Codes between MBR and MSR Points with Exact Repair Property

Size: px
Start display at page:

Download "Codes between MBR and MSR Points with Exact Repair Property"

Transcription

1 Codes between MBR and MSR Points with Exact Repair Property 1 Toni Ernva arxiv: v1 [cs.it] 18 Dec 2013 Abstract In this paper distributed storage systems with exact repair are studied. A construction for regenerating codes between the minimum storage regenerating MSR and the minimum bandwidth regenerating MBR points is given. To the best of author s knowedge, no previous construction of exact-regenerating codes between MBR and MSR points is done except in the work by Tian et a. On contrast to their work, the methods used here are eementary. In this paper it is shown that in the case that the parameters n, k, and d are cose to each other, the given construction is cose to optima when comparing to the known functiona repair capacity. This is done by showing that when the distances of the parameters n, k, and d are fixed but the actua vaues approach to infinity, the fraction of the performance of constructed codes with exact repair and the known capacity of codes with functiona repair, approaches to one. Aso a simpe variation of the constructed codes with amost the same performance is given. A. Regenerating Codes I. INTRODUCTION In a distributed storage system a fie is dispersed across n nodes in a network such that given any k < n of these nodes one can reconstruct the origina fie. We aso want to have such a redundancy in our network that if we ose a node then any d < n of the remaining nodes can repair the ost node. We assume that each node stores the amount α of information, e.g., α symbos over a finite fied, and in the repair process each repairing node transmits the amount β to the new repacing node caed a newcomer and hence the tota repair bandwidth is γ = dβ. We aso assume that k d. The repair process can be either functiona or exact. By functiona repair we mean that the nodes may change over time, i.e., if a node v od i v od i is ost and in the repair process we get a new node v new i instead, then we may have vi new. If ony functiona repair is assumed then the capacity of the system, denoted by C k,d α, γ, is known. Namey, it was proved in the pioneering work by Dimakis et a. [2] that k 1 { C k,d α, γ = min α, d j } d γ. j=0 Part of this paper was presented at 2013 IEEE Information Theory Workshop, Sevie, Spain [1]. T. Ernva is with the Turku Centre for Computer Science, Turku, Finand and with the Department of Mathematics and Statistics, FI-20014, University of Turku, Finand e-mai:tmernv@utu.fi.

2 2 If the size of the stored fie is fixed to be B then the above expression for the capacity defines a trade-off between the node size α and the tota repair bandwidth γ. The two extreme points are caed the minimum storage regenerating MSR point and the minimum bandwidth regenerating MBR point. The MSR point is achieved by first minimizing α and then minimizing γ to obtain α = B k 1 db γ = kd k+1. By first minimizing γ and then minimizing α eads to the MBR point α = γ = 2dB k2d k+1 2 2dB k2d k+1. In this paper we wi study codes that have exact repair property. The concepts of exact regeneration and exact repair were introduced independenty in [3], [4], and [5]. Exact repair means that the network of nodes does not vary over time, i.e., if a node v od i denote by is ost and in the repair process we get a new node vi new, then vi od C exact n,k,dα, γ = vi new. We the capacity of codes with exact repair with n nodes each of size α, with tota repair bandwidth γ, and for which each set of k nodes can recover the stored fie and each set of d nodes can repair a ost node. We have by definition that C exact n,k,dα, γ C k,d α, γ. B. Reated Work It was proved in [6], [8], [9], and [10] that the codes with exact repair achieve the MSR point and in [6] that the codes with exact repair achieve the MBR point. The impossibiity of constructing codes with exact repair at essentiay a interior points on the storage-bandwidth tradeoff curve was shown in [7]. Other papers studying exact-regenerating codes in MSR point incude e.g. [11], [14], [12], and [13]. Locay repairabe codes that achieve repair bandwidth that fas beow the time-sharing trade-off of the MSR and MBR points are studied in [15]. To the best of author s knowedge, no previous construction of exact-regenerating codes between MBR and MSR points is done except in [17]. Our construction is very different to that. We do not use compex combinatoria structures but instead expoit some optima codes in MSR point. However, we require in our construction that storage symbos can be spit into a sufficienty arge number of subsymbos. Tian has shown in [16] that there exists a non-vanishing gap between the optima bandwidth-storage tradeoff of the functiona-repair regenerating codes and that of the exact-repair regenerating codes by characterizing the rate region of the exact-repair regenerating codes in the case n, k, d = 4, 3, 3.

3 3 C. Organization and Contributions In Section II we give a construction for codes between MSR and MBR points with exact repair. In Section III we derive some inequaities from our construction. Section IV provides an exampe showing that, in the specia case of n = k + 1 = d + 1, our construction is cose to optima when comparing to the known capacity when ony functiona repair is required. In Section V we show that when the distances of the parameters n, k, and d are fixed but the actua vaues approach to infinity, the fraction of performance of our codes with exact repair and the known capacity of functiona-repair codes approaches to one. In Section VI we give another construction with quite simiar performance. The main differences of this construction when compared to the construction of Section II is its easiness as advantage and reaxation of assumption of symmetric repair as its disadvantage. In Section VII we give yet two other constructions that have some simiarities with the construction of Section II. However, the performance of these constructions is reativey bad and the main interest of this section is the comparison of these constructions with the construction of Section II. To make it easier to compare our constructions we use notions Pn,k,d 1 α, γ, P n,k,d 2 α, γ, P n,k,d 3 α, γ, and Pn,k,d 4 α, γ to denote the performances of constructions of Section II, Section VI, Subsection VII-A, and Subsection VII-B, respectivey. It is cear that for j = 1, 2, 3, 4. P j n,k,d α, γ Cexact n,k,dα, γ II. MAIN CONSTRUCTION Assume we have a storage system DSS 1 with exact repair for parameters n, k, d with a node size α and the tota repair bandwidth γ = dβ. In this section we propose a construction that gives a new storage system for parameters n = n + 1, k = k + 1, d = d + 1. Let DSS 1 consist of nodes v 1,..., v n, and et the stored fie F be of maxima size Cn,k,d exact α, γ. Let then DSS 1+ denote a new system consisting of the origina storage system DSS 1 and one extra node v n+1 storing nothing. It is cear that DSS 1+ is a storage system for parameters and can store the origina fie F. n + 1, k + 1, d + 1 Let {σ j j = 1,..., n + 1!} be the set of permutations of the set {1,..., n + 1}. Assume that DSS new j storage system for j = 1,..., n + 1! corresponding to the permutation σ j such that DSS new j is a is exacty the same

4 4 as DSS 1+ except that the order of the nodes is changed corresponding to the permutation σ j, i.e., the ith node in DSS 1+ is the σ j ith node in DSS new j. Using these n + 1! new systems as buiding bocks we construct a new system DSS 2 such that its jth node for j = 1,..., n + 1 stores the jth node from each system DSS new i for i = 1,..., n + 1!. It is cear that this new system DSS 2 works for parameters n + 1, k + 1, d + 1, has exact repair property, and stores a fie of size n + 1!Cn,k,d exact α, γ. By noticing that there are n! such permutated copies DSSnew j, where the ith node is empty, we get that the node size of the new system DSS 2 is α 2 = n + 1! n!α = n n!α. Simiary, since an empty node does not need any repair we aso find that the tota repair bandwidth of the new system is γ 2 = n + 1! n!γ = n n!γ. Definition 2.1 Symmetric repair: By symmetric repair we mean that in the repair process of a ost node, each heper node transmits the same amount β of information. Let us fix some repairing scheme for subsystems. Namey, define β ijs {0, β} to be the amount of information when the ith node repairs the jth node and the other heper nodes have indices from the set S. Now γ if j n + 1 β ijs = 0 if j = n + 1 and hence β 2 = = = i S n+1 j=1 n j=1 n j=1 S [n+1]\{j} S =d+1 S [n+1]\{j} S =d+1 n d + 1 β ijs n d 1!d! i S γ n d 1!d! γ n d 1!d! d = n n! d + 1 β. This proves that our construction has symmetric repair property. The distributed storage system DSS 1 that we used as a starting point in our construction is not yet expicity fixed. We have just fixed that the used storage system is some optima system. To make it easier to foow our 1, in progress construction we use the notation Pn+1,k+1,d+1 α, γ to denote the performance of our incompete construction. The above reasoning impies the equaity 1, in progress Pn+1,k+1,d+1 n n!α, n n!γ = n + 1!Cexact n,k,dα, γ. 3 Dividing both sides by n n! gives 1, in progress Pn+1,k+1,d+1 n + 1 α, γ = n Cexact n,k,dα, γ. 4

