Nearly Optimal Constructions of PIR and Batch Codes

Size: px
Start display at page:

Download "Nearly Optimal Constructions of PIR and Batch Codes"

Transcription

1 arxiv:700706v [csit] 5 Jun 07 Neary Optima Constructions of PIR and Batch Codes Hia Asi Technion - Israe Institute of Technoogy Haifa 3000, Israe shea@cstechnionaci Abstract In this work we study two famiies of codes with avaiabiity, namey private information retrieva PIR) codes and batch codes Whie the former requires that every information symbo has k mutuay disjoint recovering sets, the atter asks this property for every mutiset request of k information symbos The main probem under this paradigm is to minimize the number of redundancy symbos We denote this vaue by r P n, k), r B n, k), for PIR, batch codes, respectivey, where n is the number of information symbos Previous resuts showed that for any constant k, r P n, k) = Θ n) and r B n, k) = O n ogn)) In this work we study the asymptotic behavior of these codes for non-constant k and specificay for k = Θn ǫ ) We aso study the argest vaue of k such that the rate of the codes approaches, and show that for a ǫ <, r P n, n ǫ ) = on), whie for batch codes, this property hods for a ǫ < 05 I INTRODUCTION In this paper we study two famiies of codes with avaiabiity for distributed storage The first famiy of codes, caed private information retrieva PIR) Codes, requires that every information symbo has some k mutuay disjoint recovering sets These codes were studied recenty in [] due to their appicabiity for private information retrieva in a coded storage system They are aso very simiar to one-step majority-ogic decodabe codes that were studied a whie ago by Massey [7] and ater by Lin and others [5] and were prompted by appications of error-correction with ow-compexity The second famiy of codes, which is a generaization of the first one, was first proposed in the ast decade by Ishai et a under the framework of batch codes [3] These codes were originay motivated by different appications such as oad-baancing in storage and cryptographic protocos Here it is required that every mutiset request of k symbos can be recovered by k mutuay disjoint recovering sets Formay, we denote a k-pir code by[n, n, k] P to be a coding scheme which encodes n information bits to N bits such that each information bit has k mutuay disjoint recovering sets Simiary, a k-batch code wi be denoted by [N, n, k] B and the requirement of mutuay disjoint recovering sets is imposed for every mutiset request of size k The main figure of merit when studying PIR and batch codes is the vaue of N, given n and k Thus, we denote by Pn, k), Bn, k) the minimum vaue of N for which an [N, n, k] P,[N, n, k] B code exists, respectivey Since it is known that for a fixed k, im n B q n, k)/n = im n P q n, k)/n =, [3], we evauate these codes by their redundancy and define r B n, k) Bn, k) n, r P n, k) Pn, k) n One of the probems we study in the paper studies the argest vaue of k as a function of n) for which one can sti have r P n, k) = on) and r B n, k) = on), so the rate of the codes approaches We show that for PIR codes this hods for k = Θn ǫ ), for a ǫ <, whie for batch codes for a ǫ < / Since r P n, k), r B n, k) k, the resut for PIR codes is indeed optima Furthermore, in order to have a better understanding Eitan Yaakobi Technion - Israe Institute of Technoogy Haifa 3000, Israe yaakobi@cstechnionaci of the asymptotic behavior of the redundancy, we study the vaues r P n, k) and r B n, k) when k = Θn ǫ ) The resuts we achieve in the paper are based on two constructions The first one uses mutipicity codes which generaized Reed Muer codes and were first presented by Kopparty et a in [4] These codes were aso used for the construction of ocay decodabe codes [] The second construction we use is based on the subcube construction from [3] This basic construction can be used to construct both PIR and batch codes Whie the idea in the works in [], [3] was to use mutidimensiona cubes in order to achieve arge vaues of k, here we take a different approach and position the information bits in a two dimensiona array and then form mutipe parity sets by taking different diagonas in the array The rest of the paper is organized as foows In Section II, we formay define the codes studied in this paper and review previous resuts In Section III, we review mutipicity codes Then, in Section IV we show how to use mutipicity codes to construct PIR codes, and in Section V we carry the same task for batch codes Then, in Section VI, we present our array construction and its resuts for PIR codes and batch codes Due to the ack of space some proofs in the paper are omitted II DEFINITIONS AND PRELIMINARIES Let F q denote the fied of size q, where q is a prime power A inear code of ength N and dimension n over F q wi be denoted by [N, n] q For binary codes we wi remove the notation of the fied The set [n] denotes the set of integers {,,, n} In this work we focus on two famiies of codes, namey private information retrieva PIR) codes that were defined recenty in [] and batch codes that were first studied by Ishai et a in [3] Formay, these codes are defined as foows Definition LetC be an[n, n] q inear code over the fiedf q ) The code C wi be caed a k-pir code, and wi be denoted by [N, n, k] q P, if for every information symbo x i, i [n], there exist k mutuay disjoint sets R i,0,, R i,k [N] such that for a j [k], x i is a function of the symbos in R i, j ) The codec wi be caed a k-batch code, and wi be denoted by [N, n, k] q B, if for every mutiset request of symbos{i 0, i,, i k }, there exist k mutuay disjoint sets R i0, R i,, R ik [N] such that for a j [k], x i j is a function of the symbos in R i j We sighty modified here the definition of batch codes In their conventiona definition, n symbos are encoded into some m tupes of strings, caed buckets, such that each batch ie request) of k information symbos can be decoded by reading at most some t symbos from each bucket In case each bucket can store a singe symbo, these codes are caed primitive batch codes, which is the setup we study here and for simpicity ca them batch codes In this work we study the binary and non-binary cases of PIR and batch codes

