Symmetries in the Entropy Space

Size: px
Start display at page:

Download "Symmetries in the Entropy Space"

Transcription

1 Symmetries in the Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Abstract This paper investigates when Shannon-type inequalities completely characterize the part of the closure of the entropy region n that is symmetric under the action of a specified rom variable permutation group This question is answered exhaustively for every group permuting n 4 n 5 rom variables, while multiple examples for arbitrary n 6 are provided for both tightness non-tightness of the Shannontype inequalities For instance, a new result shows that non- Shannon-type inequalities are necessary under the action of the cyclic group C n, the dihedral group D n, as well as S C n S D n, for every n 6 I INTRODUCTION Let N be a set with cardinality n H n R 2N For any h 2H n, we call h entropic if there exits a set of n jointly distributed discrete rom variables X N, {X i : i 2 N} such that ha) HX A ) for any A N, where X A, {X i : i 2 A} HX ; )0by convention The vector h is called the entropy function of X N so H n is called the entropy space of order n Let n be the set of all entropy functions n be the closure of n, the set of almost entropic functions For all A, B N, entropy is a non-negative ha) 0), non-decreasing ha) apple hb) if A B), submodular ha)+hb) ha \ B)+hA [ B)) function, thus a polymatroid [2] The set of all polymatroids, ie the set of all non-negative, non-decreasing, submodular set functions on N, is denoted by n The inequalities bounding n are also called Shannon-type information inequalities since they can be derived by the nonnegativity of Shannon measures [, Chapter 3-5] Due to the existence of infinitely many linear non-shannon-type inequalities [3], [6] when n 4, n is a non-polyhedral convex cone with n n for n 4, whose boundaries have yet to be exhaustively characterized It is thus a fundamental open problem in information theory to characterize n n for n 4, as they determine all fundamental information inequalities It has been shown that characterizing the entropy region is equivalent to determining the capacity regions of all networks information storage systems under coding, determining all fundamental inequalities regarding sizes of subgroups in group theory, as well as several other fundamental problems [, Chapter 3-6, 2] All three authors were with the Dept of ECE, Drexel University, this work was supported by the National Science Foundation under the award CCF-422 Jayant Apte John MacLaren Walsh are now with the Dept of ECE, Drexel University jsa46@drexeledu, jwalsh@coedrexeledu) Qi Chen has now returned to the Institute of Network Coding, The Chinese University of Hong Kong qichen@iecuhkeduhk), where he has received additional support via a grant from the University rant Committee of the Hong Kong Special Administrative Region Project No AoE/E-02/0) Shenzhen Key Laboratory of Network Coding Key Technology Application, Shenzhen, China ZDSY ) In this paper, we wish to contribute to this problem by studying the part of the entropy region n consisting of those almost entropic vectors which obey a specified collection of symmetries As a collection of symmetries must be closed under composition have inverses that are also symmetries, they naturally admit a group structure Formally, we focus on symmetries arising from permuting rom variables, consider any apple S n, a collection of permutations forming a subgroup of the symmetric group on N, defining the associated group action on H n by h)a) h A)) for any 2 h 2H n Let fix be the set of all fixed points the fixed set) of this action, ie, fix {h 2H n : ha) hb) if 9 2 st A) B} ) Inspired by groups of rom variable symmetries that arise in rate regions for network coding problems, [4] defined the -symmetric entropy region, n \ fix its outer bound, the -symmetric polymatroidal region n \ fix, respectively This definition built upon [5], which considered the special case of n,,n t )-partition groups p S N S N2 S Nt, wherein p {N,N 2,,N t } is a t-partition of N with n i N i,i2{,,t}, proved the following important theorem Thm : For N 4, p p if only if p or {{i},n \{i}} for some i 2 N The theorem states that the closure of p -symmetric entropy region can be fully characterized by Shannon-type inequalities if only if p is the -partition or a 2-partition with one of its blocks being singleton Building on this theorem, in this paper we study when for arbitrary rom variable permutation groups Naturally, the key quantity in determining the regions is the orbits in the power set under the group action, denoted as 2 N //, several results are given regarding the structure of these orbits in II, as well the structure of these orbit structures themselves under the action of different groups in III It is shown that Shannon sufficiency is implied under refinement of the associated partition of the power set, hence to supergroups of a group, while insufficiency of