5 5 Exampe 2.1: If we reax on the requirement of a DSS to have symmetric repair then the construction becomes a bit simper. Now, require instead ony that the tota repair bandwidth γ is constant i.e., β may take different vaues depending on the node. Let n, k, d = 3, 2, 2 and DSS 1 be a distributed storage system with exact repair. Let DSS new j be a storage system with 4 nodes for j = 1,..., 4 where the jth node stores nothing, the ith node for i < j stores as the ith node in the origina system DSS 1, and the ith node for i > j stores as the i 1th node in the origina system DSS 1. That is, in the jth subsystem DSS new j nodes are as those in the origina system DSS 1. the jth node stores nothing whie the other Using these four new systems as buiding bocks we construct a new system DSS 2 for parameters 4, 3, 3 such that its jth node for j = 1,..., 4 stores the jth node from each system DSS new i in DSS 2 stores 4 1α = 3α and the tota repair bandwidth is 4 1γ = 3γ. for i = 1,..., 4. Hence each node For exampe, if the origina system DSS 1 consists of nodes v 1 storing x, v 2 storing y, and v 3 storing x + y then DSS new 1 consists of nodes u 11 storing nothing, u 12 storing x 1, u 13 storing y 1, and u 14 storing x 1 + y 1. Simiary DSS new 2 consists of nodes u 21 storing x 2, u 22 storing nothing, u 23 storing y 2, and u 24 storing x 2 + y 2 and so on. Then in the resuting system the first node w 1 consists of nodes u 11 storing nothing, u 21 storing x 2, u 31 storing x 3, and u 41 storing x 4. The stored fie is x 1, x 2, x 3, x 4, y 1, y 2, y 3, y 4. w 1 : x 2 x 3 x 4 w 2 : x 1 y 3 y 4 w 3 : y 1 y 2 x 4 +y 4 w 4 : x 1 +y 1 x 2 +y 2 x 3 +y 3 Fig. 1. The figure iustrates the DSS buit in Exampe 2.1. It consists of nodes w 1, w 2, w 3, and w 4. III. BOUNDS FROM THE CONSTRUCTION Next we wi derive some inequaities for the capacity in the case of exact repair. Using Equation 4 inductivey we get Theorem 3.1: For an integer j [0, k 1] we have Cn,k,d exact α, γ n n j Cexact n j,k j,d jα, γ. It is proved in [6], [8], [9], and [10] that the MSR point can be achieved if exact repair is assumed. As a consequence of this and Theorem 4 we get the foowing bound.

6 6 Theorem 3.2: For integers 1 i k we have α, C exact n,k,d d k + iα Proof: Write n = n j, k = k j, d = d j, α = B k, and γ = in [6], [8], [9], and [10] that i.e., Hence by Theorem 3.1 we have Cn exact,k,d α, γ = B, niα n k + i. Cn j,k j,d j exact d jα α, = k jα. Cn,k,d exact d jα nk jα α,. n j Now a change of variabes by setting i = k j gives us the resut. d B k d k +1. It is proved for the MSR point Our construction is now ready since we have decided to use MSR optima codes as a starting point for our construction. So et us use the notion P 1 n,k,d α, d k + iα = for integers i = 1,..., k, to note the performance of our construction. niα n k + i Exampe 3.1: Tian characterized the rate region of the exact-repair regenerating codes in the case n, k, d = 4, 3, 3 in [16]. In this exampe we wi compare our construction to this. In [16] the stored fie is assumed to be of size 1 and then the rate-region of exact-regenerating codes is characterized by foowing pairs of α, β: 1 3, 1 3, 3 8, 1 4, and 1 2, 1 6. These correspond to foowing pairs of α, γ: 1 3, 1, 3 8, 3 4, and 1 2, 1 2, i.e., 1 Cexact 4,3,3 3, 1 = 1, C4,3,3 exact 3 8, 3 4 = 1, and C exact 1 4,3,3 2, 2 1 = 1. Theorem 3.2 gives in this same specia case for integers i = 1, 2, 3. P 1 4,3,3α, iα = 4iα 1 + i Hence P 1 4,3,3 α, α = 2α, P 1 4,3,3 α, 2α = 8α 3, and P 1 4,3,3 α, 3α = 3α. By substituting into these α = 1 2, 3 8, 1 3, respectivey, we get exacty the same performances as in [16]. 5 IV. EXAMPLE: CASE n = k + 1 = d + 1 In this section we study the specia case n = k + 1 = d + 1 and compare the resuting capacity with exact repair to the known capacity with the assumption of functiona repair, n 2 { C n 1,n 1 α, γ = min Our construction gives codes with performance j=0 α, n 1 j n 1 γ P 1 n,n 1,n 1α, iα = niα 1 + i }.

7 7 for integers i = 1,..., k. Notice that now in the extreme points our performance P 1 n,n 1,n 1 achieves the known capacity, i.e., C exact n,n 1,n 1α, α = P 1 n,n 1,n 1α, α = nα 2 for the MBR point and C exact n,n 1,n 1α, kα = P 1 n,n 1,n 1α, kα = n 1α for the MSR point. As an exampe we study the fraction P 1 n,n 1,n 1α, iα C n 1,n 1 α, iα = for integers i [1, k]. Writing it out we see that where T = n 11 1 i. = P 1 n,n 1,n 1α, iα C n 1,n 1 α, iα ni 1+i T j=0 1 + n 2 j=t +1 = T For arge vaues of n this is approximatey for a i = 1,..., k. with i 2n 1 niα 1+i { } n 2 j=0 min α, n 1 j n 1 iα n 1 j n 1 ni 1+i i n T 1n T 2, 2i 2 2i 2 + i Notice that if we had chosen n = k + 2 = d + 2 instead of n = k + 1 = d + 1, then we woud have ended up 2i 2 2i 2 + 3i 2. Simiary, if we had chosen n = k + 3 = d + 3 then we woud have ended up with 2i 2 2i 2 + 5i 3. These both are aso cose to 1 when i is not too sma. For this reason we wi study the asymptotic behavior of the capacity curve more carefuy in the next section. 6 V. THE CASE WHEN n, k AND d ARE CLOSE TO EACH OTHER Next we wi study the specia case where n, k and d are cose to each other. We wi do this by setting n M = n + M, k M = k + M and d M = d + M and etting M, and then examine how the capacity curve asymptoticay behaves. The exampe in the previous section showed us that in that specia case the performance Pn,k,d 1 α, γ is quite cose to the capacity of functionay regenerating codes. However, in the previous section we

8 8 TABLE I THE PERFORMANCE OF CONSTRUCTION OF SECTION II n, k, d = 100, 99, 99 n, k, d = 100, 96, 98 n, k, d = 100, 95, n, k, d = 100, 90, 90 n, k, d = 100, 85, 90 n, k, d = 100,, 85 The figures show the performance Pn,k,d 1 of codes from construction of Section II dotted curve between the capacity of functionay repairing codes uppermost curve and the trivia ower bound given by interpoation of the known MSR and MBR points with different n, k, d. Here α = 1, and γ [1, d d k+1 ]. fixed i to be an integer and then assumed that n is arge. In this section we tie up the vaues i and M together to arrive at a situation where the tota repair bandwidth stays on a fixed point between its minima possibe vaue given by the MBR point and its maxima possibe vaue given by the MSR point. For each M our construction gives a code with performance Pn 1 M,k M,d M α, d M k M + iα d M k M + 1 for i = 1,..., k M, hence Pn 1 M,k M,d M α, d M k M +xα these points. d M k M +1 = n M iα n k + i with x [1, k] is the piecewise inear curve connecting Let s 0, 1] be a fixed number and i = 1 + sk M 1. We wi study how the fraction Pn 1 M,k M,d M α, d M k M +iα d M k M +1 C km,d M α, d M k M +iα d M k M +1 behaves as we et M. Informay this tes how cose our performance curve and the known capacity curve are to each other when M is arge, i.e., vaues n M, k M, d M are cose to each other. Remark 5.1: In the MSR point we have γ MSR = d M α d M k M + 1

9 9 and in the MBR point γ MBR = α. Hence α dm k M + i d M k M + 1 = sγ MSR + 1 sγ MBR. Theorem 5.1: Let s 0, 1] be a fixed number and i = 1 + sk M 1. Then Pn 1 M,k M,d M α, d M k M +iα d M k M +1 im M C km,d M α, d M k M +iα d M k M +1 = 1. The proof is rather technica and is hence postponed to Appendix. As a straightforward coroary to Theorem 5.1 we have Theorem 5.2: Let s [0, 1] be a fixed number and et γ MSR = d M α d M k M +1 and γ MBR = α. Then Cn exact im M,k M,d M α, sγ MSR + 1 sγ MBR = 1. M C km,d M α, sγ MSR + 1 sγ MBR VI. A SIMPLER CONSTRUCTION In this section we wi give a construction of a distributed storage system that again uses optima codes at the MSR point as buiding bocks. There are two important differences to the main construction in Section II of this paper. The first difference is the easiness of the construction of this section. The second is that this construction has no symmetric repair. We ony require that the tota repair bandwidth is fixed to be γ but it can consist of varying βs. A. Construction We are interested in to design a storage system for given parameters n, k, d and α, γ. Write ɛ = n k and Choose Z + integers n 1,..., n such that δ = n d. n j ɛ + 1 for a j = 1,..., and n = n n. For this choice, write k j = n j ɛ and d j = n j δ for a j = 1,...,.