2 The main probem in studying PIR and batch codes is to minimize the ength N given the vaues of n and k We denote by P q n, k), B q n, k) the vaue of the smaest N such that there exists an [N, n, k] q P,[N, n, k] q B code, respectivey Since every batch code is aso a PIR code with the same parameters we get that B q n, k) P q n, k) For the binary case, we wi remove q from these and subsequent notations In [3], it was shown using the subcube construction that for any fixed k there exists an asymptoticay optima construction of [N, n, k] q B batch code, and hence im B qn, k)/n = im P q n, k)/n = n n Therefore, it is important to study how fast the rate of these codes converges to one, and so the redundancy of PIR and batch codes is studied We define r B n, k) q to be the vaue r B n, k) q Bn, k) q n and simiary, r P n, k) q Pn, k) q n In [], it was shown that for any fixed k 3 there exists an [N, n, k] PIR code where N = n+o n), so r P n, 3) = O n) and in [8] it was proved that r P n, 3) = Θ n), by providing a ower bound on the redundancy of 3-PIR codes These resuts assure aso that for any fixed k, r P n, k) = Θ n) and aso impied that for any fixed k, r B n, k) = Ω n) In [0], it was proved that for k = 3, 4, r B n, k) = Θ n), and for any fixed k 5, r B n, k) = O n ogn)) In this paper, we wi mosty study the vaues of r P n, k) and r B n, k), when k is a function of n, for exampe k = Θn ǫ ) One of the probems we wi aso investigate is finding the argest ǫ for which r P n, k = Θn ǫ ) ) = on), and simiary for batch codes There are severa more constructions of PIR and batch codes, which we summarize beow ) r B n, n /3 ) n, [9] ) r B n, n ǫ ) n 7/8 for 7/3 ǫ /4, [9] 3) r B n, n ǫ ) n 4ǫ for /5 <ǫ 7/3, [9] 4) Bn, n) n 5, [] 5) r P n, n) = On og 3)/ ), [5] 6) r P n, n ǫ ) = On 05+ǫ ), [5] III MUTLIPLICITY CODES In this section we review the construction of mutipicity codes This famiy of codes was first presented by Kopparty et a in [4] as a generaization of Reed Muer codes by cacuating the derivatives of poynomias We foow the definitions of these codes as were presented in [4] and first start with the definition of the Hasse derivative For a fied F, et F[x,, x s ] = F[x] be the ring of poynomias in the variabes x,, x s with coefficients in F For a vector i = i,, i of non-negative integers, its weight wti) is s j= i j, and et x i denote the monomia s j= xi j j The tota degree of this monomia equas wti) For Px) F[x], et the degree of Px), degp), be the maximum tota degree over a monomias in Px) Definition For a poynomia Px) F[x] and a nonnegative vector i, the i-th Hasse derivative of Px), denoted by P i) x), is the coefficient of z i in the poynomia P x, z) = Px+z) F[x, z] Definition 3 Let m, d, s be nonnegative integers and et q be a prime power Let Σ = F q {i:wti)<m} = F s+m q For a poynomia Px,, x F q [x,, x s ], we define the order m evauation of P at w F s q, denoted by P <m) w), to be the vector P <m) w) = P i) w) ) i:wti)<m Σ The mutipicity code Cm, d, s, q) of order m evauations of degree d poynomias in s variabes is defined as foows The code is over Σ, has ength q s, and its coordinates are indexed by eements in F s q For each poynomia Px) F q [x,, x s ] with degp) d, there is a codeword in C given by: Enc m,d,s,q P) = P <m) w) ) w F s q Σ)qs That is, Cm, d, s, q)={ P <m) w) ) w F s q Σqs : P F q [x], degp) d} The foowing emma was proved in [4], Lemma 9 Lemma 4 The mutipicity code Cm, d, s, q) has reative distance at eastδ = mq d and rate d+s /s+m s )q s Lasty, we note that since the mutipicity code Cm, d, s, q) is a inear code it can aso be a systematic code and thus for the rest of the paper we assume these codes to be systematic; for more detais see Lemma 3 in [] For the rest of the paper and uness stated otherwise, we assume that m, d, s, q are positive integers IV PIR CODES FROM MULTIPLICITY CODES In [4], mutipicity codes were used to construct ocay decodabe codes in order to retrieve the vaue of a singe symbo with high probabiity, given that at most a fixed fraction of the codeword s symbo has errors [] Since we are not concerned with errors, we modify the recovering procedure so that each information symbo has a arge number of disjoint recovering sets For this end, we estabish severa properties on interpoation sets of poynomias which wi hep us ater to construct the recovering sets, and thus PIR and batch codes Lemma 5 Let Px) F q [x,, x s ] be an homogeneous poynomia such that degp) = d Let A,, A s be subsets of F q such that A i = d + Then the set A = A A s {} is an interpoation set of Px), where F q is the unitary eement of the fied The foowing definition wi be used in the construction of recovering sets for mutipicity codes Definition 6 Let F q be a fied, and S, S F s q where s is a positive integer We say that the sets S and S are disjoint under mutipication if for every x S andα F q \{0} it hods thatαx / S Lemma 7 Let Px) F q [x,, x s ] be an homogeneous poynomia such that degp) = d Then there exists q d+ s interpoation sets of Px), each of size d+) s, which are mutuay disjoint under mutipication Now we are in a good position to present the recovering procedure for mutipicity codes First, we show a genera structure of the recovering sets, and then we argue that many disjoint sets can be constructed this way Theorem 8 Let m, d, s, q be such that d/m < q, and C = Cm, d, s, q) is the mutipicity code of ength q s over F s+m q Let A F s q be an interpoation set for homogeneous poynomias of degree at most m Then, for We say that Px) F q [x] is homogeneous if a the monomias of Px) have the same tota degree For Px) F q [x,, x s ] and R F s q, we say that R is an interpoation set of Px) if for every poynomia Qx) such that Px) = Qx) for every x R, it hods that Px) = Qx) for every x F s q