2 Shanon-type inequalities is implied to subgroups This simple implication, in turn, enables one to leverage the main result of [5] to show that unless the group acts transitively on N or fixes an element of this set while acting transitively on the remaining n elements, Shannon-type inequalities will be insufficient Bearing this in mind, we first undertake an exhaustive solution to the Shannon-type sufficiency question for four five variables This is easily carried out with computational tools from AP ITAP, the results are detailed in IV-A summarized at the top of Fig 4 Shifting attention to n 6 the remaining open cases, which are exclusively associated with transitive subgroups of S n or S n, it becomes clear that the priorities for investigation are containment minimal or maximal transitive groups, as the implication of super/subgroup sufficiency/insufficiency of Shannon-type inequalities can be leveraged to solve more tightness questions One collection of containment minimal transitive groups are the cyclic groups C n, Shannon type inequalities were shown in IV-A to be sufficient for n 4, 5 for these groups, thus their supergroups, the dihedral groups D 4 D 5 However, we prove in IV-B that Shannon type inequalities are insufficient to characterize C n, as well as S C n S D n for n 6 Together with the results from [5], their implications to subgroups as described in III, collectively this forms a wealth of examples of both tightness non-tightness of the Shannon-type inequalities on group symmetric entropy regions summarized in Fig 4 II ORBIT STRUCTURE For a given apple S n, for any 2 A N, A) { i) :i 2 A} 2) defines an action of on 2 N For A N, let O A) { A) : 2 } be the orbit of the action that contains A If there is no ambiguity, we simply call O A) an orbit of Let O {O A) :A N} 2 N // be the set of all orbits of we call it the orbit structure of Then one can easily check that ) can be rewritten as fix {h 2H n : ha) hb) if A, B 2O, O2O } 3) It can be seen from 3) that O uniquely determines fix, ie, fix R O So it also determines in some sense, whether they are equal Therefore, in this section, we study the structure of O There exists a partial order in O defined below Definition : For O, O 2 2 O, O appleo 2 if for any A 2O, there exists B 2O 2 such that A B The definition immediately implies the following Prop : For A B N, O A) appleo B) Note that O may not be a lattice, see Fig 2b), the orbit structure of cyclic group C 5 Let {N,N 2 } be a partition of N, 2 be permutation groups on N N 2, respectively We define O O 2 {O 2 N :{A \ N : A 2O}2O, {A \ N 2 : A 2O}2O 2 } Note that O O 2 is just the Cartesian product of O O 2 For A N, it can be checked that O 2 A) O A \ N ) O 2 A \ N 2 ) For O O ) O ) 2 O 2 O 2) O ) 2 in O O 2, O appleo 2 if only if both O ) appleo 2) O ) 2 appleo 2) 2 Prop 2: O 2 O O 2 Proof Let B 2O 2 A) Then there exists 2 2 such that B A) Let 2, where Then B \N A\N 2 ) which implies B \N 2 O A \ N ) Similarly B \ N 2 2O 2 A \ N 2 ) Therefore, O 2 A) O A \ N ) O 2 A \ N 2 ) 2 O O 2 The other inclusion direction can be verified similarly Cor Q : Let p {N,,N t } be a partition of N Let t i i be a permutation group on N i be permutation groups on N i, respectively Then O Q t i O i According to Corollary, if a permutation group on N can be written as the direct product of i on N i, where N i is a block of a partition of N the orbit structure O is the direct product of O i We call such groups decomposable if t 2 call other groups undecomposable An orbit structure of a decomposable group is called a decomposable orbit structure An orbit structure which is not equal to the orbit structure of any decomposable group is called an undecomposable orbit structure Note that the orbit structure of an undecomposable group can be decomposable See Fig 3, the orbit structure of undecomposable group S5 3, h2)45), 345)i is decomposable since it is equal to the orbit structure of decomposable group S 2 S 3 To study the orbit structure of an arbitrary permutation group, we only need to focus on those undecomposable obit structures treat them as the building blocks For symmetric group S n, the orbit structure is a chain with length n +, ie, O Sn {O i {A N : A i} : i 0,,n} O i appleo j if only if i apple j When n, 2, 3, all undecomposable orbit structure is orbit structure of symmetric group S n, while O S3 is also equal to O A3 For n 4, 5, the hasse diagrams of all undecomposable orbit structures up to conjugacy) are listed in Figs 2, respectively To save space, in the label of the figures, we denote a set by juxtaposing its elements For example, {, 2} is denoted by 2 in Fig c), for group V, O2) O V {, 2}) {{, 2}, {3, 4}} In Fig 3, we give an examples of a decomposable orbit structure S 2 S 3 Remark When apple S n is the trivial group, each A N forms an orbit of O become isomorphic to the boolean lattice fix H n Then n When S n, the symmetric group itself, as we discussed above, O becomes a chain When is a partition group, O is the direct product of chains, see Fig 3 for the case of partition group S 2 S 3

3 O23) O23) O2) O3) O2) O) O) a) O S4 O A4 b) O D4 O C4 O23) O34) O23) O4) O3) O4) O3) O2) O34) O2) O) O3) O) c) O V d) O S 2 4 Fig Undecomposable orbit structures on N {, 2, 3, 4} O234) O234) O23) O24) O23) O2) O3) O2) O) O) a) O S5 O A5 O A,5) b) O D5 O C5 Fig 2 Undecomposable orbit structures on N {, 2, 3, 4, 5} O234) O345) O23) O34) O2) O3) O34) O) O3) Fig 3 Orbit structures of S 2 S 3 S5 3 III RELATIONS BETWEEN ORBIT STRUCTURES In the previous section, we discussed the orbit structure of a permutation group In this section, we discuss the structure among different orbit structures, a partial order defined below Definition 2 Structure of the orbit structures): For, 2 apple S n, O apple O 2 if O is a refinement of O 2 For example, by Figs b) c), we see that O V apple O C4 Prop 3: For apple 2 apple S n, O apple O 2 Proof Since O O 2 are both partitions of 2 N, to prove O apple O 2, it suffices to prove that each orbit of 2 is the union of the orbits of Let l 2 /, 2,, l be the right cosets of on 2, where i 2 2 is the identity of 2 also ) Then for any A N, O 2 A) { A) : 2 2 } l[ O i A)) i which proves the proposition l[ { i A)) : 2 } i Lem : For any apple S n, n \ fix Lemma can be proved by a method similar to that of Theorem 4 in [5] The proof is omitted Thm 2: For, 2 apple S n with O apple O 2, ) if 2 2 ; 2) if 2 2 Proof For O apple O 2, by 3), we have fix 2 fix Now if, by Lemma, we have 2 n \ fix 2 n \ fix \ fix 2 ) n \ fix \ fix 2 \ fix 2 \ fix 2 n \ fix \ fix 2 n \ fix 2 2 which proves the first part of the theorem If 2 2 there exists h 2 2 such that h 62 2 n \ fix 2 Since h 2 2 n \ fix 2, h 2 fix 2 which implies that h 62 n so h 62 n \ fix One the other h, since 2, h 2 Therefore which proves the second part of the theorem Proposition 3 Theorem 2 immediately imply the following Corollary Cor 2: For < 2 apple S n, ) if 2 2 ; 2) if 2 2 The purpose of stating Thm 2 in terms of orbit structures rather than the subgroups that generate them as presented in corollary 2, more generally the structure of the orbit structures rather than simply the lattice of subgroups, is that multiple groups can generate the same orbit structure in the