10 10 Assume we have storage systems DSS 1,..., DSS corresponding parameters n 1, k 1, d 1,..., n, k, d, respectivey. Each of these systems has node size α and tota repair bandwidth γ. Suppose we put these systems together to get a new bigger system DSS big with n n = n nodes and storing the same fies that origina systems DSS 1,..., DSS store. This is indeed a distributed storage system for parameters n, k, d and α, γ: It is cear that we have n nodes, each of size α. Each set of k nodes can recover the fie: Indeed, there are ɛ = n k nodes that are not part of the reconstruction process. Hence of each subsystem DSS j we have at east n j ɛ = k j nodes that are part of the reconstruction process and hereby we can recover the corresponding fie and hence the whoe fie. By the same argumentation as above we notice that contacting any d of the nodes we can repair a ost node. Hence we ony have to downoad the same amount of information in the repair process of this new bigger system as in the repair process of the corresponding subsystem the tota repair bandwidth is indeed γ. Remark 6.1: The main disadvantage of constructed storage systems of this section is that they do not have symmetric repair. By shuffing the nodes corresponding to each permutation on set {1,..., n} as in the construction of Section II woud give a DSS with symmetric repair and same performance. However, this woud destroy the main advantage of this construction, namey its easiness. v 11 DSS 1 DSS 2 DSS v 12 v 1n1 v 21 v 22 v 2n2 v 1 v 2 v 11 v 12 v 1n1 v 21 v 22 v 2n2 v 1 v 2 v n DSS big v n Fig. 2. The figure iustrates the construction of Section VI. First we have storage systems DSS 1,..., DSS and then we just put them together to get a new storage system DSS big.

11 11 B. The Performance of the Construction In the construction we did not stick to any fixed type of subsystem. Hence we have the foowing genera inequaity. Proposition 6.1: Given positive integers n, k, d with k d < n and the decomposition of n to positive integers n 1,..., n with n = n n and n j n k + 1 for a j = 1,...,. Define aso integers k j = n j n + k and d j = n j n + d for j = 1,...,. Then we have C exact n,k,dα, γ j=1 Proof: The setup is just as in the construction of subsection VI-A. To make it easier to foow, et us use the notation P construction. By above, we have 2, in progress Pn,k,d α, γ = C exact n j,k j,d j α, γ. 7 2, in progress n,k,d j=1 α, γ for the performance of this incompete C exact n j,k j,d j α, γ. 8 Next we wi fix the subsystems DSS 1,..., DSS and then derive another ower bound for the performance of our construction of exact-regenerating codes. Let n n j = for j = 1,..., 1 and Then n n = n 1. k 1 = n 1 n + k, d 1 = n 1 n + d, n k = n n + k = k 1 and n d = n n + d = d 1. By substituting these into the equaity 8 we get P 2, in progress n,k,d α, γ = 1Cn exact 1,k 1,d 1 α, γ + Cn exact,k,d α, γ.

12 12 To finish our construction we again use MSR optima codes as buiding bocks and substitute in the above giving C exact n 1,k 1,d 1 α, By noticing that d 1α d k+1 C exact n,k,d and then defining α new = d k+1γ d γ = = k 1 α and hence α, d 1 α α = = d1α d, i.e., d 1 α d 1 k = d 1 α 1k 1 α + C exact n,k,d α, γ γ d 1 d d 1 α. we find that C exact n,k,d α, γ = d α new = d α new d k + 1 d 1 α Cn exact,k,d α new, d 1 α = Cn exact d α new,k,d α new, d k = k α new = k d 1 α d. Here the second to the ast equaity was again because of the fact that we know that the MSR point can be achieved by exact-regenerating codes. In the cacuation above giving the inequaity Cn exact d,k,d α, 1α d k+1 k d 1α d we just adapted the biggest possibe MSR code when the upper bounds for node size and tota repair bandwidth was given. The reason for this is that we are eager to give a very simpe construction by using aready known MSR codes as buiding bocks. So now we are ready to give a new ower bound for the capacity of exact-regenerating codes. n Theorem 6.2: For integers 1 n+1 k we have Cn,k,d exact d 1 α α, 1k 1 + k d 1 α 10 d with n k 1 = n n + k and d 1 = n + d and n k = k 1 n and d = d 1. Proof: By the above reasoning we have the inequaity 10 for given if we can spit our n, k, d storage system into pieces by the above way. This is possibe if we have 1 k 1 d 1 n 1 1 and 1 k d n 1. The first chain of inequaities is proved by noticing that d 1 = n 1 n + d n 1 1,

13 13 and n k 1 = n 1 n + k = n + k n n n+1 k n + k = 1 d 1 k 1 = n 1 n + d n 1 n + k = d k 0. The second chain of inequaities is proved by noticing that and k k 1n d = n n d n 1, = k n + n k n + n n n+1 k d k = n n + d n n + k = d k 0. = 1 Hence the performance of our construction is α, for 1 n n+1 k. P 2 n,k,d d 1 α = 1k 1 + k d 1 α 11 d Exampe 6.1: Let n, k, d = 3, 2, 2. Suppose a system with the first node storing x, second node storing y and third node storing x + y. This MSR-optima code storing a fie x, y has node size α = 1 and tota repair bandwidth γ = 2β = 2. Take three copies of this system to form a bigger system with nine nodes: x 1, y 1, x 1 + y 1, x 2, y 2, x 2 + y 2, x 3, y 3, x 3 + y 3. Simiary as in our construction this is a storage system with n, k, d = 9, 8, 8, node size α = α = 1, and tota repair bandwidth γ = 2. It stores a fie x 1, y 1, x 2, y 2, x 3, y 3 of size 6. C. Connection to the Construction of Section II i.e., Consider equaity 11 in the case divides n, i.e., n = n 1. In that case we have k 1 = k and d 1 = d and hence Pn,k,d 2 d 1 α α, = k 1 α, P 2 n,k,d Let j = k n + n. Since 1 α, n n + dα n we have j k n + n+1 k = n n + kα. 12 n n n+1 k = 1 and j k n + n = k. Hence

14 14 TABLE II THE PERFORMANCE OF CONSTRUCTION OF SECTION VI n, k, d = 100, 99, 99 n, k, d = 100, 96, 98 n, k, d = 100, 95, n, k, d = 100, 90, 90 n, k, d = 100, 85, 90 n, k, d = 100,, 85 The figures show the performance Pn,k,d 2 of codes from construction of Section VI dotted curve between the capacity of functionay repairing codes uppermost curve and the trivia ower bound given by interpoation of the known MSR and MBR points with different n, k, d. Here α = 1, and γ [1, d d k+1 ]. we can use Equation 5 with this vaue. We get Pn,k,d 1 α, n n + dα = Pn,k,d 1 so the performances Pn,k,d 1 and P n,k,d 2 are same in this case. = α, njα n k + j = nk n + n α n d k + jα = n n + kα = Pn,k,d 2 α, n n + dα This tes us that the performance of the construction of Section II and the performance of the construction of Section VI are exacty the same whenever divides n, i.e., whenever the atter construction is buit using optima MSR codes of equa size n. The expanation for the simiarity of the performances of these two constructions is that the main idea of the both constructions is to increase vaues k and d but to restrain the vaues α and γ. 13

15 15 VII. COMPARISON TO SIMILAR CONSTRUCTIONS The main idea in our construction of Section II was to add a new empty node in the storage system. The benefit of this was the reduction of the average node size and the average tota repair bandwidth. The drawback was that we had to increase parameters k and d. In this section we study what happens if we add something ese than an empty node in the system. We try out what happens when adding an exact copy of some existing node and when adding the stored fie itsef. We wi see that these variations are not very usefu. The performance of the construction of Subsection VII-A is moderate but the performance of the construction of Subsection VII-B is not good. The key differences wi be summarized in Subsection VII-C. A. Construction by Copying Nodes Assume we have a storage system DSS 1 with exact repair for parameters n, k, d with the node size α and the tota repair bandwidth γ = dβ. In this section we propose a construction that gives a new storage system for parameters n = n +, k = k +, d = d + for integers = 1,..., k 1. Let DSS 1 consist of the nodes v 1,..., v n, and et the stored fie F be of maxima size Cn,k,d exact α, γ. Let then DSS 1+ denote a new system consisting of the origina storage system DSS 1 and extra nodes v n+1,..., v n+ such that v n+j is the exact copy of the node v j for j = 1,...,. It is cear that DSS 1+ is a storage system for parameters and can store the origina fie F. n +, k +, d + Again we use permutations just simiary as in the construction of Section II: et {σ j j = 1,..., n +!} be the set of permutations of the set {1,..., n + }. Assume that DSS new j corresponding to the permutation σ j such that DSS new j is a storage system for j = 1,..., n +! is exacty the same as DSS 1+ except that the order of the nodes is changed corresponding to the permutation σ j, i.e., the ith node in DSS 1+ is the σ j ith node in DSS new j. Using these n +! new systems as buiding bocks we construct a new system DSS 2 such that its jth node for j = 1,..., n + stores the jth node from each system DSS new i for i = 1,..., n +!. It is cear that this new system DSS 2 works for parameters n +, k +, d +, has exact repair property, and stores a fie of size n +!C exact n,k,d α, γ. The node size of the new system DSS 2 is α 2 = n +!α. When repairing a node there are 2d + n + 2! subsystems in which the exact copy of the ost node is one of the heper nodes. Hence there are n +! 2d + n + 2! subsystems in which this not the case. So