3 every y = y w ) w F s q C, and for any w 0 F s q, the set of coordinates indexed by the set R = {w 0 }+F q A {w 0 +λv : v A,λ F q \{0}} is a recovering set for the symbo y w0 Proof: The proof foows simiar ideas to the one from [4] Reca that every codeword y = y w ) w F s q C corresponds to a poynomia Px) F q [x], of degree at most d, where for a w F s q, y w = P <m) w) Every vector v in the interpoation set A is caed a direction and wi correspond to a ine containing w 0 in the direction v Reading the order m evauations of the poynomia Px) at these ines wi enabe us to recover the vaue of P <m) w 0 ) This procedure consists of two steps, described as foows Step : For every direction v A, define the foowing univariate poynomia p v λ) = Pw 0 + λv) def = d j=0 c v, jλ j F q [x] Since the vaues and the derivatives of Pw 0 + λv) for a λ F q \{0} are known, and degp v ) d, one can prove, as in [4], that p v λ) is unique, and thus can be recovered Step : From Step, one can get that p v λ) = P i) w 0 )v i λ wti) d = c v, j λ j, i j=0 and therefore for 0 j d, i:wti)= j P i) w 0 )v i = c v, j Considering ony the first m of these d+ equations, we get that u i = P i) w 0 ) is a soution for the equations system i:wti)= j u i v i = c v, j, 0 j < m d ) Now we prove that the equations system ) has a unique soution Indeed, if we denote Q j x) = i:wti)= j u i x i F q [x,, x s ] where 0 j < m, we get that the equations in ) are equivaent to Q j v) = c v, j for every v A But since for every j we know that Q j is an homogeneous poynomia of degree j, and A is an interpoation set for homogeneous poynomias of degree at most m, we get that the poynomia Q j x) is unique Therefore, we can recover the vaue of P <m) w 0 ) by soving the equations system ) The next theorem shows how to construct PIR codes from Mutipicity Codes d Theorem 9 For a m, d, s, q such that m < q, the code Cm, d, s, q) is a k-pir code [q s, n, k] P Q, where n = d+s s+m s ), k = q m s, and Q = q s+m Proof: According to Theorem 8, every interpoation set A for homogeneous poynomias of degree m defines a recovering set, which consists of the ines containing w 0 in the directions of v for a v A Therefore, in order to get disjoint recovering sets, a we need to do is to pick different ines According to Lemma 7, there are q m s interpoation sets for homogeneous poynomias of degree m which are mutuay disjoint under mutipication This means that each ine cannot appear in two sets, thus the recovering sets defined by these interpoation sets are disjoint The next theorem summarizes the resuts in this section Theorem 0 For every positive integer s, 0 < α <, and n sufficienty arge, there exists a k-pir code [N, n, k] P Q, overf Q with redundancy r = N n such that k = Θn α) ), Q = n Θnα), r = On α In particuar, for 0 ǫ <, it hods that r P n, k = Θn ǫ ) ) = O n δǫ)), where δǫ) = min s:s> {δ s ǫ)}, and δ s ǫ) = ǫ 5 05 δ δ 3 ǫ) δ 5 ǫ) δ 7 ǫ) δ 0 ǫ) ǫ od resuts ower bound ǫ Fig Asymptotic resuts for binary PIR codes s + s ǫ For a given vaue of ǫ, the vaue s that minimizesδǫ) is s = ǫ Now we use our ast resut in order to construct binary k-pir codes The main idea is to convert every symbo of the fied F Q to ogq) binary symbos We say that fn) = Ωn a ) is for a τ > 0, fn) = Ωn a τ ) Simiary we define fn) = On a+ ) if for a τ > 0, fn) = On a+τ ) Theorem For every positive integer s, 0 <α <, and n sufficienty arge, there exists a binary k-pir code[n, n, k] P, with redundancy r = N n such that k = Θ n ogn) ) α +α ), r = O n α s+α) ogn)) ) s+α) In particuar, for 0 ǫ <, r P n, k = Ωn ǫ ) ) = O ) n δǫ)+, where δǫ) = mins:s> {δ s ǫ)} and δ s ǫ) = ǫ s ǫ) ss ), and r P n, k = Θn ǫ ) ) = on) The anaysis so far deat with constructing k-pir when k = Θn ǫ ) and 0 ǫ < Now we show how to use these resuts to construct k-pir codes forǫ The idea is to concatenate a sufficient copies of k -PIR codes, when k = Ωn ) such that each bit wi have k recovering sets Theorem For aǫ and n sufficienty arge, there exists a binary k-pir code [N, n, k] P, such that k = Θnǫ ) and N = On ǫ+ ) The ength achieved by the PIR construction in Theorem is neary optima Reca that the ength of k-pir codes is Ωk) since every non-trivia recovering set must contain at east one redundancy bit Fig summarizes the resuts of binary PIR codes we achieved in this section together with the previous resuts We pot the curves δ s ǫ) for s = 3, 5, 9, 0 from Theorem as we as the resuts for ǫ from Theorem The ower bound on the redundancy is given by min{k, n} V BATCH CODES FROM MULTIPLICITY CODES It turns out that mutipicity codes can be aso an exceent too to construct batch codes Unike the PIR case, recovering different entries in the codeword wi cause intersection in the corresponding ines, and thus intersecting recovering sets In order to overcome this obstace, we reduce the degree d of the poynomias such that a fewer number of points is needed α

4 from every ine This wi aow different ines to avoid points which are used by other ines That way, every recovering set can drop out points which are used by other sets, resuting in disjoint recovering sets Lemma 3 For a m, s, q, d, k such that d mq km s ) and k q m s, the code Cm, d, s, q) is a k-batch code [q s, n, k] B d+s Q, where n = s+m and Q = qs+m Proof: The caim regarding the code dimension and fied size can be proven simiary to PIR codes Now we prove that every mutiset request of size k can be recovered As we saw in the recovering procedure for PIR codes, every recovering set contains m s different ines Since different ines can intersect on at most one point, and there are k recovering sets, it suffices to prove that Step in the recovering procedure can be competed even when km s points on the ine are not used But since the minimum distance of Cm, d, s =, q) equas q d m > kms +, it can be shown in a very simiar way to PIR codes, that the poynomia p v λ) in Step can be uniquey recovered, and thus aso Step can be competed Unike the PIR case, it turns out that ony the vaue s = is usefu for batch codes, thus getting the foowing theorem Theorem 4 For every 0 < α < 05 and n sufficienty arge, there exists a k-batch code[n, n, k] B Q overf Q with redundancy r = N n such that k = Θn 05 α ), r = On α ), Q = n Θn α) In particuar, for 0 < ǫ < 05, it hods that r B n, k = Θn ǫ ) ) = O n δǫ)), whereδǫ) = ǫ As in the PIR case, the ast resut can be extended for binary batch codes Theorem 5 For every 0 < α < 05 and n sufficienty arge, there exists a binary k-batch code [N, n, k] B with redundancy r = N n such that k = Θ n/ ogn)) 05 α), r = O n α 3 ogn)) α 3 ) In particuar, for 0 < ǫ < 05, it hods that r B n, k = Ωn ǫ ) ) = O n δǫ)+ ), where δǫ) = ǫ 3, and r B n, k = Θn ǫ ) ) = on) Forǫ 05 there exists a binary k-batch code [N, n, k] B of dimension n such that k = Θnǫ ) and N = On 05+ǫ+ ) VI ARRAY CONSTRUCTION FOR PIR AND BATCH CODES Our point of departure for this section is the subcube construction from [3] which was aso used in [] to construct PIR codes The idea of this construction is to position the information bits in a two-dimensiona array, and add a simpe parity bit for each row and each coumn Our approach here is to extend this construction by considering aso diagonas with different sopes As there are many different sopes, this can greaty increase the number of recovering sets However, we wi have to guarantee that using the diagonas wi sti resut with disjoint recovering sets By a sight abuse of notation, in this section we et the set [n] denote the set of integers {0,,, n } We use the notation x m to denote the vaue of x mod m) Definition 6 Let A be an r p array, with indices [r] [p] For s [p] we define the foowing set of sets P s r, p) = {D s,0, D s,,, D s,p }, where for t [p], D s,t ={0, t),, t+ s p ),,r, t+r )s p )} The idea behind Definition 6 is to fix a sope s [p] and then define p diagona sets which are determined by the starting point on the first row and the sope We use these sets in order to construct array codes, where every diagona determines a parity bit for the bits on this diagona Construction Array Construction) Let r, p, n be positive integers such that n = rp, and S [p] a subset of size k We define the encoder E r,p,s, as a mapping E r,p,s : {0, } n {0, } k p as foows We denote S = {s 0, s,, s k } where 0 s 0 < s < < s k p The input vector x {0, } n is represented as an r p array, that is x = x i, j ) [r] [p] and is encoded to the foowing kp redundancy bitsρ,t, for [k], and t [p], ρ,t = x i, j D s,t Let E r,p,s x) = ρ 0,0,,ρ 0,p,,ρ k,0,,ρ k,p ), and the codecr, p, S) is defined to be Cr, p, S) = {x, E r,p,s x)) : x {0, } n } We first ist severa usefu properties Lemma 7 For a r, p, and s [p] the set P s r, p) is a partition of[r] [p] Lemma 8 For a r p and S [p] If p is prime, then for a s = s S and t, t [p], D s,t D s,t We ony state here the resut of this construction for PIR codes, as we focus here mainy on batch codes Theorem 9 Let n = p, where p is a prime number, and k n The code Cr = p, p, S = [k]) is a k-pir code with redundancy k n In particuar, for a k n, r P n, k) = Ok n) For batch codes, this construction can resut with good batch codes as we as batch codes with restricted size for the recovering sets [3] Formay, a k-pir code, k-batch code, in which the size of each recovering set is at most r wi be caed an r, k)-pir code, r, k)-batch code, respectivey The idea here is to choose the set S in a way that for every bit, each of its recovering sets intersects with at most one recovering set of any other bit This property for constructing batch codes from PIR codes was proved in [9] and is stated beow Lemma 0 LetC be anr, k)-pir code Assume that for every distinct indices i, j [n], it hods that each recovering set of the ith bit intersects with at most one recovering set of the jth bit Then, the code C is an r, k)-batch code The main chaenge is to find sets S that wi generate recovering sets which satisfy the condition in Lemma 0 For that, we use the foowing definition Definition Let r be a positive integer, and S be a set of nonnegative integers We say that the set S does not contain an r- weighted arithmetic progression moduo p if there do not exist s, s, s 3 S and 0 < x, y < r, where x+ y < r, such that xs + ys = x+ y)s 3 mod p Given this definition, we prove the foowing theorem Theorem Let r p and S [p], S = k If p is prime, and S does not contain an r-weighted arithmetic progression moduo p, then the code C = Cr, p, S) is anr, k)-batch code of dimension rp