4 power set, as we shall see multiple examples in the next section as depicted in Fig 4 Indeed, as can be seen by Fig4, which we shall derive in detail in the next section, while apple 2 ) O apple O 2, the converse is not true in general Remark According to the the contrapositive of Thm, if p N//, {{ i) : 2 } : i 2 N} has three or more blocks, or has two blocks each with more than one element, then It leaves open only the following remaining cases to determine whether : ) is transitive, ie N// 2) fixes one element of N acts transitively on the remaining n elements, so that N// {N \ i, {i}} for some i 2 N Furthermore, we only need to focus on one of these two cases, depending on whether or not we are trying to show sufficiency or insufficiency, as shown by the following theorem Thm 3: S S ), or equivalently, ) S S Proof Observe that the orbits O S can be found by taking each orbit in O, repeating it twice, once without the element fixed by S, once with it Letting N 0 N [{n+}, we see that the projection proj N S meaning keeping only the elements in the entropy function associated with subsets of the ground set N), since the containment holds from the extra variable, inequality, equalities in the polyhedral cone on the left h side, the direction holds from the fact that any polymatroid h 2 can trivially be extended to a polymatroid h 0 2 S by defining h 0 A) ha \ N) for all A N 0 A parallel argument shows that proj N S, since an almost entropic vector can always be extended in this trivial way by making the new rom variable deterministic Thus mapping through the projection operation, S S implies The other statement is simply the negation of this statement Finally, to best leverage subgroup supergroup implications set out by Corollary 2, the study should focus on maximal or minimal subgroup, respect equivalences the ordering between orbit structures from Thm 2 IV RESULTS: TIHTNESS OF POLYMATROIDAL REION FOR SOME SYMMETRICAL ENTROPY FUNCTIONS Bearing the results of the previous section in mind, in this section we exhaustively determine all distinct orbit structures for n 4, 5 rom variables, determine for which ones the Shannon outer bound is tight Then, we outline several new cases beyond those covered by Thm for which the Shannon outer bound is not tight A Symmetrical entropy functions of 4 or 5 rom variables All subgroups of S 4 S 5 are easily generated within AP [7] When doing so, for each conjugacy class of subgroups, we need to consider only one representative, since the orbit structures of different groups in the same conjugacy class can be obtained from each other by permuting the elements of the ground set Furthermore, we can consider two representatives of different conjugacy classes with isomorphic orbit structures equivalent for our purpose of determining whether Up to conjugacy, there are classes of permutation groups for n 4 9 classes of permutation groups for n 5 On the other h, up to orbit structure isomorphism, there are only classes of permutation groups respectively for n 4 5, representatives from the conjugacy classes of groups associated with these equivalence classes are listed in the nodes in Fig 4 under n 4 n 5, respectively As described in the previous section, the structure of orbit structures can be partially ordered by partition refinement, this partial ordering is also depicted via the edges in Fig 4 Thm 4: Fig 4 indicates correctly for each node whether Proof The orbits in the power set can be found with AP [7], while the extreme rays of the associated can be calculated by entering the equality constrained regions into lrs [9] The data located at [0] contains each of these regions their extreme rays Paying attention to the structure among the orbits, we can organize the results as follows n 4:The only remaining cases not already hled by Thms 2is that of the Normal Klein 4-group V : h2)34), 3)24)i the cyclic/dihedral groups C 4,D 4 We prove V V as this implies, by Theorem 2, C4 C 4 ITAP [] was used to construct linear polymatroids for all of the rays of V, showing that each of them are almostentropic thus V V as detailed in [0], [] n 5 : It suffices to prove C5 C 5 S C 4 S C 4, as Thms 2together with this information hle the other cases via implication C5 C 5 can be proven by using, eg ITAP to construct a linear polymatroid for each of the rays of C 5 as detailed in [0] Next, among the extreme rays of S C 4, one finds the polymatroid 0 if A ;, < 2 if A, ha) 3 if A 2 A {2, 4} or {3, 5}, : 4 if A {2, 4}, {3, 5} or A 3 By restricting the polymatroid on {, 2, 3, 4}, we have 0 if A ;, < 2 if A, eha) 3 if A 2 A {2, 4}, : 4 if A {2, 4} or A 3, which violates Zhang-Yeung inequality, is therefore nonentropic Thus S C 4 S C 4 B Cyclic dihedral Symmetric Entropy Functions, n 6 From the remark at the end of III, we know that for apple S n, to determine whether, we should consider transitive groups that are either minimal or maximal In this 4)

5 Fig a) Symmetric & Alternating: S4 : h234), 2)i A4 : h23), 2)34)i n4: Fig b) Dihedral & Cyclic: D4 : h234), 3)i 2, 2)-Partition: C4 : h234)i Fig c) S2 S2 : h2), 34)i Normal Klein 4-group: V : h2)34), 3)24)i Double Transp: S42 : h2)34)i Fig d) n 6: Sn, Sn {,, n}// not a, n S, S 6,, 3)-partition: S S S3 : h345), 34)i S S A3 : h345)i,, 2)-Partition: S S S2 : h34)i S Sn S, 4)-Partition: S S4 : h2345), 23)i S A4 : h2345), 23)45)i Cyclic & Dihedral: C5 : h2345)i D5 : h2345), 25)34)i Fig 2b) Fix, Rest Cyclic or Dihedral: S C4 : h2345)i S D4 : h2345), 24)i, 2, 2)-partition: S S2 S2 : h23), 45)i,,, 2)-partition: S S S S2 : h45)i S Sn ) or n) partition ) S, Fig 2a) Symmetric, Alternating, & en Affine: S5 : h2345), 2)i, A5 : h2345), 23)i A, 5) : h2345), 2345)i Fig 3 2, 3)-Partition: S2 S3 : h2), 345), 34)i S2 A3 : h2), 345)i S53 : h2)45), 345)i, 3)-Partition: S S3 : h234), 23)i S A3 : h234), 243)i Trivial: h)i n5: Fix, Rest Klein 4-group: S V : h23)45), 24)35)i S S42 : h23)45)i trivial: h)i Fig 4 Summary of results in this paper about the tightness of Shannon outer bounds to group symmetrical entropy regions Equivalent subgroups of Sn yielding the same orbit structures in the power set are grouped together, the partial order based on refinement of the associated partition in the power set is displayed For each subgroup, a sample representation is provided in terms of its generators When the orbit structure has been depicted elsewhere in the paper, the appropriate figure is also indicated vein, we consider the cyclic group dihedral group, which we have just shown to have Shannon-type inequalities tight for n 4, 5 in the result below Thm 5: For n S, S 6,, S, S Proof For Sn, let O2, {O A) 2 O : A 2 O, A 2} Note that O2, {{ {, + i}) : 2 }, i,, bn/2c} We pick { {, 4}) : 2 } 2 O2, Let h 2 Hn be defined by 0 if A ;, <2 if A, ha) 3 if A 2 A 62 { {, 4}) : 2 }, : 4 if A 2 { {, 4}) : 2 } or A 3 This h 2 n h 2 fix which implies h 2 By restricting h on {, 2, 3, 4}, we have the ray 4) which violates Zhang-Yeung inequality, hence is non-entropic, impling that h is also non-entropic For dihedral groups, n 6, note that O2,D O2,C thus These in turn imply S S, S S for n 7 by Thm 3 All that remains is S C5 S C5, S D5 S D5 Among the extreme rays of for this case, one finds 0 if A ;, <2 if A, ha) 3 if A 2 A 2 / O {2, 4}), : 4 otherwise By restricting the polymatroid on {, 4, 5, 6}, we obtain a ray isomorphic to the ray 4) which violates Zhang-Yeung inequality, therefore non-entropic, implying h is also nonentropic hence for S C5 S D 5 V C ONCLUSION This paper studied whether or not Shannon-type inequalities fully characterize the part of the entropy region that is symmetric under the action of various permutation groups on the rom variables Several results were outlined regarding implications between different groups of the sufficiency/insufficiency of Shannon-type inequalities Aside from these implications, the main results of the paper are summarized in Fig 4 R EFERENCES [] R W Yeung, Information Theory Network Coding, Springer, 200 [2] S Fujishige, Polymatroidal dependence structure of a set of rom variables, Info Contr, 39: pp 55-72,97 [3] Z Zhang R W Yeung, On characterization of entropy function via information inequalities, IEEE Trans Info Theory, vol 44, pp , Nov 99 [4] J Apte J Walsh, Symmetry in network coding, in 205 IEEE International Symposium on Information Theory ISIT), June 205 [5] Q Chen R W Yeung, Partition-symmetrical entropy functions, accepted by IEEE Trans Inform Theory [6] F Mat usˇ, Infinitely many information inequalities, IEEE Int Symp Info Theory, Nice, France, June 2007 [7] The AP roup, AP roups, Algorithms, Programming, [] J Apte J M Walsh, Information Theoretic Achievability Prover-A AP4 Package, [9] D Avis, A revised implementation of the reverse search vertex enumeration algorithm, Polytopes Combinatorics Computation, pp77 9, Springer, 2000 [0] J Apte, Computer Proofs for Symmetrical entropy functions, [] J Apte J M, Walsh, Constrained linear representability of polymatroids algorithms for computing achievability proofs in network coding, submitted to IEEE Trans Info Theory,