16 16 the tota repair bandwidth is γ 2 = 2d + n + 2!α + n +! 2d + n + 2!γ Hence the performance of this incompete construction is 3, in progress Pn+,k+,d+ α 2, γ 2 = n +!Cn,k,dα, exact γ that is 3, in progress Pn+,k+,d+ α, γ 3 = Cn,k,dα, exact γ 14 for = 1,..., k 1 with γ 3 = γ 3 = γ n+!, that is, 2d + n + n + 1 α + 1 2d + n + n + 1 γ. By the change of variabes n = n +, k = k +, d = d + we obtain for = 1,..., k 1 2 with γ 4 = P 3, in progress n,k,d α, γ 4 = Cn,k,d α, exact γ 15 2d nn 1 α + 1 2d nn 1 γ. Finish again the construction by using MSR-optima codes as a starting point. The performance we obtain is P 3 n,k,dα, γ 4 = k α 16 with γ 4 = 2d nn d d α. nn 1 B. Construction by Adding the Fie Assume we have a storage system DSS 1 with exact repair for parameters n, k, d with the node size α and the tota repair bandwidth γ = dβ. In this section we propose a construction that gives a new storage system for parameters n = n + 1, k = k, d = d. Let DSS 1 consist of the nodes v 1,..., v n, and et the stored fie F be of maxima size Cn,k,d exact α, γ. Let then DSS 1+ denote a new system consisting of the origina storage system DSS 1 and one extra node v n+1 storing the whoe fie F. It is cear that DSS 1+ is a storage system for parameters and can store the origina fie F. n + 1, k, d Again we use permutations just simiary as in the construction of Section II: et {σ j j = 1,..., n + 1!} be the set of permutations of the set {1,..., n + 1}. Assume that DSS new j is a storage system for j = 1,..., n + 1!

17 17 TABLE III THE PERFORMANCE OF THE CONSTRUCTION OF SECTION VII-A n, k, d = 100, 99, 99 n, k, d = 100,, 85 The figure shows the performance Pn,k,d 3 of codes from the construction of Subsection VII-A dotted curve between the capacity of functionay repairing codes uppermost curve and the trivia ower bound given by interpoation of the known MSR and MBR points with different n, k, d. corresponding to the permutation σ j such that DSS new j is exacty the same as DSS 1+ except that the order of the nodes is changed corresponding to the permutation σ j, i.e., the ith node in DSS 1+ is the σ j ith node in DSS new j. Using these n + 1! new systems as buiding bocks we construct a new system DSS 2 such that its jth node for j = 1,..., n + 1 stores the jth node from each system DSS new i for i = 1,..., n + 1!. It is cear that this new system DSS 2 works for parameters n + 1, k, d, has exact repair property, and stores a fie of size n + 1!Cn,k,d exact α, γ. By noticing that there are n! such permutated copies DSSnew j where the ith node is storing the whoe fie we get that the node size of the new system DSS 2 is α 2 = n + 1! n!α + n!c exact n,k,dα, γ = n!nα + C exact n,k,dα, γ Since to repair a node storing the whoe fie can be done by bandwidth of size kα and repairing a node when the whoe fie is one of the heper nodes requires bandwidth α, we find that the tota repair bandwidth of the new

18 18 system is γ 2 =nn 1 n d n d!γ + ndn 1 n d + 1 n d!α + n!kα 17 =n!n dγ + d + kα Hence the performance of this incompete construction is that is P P 4, in progress n+1,k,d 4, in progress n+1,k,d =n + 1C exact n,k,dα, γ. α 2, γ 2 = n + 1!C exact n,k,dα, γ nα + Cn,k,dα, exact γ, n dγ + d + kα Substituting MSR point into above gives a code with performance dn d Pn+1,k,d 4 n + kα, + d + k α = n + 1kα i.e. P 4 n+1,k,d α, nd + d k2 + kα = n + k n + 1kα. n + k However, this construction is useess because it is easy to verify that this performance is stricty worse than the trivia ower bound by timesharing when d > k and it ies on the timesharing ine when k = d. 18 C. Summary of Differences of Different Approaches Despite the cear simiarities of the construction techniques, there is a huge difference on the performances Pn,k,d 1 α, γ, P n,k,d 3 α, γ, and P n,k,d 4 α, γ of codes constructed using these different approaches. In the cases where the performance Pn,k,d 1 α, γ of the construction of Section II is very poor, the construction of Section VII-B performs better. However, the performance Pn,k,d 4 α, γ of the construction of Section VII-B is sti worse than the one achieved by timesharing of MSR and MBR points. Comparing to the trivia ower bound given by timesharing MBR and MSR points one can summarize that the construction of Subsection VII-B is useess, the construction of Subsection VII-A is in certain cases quite good, and the construction of Section II is in certain cases very good. VIII. CONCLUSIONS We have constructed exact-regenerating codes between MBR and MSR points. To the best of author s knowedge, no previous construction of exact-regenerating codes between MBR and MSR points is done except in [17]. Compared to that construction, our construction is very different. We have shown in this paper that when n, k, and d are cose to each other, the capacity of a distributed storage system when exact repair is assumed is essentiay the same as when ony functiona repair is required. This was

19 19 proved by using a specific code construction expoiting some aready known codes achieving the MSR point on the trade-off curve and by studying the asymptotic behavior of the capacity curve. A very easy aternative construction for the main construction of this paper was presented. Its performance is amost as good as the performance of the main construction and it is simpe to buid up. The drawback of this construction was that it has no symmetric repair. Aso we have constructed two constructions in a simiar manner as the main construction. These were to be compared to the main construction. Despite the cear simiarities of these three constructions their performances vary hugey. However, when n, k, and d are not cose to each other then the performance of our main construction is not good when compared to the capacity of functionay repairing codes. However, there is no evidence that the capacity of a distributed storage system when exact repair is assumed is generay cose to the capacity of functionay repairing codes. So as a future work it is sti eft to find the precise expression of the capacity of a distributed storage system when exact repair is assumed, and especiay to study the behavior of the capacity when n, k, and d are not cose to each other. IX. ACKNOWLEDGMENTS This research was party supported by the Academy of Finand grant # and by the Emi Aatonen Foundation, Finand, through grants to Camia Hoanti. Prof. Saim E Rouayheb at the Iinois Institute of Technoogy is gratefuy acknowedged for usefu discussions. Prof. Camia Hoanti at the Aato University is gratefuy acknowedged for usefu comments on the first draft of this paper. have i i and APPENDIX The proof of Theorem 5.1: Let i = 1 + sk M 1. We study the behavior of the fraction for arge M, so we We have 1. Thus, to simpify the notation, we may assume that i acts as an integer. We aso use the notation t = d M sk M 1 + sk M 1. Pn 1 M,k M,d M α, d M k M sk M 1α d M k M + 1 = n M 1 + sk M 1α n k + i C km,d M α, d M k M + iα d M k M + 1 t =α 1 + =α k M 1 d M j d k + i d j=0 j=t+1 M t k M t 12d + M k td k + i 2d M, 19 20

20 20 whence where and P 1 n M,k M,d M C km,d M α, d M k M +iα d M k M +1 α, d M k M +iα d M k M +1 h 1 M = h 2 Mh 3 M + h 4 M, h 1 M = 2n M 1 + sk M 1d M, h 2 M = n k sk M 1, h 3 M = 2t + 1d M, h 4 M = k M t 12d k + M t + sk M and Now it is easy to check that as M. Note that when M is arge and hence as M. Finay, as M, proving the caim. h 4 M M 2 h 1 M M 3 2s, h 2 M M s, h 3 M M 2 2 M t ds s = k M t 12d k + M t M 0 s = 0 = P 1 n M,k M,d M C km,d M h 2M M + sk M 1 M α, d M k M +iα d M k M +1 α, d M k M +iα d M k M +1 h 1M M 3 h3m+h4m M 2 2s s2 + 0 =

