding Schemes Lele Wang, Eren Şaşoğlu, Bernd Bandemer, and Young-Han Kim Department of Electrical and Computer Engineering University of California, San Diego La Jolla, CA

More information

Vector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition)

Vector Space Basics. 1 Abstract Vector Spaces. 1. (commutativity of vector addition) u + v = v + u. 2. (associativity of vector addition) Vector Space Basics (Remark: these notes are highly formal and may be a useful reference to some students however I am also posting Ray Heitmann's notes to Canvas for students interested in a direct computational

More information

Index Coding. Trivandrum School on Communication, Coding and Networking Prasad Krishnan

Index Coding. Trivandrum School on Communication, Coding and Networking Prasad Krishnan Index Coding Trivandrum School on Communication, Coding and Networking 2017 Prasad Krishnan Signal Processing and Communications Research Centre, International Institute of Information Technology, Hyderabad

More information

Intrinsic products and factorizations of matrices

Intrinsic products and factorizations of matrices Available online at www.sciencedirect.com Linear Algebra and its Applications 428 (2008) 5 3 www.elsevier.com/locate/laa Intrinsic products and factorizations of matrices Miroslav Fiedler Academy of Sciences

More information

0.2 Vector spaces. J.A.Beachy 1

0.2 Vector spaces. J.A.Beachy 1 J.A.Beachy 1 0.2 Vector spaces I m going to begin this section at a rather basic level, giving the definitions of a field and of a vector space in much that same detail as you would have met them in a

More information

Journal of Symbolic Computation. On the Berlekamp/Massey algorithm and counting singular Hankel matrices over a finite field

Journal of Symbolic Computation. On the Berlekamp/Massey algorithm and counting singular Hankel matrices over a finite field Journal of Symbolic Computation 47 (2012) 480 491 Contents lists available at SciVerse ScienceDirect Journal of Symbolic Computation journal homepage: wwwelseviercom/locate/jsc On the Berlekamp/Massey

More information

A NOTE ON STRATEGY ELIMINATION IN BIMATRIX GAMES

A NOTE ON STRATEGY ELIMINATION IN BIMATRIX GAMES A NOTE ON STRATEGY ELIMINATION IN BIMATRIX GAMES Donald E. KNUTH Department of Computer Science. Standford University. Stanford2 CA 94305. USA Christos H. PAPADIMITRIOU Department of Computer Scrence and

More information

Key words. n-d systems, free directions, restriction to 1-D subspace, intersection ideal.

Key words. n-d systems, free directions, restriction to 1-D subspace, intersection ideal. ALGEBRAIC CHARACTERIZATION OF FREE DIRECTIONS OF SCALAR n-d AUTONOMOUS SYSTEMS DEBASATTAM PAL AND HARISH K PILLAI Abstract In this paper, restriction of scalar n-d systems to 1-D subspaces has been considered

More information

Convergence analysis for a class of LDPC convolutional codes on the erasure channel

Convergence analysis for a class of LDPC convolutional codes on the erasure channel Convergence analysis for a class of LDPC convolutional codes on the erasure channel Sridharan, Arvind; Lentmaier, Michael; Costello Jr., Daniel J.; Zigangirov, Kamil Published in: [Host publication title

More information

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:

More information

COMMUTING PAIRS AND TRIPLES OF MATRICES AND RELATED VARIETIES

COMMUTING PAIRS AND TRIPLES OF MATRICES AND RELATED VARIETIES COMMUTING PAIRS AND TRIPLES OF MATRICES AND RELATED VARIETIES ROBERT M. GURALNICK AND B.A. SETHURAMAN Abstract. In this note, we show that the set of all commuting d-tuples of commuting n n matrices that

More information

An Introduction to (Network) Coding Theory

An Introduction to (Network) Coding Theory An to (Network) Anna-Lena Horlemann-Trautmann University of St. Gallen, Switzerland April 24th, 2018 Outline 1 Reed-Solomon Codes 2 Network Gabidulin Codes 3 Summary and Outlook A little bit of history

More information

Upper Bounds on the Capacity of Binary Intermittent Communication

Upper Bounds on the Capacity of Binary Intermittent Communication Upper Bounds on the Capacity of Binary Intermittent Communication Mostafa Khoshnevisan and J. Nicholas Laneman Department of Electrical Engineering University of Notre Dame Notre Dame, Indiana 46556 Email:{mhoshne,

More information

USING multiple antennas has been shown to increase the

USING multiple antennas has been shown to increase the IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 1, JANUARY 2007 11 A Comparison of Time-Sharing, DPC, and Beamforming for MIMO Broadcast Channels With Many Users Masoud Sharif, Member, IEEE, and Babak

More information

Low Complexity Encoding for Network Codes

Low Complexity Encoding for Network Codes Low Complexity Encoding for Network Codes Sidharth Jaggi 1 Laboratory of Information and Decision Sciences Massachusetts Institute of Technology Cambridge, MA 02139, USA Email: jaggi@mit.edu Yuval Cassuto

More information

Lecture 3: Error Correcting Codes

Lecture 3: Error Correcting Codes CS 880: Pseudorandomness and Derandomization 1/30/2013 Lecture 3: Error Correcting Codes Instructors: Holger Dell and Dieter van Melkebeek Scribe: Xi Wu In this lecture we review some background on error

More information

CHAPTER 0 PRELIMINARY MATERIAL. Paul Vojta. University of California, Berkeley. 18 February 1998

CHAPTER 0 PRELIMINARY MATERIAL. Paul Vojta. University of California, Berkeley. 18 February 1998 CHAPTER 0 PRELIMINARY MATERIAL Paul Vojta University of California, Berkeley 18 February 1998 This chapter gives some preliminary material on number theory and algebraic geometry. Section 1 gives basic

More information

Practical Polar Code Construction Using Generalised Generator Matrices

Practical Polar Code Construction Using Generalised Generator Matrices Practical Polar Code Construction Using Generalised Generator Matrices Berksan Serbetci and Ali E. Pusane Department of Electrical and Electronics Engineering Bogazici University Istanbul, Turkey E-mail:

More information