5 Proof: Assume that S = {s 0, s,,, s k } One can verify using Lemma 7 and 8 that for every [r] [p] the foowing sets R = {ρ,t } {x i, j : i, j ) D s,t \{}}, for [k] are k mutuay disjoint recovering sets for x i, j, where t [p] is chosen such that D s,t We denote DR ) = D s,t Thus C is r, k)-pir, and it remains to prove that C satisfies the condition of Lemma 0 Assume in the contrary that there exist two bits,i, j ) [r] [p] such that has a recovering set R that intersects with two recovering sets R i, j ), R i, j ) of i, j ) Assume b R R i, j ) and b R R i, j ) where b, b are codeword entries It can be verified that b, b don t correspond to parity bits Therefore, we denote b = x i, j, b = x i, j, for i, j ),i, j ) [r] [p] Denote DR ) = D s,t, DR i, j ) ) = D s,t, DR i, j ) ) = D s 3,t 3 for s, s, s 3 S and t, t, t 3 [p] Thus we get that i, j ),i, j ) D s,t,i, j ),i, j ) D s,t, and i, j ),i, j ) D s 3,t 3 From Lemma 7 and 8 we deduce that s = s = s 3 and i = i = i Assume wog i < i < i It foows that: j = t + i s p, j = t + i s p, j = t 3 + i s 3 p, j = t + i s p j = t + i s p j = t 3 + i s 3 p This impies that i i )s + i i )s 3 p = i i )s p, which is a contradiction since S does not contain an r-weighted arithmetic progression moduo p In order to compete the construction of batch codes, we are eft with the probem of finding arge sets S which satisfy the condition in Theorem That is, given r and p, our goa is to find the argest such a set S A simpe greedy agorithm can give the foowing resut Theorem 3 Let r, p be positive integers, such that p is prime Then there exists a set S with no r-weighted arithmetic progression moduo p of size at east k, where k is the argest integer such that p > k r The foowing theorem foows from these observations Theorem 4 For every r, k, et n = rp, where p is the smaest prime number such that k r < p Then, there exists an r r, k)-batch code of dimension n and rate r+k In particuar, the redundancy of the code equas kp According to Theorem 4 we are now at a point to construct k-batch codes with good redundancy Coroary 5 For any n and k such that k = o n), there exists a k-batch code of dimension n and redundancyon 3 k 5 3) In particuar, for 0 <ǫ < /, r B n, n ǫ ) = On /3+5ǫ/3 ) Proof: For n and k, et us choose r = n 3/k 3, and p is the smaest prime number such that k r < p Then, according to Theorem 4, there exists an r, k)-batch code of dimension pr > n and redundancy kp That is, the redundancy satisfies kp = Θk 3 r ) = Θn 3 k 5 3) The second statement in the coroary is estabished for k = n ǫ in the ast equation Let us denote r B k = n ǫ ) = On δ ) In Fig we pot the resuts on the asymptotic behavior of the redundancy of batch δ Batch codes Theorem 5) Batch codes Coroary 5) ǫ 05 ower bound od resuts ǫ Fig Asymptotic resuts for binary batch codes codes These pots are received from Coroary 5 in this section and Theorem 5 from Section V Note that the array construction improves the redundancy ony for ǫ < Lasty, we report on two more resuts that can be derived using the Array Construction Note that the second resut improves upon the one from [0], which states that r B n, 5) = O n ogn) Theorem 6 For every 0 < α <, k = On α ), and fixed r 3, there exists anr, k)-batch code with rate r r+k Theorem 7 Let n = p where p is a prime number The code C, that extends Cr = p, p, S = [5]) by adding a goba parity bit, is a 5-batch code with redundancy 5p+ = Θ n), and therefore r B n, 5) = Θ n) REFERENCES [] S Buzago, E Yaakobi, Y Cassuto, and P H Siege, Consecutive switch codes, Proc IEEE Int Symp Inf Theory, pp , Barceona, Spain, Juy 06 [] A Fazei, A Vardy, and E Yaakobi, PIR with ow storage overhead: Coding instead of repication, arxiv:505064, May 05 [3] Y Ishai, E Kushievitz, R Ostrovsky, and A Sahai, Batch codes and their appications, Proc of the 36-sixth Annua ACM Symposium on Theory of Computing, pp 6 7, Chicago, ACM Press, 004 [4] S Kopparty, S Saraf, and S Yekhanin, High-rate codes with subineartime decoding, in Proc of the Forty-third Annua ACM Symposium on Theory of Computing STOC), pp 67 76, New York, NY, 0 [5] S Lin and D J Costeo, Error Contro Coding, Prentice Ha, 004 [6] H Lipmaa and V Skachek, Linear batch codes, Coding Theory and Appications, CIM Series, vo 3 pp 45 53, 05 [7] JL Massey, Threshod Decoding, MIT Press, 963 [8] S Rao and A Vardy, Lower bound on the redundancy of PIR codes, arxiv: v, May 06 [9] A S Rawat, Z Song, A G Dimakis, and A Gá, Batch codes through dense graphs without short cyces, IEEE Trans Inform Theory, vo 6, pp , Apr 06 [0] A Vardy and E Yaakobi, Constructions of batch codes with nearoptima redundancy, Proc IEEE Int Symp Inf Theory, pp 97 0, Barceona, Spain, Juy 06 [] S Yekhanin, Locay decodabe codes, Foundations and Trends in Theoretica Computer Science, vo 6, no 3, pp39 55, 0 [] Z Wang, O Shaked, Y Cassuto, and J Bruck, Codes for network switches, Proc IEEE Int Symp on Inf Theory, pp , Istanbu, Turkey, Ju 03 [3] H Zhang and V Skachek, Bounds for batch codes with restricted query size, Proc IEEE Int Symp Inf Theory, pp 9 96, Barceona, Spain, Juy 06