21 21 REFERENCES [1] T. Ernva, Exact-Regenerating Codes between MBR and MSR Points, Proc. IEEE Information Theory Workshop, Sevie, Spain, September [2] A. G. Dimakis, P. B. Godfrey, Y. Wu, M. J. Wainwright, and K. Ramchandran, Network coding for distributed storage systems, IEEE Transactions on Information Theory, vo. 56, no. 9, pp , September [3] K. V. Rashmi, Nihar B. Shah, P. Vijay Kumar, and K. Ramchandran, Expicit Construction of Optima Exact Regenerating Codes for Distributed Storage. Avaiabe: arxiv: v2 [cs.it] [4] Y. Wu and A. G. Dimakis, Reducing Repair Traffic for Erasure Coding-Based Storage via Interference Aignment, in Proc. IEEE Internationa Symposium on Information Theory ISIT, Seou, Juy 2009, pp [5] D. Cuina, A. G. Dimakis, and T. Ho, Searching for Minimum Storage Regenerating Codes, in Proc. 47th Annua Aerton Conference on Communication, Contro, and Computing, Urbana-Champaign, September [6] K. V. Rashmi, Nihar B. Shah, and P. Vijay Kumar, Optima Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction, IEEE Transactions on Information Theory, vo. 57, no. 8, pp , August [7] Nihar B. Shah, K. V. Rashmi, P. Vijay Kumar, and K. Ramchandran, Distributed Storage Codes With Repair-by-Transfer and Nonachievabiity of Interior Points on the Storage-Bandwidth Tradeoff, IEEE Transactions on Information Theory, vo. 58, no. 3, pp , March [8] V. R. Cadambe, S. A. Jafar, and H. Maeki, Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functiona Repair are Asymptoticay Equay Efficient, Avaiabe: arxiv: v1 [cs.it] [9] C. Suh and K. Ramchandran: On the Existence of Optima Exact-Repair MDS Codes for Distributed Storage, Avaiabe: arxiv: v1 [cs.it] [10] V. R. Cadambe, S. A. Jafar, H. Maeki, K. Ramchandran and C. Suh: Asymptotic Interference Aignment for Optima Repair of MDS codes in Distributed Data Storage, Avaiabe: [11] V. R. Cadambe, C. Huang, J. Li, Permutation Code: Optima Exact-Repair of a Singe Faied Node in MDS Code Based Distributed Storage Systems, in Proc. IEEE Internationa Symposium on Information Theory ISIT, Saint Petersburg, August 2011, pp [12] V. R. Cadambe, C. Huang, S. A. Jafar, J. Li, Optima Repair of MDS Codes in Distributed Storage via Subspace Interference Aignment. Avaiabe: arxiv: [cs.it] [13] I. Tamo, Z. Wang, J. Bruck Zigzag Codes: MDS Array Codes with Optima Rebuiding, IEEE Transactions on Information Theory, vo. 59, no. 3, pp , March [14] D. S. Papaiiopouos, A. G. Dimakis, V. R. Cadambe, Repair Optima Erasure Codes through Hadamard Designs. Avaiabe: arxiv: [cs.it] [15] G. M. Kamath, N. Prakash, V. Laitha, P. V. Kumar, Codes with Loca Regeneration. Avaiabe: arxiv: [cs.it] [16] C. Tian, Rate Region of the 4,3,3 Exact-Repair Regenerating Codes, in Proc. IEEE Internationa Symposium on Information Theory ISIT, Istanbu, Juy 2013, pp [17] C. Tian, V. Aggarwa, V. A. Vaishampayan, Exact-Repair Regenerating Codes Via Layered Erasure Correction and Bock Designs, in Proc. IEEE Internationa Symposium on Information Theory ISIT, Istanbu, Juy 2013, pp

Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes

Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Ankit Singh Rawat CS Department Carnegie Mellon University Pittsburgh, PA 523 Email: asrawat@andrewcmuedu O Ozan Koyluoglu Department

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes

More information

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents

MARKOV CHAINS AND MARKOV DECISION THEORY. Contents MARKOV CHAINS AND MARKOV DECISION THEORY ARINDRIMA DATTA Abstract. In this paper, we begin with a forma introduction to probabiity and expain the concept of random variabes and stochastic processes. After

More information

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems Regenerating Codes and Locally Recoverable 1 Codes for Distributed Storage Systems Yongjune Kim and Yaoqing Yang Abstract We survey the recent results on applying error control coding to distributed storage

More information

Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach

Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Mehran Elyasi Department of ECE University of Minnesota melyasi@umn.edu Soheil Mohajer Department of ECE University

More information

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and

More information

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels

Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channes arxiv:cs/060700v1 [cs.it] 6 Ju 006 Chun-Hao Hsu and Achieas Anastasopouos Eectrica Engineering and Computer Science Department University

More information

Separation of Variables and a Spherical Shell with Surface Charge

Separation of Variables and a Spherical Shell with Surface Charge Separation of Variabes and a Spherica She with Surface Charge In cass we worked out the eectrostatic potentia due to a spherica she of radius R with a surface charge density σθ = σ cos θ. This cacuation

More information

Bounds on Binary Locally Repairable Codes Tolerating Multiple Erasures

Bounds on Binary Locally Repairable Codes Tolerating Multiple Erasures Bounds on Binary Locay Repairabe Codes Toerating Mutipe Erasures Matthias Grezet, Ragnar Freij-Hoanti, Thomas Westerbäc, Otay Omez and Camia Hoanti Department of Mathematics and Systems Anaysis, Aato University,

More information

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES

MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES MATH 172: MOTIVATION FOR FOURIER SERIES: SEPARATION OF VARIABLES Separation of variabes is a method to sove certain PDEs which have a warped product structure. First, on R n, a inear PDE of order m is

More information

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes

A Fundamental Storage-Communication Tradeoff in Distributed Computing with Straggling Nodes A Fundamenta Storage-Communication Tradeoff in Distributed Computing with Stragging odes ifa Yan, Michèe Wigger LTCI, Téécom ParisTech 75013 Paris, France Emai: {qifa.yan, michee.wigger} @teecom-paristech.fr

More information

Efficiently Generating Random Bits from Finite State Markov Chains

Efficiently Generating Random Bits from Finite State Markov Chains 1 Efficienty Generating Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

arxiv: v1 [cs.it] 5 Aug 2016

arxiv: v1 [cs.it] 5 Aug 2016 A Note on Secure Minimum Storage Regenerating Codes Ankit Singh Rawat arxiv:1608.01732v1 [cs.it] 5 Aug 2016 Computer Science Department, Carnegie Mellon University, Pittsburgh, 15213. E-mail: asrawat@andrew.cmu.edu

More information

Fractional Repetition Codes For Repair In Distributed Storage Systems

Fractional Repetition Codes For Repair In Distributed Storage Systems Fractional Repetition Codes For Repair In Distributed Storage Systems 1 Salim El Rouayheb, Kannan Ramchandran Dept. of Electrical Engineering and Computer Sciences University of California, Berkeley {salim,

More information

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017

In-plane shear stiffness of bare steel deck through shell finite element models. G. Bian, B.W. Schafer. June 2017 In-pane shear stiffness of bare stee deck through she finite eement modes G. Bian, B.W. Schafer June 7 COLD-FORMED STEEL RESEARCH CONSORTIUM REPORT SERIES CFSRC R-7- SDII Stee Diaphragm Innovation Initiative

More information

Explicit MBR All-Symbol Locality Codes

Explicit MBR All-Symbol Locality Codes Explicit MBR All-Symbol Locality Codes Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, and Sriram Vishwanath 1 Abstract arxiv:1302.0744v2

More information

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage 1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,

More information

Algorithms to solve massively under-defined systems of multivariate quadratic equations

Algorithms to solve massively under-defined systems of multivariate quadratic equations Agorithms to sove massivey under-defined systems of mutivariate quadratic equations Yasufumi Hashimoto Abstract It is we known that the probem to sove a set of randomy chosen mutivariate quadratic equations

More information

Some Measures for Asymmetry of Distributions

Some Measures for Asymmetry of Distributions Some Measures for Asymmetry of Distributions Georgi N. Boshnakov First version: 31 January 2006 Research Report No. 5, 2006, Probabiity and Statistics Group Schoo of Mathematics, The University of Manchester

More information

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network

An Algorithm for Pruning Redundant Modules in Min-Max Modular Network An Agorithm for Pruning Redundant Modues in Min-Max Moduar Network Hui-Cheng Lian and Bao-Liang Lu Department of Computer Science and Engineering, Shanghai Jiao Tong University 1954 Hua Shan Rd., Shanghai

More information

Statistical Inference, Econometric Analysis and Matrix Algebra

Statistical Inference, Econometric Analysis and Matrix Algebra Statistica Inference, Econometric Anaysis and Matrix Agebra Bernhard Schipp Water Krämer Editors Statistica Inference, Econometric Anaysis and Matrix Agebra Festschrift in Honour of Götz Trenker Physica-Verag

More information

Pattern Frequency Sequences and Internal Zeros

Pattern Frequency Sequences and Internal Zeros Advances in Appied Mathematics 28, 395 420 (2002 doi:10.1006/aama.2001.0789, avaiabe onine at http://www.ideaibrary.com on Pattern Frequency Sequences and Interna Zeros Mikós Bóna Department of Mathematics,

More information

XSAT of linear CNF formulas

XSAT of linear CNF formulas XSAT of inear CN formuas Bernd R. Schuh Dr. Bernd Schuh, D-50968 Kön, Germany; bernd.schuh@netcoogne.de eywords: compexity, XSAT, exact inear formua, -reguarity, -uniformity, NPcompeteness Abstract. Open

More information

Distributed Storage Systems with Secure and Exact Repair - New Results

Distributed Storage Systems with Secure and Exact Repair - New Results Distributed torage ystems with ecure and Exact Repair - New Results Ravi Tandon, aidhiraj Amuru, T Charles Clancy, and R Michael Buehrer Bradley Department of Electrical and Computer Engineering Hume Center

More information

CONGRUENCES. 1. History

CONGRUENCES. 1. History CONGRUENCES HAO BILLY LEE Abstract. These are notes I created for a seminar tak, foowing the papers of On the -adic Representations and Congruences for Coefficients of Moduar Forms by Swinnerton-Dyer and

More information

(This is a sample cover image for this issue. The actual cover is not yet available at this time.)