Symmetries in Entropy Space

Symmetries in Entropy Space 1 Symmetries in Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks to NSF CCF-1421828

More information

Non-isomorphic Distribution Supports for Calculating Entropic Vectors

Non-isomorphic Distribution Supports for Calculating Entropic Vectors Non-isomorphic Distribution Supports for Calculating Entropic Vectors Yunshu Liu & John MacLaren Walsh Adaptive Signal Processing and Information Theory Research Group Department of Electrical and Computer

More information

. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables

. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables . Relationships Among Bounds for the Region of Entropic Vectors in Four Variables John MacLaren Walsh and Steven Weber Department of Electrical and Computer Engineering, Drexel University, Philadelphia,

More information

Network Combination Operations Preserving the Sufficiency of Linear Network Codes

Network Combination Operations Preserving the Sufficiency of Linear Network Codes Network Combination Operations Preserving the Sufficiency of Linear Network Codes Congduan Li, Steven Weber, John MacLaren Walsh ECE Department, Drexel University Philadelphia, PA 904 Abstract Operations

More information

Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions

Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia NetCod, 205 NSF

More information

Symmetry in Network Coding

Symmetry in Network Coding Symmetry in Network Coding Formalization, Graph-theoretic Characterization, and Computation Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia ISIT,

More information

Partition Symmetrical Entropy Functions*

Partition Symmetrical Entropy Functions* Partition Symmetrical Entropy Functions* Jayant Apte ASPITRG *Chen, Qi; Yeung, Raymond W., Partition Symmetrical Entropy Functions, arxiv:1407.7405v1 [cs.it] Outline Sneak Peak Background: Basic facts

More information

Bounding the Entropic Region via Information Geometry

Bounding the Entropic Region via Information Geometry Bounding the ntropic Region via Information Geometry Yunshu Liu John MacLaren Walsh Dept. of C, Drexel University, Philadelphia, PA 19104, USA yunshu.liu@drexel.edu jwalsh@coe.drexel.edu Abstract This

More information

Matroid Bounds on the Region of Entropic Vectors

Matroid Bounds on the Region of Entropic Vectors Matroid Bounds on the Region of Entropic Vectors Congduan Li, John MacLaren Walsh, Steven Weber Drexel University, Dept of ECE, Philadelphia, PA 19104, USA congduanli@drexeledu, jwalsh@coedrexeledu, sweber@coedrexeledu

More information

A computational approach for determining rate regions and codes using entropic vector bounds

A computational approach for determining rate regions and codes using entropic vector bounds 1 A computational approach for determining rate regions and codes using entropic vector bounds Congduan Li, John MacLaren Walsh, Steven Weber Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA

More information

Multiterminal Networks: Rate Regions, Codes, Computations, & Forbidden Minors

Multiterminal Networks: Rate Regions, Codes, Computations, & Forbidden Minors Multiterminal etworks: Rate Regions, Codes, Computations, & Forbidden Minors Ph D Thesis Proposal Congduan Li ASPITRG & MAL Drexel University congduanli@gmailcom October 5, 204 C Li (ASPITRG & MAL) Thesis

More information

Capacity Region of the Permutation Channel

Capacity Region of the Permutation Channel Capacity Region of the Permutation Channel John MacLaren Walsh and Steven Weber Abstract We discuss the capacity region of a degraded broadcast channel (DBC) formed from a channel that randomly permutes

More information

Received: 1 September 2018; Accepted: 10 October 2018; Published: 12 October 2018

Received: 1 September 2018; Accepted: 10 October 2018; Published: 12 October 2018 entropy Article Entropy Inequalities for Lattices Peter Harremoës Copenhagen Business College, Nørre Voldgade 34, 1358 Copenhagen K, Denmark; harremoes@ieee.org; Tel.: +45-39-56-41-71 Current address:

More information

Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences.

Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences. Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences A Thesis Submitted to the Faculty of Drexel University by Yunshu

More information

Algebraic matroids are almost entropic

Algebraic matroids are almost entropic accepted to Proceedings of the AMS June 28, 2017 Algebraic matroids are almost entropic František Matúš Abstract. Algebraic matroids capture properties of the algebraic dependence among elements of extension

More information

Amobile satellite communication system, like Motorola s

Amobile satellite communication system, like Motorola s I TRANSACTIONS ON INFORMATION THORY, VOL. 45, NO. 4, MAY 1999 1111 Distributed Source Coding for Satellite Communications Raymond W. Yeung, Senior Member, I, Zhen Zhang, Senior Member, I Abstract Inspired

More information

A new computational approach for determining rate regions and optimal codes for coded networks

A new computational approach for determining rate regions and optimal codes for coded networks A new computational approach for determining rate regions and optimal codes for coded networks Congduan Li, Jayant Apte, John MacLaren Walsh, Steven Weber Drexel University, Dept. of ECE, Philadelphia,

More information

Characterizing the Region of Entropic Vectors via Information Geometry

Characterizing the Region of Entropic Vectors via Information Geometry Characterizing the Region of Entropic Vectors via Information Geometry John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks

More information

1440 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 4, JULY On Characterization of Entropy Function via Information Inequalities

1440 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 4, JULY On Characterization of Entropy Function via Information Inequalities 1440 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 4, JULY 1998 On Characterization of Entropy Function via Information Inequalities Zhen Zhang, Senior Member, IEEE, Raymond W. Yeung, Senior Member,

More information

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations

Definitions. Notations. Injective, Surjective and Bijective. Divides. Cartesian Product. Relations. Equivalence Relations Page 1 Definitions Tuesday, May 8, 2018 12:23 AM Notations " " means "equals, by definition" the set of all real numbers the set of integers Denote a function from a set to a set by Denote the image of

More information

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore.

This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. This document is downloaded from DR-NTU, Nanyang Technological University Library, Singapore. Title Finite nilpotent metacyclic groups never violate the Ingleton inequality Author(s) Stancu, Radu; Oggier,

More information

Properties and Classification of the Wheels of the OLS Polytope.

Properties and Classification of the Wheels of the OLS Polytope. Properties and Classification of the Wheels of the OLS Polytope. G. Appa 1, D. Magos 2, I. Mourtos 1 1 Operational Research Department, London School of Economics. email: {g.appa, j.mourtos}@lse.ac.uk

More information

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities

Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Sector-Disk Codes and Partial MDS Codes with up to Three Global Parities Junyu Chen Department of Information Engineering The Chinese University of Hong Kong Email: cj0@alumniiecuhkeduhk Kenneth W Shum

More information

The Capacity of Finite Abelian Group Codes Over Symmetric Memoryless Channels Giacomo Como and Fabio Fagnani

The Capacity of Finite Abelian Group Codes Over Symmetric Memoryless Channels Giacomo Como and Fabio Fagnani IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 5, MAY 2009 2037 The Capacity of Finite Abelian Group Codes Over Symmetric Memoryless Channels Giacomo Como and Fabio Fagnani Abstract The capacity

More information

Isomorphisms between pattern classes

Isomorphisms between pattern classes Journal of Combinatorics olume 0, Number 0, 1 8, 0000 Isomorphisms between pattern classes M. H. Albert, M. D. Atkinson and Anders Claesson Isomorphisms φ : A B between pattern classes are considered.

More information

On the mean connected induced subgraph order of cographs

On the mean connected induced subgraph order of cographs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 71(1) (018), Pages 161 183 On the mean connected induced subgraph order of cographs Matthew E Kroeker Lucas Mol Ortrud R Oellermann University of Winnipeg Winnipeg,

More information

Network Coding on Directed Acyclic Graphs

Network Coding on Directed Acyclic Graphs Network Coding on Directed Acyclic Graphs John MacLaren Walsh, Ph.D. Multiterminal Information Theory, Spring Quarter, 0 Reference These notes are directly derived from Chapter of R. W. Yeung s Information

More information

0 Sets and Induction. Sets

0 Sets and Induction. Sets 0 Sets and Induction Sets A set is an unordered collection of objects, called elements or members of the set. A set is said to contain its elements. We write a A to denote that a is an element of the set

More information

Entropy Vectors and Network Information Theory

Entropy Vectors and Network Information Theory Entropy Vectors and Network Information Theory Sormeh Shadbakht and Babak Hassibi Department of Electrical Engineering Caltech Lee Center Workshop May 25, 2007 1 Sormeh Shadbakht and Babak Hassibi Entropy

More information

Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids

Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids Jayant Apte, Congduan Li, John MacLaren Walsh Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA

More information

TORIC WEAK FANO VARIETIES ASSOCIATED TO BUILDING SETS

TORIC WEAK FANO VARIETIES ASSOCIATED TO BUILDING SETS TORIC WEAK FANO VARIETIES ASSOCIATED TO BUILDING SETS YUSUKE SUYAMA Abstract. We give a necessary and sufficient condition for the nonsingular projective toric variety associated to a building set to be

More information

Symmetry in Network Coding

Symmetry in Network Coding Symmetry in Network Coding Jayant Apte, John MacLaren Walsh Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA jsa46@drexel.edu, jwalsh@coe.drexel.edu Abstract We establish connections between

More information

Some notes on Coxeter groups

Some notes on Coxeter groups Some notes on Coxeter groups Brooks Roberts November 28, 2017 CONTENTS 1 Contents 1 Sources 2 2 Reflections 3 3 The orthogonal group 7 4 Finite subgroups in two dimensions 9 5 Finite subgroups in three

More information

On Scalable Coding in the Presence of Decoder Side Information

On Scalable Coding in the Presence of Decoder Side Information On Scalable Coding in the Presence of Decoder Side Information Emrah Akyol, Urbashi Mitra Dep. of Electrical Eng. USC, CA, US Email: {eakyol, ubli}@usc.edu Ertem Tuncel Dep. of Electrical Eng. UC Riverside,

More information

SHANNON S information measures refer to entropies, conditional

SHANNON S information measures refer to entropies, conditional 1924 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 43, NO. 6, NOVEMBER 1997 A Framework for Linear Information Inequalities Raymond W. Yeung, Senior Member, IEEE Abstract We present a framework for information

More information

Entropic Vectors: Polyhedral Computation & Information Geometry

Entropic Vectors: Polyhedral Computation & Information Geometry Entropic Vectors: Polyhedral Computation & Information Geometry John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks to

More information

Lecture 5. Shearer s Lemma

Lecture 5. Shearer s Lemma Stanford University Spring 2016 Math 233: Non-constructive methods in combinatorics Instructor: Jan Vondrák Lecture date: April 6, 2016 Scribe: László Miklós Lovász Lecture 5. Shearer s Lemma 5.1 Introduction

More information

Partial cubes: structures, characterizations, and constructions

Partial cubes: structures, characterizations, and constructions Partial cubes: structures, characterizations, and constructions Sergei Ovchinnikov San Francisco State University, Mathematics Department, 1600 Holloway Ave., San Francisco, CA 94132 Abstract Partial cubes

More information

Tree sets. Reinhard Diestel

Tree sets. Reinhard Diestel 1 Tree sets Reinhard Diestel Abstract We study an abstract notion of tree structure which generalizes treedecompositions of graphs and matroids. Unlike tree-decompositions, which are too closely linked

More information

The Capacity Region for Multi-source Multi-sink Network Coding

The Capacity Region for Multi-source Multi-sink Network Coding The Capacity Region for Multi-source Multi-sink Network Coding Xijin Yan Dept. of Electrical Eng. - Systems University of Southern California Los Angeles, CA, U.S.A. xyan@usc.edu Raymond W. Yeung Dept.