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG

#A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG #A48 INTEGERS 12 (2012) ON A COMBINATORIAL CONJECTURE OF TU AND DENG Guixin Deng Schoo of Mathematica Sciences, Guangxi Teachers Education University, Nanning, P.R.China dengguixin@ive.com Pingzhi Yuan

More information

Partial permutation decoding for MacDonald codes

Partial permutation decoding for MacDonald codes Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics

More information

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr

More information

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS

NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS NOISE-INDUCED STABILIZATION OF STOCHASTIC DIFFERENTIAL EQUATIONS TONY ALLEN, EMILY GEBHARDT, AND ADAM KLUBALL 3 ADVISOR: DR. TIFFANY KOLBA 4 Abstract. The phenomenon of noise-induced stabiization occurs

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

Lecture Note 3: Stationary Iterative Methods

Lecture Note 3: Stationary Iterative Methods MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or

More information

Mat 1501 lecture notes, penultimate installment

Mat 1501 lecture notes, penultimate installment Mat 1501 ecture notes, penutimate instament 1. bounded variation: functions of a singe variabe optiona) I beieve that we wi not actuay use the materia in this section the point is mainy to motivate the

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

The Group Structure on a Smooth Tropical Cubic

The Group Structure on a Smooth Tropical Cubic The Group Structure on a Smooth Tropica Cubic Ethan Lake Apri 20, 2015 Abstract Just as in in cassica agebraic geometry, it is possibe to define a group aw on a smooth tropica cubic curve. In this note,

More information

C. Fourier Sine Series Overview

C. Fourier Sine Series Overview 12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a

More information

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete

Uniprocessor Feasibility of Sporadic Tasks with Constrained Deadlines is Strongly conp-complete Uniprocessor Feasibiity of Sporadic Tasks with Constrained Deadines is Strongy conp-compete Pontus Ekberg and Wang Yi Uppsaa University, Sweden Emai: {pontus.ekberg yi}@it.uu.se Abstract Deciding the feasibiity

More information

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES ANDRZEJ DUDEK AND ANDRZEJ RUCIŃSKI Abstract. For positive integers k and, a k-uniform hypergraph is caed a oose path of ength, and denoted by

More information

Threshold Circuits for Multiplication and Related Problems

Threshold Circuits for Multiplication and Related Problems Optima-Depth Threshod Circuits for Mutipication and Reated Probems Chi-Hsiang Yeh Dept. of Eectrica & Computer Engineering Queen s University Kingston, Ontario, Canada, K7K 3N6 E.A. Varvarigos, B. Parhami,

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract

Stochastic Complement Analysis of Multi-Server Threshold Queues. with Hysteresis. Abstract Stochastic Compement Anaysis of Muti-Server Threshod Queues with Hysteresis John C.S. Lui The Dept. of Computer Science & Engineering The Chinese University of Hong Kong Leana Goubchik Dept. of Computer

More information

arxiv: v1 [cs.db] 25 Jun 2013

arxiv: v1 [cs.db] 25 Jun 2013 Communication Steps for Parae Query Processing Pau Beame, Paraschos Koutris and Dan Suciu {beame,pkoutris,suciu}@cs.washington.edu University of Washington arxiv:1306.5972v1 [cs.db] 25 Jun 2013 June 26,

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

6 Wave Equation on an Interval: Separation of Variables

6 Wave Equation on an Interval: Separation of Variables 6 Wave Equation on an Interva: Separation of Variabes 6.1 Dirichet Boundary Conditions Ref: Strauss, Chapter 4 We now use the separation of variabes technique to study the wave equation on a finite interva.

More information

On colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018

On colorings of the Boolean lattice avoiding a rainbow copy of a poset arxiv: v1 [math.co] 21 Dec 2018 On coorings of the Booean attice avoiding a rainbow copy of a poset arxiv:1812.09058v1 [math.co] 21 Dec 2018 Baázs Patkós Afréd Rényi Institute of Mathematics, Hungarian Academy of Scinces H-1053, Budapest,

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

Pattern Frequency Sequences and Internal Zeros

Pattern Frequency Sequences and Internal Zeros Advances in Appied Mathematics 28, 395 420 (2002 doi:10.1006/aama.2001.0789, avaiabe onine at http://www.ideaibrary.com on Pattern Frequency Sequences and Interna Zeros Mikós Bóna Department of Mathematics,

More information

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS

SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS ISEE 1 SUPPLEMENTARY MATERIAL TO INNOVATED SCALABLE EFFICIENT ESTIMATION IN ULTRA-LARGE GAUSSIAN GRAPHICAL MODELS By Yingying Fan and Jinchi Lv University of Southern Caifornia This Suppementary Materia

More information

Analysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case

Analysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case Technica Report PC-04-00 Anaysis of Emerson s Mutipe Mode Interpoation Estimation Agorithms: The MIMO Case João P. Hespanha Dae E. Seborg University of Caifornia, Santa Barbara February 0, 004 Anaysis

More information

Research Article On the Lower Bound for the Number of Real Roots of a Random Algebraic Equation

Research Article On the Lower Bound for the Number of Real Roots of a Random Algebraic Equation Appied Mathematics and Stochastic Anaysis Voume 007, Artice ID 74191, 8 pages doi:10.1155/007/74191 Research Artice On the Lower Bound for the Number of Rea Roots of a Random Agebraic Equation Takashi

More information

arxiv: v1 [math.fa] 23 Aug 2018

arxiv: v1 [math.fa] 23 Aug 2018 An Exact Upper Bound on the L p Lebesgue Constant and The -Rényi Entropy Power Inequaity for Integer Vaued Random Variabes arxiv:808.0773v [math.fa] 3 Aug 08 Peng Xu, Mokshay Madiman, James Mebourne Abstract

More information

Report on PIR with Low Storage Overhead

Report on PIR with Low Storage Overhead Report on PIR with Low Storage Overhead Ehsan Ebrahimi Targhi University of Tartu December 15, 2015 Abstract Private information retrieval (PIR) protocol, introduced in 1995 by Chor, Goldreich, Kushilevitz

More information

Restricted weak type on maximal linear and multilinear integral maps.