(This is a sample cover image for this issue. The actual cover is not yet available at this time.) (This is a sampe cover image for this issue The actua cover is not yet avaiabe at this time) This artice appeared in a journa pubished by Esevier The attached copy is furnished to the author for interna

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Approximated MLC shape matrix decomposition with intereaf coision constraint Thomas Kainowski Antje Kiese Abstract Shape matrix decomposition is a subprobem in radiation therapy panning. A given fuence

More information

Partial permutation decoding for MacDonald codes

Partial permutation decoding for MacDonald codes Partia permutation decoding for MacDonad codes J.D. Key Department of Mathematics and Appied Mathematics University of the Western Cape 7535 Bevie, South Africa P. Seneviratne Department of Mathematics

More information

Asynchronous Control for Coupled Markov Decision Systems

Asynchronous Control for Coupled Markov Decision Systems INFORMATION THEORY WORKSHOP (ITW) 22 Asynchronous Contro for Couped Marov Decision Systems Michae J. Neey University of Southern Caifornia Abstract This paper considers optima contro for a coection of

More information

A Brief Introduction to Markov Chains and Hidden Markov Models

A Brief Introduction to Markov Chains and Hidden Markov Models A Brief Introduction to Markov Chains and Hidden Markov Modes Aen B MacKenzie Notes for December 1, 3, &8, 2015 Discrete-Time Markov Chains You may reca that when we first introduced random processes,

More information

Nearly Optimal Constructions of PIR and Batch Codes

Nearly Optimal Constructions of PIR and Batch Codes arxiv:700706v [csit] 5 Jun 07 Neary Optima Constructions of PIR and Batch Codes Hia Asi Technion - Israe Institute of Technoogy Haifa 3000, Israe shea@cstechnionaci Abstract In this work we study two famiies

More information

An explicit Jordan Decomposition of Companion matrices

An explicit Jordan Decomposition of Companion matrices An expicit Jordan Decomposition of Companion matrices Fermín S V Bazán Departamento de Matemática CFM UFSC 88040-900 Forianópois SC E-mai: fermin@mtmufscbr S Gratton CERFACS 42 Av Gaspard Coriois 31057

More information

Limited magnitude error detecting codes over Z q

Limited magnitude error detecting codes over Z q Limited magnitude error detecting codes over Z q Noha Earief choo of Eectrica Engineering and Computer cience Oregon tate University Corvais, OR 97331, UA Emai: earief@eecsorstedu Bea Bose choo of Eectrica

More information

Centralized Coded Caching of Correlated Contents

Centralized Coded Caching of Correlated Contents Centraized Coded Caching of Correated Contents Qianqian Yang and Deniz Gündüz Information Processing and Communications Lab Department of Eectrica and Eectronic Engineering Imperia Coege London arxiv:1711.03798v1

More information

Approximated MLC shape matrix decomposition with interleaf collision constraint

Approximated MLC shape matrix decomposition with interleaf collision constraint Agorithmic Operations Research Vo.4 (29) 49 57 Approximated MLC shape matrix decomposition with intereaf coision constraint Antje Kiese and Thomas Kainowski Institut für Mathematik, Universität Rostock,

More information

On MBR codes with replication

On MBR codes with replication On MBR codes with replication M. Nikhil Krishnan and P. Vijay Kumar, Fellow, IEEE Department of Electrical Communication Engineering, Indian Institute of Science, Bangalore. Email: nikhilkrishnan.m@gmail.com,

More information

Section 6: Magnetostatics

Section 6: Magnetostatics agnetic fieds in matter Section 6: agnetostatics In the previous sections we assumed that the current density J is a known function of coordinates. In the presence of matter this is not aways true. The

More information

Math 124B January 17, 2012

Math 124B January 17, 2012 Math 124B January 17, 212 Viktor Grigoryan 3 Fu Fourier series We saw in previous ectures how the Dirichet and Neumann boundary conditions ead to respectivey sine and cosine Fourier series of the initia

More information

$, (2.1) n="# #. (2.2)

$, (2.1) n=# #. (2.2) Chapter. Eectrostatic II Notes: Most of the materia presented in this chapter is taken from Jackson, Chap.,, and 4, and Di Bartoo, Chap... Mathematica Considerations.. The Fourier series and the Fourier

More information

Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions

Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions Nihar B Shah, K V Rashmi, P Vijay Kumar, Fellow, IEEE, and Kannan Ramchandran, Fellow, IEEE Abstract

More information

2M2. Fourier Series Prof Bill Lionheart

2M2. Fourier Series Prof Bill Lionheart M. Fourier Series Prof Bi Lionheart 1. The Fourier series of the periodic function f(x) with period has the form f(x) = a 0 + ( a n cos πnx + b n sin πnx ). Here the rea numbers a n, b n are caed the Fourier

More information

Homogeneity properties of subadditive functions

Homogeneity properties of subadditive functions Annaes Mathematicae et Informaticae 32 2005 pp. 89 20. Homogeneity properties of subadditive functions Pá Burai and Árpád Száz Institute of Mathematics, University of Debrecen e-mai: buraip@math.kte.hu

More information

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel

Sequential Decoding of Polar Codes with Arbitrary Binary Kernel Sequentia Decoding of Poar Codes with Arbitrary Binary Kerne Vera Miosavskaya, Peter Trifonov Saint-Petersburg State Poytechnic University Emai: veram,petert}@dcn.icc.spbstu.ru Abstract The probem of efficient

More information

K a,k minors in graphs of bounded tree-width *

K a,k minors in graphs of bounded tree-width * K a,k minors in graphs of bounded tree-width * Thomas Böhme Institut für Mathematik Technische Universität Imenau Imenau, Germany E-mai: tboehme@theoinf.tu-imenau.de and John Maharry Department of Mathematics

More information

Week 6 Lectures, Math 6451, Tanveer

Week 6 Lectures, Math 6451, Tanveer Fourier Series Week 6 Lectures, Math 645, Tanveer In the context of separation of variabe to find soutions of PDEs, we encountered or and in other cases f(x = f(x = a 0 + f(x = a 0 + b n sin nπx { a n

More information

(1 ) = 1 for some 2 (0; 1); (1 + ) = 0 for some > 0:

(1 ) = 1 for some 2 (0; 1); (1 + ) = 0 for some > 0: Answers, na. Economics 4 Fa, 2009. Christiano.. The typica househod can engage in two types of activities producing current output and studying at home. Athough time spent on studying at home sacrices

More information

Manipulation in Financial Markets and the Implications for Debt Financing

Manipulation in Financial Markets and the Implications for Debt Financing Manipuation in Financia Markets and the Impications for Debt Financing Leonid Spesivtsev This paper studies the situation when the firm is in financia distress and faces bankruptcy or debt restructuring.