More information

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract

Permutation groups/1. 1 Automorphism groups, permutation groups, abstract Permutation groups Whatever you have to do with a structure-endowed entity Σ try to determine its group of automorphisms... You can expect to gain a deep insight into the constitution of Σ in this way.

More information

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse

2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse Two-unicast is hard Sudeep Kamath ECE Department, University of California, San Diego, CA, USA sukamath@ucsd.edu David N.C. Tse EECS Department, University of California, Berkeley, CA, USA dtse@eecs.berkeley.edu

More information

Decomposing Bent Functions

Decomposing Bent Functions 2004 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 49, NO. 8, AUGUST 2003 Decomposing Bent Functions Anne Canteaut and Pascale Charpin Abstract In a recent paper [1], it is shown that the restrictions

More information

CONSEQUENCES OF THE SYLOW THEOREMS

CONSEQUENCES OF THE SYLOW THEOREMS CONSEQUENCES OF THE SYLOW THEOREMS KEITH CONRAD For a group theorist, Sylow s Theorem is such a basic tool, and so fundamental, that it is used almost without thinking, like breathing. Geoff Robinson 1.

More information

On non-hamiltonian circulant digraphs of outdegree three

On non-hamiltonian circulant digraphs of outdegree three On non-hamiltonian circulant digraphs of outdegree three Stephen C. Locke DEPARTMENT OF MATHEMATICAL SCIENCES, FLORIDA ATLANTIC UNIVERSITY, BOCA RATON, FL 33431 Dave Witte DEPARTMENT OF MATHEMATICS, OKLAHOMA

More information

The Inflation Technique for Causal Inference with Latent Variables

The Inflation Technique for Causal Inference with Latent Variables The Inflation Technique for Causal Inference with Latent Variables arxiv:1609.00672 (Elie Wolfe, Robert W. Spekkens, Tobias Fritz) September 2016 Introduction Given some correlations between the vocabulary

More information

Communicating the sum of sources in a 3-sources/3-terminals network

Communicating the sum of sources in a 3-sources/3-terminals network Communicating the sum of sources in a 3-sources/3-terminals network Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel Email: mikel@openu.ac.il Aditya Ramamoorthy

More information

YOUNG TABLEAUX AND THE REPRESENTATIONS OF THE SYMMETRIC GROUP

YOUNG TABLEAUX AND THE REPRESENTATIONS OF THE SYMMETRIC GROUP YOUNG TABLEAUX AND THE REPRESENTATIONS OF THE SYMMETRIC GROUP YUFEI ZHAO ABSTRACT We explore an intimate connection between Young tableaux and representations of the symmetric group We describe the construction

More information

SUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by

SUBGROUPS OF CYCLIC GROUPS. 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by SUBGROUPS OF CYCLIC GROUPS KEITH CONRAD 1. Introduction In a group G, we denote the (cyclic) group of powers of some g G by g = {g k : k Z}. If G = g, then G itself is cyclic, with g as a generator. Examples

More information

Parameterizing orbits in flag varieties

Parameterizing orbits in flag varieties Parameterizing orbits in flag varieties W. Ethan Duckworth April 2008 Abstract In this document we parameterize the orbits of certain groups acting on partial flag varieties with finitely many orbits.

More information

The Capacity of a Network

The Capacity of a Network The Capacity of a Network April Rasala Lehman MIT Collaborators: Nick Harvey and Robert Kleinberg MIT What is the Capacity of a Network? Source a Source b c d e Sink f Sink What is the Capacity of a Network?

More information

Hidden Symmetry Subgroup Problems

Hidden Symmetry Subgroup Problems 1/27 Hidden Symmetry Subgroup Problems Miklos Santha CNRS, Université Paris Diderot, France and Centre for Quantum Technologies, NUS, Singapore joint work with Thomas Decker Gábor Ivanyos Pawel Wocjan

More information

Independent generating sets and geometries for symmetric groups

Independent generating sets and geometries for symmetric groups Independent generating sets and geometries for symmetric groups Peter J. Cameron School of Mathematical Sciences Queen Mary, University of London Mile End Road London E1 4NS UK Philippe Cara Department

More information

Shannon-type Inequalities, Submodular Width, and Disjunctive Datalog

Shannon-type Inequalities, Submodular Width, and Disjunctive Datalog Shannon-type Inequalities, Submodular Width, and Disjunctive Datalog Hung Q. Ngo (Stealth Mode) With Mahmoud Abo Khamis and Dan Suciu @ PODS 2017 Table of Contents Connecting the Dots Output Size Bounds

More information

The Logic of Partitions

The Logic of Partitions The Logic of Partitions Introduction to the Dual of "Propositional" Logic David Ellerman Philosophy U. of California/Riverside U. of Ljubljana, Sept. 8, 2015 David Ellerman Philosophy U. of California/Riverside

More information

On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region. Computation, and Hierarchy. A Thesis. Submitted to the Faculty

On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region. Computation, and Hierarchy. A Thesis. Submitted to the Faculty On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region Computation, and Hierarchy A Thesis Submitted to the Faculty of Drexel University by Congduan Li in partial fulfillment of the requirements

More information

RESEARCH ARTICLE. An extension of the polytope of doubly stochastic matrices

RESEARCH ARTICLE. An extension of the polytope of doubly stochastic matrices Linear and Multilinear Algebra Vol. 00, No. 00, Month 200x, 1 15 RESEARCH ARTICLE An extension of the polytope of doubly stochastic matrices Richard A. Brualdi a and Geir Dahl b a Department of Mathematics,

More information

The Logic of Partitions with an application to Information Theory

The Logic of Partitions with an application to Information Theory 1 The Logic of Partitions with an application to Information Theory David Ellerman University of California at Riverside and WWW.Ellerman.org 2 Outline of Talk Logic of partitions dual to ordinary logic