Restricted weak type on maximal linear and multilinear integral maps. Restricted weak type on maxima inear and mutiinear integra maps. Oscar Basco Abstract It is shown that mutiinear operators of the form T (f 1,..., f k )(x) = R K(x, y n 1,..., y k )f 1 (y 1 )...f k (y

More information

Weakly-Private Information Retrieval

Weakly-Private Information Retrieval Weaky-Private Information Retrieva Hsuan-Yin Lin Siddhartha Kumar Eirik Rosnes Aexandre Grae i Amat and Eitan Yaakobi Simua UiB N 5020 Bergen Noray Department of Eectrica Engineering Chamers University

More information

Homogeneity properties of subadditive functions

Homogeneity properties of subadditive functions Annaes Mathematicae et Informaticae 32 2005 pp. 89 20. Homogeneity properties of subadditive functions Pá Burai and Árpád Száz Institute of Mathematics, University of Debrecen e-mai: buraip@math.kte.hu

More information

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines

Recursive Constructions of Parallel FIFO and LIFO Queues with Switched Delay Lines Recursive Constructions of Parae FIFO and LIFO Queues with Switched Deay Lines Po-Kai Huang, Cheng-Shang Chang, Feow, IEEE, Jay Cheng, Member, IEEE, and Duan-Shin Lee, Senior Member, IEEE Abstract One

More information

JENSEN S OPERATOR INEQUALITY FOR FUNCTIONS OF SEVERAL VARIABLES

JENSEN S OPERATOR INEQUALITY FOR FUNCTIONS OF SEVERAL VARIABLES PROCEEDINGS OF THE AMERICAN MATHEMATICAL SOCIETY Voume 128, Number 7, Pages 2075 2084 S 0002-99390005371-5 Artice eectronicay pubished on February 16, 2000 JENSEN S OPERATOR INEQUALITY FOR FUNCTIONS OF

More information

<C 2 2. λ 2 l. λ 1 l 1 < C 1

<C 2 2. λ 2 l. λ 1 l 1 < C 1 Teecommunication Network Contro and Management (EE E694) Prof. A. A. Lazar Notes for the ecture of 7/Feb/95 by Huayan Wang (this document was ast LaT E X-ed on May 9,995) Queueing Primer for Muticass Optima

More information

NIKOS FRANTZIKINAKIS. N n N where (Φ N) N N is any Følner sequence

NIKOS FRANTZIKINAKIS. N n N where (Φ N) N N is any Følner sequence SOME OPE PROBLEMS O MULTIPLE ERGODIC AVERAGES IKOS FRATZIKIAKIS. Probems reated to poynomia sequences In this section we give a ist of probems reated to the study of mutipe ergodic averages invoving iterates

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

FRIEZE GROUPS IN R 2

FRIEZE GROUPS IN R 2 FRIEZE GROUPS IN R 2 MAXWELL STOLARSKI Abstract. Focusing on the Eucidean pane under the Pythagorean Metric, our goa is to cassify the frieze groups, discrete subgroups of the set of isometries of the

More information

Rate-Distortion Theory of Finite Point Processes

Rate-Distortion Theory of Finite Point Processes Rate-Distortion Theory of Finite Point Processes Günther Koiander, Dominic Schuhmacher, and Franz Hawatsch, Feow, IEEE Abstract We study the compression of data in the case where the usefu information

More information

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm

Asymptotic Properties of a Generalized Cross Entropy Optimization Algorithm 1 Asymptotic Properties of a Generaized Cross Entropy Optimization Agorithm Zijun Wu, Michae Koonko, Institute for Appied Stochastics and Operations Research, Caustha Technica University Abstract The discrete

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea-Time Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process

More information

Pricing Multiple Products with the Multinomial Logit and Nested Logit Models: Concavity and Implications

Pricing Multiple Products with the Multinomial Logit and Nested Logit Models: Concavity and Implications Pricing Mutipe Products with the Mutinomia Logit and Nested Logit Modes: Concavity and Impications Hongmin Li Woonghee Tim Huh WP Carey Schoo of Business Arizona State University Tempe Arizona 85287 USA

More information

Akaike Information Criterion for ANOVA Model with a Simple Order Restriction

Akaike Information Criterion for ANOVA Model with a Simple Order Restriction Akaike Information Criterion for ANOVA Mode with a Simpe Order Restriction Yu Inatsu * Department of Mathematics, Graduate Schoo of Science, Hiroshima University ABSTRACT In this paper, we consider Akaike

More information

Melodic contour estimation with B-spline models using a MDL criterion

Melodic contour estimation with B-spline models using a MDL criterion Meodic contour estimation with B-spine modes using a MDL criterion Damien Loive, Ney Barbot, Oivier Boeffard IRISA / University of Rennes 1 - ENSSAT 6 rue de Kerampont, B.P. 80518, F-305 Lannion Cedex

More information

Codes between MBR and MSR Points with Exact Repair Property

Codes between MBR and MSR Points with Exact Repair Property Codes between MBR and MSR Points with Exact Repair Property 1 Toni Ernva arxiv:1312.5106v1 [cs.it] 18 Dec 2013 Abstract In this paper distributed storage systems with exact repair are studied. A construction

More information

A Fourier-Analytic Approach to List-Decoding for Sparse Random Linear Codes

A Fourier-Analytic Approach to List-Decoding for Sparse Random Linear Codes 53 IEICE TRANS. INF. & SYST., VOL.E98 D, NO.3 MARCH 015 PAPER Specia Section on Foundations of Computer Science New Spirits in Theory of Computation and Agorithm A Fourier-Anaytic Approach to List-Decoding

More information

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems

Convergence Property of the Iri-Imai Algorithm for Some Smooth Convex Programming Problems Convergence Property of the Iri-Imai Agorithm for Some Smooth Convex Programming Probems S. Zhang Communicated by Z.Q. Luo Assistant Professor, Department of Econometrics, University of Groningen, Groningen,

More information

RECENTLY, non-volatile memories (NVM) including

RECENTLY, non-volatile memories (NVM) including 64 IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 61, NO. 7, JULY 013 Dynamic Threshod Schemes for Muti-Leve Non-Voatie Memories Frederic Saa, Student Member, IEEE, RyanGabrys,Student Member, IEEE, and Lara