More information

Cryptanalysis of PKP: A New Approach

Cryptanalysis of PKP: A New Approach Cryptanaysis of PKP: A New Approach Éiane Jaumes and Antoine Joux DCSSI 18, rue du Dr. Zamenhoff F-92131 Issy-es-Mx Cedex France eiane.jaumes@wanadoo.fr Antoine.Joux@ens.fr Abstract. Quite recenty, in

More information

C. Fourier Sine Series Overview

C. Fourier Sine Series Overview 12 PHILIP D. LOEWEN C. Fourier Sine Series Overview Let some constant > be given. The symboic form of the FSS Eigenvaue probem combines an ordinary differentia equation (ODE) on the interva (, ) with a

More information

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA

T.C. Banwell, S. Galli. {bct, Telcordia Technologies, Inc., 445 South Street, Morristown, NJ 07960, USA ON THE SYMMETRY OF THE POWER INE CHANNE T.C. Banwe, S. Gai {bct, sgai}@research.tecordia.com Tecordia Technoogies, Inc., 445 South Street, Morristown, NJ 07960, USA Abstract The indoor power ine network

More information

Math 124B January 31, 2012

Math 124B January 31, 2012 Math 124B January 31, 212 Viktor Grigoryan 7 Inhomogeneous boundary vaue probems Having studied the theory of Fourier series, with which we successfuy soved boundary vaue probems for the homogeneous heat

More information

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC

A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC (January 8, 2003) A NOTE ON QUASI-STATIONARY DISTRIBUTIONS OF BIRTH-DEATH PROCESSES AND THE SIS LOGISTIC EPIDEMIC DAMIAN CLANCY, University of Liverpoo PHILIP K. POLLETT, University of Queensand Abstract

More information

8 Digifl'.11 Cth:uits and devices

8 Digifl'.11 Cth:uits and devices 8 Digif'. Cth:uits and devices 8. Introduction In anaog eectronics, votage is a continuous variabe. This is usefu because most physica quantities we encounter are continuous: sound eves, ight intensity,

More information

Lecture Note 3: Stationary Iterative Methods

Lecture Note 3: Stationary Iterative Methods MATH 5330: Computationa Methods of Linear Agebra Lecture Note 3: Stationary Iterative Methods Xianyi Zeng Department of Mathematica Sciences, UTEP Stationary Iterative Methods The Gaussian eimination (or

More information

arxiv: v1 [math.co] 17 Dec 2018

arxiv: v1 [math.co] 17 Dec 2018 On the Extrema Maximum Agreement Subtree Probem arxiv:1812.06951v1 [math.o] 17 Dec 2018 Aexey Markin Department of omputer Science, Iowa State University, USA amarkin@iastate.edu Abstract Given two phyogenetic

More information

CS229 Lecture notes. Andrew Ng

CS229 Lecture notes. Andrew Ng CS229 Lecture notes Andrew Ng Part IX The EM agorithm In the previous set of notes, we taked about the EM agorithm as appied to fitting a mixture of Gaussians. In this set of notes, we give a broader view

More information

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with?

Bayesian Learning. You hear a which which could equally be Thanks or Tanks, which would you go with? Bayesian Learning A powerfu and growing approach in machine earning We use it in our own decision making a the time You hear a which which coud equay be Thanks or Tanks, which woud you go with? Combine

More information

THE REACHABILITY CONES OF ESSENTIALLY NONNEGATIVE MATRICES

THE REACHABILITY CONES OF ESSENTIALLY NONNEGATIVE MATRICES THE REACHABILITY CONES OF ESSENTIALLY NONNEGATIVE MATRICES by Michae Neumann Department of Mathematics, University of Connecticut, Storrs, CT 06269 3009 and Ronad J. Stern Department of Mathematics, Concordia

More information

arxiv: v1 [math.fa] 23 Aug 2018

arxiv: v1 [math.fa] 23 Aug 2018 An Exact Upper Bound on the L p Lebesgue Constant and The -Rényi Entropy Power Inequaity for Integer Vaued Random Variabes arxiv:808.0773v [math.fa] 3 Aug 08 Peng Xu, Mokshay Madiman, James Mebourne Abstract

More information

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE

THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE THE THREE POINT STEINER PROBLEM ON THE FLAT TORUS: THE MINIMAL LUNE CASE KATIE L. MAY AND MELISSA A. MITCHELL Abstract. We show how to identify the minima path network connecting three fixed points on

More information

Formulas for Angular-Momentum Barrier Factors Version II

Formulas for Angular-Momentum Barrier Factors Version II BNL PREPRINT BNL-QGS-06-101 brfactor1.tex Formuas for Anguar-Momentum Barrier Factors Version II S. U. Chung Physics Department, Brookhaven Nationa Laboratory, Upton, NY 11973 March 19, 2015 abstract A

More information

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c)

A Simple and Efficient Algorithm of 3-D Single-Source Localization with Uniform Cross Array Bing Xue 1 2 a) * Guangyou Fang 1 2 b and Yicai Ji 1 2 c) A Simpe Efficient Agorithm of 3-D Singe-Source Locaization with Uniform Cross Array Bing Xue a * Guangyou Fang b Yicai Ji c Key Laboratory of Eectromagnetic Radiation Sensing Technoogy, Institute of Eectronics,

More information

arxiv: v1 [math.co] 12 May 2013

arxiv: v1 [math.co] 12 May 2013 EMBEDDING CYCLES IN FINITE PLANES FELIX LAZEBNIK, KEITH E. MELLINGER, AND SCAR VEGA arxiv:1305.2646v1 [math.c] 12 May 2013 Abstract. We define and study embeddings of cyces in finite affine and projective

More information

LECTURE NOTES 8 THE TRACELESS SYMMETRIC TENSOR EXPANSION AND STANDARD SPHERICAL HARMONICS

LECTURE NOTES 8 THE TRACELESS SYMMETRIC TENSOR EXPANSION AND STANDARD SPHERICAL HARMONICS MASSACHUSETTS INSTITUTE OF TECHNOLOGY Physics Department Physics 8.07: Eectromagnetism II October, 202 Prof. Aan Guth LECTURE NOTES 8 THE TRACELESS SYMMETRIC TENSOR EXPANSION AND STANDARD SPHERICAL HARMONICS

More information

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University

Turbo Codes. Coding and Communication Laboratory. Dept. of Electrical Engineering, National Chung Hsing University Turbo Codes Coding and Communication Laboratory Dept. of Eectrica Engineering, Nationa Chung Hsing University Turbo codes 1 Chapter 12: Turbo Codes 1. Introduction 2. Turbo code encoder 3. Design of intereaver

More information

A simple reliability block diagram method for safety integrity verification

A simple reliability block diagram method for safety integrity verification Reiabiity Engineering and System Safety 92 (2007) 1267 1273 www.esevier.com/ocate/ress A simpe reiabiity bock diagram method for safety integrity verification Haitao Guo, Xianhui Yang epartment of Automation,

More information

Efficient Generation of Random Bits from Finite State Markov Chains

Efficient Generation of Random Bits from Finite State Markov Chains Efficient Generation of Random Bits from Finite State Markov Chains Hongchao Zhou and Jehoshua Bruck, Feow, IEEE Abstract The probem of random number generation from an uncorreated random source (of unknown

More information

Linear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach

Linear Network Coding for Multiple Groupcast Sessions: An Interference Alignment Approach Linear Network Coding for Mutipe Groupcast Sessions: An Interference Aignment Approach Abhik Kumar Das, Siddhartha Banerjee and Sriram Vishwanath Dept. of ECE, The University of Texas at Austin, TX, USA

More information

The distribution of the number of nodes in the relative interior of the typical I-segment in homogeneous planar anisotropic STIT Tessellations

The distribution of the number of nodes in the relative interior of the typical I-segment in homogeneous planar anisotropic STIT Tessellations Comment.Math.Univ.Caroin. 51,3(21) 53 512 53 The distribution of the number of nodes in the reative interior of the typica I-segment in homogeneous panar anisotropic STIT Tesseations Christoph Thäe Abstract.

More information

On the Tradeoff Region of Secure Exact-Repair Regenerating Codes

On the Tradeoff Region of Secure Exact-Repair Regenerating Codes 1 On the Tradeoff Region of Secure Exact-Repair Regenerating Codes Shuo Shao, Tie Liu, Chao Tian, and Cong Shen any k out of the total n storage nodes; 2 when a node failure occurs, the failed node can

More information

Haar Decomposition and Reconstruction Algorithms

Haar Decomposition and Reconstruction Algorithms Jim Lambers MAT 773 Fa Semester 018-19 Lecture 15 and 16 Notes These notes correspond to Sections 4.3 and 4.4 in the text. Haar Decomposition and Reconstruction Agorithms Decomposition Suppose we approximate

More information

Problem set 6 The Perron Frobenius theorem.