More information

Normal Fans of Polyhedral Convex Sets

Normal Fans of Polyhedral Convex Sets Set-Valued Analysis manuscript No. (will be inserted by the editor) Normal Fans of Polyhedral Convex Sets Structures and Connections Shu Lu Stephen M. Robinson Received: date / Accepted: date Dedicated

More information

On the Fully Commutative Elements of Coxeter Groups

On the Fully Commutative Elements of Coxeter Groups Journal of Algebraic Combinatorics 5 (1996), 353-385 1996 Kluwer Academic Publishers. Manufactured in The Netherlands. On the Fully Commutative Elements of Coxeter Groups JOHN R. STEMBRIDGB* Department

More information

A MATROID EXTENSION RESULT

A MATROID EXTENSION RESULT A MATROID EXTENSION RESULT JAMES OXLEY Abstract. Adding elements to matroids can be fraught with difficulty. In the Vámos matroid V 8, there are four independent sets X 1, X 2, X 3, and X 4 such that (X

More information

Subspace stabilizers and maximal subgroups of exceptional groups of Lie type

Subspace stabilizers and maximal subgroups of exceptional groups of Lie type Subspace stabilizers and maximal subgroups of exceptional groups of Lie type David A. Craven June 7, 2016 Abstract In 1998, Liebeck and Seitz introduced a constant t(g), dependent on the root system of

More information

A Proximal Method for Identifying Active Manifolds

A Proximal Method for Identifying Active Manifolds A Proximal Method for Identifying Active Manifolds W.L. Hare April 18, 2006 Abstract The minimization of an objective function over a constraint set can often be simplified if the active manifold of the

More information

Counting chains in noncrossing partition lattices

Counting chains in noncrossing partition lattices Counting chains in noncrossing partition lattices Nathan Reading NC State University NCSU Algebra Seminar, November 16, 2007 1 Counting chains in noncrossing partition lattices Classical noncrossing partitions

More information

Journal of Integer Sequences, Vol. 3 (2000), Article Magic Carpets

Journal of Integer Sequences, Vol. 3 (2000), Article Magic Carpets Journal of Integer Sequences, Vol. 3 (2000), Article 00.2.5 Magic Carpets Erich Friedman Stetson University Deland, FL 32720 Mike Keith 4100 Vitae Springs Road Salem, OR 97306 Email addresses: efriedma@stetson.edu

More information

Secret Sharing. Qi Chen. December 14, 2015

Secret Sharing. Qi Chen. December 14, 2015 Secret Sharing Qi Chen December 14, 2015 What is secret sharing? A dealer: know the secret S and distribute the shares of S to each party A set of n parties P n {p 1,, p n }: each party owns a share Authorized

More information

MAT-INF4110/MAT-INF9110 Mathematical optimization

MAT-INF4110/MAT-INF9110 Mathematical optimization MAT-INF4110/MAT-INF9110 Mathematical optimization Geir Dahl August 20, 2013 Convexity Part IV Chapter 4 Representation of convex sets different representations of convex sets, boundary polyhedra and polytopes:

More information

Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions

Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions 2009 IEEE Information Theory Workshop Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions Asaf Cohen, Michelle Effros, Salman Avestimehr and Ralf Koetter Abstract In this

More information

A Numerical Study on the Wiretap Network with a Simple Network Topology

A Numerical Study on the Wiretap Network with a Simple Network Topology 1 A Numerical Study on the Wiretap Network with a Simple Network Topology Fan Cheng, Member, IEEE and Vincent Y. F. Tan, Senior Member, IEEE arxiv:1505.02862v3 [cs.it] 15 Jan 2016 Fig. 1. Abstract In this

More information

Characterising Probability Distributions via Entropies

Characterising Probability Distributions via Entropies 1 Characterising Probability Distributions via Entropies Satyajit Thakor, Terence Chan and Alex Grant Indian Institute of Technology Mandi University of South Australia Myriota Pty Ltd arxiv:1602.03618v2

More information

THE SYLOW THEOREMS AND THEIR APPLICATIONS

THE SYLOW THEOREMS AND THEIR APPLICATIONS THE SYLOW THEOREMS AND THEIR APPLICATIONS AMIN IDELHAJ Abstract. This paper begins with an introduction into the concept of group actions, along with the associated notions of orbits and stabilizers, culminating

More information

The symmetric group action on rank-selected posets of injective words

The symmetric group action on rank-selected posets of injective words The symmetric group action on rank-selected posets of injective words Christos A. Athanasiadis Department of Mathematics University of Athens Athens 15784, Hellas (Greece) caath@math.uoa.gr October 28,

More information

Chain Independence and Common Information

Chain Independence and Common Information 1 Chain Independence and Common Information Konstantin Makarychev and Yury Makarychev Abstract We present a new proof of a celebrated result of Gács and Körner that the common information is far less than

More information

A quasisymmetric function generalization of the chromatic symmetric function

A quasisymmetric function generalization of the chromatic symmetric function A quasisymmetric function generalization of the chromatic symmetric function Brandon Humpert University of Kansas Lawrence, KS bhumpert@math.ku.edu Submitted: May 5, 2010; Accepted: Feb 3, 2011; Published:

More information

On Antichains in Product Posets

On Antichains in Product Posets On Antichains in Product Posets Sergei L. Bezrukov Department of Math and Computer Science University of Wisconsin - Superior Superior, WI 54880, USA sb@mcs.uwsuper.edu Ian T. Roberts School of Engineering

More information

Exercises MAT2200 spring 2013 Ark 3 Cosets, Direct products and Abelian groups

Exercises MAT2200 spring 2013 Ark 3 Cosets, Direct products and Abelian groups Exercises MAT2200 spring 2013 Ark 3 Cosets, Direct products and Abelian groups This Ark concerns the weeks No. (Feb ) andno. (Feb Mar ). The plans for those two weeks are as follows: On Wednesday Feb I

More information

6 Cosets & Factor Groups

6 Cosets & Factor Groups 6 Cosets & Factor Groups The course becomes markedly more abstract at this point. Our primary goal is to break apart a group into subsets such that the set of subsets inherits a natural group structure.