More information

Week 6 Lectures, Math 6451, Tanveer

Week 6 Lectures, Math 6451, Tanveer Fourier Series Week 6 Lectures, Math 645, Tanveer In the context of separation of variabe to find soutions of PDEs, we encountered or and in other cases f(x = f(x = a 0 + f(x = a 0 + b n sin nπx { a n

More information

K a,k minors in graphs of bounded tree-width *

K a,k minors in graphs of bounded tree-width * K a,k minors in graphs of bounded tree-width * Thomas Böhme Institut für Mathematik Technische Universität Imenau Imenau, Germany E-mai: tboehme@theoinf.tu-imenau.de and John Maharry Department of Mathematics

More information

Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes

Improved Decoding of Reed-Solomon and Algebraic-Geometric Codes Improved Decoding of Reed-Soomon and Agebraic-Geometric Codes Venkatesan Guruswami Madhu Sudan Abstract Given an error-correcting code over strings of ength n and an arbitrary input string aso of ength

More information

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness

Schedulability Analysis of Deferrable Scheduling Algorithms for Maintaining Real-Time Data Freshness 1 Scheduabiity Anaysis of Deferrabe Scheduing Agorithms for Maintaining Rea- Data Freshness Song Han, Deji Chen, Ming Xiong, Kam-yiu Lam, Aoysius K. Mok, Krithi Ramamritham UT Austin, Emerson Process Management,

More information

Homework 5 Solutions

Homework 5 Solutions Stat 310B/Math 230B Theory of Probabiity Homework 5 Soutions Andrea Montanari Due on 2/19/2014 Exercise [5.3.20] 1. We caim that n 2 [ E[h F n ] = 2 n i=1 A i,n h(u)du ] I Ai,n (t). (1) Indeed, integrabiity

More information

On the Goal Value of a Boolean Function

On the Goal Value of a Boolean Function On the Goa Vaue of a Booean Function Eric Bach Dept. of CS University of Wisconsin 1210 W. Dayton St. Madison, WI 53706 Lisa Heerstein Dept of CSE NYU Schoo of Engineering 2 Metrotech Center, 10th Foor

More information

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron

A Solution to the 4-bit Parity Problem with a Single Quaternary Neuron Neura Information Processing - Letters and Reviews Vo. 5, No. 2, November 2004 LETTER A Soution to the 4-bit Parity Probem with a Singe Quaternary Neuron Tohru Nitta Nationa Institute of Advanced Industria

More information

MIXING AUTOMORPHISMS OF COMPACT GROUPS AND A THEOREM OF SCHLICKEWEI

MIXING AUTOMORPHISMS OF COMPACT GROUPS AND A THEOREM OF SCHLICKEWEI MIXING AUTOMORPHISMS OF COMPACT GROUPS AND A THEOREM OF SCHLICKEWEI KLAUS SCHMIDT AND TOM WARD Abstract. We prove that every mixing Z d -action by automorphisms of a compact, connected, abeian group is

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons

Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Expectation-Maximization for Estimating Parameters for a Mixture of Poissons Brandon Maone Department of Computer Science University of Hesini February 18, 2014 Abstract This document derives, in excrutiating

More information

A. Distribution of the test statistic

A. Distribution of the test statistic A. Distribution of the test statistic In the sequentia test, we first compute the test statistic from a mini-batch of size m. If a decision cannot be made with this statistic, we keep increasing the mini-batch

More information

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version)

Approximate Bandwidth Allocation for Fixed-Priority-Scheduled Periodic Resources (WSU-CS Technical Report Version) Approximate Bandwidth Aocation for Fixed-Priority-Schedued Periodic Resources WSU-CS Technica Report Version) Farhana Dewan Nathan Fisher Abstract Recent research in compositiona rea-time systems has focused

More information

The EM Algorithm applied to determining new limit points of Mahler measures

The EM Algorithm applied to determining new limit points of Mahler measures Contro and Cybernetics vo. 39 (2010) No. 4 The EM Agorithm appied to determining new imit points of Maher measures by Souad E Otmani, Georges Rhin and Jean-Marc Sac-Épée Université Pau Veraine-Metz, LMAM,

More information

QUADRATIC FORMS AND FOUR PARTITION FUNCTIONS MODULO 3

QUADRATIC FORMS AND FOUR PARTITION FUNCTIONS MODULO 3 QUADRATIC FORMS AND FOUR PARTITION FUNCTIONS MODULO 3 JEREMY LOVEJOY AND ROBERT OSBURN Abstract. Recenty, Andrews, Hirschhorn Seers have proven congruences moduo 3 for four types of partitions using eementary

More information

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch The Eighth Internationa Symposium on Operations Research and Its Appications (ISORA 09) Zhangiaie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 402 408 Minimizing Tota Weighted Competion

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE arxiv:0.5339v [cs.it] 4 Dec 00 Abstract The probem of random number generation from an uncorreated

More information

BASIC NOTIONS AND RESULTS IN TOPOLOGY. 1. Metric spaces. Sets with finite diameter are called bounded sets. For x X and r > 0 the set

BASIC NOTIONS AND RESULTS IN TOPOLOGY. 1. Metric spaces. Sets with finite diameter are called bounded sets. For x X and r > 0 the set BASIC NOTIONS AND RESULTS IN TOPOLOGY 1. Metric spaces A metric on a set X is a map d : X X R + with the properties: d(x, y) 0 and d(x, y) = 0 x = y, d(x, y) = d(y, x), d(x, y) d(x, z) + d(z, y), for a

More information

Batch and PIR Codes and Their Connections to Locally Repairable Codes

Batch and PIR Codes and Their Connections to Locally Repairable Codes Batch and PIR Codes and Their Connections to Locally Repairable Codes Vitaly Skachek Abstract Two related families of codes are studied: batch codes and codes for private information retrieval. These two

More information

4 Separation of Variables

4 Separation of Variables 4 Separation of Variabes In this chapter we describe a cassica technique for constructing forma soutions to inear boundary vaue probems. The soution of three cassica (paraboic, hyperboic and eiptic) PDE

More information

(1 ) = 1 for some 2 (0; 1); (1 + ) = 0 for some > 0:

(1 ) = 1 for some 2 (0; 1); (1 + ) = 0 for some > 0: Answers, na. Economics 4 Fa, 2009. Christiano.. The typica househod can engage in two types of activities producing current output and studying at home. Athough time spent on studying at home sacrices

More information

Generalized Bell polynomials and the combinatorics of Poisson central moments

Generalized Bell polynomials and the combinatorics of Poisson central moments Generaized Be poynomias and the combinatorics of Poisson centra moments Nicoas Privaut Division of Mathematica Sciences Schoo of Physica and Mathematica Sciences Nanyang Technoogica University SPMS-MAS-05-43,