Problem set 6 The Perron Frobenius theorem. Probem set 6 The Perron Frobenius theorem. Math 22a4 Oct 2 204, Due Oct.28 In a future probem set I want to discuss some criteria which aow us to concude that that the ground state of a sef-adjoint operator

More information

Age of Information: The Gamma Awakening

Age of Information: The Gamma Awakening Age of Information: The Gamma Awakening Eie Najm and Rajai Nasser LTHI, EPFL, Lausanne, Switzerand Emai: {eie.najm, rajai.nasser}@epf.ch arxiv:604.086v [cs.it] 5 Apr 06 Abstract Status update systems is

More information

FRIEZE GROUPS IN R 2

FRIEZE GROUPS IN R 2 FRIEZE GROUPS IN R 2 MAXWELL STOLARSKI Abstract. Focusing on the Eucidean pane under the Pythagorean Metric, our goa is to cassify the frieze groups, discrete subgroups of the set of isometries of the

More information

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch

Minimizing Total Weighted Completion Time on Uniform Machines with Unbounded Batch The Eighth Internationa Symposium on Operations Research and Its Appications (ISORA 09) Zhangiaie, China, September 20 22, 2009 Copyright 2009 ORSC & APORC, pp. 402 408 Minimizing Tota Weighted Competion

More information

Explicit overall risk minimization transductive bound

Explicit overall risk minimization transductive bound 1 Expicit overa risk minimization transductive bound Sergio Decherchi, Paoo Gastado, Sandro Ridea, Rodofo Zunino Dept. of Biophysica and Eectronic Engineering (DIBE), Genoa University Via Opera Pia 11a,

More information

Minimum Enclosing Circle of a Set of Fixed Points and a Mobile Point

Minimum Enclosing Circle of a Set of Fixed Points and a Mobile Point Minimum Encosing Circe of a Set of Fixed Points and a Mobie Point Aritra Banik 1, Bhaswar B. Bhattacharya 2, and Sandip Das 1 1 Advanced Computing and Microeectronics Unit, Indian Statistica Institute,

More information

Distributed Data Storage Systems with. Opportunistic Repair

Distributed Data Storage Systems with. Opportunistic Repair Distributed Data Storage Systems with 1 Opportunistic Repair Vaneet Aggarwal, Chao Tian, Vinay A. Vaishampayan, and Yih-Farn R. Chen Abstract arxiv:1311.4096v2 [cs.it] 6 Nov 2014 The reliability of erasure-coded

More information

FOURIER SERIES ON ANY INTERVAL

FOURIER SERIES ON ANY INTERVAL FOURIER SERIES ON ANY INTERVAL Overview We have spent considerabe time earning how to compute Fourier series for functions that have a period of 2p on the interva (-p,p). We have aso seen how Fourier series

More information

Product-matrix Construction

Product-matrix Construction IERG60 Coding for Distributed Storage Systems Lecture 0-9//06 Lecturer: Kenneth Shum Product-matrix Construction Scribe: Xishi Wang In previous lectures, we have discussed about the minimum storage regenerating

More information

(f) is called a nearly holomorphic modular form of weight k + 2r as in [5].

(f) is called a nearly holomorphic modular form of weight k + 2r as in [5]. PRODUCTS OF NEARLY HOLOMORPHIC EIGENFORMS JEFFREY BEYERL, KEVIN JAMES, CATHERINE TRENTACOSTE, AND HUI XUE Abstract. We prove that the product of two neary hoomorphic Hece eigenforms is again a Hece eigenform

More information

Akaike Information Criterion for ANOVA Model with a Simple Order Restriction

Akaike Information Criterion for ANOVA Model with a Simple Order Restriction Akaike Information Criterion for ANOVA Mode with a Simpe Order Restriction Yu Inatsu * Department of Mathematics, Graduate Schoo of Science, Hiroshima University ABSTRACT In this paper, we consider Akaike

More information

Weakly Secure Regenerating Codes for Distributed Storage

Weakly Secure Regenerating Codes for Distributed Storage Weakly Secure Regenerating Codes for Distributed Storage Swanand Kadhe and Alex Sprintson 1 arxiv:1405.2894v1 [cs.it] 12 May 2014 Abstract We consider the problem of secure distributed data storage under

More information

Mat 1501 lecture notes, penultimate installment

Mat 1501 lecture notes, penultimate installment Mat 1501 ecture notes, penutimate instament 1. bounded variation: functions of a singe variabe optiona) I beieve that we wi not actuay use the materia in this section the point is mainy to motivate the

More information

Reichenbachian Common Cause Systems

Reichenbachian Common Cause Systems Reichenbachian Common Cause Systems G. Hofer-Szabó Department of Phiosophy Technica University of Budapest e-mai: gszabo@hps.ete.hu Mikós Rédei Department of History and Phiosophy of Science Eötvös University,

More information

Reliability: Theory & Applications No.3, September 2006

Reliability: Theory & Applications No.3, September 2006 REDUNDANCY AND RENEWAL OF SERVERS IN OPENED QUEUING NETWORKS G. Sh. Tsitsiashvii M.A. Osipova Vadivosto, Russia 1 An opened queuing networ with a redundancy and a renewa of servers is considered. To cacuate

More information

-ИИИИИ"ИИИИИИИИИ 2017.

-ИИИИИИИИИИИИИИ 2017. -.. -ИИИИИ"ИИИИИИИИИ 2017. Ы :,. : 02.03.02 -. 43507,..,.. - 2017 .. " " 2017. 1. : «, -.» 2. : 10 2017. 3. ( ): -. 4. ( ). -. - Э. -. -. 5.. - -. 6. (, ). : ИИИИИИИИИИИИИИИИ. : ИИИИИИИИИИИИИИИИИИ..,..

More information

Lecture 11. Fourier transform

Lecture 11. Fourier transform Lecture. Fourier transform Definition and main resuts Let f L 2 (R). The Fourier transform of a function f is a function f(α) = f(x)t iαx dx () The normaized Fourier transform of f is a function R ˆf =

More information

Competitive Diffusion in Social Networks: Quality or Seeding?

Competitive Diffusion in Social Networks: Quality or Seeding? Competitive Diffusion in Socia Networks: Quaity or Seeding? Arastoo Fazei Amir Ajorou Ai Jadbabaie arxiv:1503.01220v1 [cs.gt] 4 Mar 2015 Abstract In this paper, we study a strategic mode of marketing and

More information

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES

MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES MONOCHROMATIC LOOSE PATHS IN MULTICOLORED k-uniform CLIQUES ANDRZEJ DUDEK AND ANDRZEJ RUCIŃSKI Abstract. For positive integers k and, a k-uniform hypergraph is caed a oose path of ength, and denoted by

More information

JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY Vol. 51 No. 1 Feb : (2016) DOI: / j. issn

JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY Vol. 51 No. 1 Feb : (2016) DOI: / j. issn 51 1 2016 2 JOURNAL OF SOUTHWEST JIAOTONG UNIVERSITY Vo. 51 No. 1 Feb. 2016 :0258 2724(2016)01 0188 06 DOI:10. 3969 / j. issn. 0258 2724. 2016. 01. 026!"#(k + 2,k)Hadamard MSR $,, ( 015 67 8,9: ; 610031)

More information

V.B The Cluster Expansion

V.B The Cluster Expansion V.B The Custer Expansion For short range interactions, speciay with a hard core, it is much better to repace the expansion parameter V( q ) by f( q ) = exp ( βv( q )), which is obtained by summing over

More information

Analysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case

Analysis of Emerson s Multiple Model Interpolation Estimation Algorithms: The MIMO Case Technica Report PC-04-00 Anaysis of Emerson s Mutipe Mode Interpoation Estimation Agorithms: The MIMO Case João P. Hespanha Dae E. Seborg University of Caifornia, Santa Barbara February 0, 004 Anaysis

More information

Distributed storage systems from combinatorial designs

Distributed storage systems from combinatorial designs Distributed storage systems from combinatorial designs Aditya Ramamoorthy November 20, 2014 Department of Electrical and Computer Engineering, Iowa State University, Joint work with Oktay Olmez (Ankara

More information

Linear Programming Bounds for Robust Locally Repairable Storage Codes

Linear Programming Bounds for Robust Locally Repairable Storage Codes Linear Programming Bounds for Robust Locally Repairable Storage Codes M. Ali Tebbi, Terence H. Chan, Chi Wan Sung Institute for Telecommunications Research, University of South Australia Email: {ali.tebbi,

More information

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR

Maximizing Sum Rate and Minimizing MSE on Multiuser Downlink: Optimality, Fast Algorithms and Equivalence via Max-min SIR 1 Maximizing Sum Rate and Minimizing MSE on Mutiuser Downink: Optimaity, Fast Agorithms and Equivaence via Max-min SIR Chee Wei Tan 1,2, Mung Chiang 2 and R. Srikant 3 1 Caifornia Institute of Technoogy,

More information

Two-Stage Least Squares as Minimum Distance

Two-Stage Least Squares as Minimum Distance Two-Stage Least Squares as Minimum Distance Frank Windmeijer Discussion Paper 17 / 683 7 June 2017 Department of Economics University of Bristo Priory Road Compex Bristo BS8 1TU United Kingdom Two-Stage

More information

Restricted weak type on maximal linear and multilinear integral maps.

Restricted weak type on maximal linear and multilinear integral maps. Restricted weak type on maxima inear and mutiinear integra maps. Oscar Basco Abstract It is shown that mutiinear operators of the form T (f 1,..., f k )(x) = R K(x, y n 1,..., y k )f 1 (y 1 )...f k (y

More information

Towards Green Distributed Storage Systems

Towards Green Distributed Storage Systems Towards Green Distributed Storage Systems Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener Wireless Communications and Networking Laboratory (WCAN) Electrical Engineering Department The Pennsylania

More information

V.B The Cluster Expansion

V.B The Cluster Expansion V.B The Custer Expansion For short range interactions, speciay with a hard core, it is much better to repace the expansion parameter V( q ) by f(q ) = exp ( βv( q )) 1, which is obtained by summing over

More information