More information

CONGRUENCES. 1. History

CONGRUENCES. 1. History CONGRUENCES HAO BILLY LEE Abstract. These are notes I created for a seminar tak, foowing the papers of On the -adic Representations and Congruences for Coefficients of Moduar Forms by Swinnerton-Dyer and

More information

Lower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees

Lower Bounds for the Relative Greedy Algorithm for Approximating Steiner Trees This paper appeared in: Networks 47:2 (2006), -5 Lower Bounds for the Reative Greed Agorithm for Approimating Steiner Trees Stefan Hougard Stefan Kirchner Humbodt-Universität zu Berin Institut für Informatik

More information

Monomial Hopf algebras over fields of positive characteristic

Monomial Hopf algebras over fields of positive characteristic Monomia Hopf agebras over fieds of positive characteristic Gong-xiang Liu Department of Mathematics Zhejiang University Hangzhou, Zhejiang 310028, China Yu Ye Department of Mathematics University of Science

More information

ORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION

ORTHOGONAL MULTI-WAVELETS FROM MATRIX FACTORIZATION J. Korean Math. Soc. 46 2009, No. 2, pp. 281 294 ORHOGONAL MLI-WAVELES FROM MARIX FACORIZAION Hongying Xiao Abstract. Accuracy of the scaing function is very crucia in waveet theory, or correspondingy,

More information

An Exponential Lower Bound for Homogeneous Depth Four Arithmetic Formulas

An Exponential Lower Bound for Homogeneous Depth Four Arithmetic Formulas An Exponentia Lower Bound for Homogeneous Depth Four Arithmetic Formuas Neeraj Kaya Microsoft Research India neeraa@microsoft.com Chandan Saha Indian Institute of Science chandan@csa.iisc.ernet.in Nutan

More information

Completion. is dense in H. If V is complete, then U(V) = H.

Completion. is dense in H. If V is complete, then U(V) = H. Competion Theorem 1 (Competion) If ( V V ) is any inner product space then there exists a Hibert space ( H H ) and a map U : V H such that (i) U is 1 1 (ii) U is inear (iii) UxUy H xy V for a xy V (iv)

More information

CONSISTENT LABELING OF ROTATING MAPS

CONSISTENT LABELING OF ROTATING MAPS CONSISTENT LABELING OF ROTATING MAPS Andreas Gemsa, Martin Nöenburg, Ignaz Rutter Abstract. Dynamic maps that aow continuous map rotations, for exampe, on mobie devices, encounter new geometric abeing

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

Many-Help-One Problem for Gaussian Sources with a Tree Structure on their Correlation

Many-Help-One Problem for Gaussian Sources with a Tree Structure on their Correlation Many-Hep-One Probem for Gaussian Sources with a Tree Structure on their Correation Yasutada Oohama arxiv:090988v csit 4 Jan 009 Abstract In this paper we consider the separate coding probem for + correated

More information

Width of Percolation Transition in Complex Networks

Width of Percolation Transition in Complex Networks APS/23-QED Width of Percoation Transition in Compex Networs Tomer Kaisy, and Reuven Cohen 2 Minerva Center and Department of Physics, Bar-Ian University, 52900 Ramat-Gan, Israe 2 Department of Computer

More information

Math 124B January 31, 2012

Math 124B January 31, 2012 Math 124B January 31, 212 Viktor Grigoryan 7 Inhomogeneous boundary vaue probems Having studied the theory of Fourier series, with which we successfuy soved boundary vaue probems for the homogeneous heat

More information

A UNIVERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIVE ALGEBRAIC MANIFOLDS

A UNIVERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIVE ALGEBRAIC MANIFOLDS A UNIERSAL METRIC FOR THE CANONICAL BUNDLE OF A HOLOMORPHIC FAMILY OF PROJECTIE ALGEBRAIC MANIFOLDS DROR AROLIN Dedicated to M Saah Baouendi on the occasion of his 60th birthday 1 Introduction In his ceebrated

More information

A Graphical Approach for Solving Single Machine Scheduling Problems Approximately

A Graphical Approach for Solving Single Machine Scheduling Problems Approximately A Graphica Approach for Soving Singe Machine Scheduing Probems Approximatey Evgeny R Gafarov Aexandre Dogui Aexander A Lazarev Frank Werner Institute of Contro Sciences of the Russian Academy of Sciences,

More information

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems

Source and Relay Matrices Optimization for Multiuser Multi-Hop MIMO Relay Systems Source and Reay Matrices Optimization for Mutiuser Muti-Hop MIMO Reay Systems Yue Rong Department of Eectrica and Computer Engineering, Curtin University, Bentey, WA 6102, Austraia Abstract In this paper,

More information

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA)

FRST Multivariate Statistics. Multivariate Discriminant Analysis (MDA) 1 FRST 531 -- Mutivariate Statistics Mutivariate Discriminant Anaysis (MDA) Purpose: 1. To predict which group (Y) an observation beongs to based on the characteristics of p predictor (X) variabes, using

More information

arxiv: v1 [cs.db] 1 Aug 2012

arxiv: v1 [cs.db] 1 Aug 2012 Functiona Mechanism: Regression Anaysis under Differentia Privacy arxiv:208.029v [cs.db] Aug 202 Jun Zhang Zhenjie Zhang 2 Xiaokui Xiao Yin Yang 2 Marianne Winsett 2,3 ABSTRACT Schoo of Computer Engineering

More information

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay

Throughput Optimal Scheduling for Wireless Downlinks with Reconfiguration Delay Throughput Optima Scheduing for Wireess Downinks with Reconfiguration Deay Vineeth Baa Sukumaran vineethbs@gmai.com Department of Avionics Indian Institute of Space Science and Technoogy. Abstract We consider

More information

Generalised colouring sums of graphs

Generalised colouring sums of graphs PURE MATHEMATICS RESEARCH ARTICLE Generaised coouring sums of graphs Johan Kok 1, NK Sudev * and KP Chithra 3 Received: 19 October 015 Accepted: 05 January 016 First Pubished: 09 January 016 Corresponding

More information

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity

Error-free Multi-valued Broadcast and Byzantine Agreement with Optimal Communication Complexity Error-free Muti-vaued Broadcast and Byzantine Agreement with Optima Communication Compexity Arpita Patra Department of Computer Science Aarhus University, Denmark. arpita@cs.au.dk Abstract In this paper

More information

Theory of Generalized k-difference Operator and Its Application in Number Theory

Theory of Generalized k-difference Operator and Its Application in Number Theory Internationa Journa of Mathematica Anaysis Vo. 9, 2015, no. 19, 955-964 HIKARI Ltd, www.m-hiari.com http://dx.doi.org/10.12988/ijma.2015.5389 Theory of Generaized -Difference Operator and Its Appication

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna

More information