More information

A New Achievable Region for Gaussian Multiple Descriptions Based on Subset Typicality

A New Achievable Region for Gaussian Multiple Descriptions Based on Subset Typicality 0 IEEE Information Theory Workshop A New Achievable Region for Gaussian Multiple Descriptions Based on Subset Typicality Kumar Viswanatha, Emrah Akyol and Kenneth Rose ECE Department, University of California

More information

Cases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem

Cases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem Cases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem Soheil Feizi, Muriel Médard RLE at MIT Emails: {sfeizi,medard}@mit.edu Abstract In this paper, we

More information

VC-DENSITY FOR TREES

VC-DENSITY FOR TREES VC-DENSITY FOR TREES ANTON BOBKOV Abstract. We show that for the theory of infinite trees we have vc(n) = n for all n. VC density was introduced in [1] by Aschenbrenner, Dolich, Haskell, MacPherson, and

More information

ACYCLIC DIGRAPHS GIVING RISE TO COMPLETE INTERSECTIONS

ACYCLIC DIGRAPHS GIVING RISE TO COMPLETE INTERSECTIONS ACYCLIC DIGRAPHS GIVING RISE TO COMPLETE INTERSECTIONS WALTER D. MORRIS, JR. ABSTRACT. We call a directed acyclic graph a CIdigraph if a certain affine semigroup ring defined by it is a complete intersection.

More information

Euler characteristic of the truncated order complex of generalized noncrossing partitions

Euler characteristic of the truncated order complex of generalized noncrossing partitions Euler characteristic of the truncated order complex of generalized noncrossing partitions D. Armstrong and C. Krattenthaler Department of Mathematics, University of Miami, Coral Gables, Florida 33146,

More information

Class Equation & Conjugacy in Groups

Class Equation & Conjugacy in Groups Subject: ALEBRA - V Lesson: Class Equation & Conjugacy in roups Lesson Developer: Shweta andhi Department / College: Department of Mathematics, Miranda House, University of Delhi Institute of Lifelong

More information

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:

More information

4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN. Robin Thomas* Xingxing Yu**

4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN. Robin Thomas* Xingxing Yu** 4 CONNECTED PROJECTIVE-PLANAR GRAPHS ARE HAMILTONIAN Robin Thomas* Xingxing Yu** School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332, USA May 1991, revised 23 October 1993. Published

More information

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels

Representation of Correlated Sources into Graphs for Transmission over Broadcast Channels Representation of Correlated s into Graphs for Transmission over Broadcast s Suhan Choi Department of Electrical Eng. and Computer Science University of Michigan, Ann Arbor, MI 80, USA Email: suhanc@eecs.umich.edu

More information

On Lossless Coding With Coded Side Information Daniel Marco, Member, IEEE, and Michelle Effros, Fellow, IEEE

On Lossless Coding With Coded Side Information Daniel Marco, Member, IEEE, and Michelle Effros, Fellow, IEEE 3284 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 7, JULY 2009 On Lossless Coding With Coded Side Information Daniel Marco, Member, IEEE, Michelle Effros, Fellow, IEEE Abstract This paper considers

More information

Characteristic-Dependent Linear Rank Inequalities and Network Coding Applications

Characteristic-Dependent Linear Rank Inequalities and Network Coding Applications haracteristic-ependent Linear Rank Inequalities and Network oding pplications Randall ougherty, Eric Freiling, and Kenneth Zeger bstract Two characteristic-dependent linear rank inequalities are given

More information

Generating p-extremal graphs

Generating p-extremal graphs Generating p-extremal graphs Derrick Stolee Department of Mathematics Department of Computer Science University of Nebraska Lincoln s-dstolee1@math.unl.edu August 2, 2011 Abstract Let f(n, p be the maximum

More information

Information Theory + Polyhedral Combinatorics

Information Theory + Polyhedral Combinatorics Information Theory + Polyhedral Combinatorics Sebastian Pokutta Georgia Institute of Technology ISyE, ARC Joint work Gábor Braun Information Theory in Complexity Theory and Combinatorics Simons Institute

More information

Section 10: Counting the Elements of a Finite Group

Section 10: Counting the Elements of a Finite Group Section 10: Counting the Elements of a Finite Group Let G be a group and H a subgroup. Because the right cosets are the family of equivalence classes with respect to an equivalence relation on G, it follows

More information

Inadmissible Class of Boolean Functions under Stuck-at Faults

Inadmissible Class of Boolean Functions under Stuck-at Faults Inadmissible Class of Boolean Functions under Stuck-at Faults Debesh K. Das 1, Debabani Chowdhury 1, Bhargab B. Bhattacharya 2, Tsutomu Sasao 3 1 Computer Sc. & Engg. Dept., Jadavpur University, Kolkata

More information

Polar codes for the m-user MAC and matroids

Polar codes for the m-user MAC and matroids Research Collection Conference Paper Polar codes for the m-user MAC and matroids Author(s): Abbe, Emmanuel; Telatar, Emre Publication Date: 2010 Permanent Link: https://doi.org/10.3929/ethz-a-005997169

More information

Maximal non-commuting subsets of groups

Maximal non-commuting subsets of groups Maximal non-commuting subsets of groups Umut Işık March 29, 2005 Abstract Given a finite group G, we consider the problem of finding the maximal size nc(g) of subsets of G that have the property that no

More information

COUNTING NUMERICAL SEMIGROUPS BY GENUS AND SOME CASES OF A QUESTION OF WILF

COUNTING NUMERICAL SEMIGROUPS BY GENUS AND SOME CASES OF A QUESTION OF WILF COUNTING NUMERICAL SEMIGROUPS BY GENUS AND SOME CASES OF A QUESTION OF WILF NATHAN KAPLAN Abstract. The genus of a numerical semigroup is the size of its complement. In this paper we will prove some results

More information

Simplified Composite Coding for Index Coding

Simplified Composite Coding for Index Coding Simplified Composite Coding for Index Coding Yucheng Liu, Parastoo Sadeghi Research School of Engineering Australian National University {yucheng.liu, parastoo.sadeghi}@anu.edu.au Fatemeh Arbabjolfaei,

More information

γ γ γ γ(α) ). Then γ (a) γ (a ) ( γ 1

γ γ γ γ(α) ). Then γ (a) γ (a ) ( γ 1 The Correspondence Theorem, which we next prove, shows that the congruence lattice of every homomorphic image of a Σ-algebra is isomorphically embeddable as a special kind of sublattice of the congruence

More information

Stab(t) = {h G h t = t} = {h G h (g s) = g s} = {h G (g 1 hg) s = s} = g{k G k s = s} g 1 = g Stab(s)g 1.

Stab(t) = {h G h t = t} = {h G h (g s) = g s} = {h G (g 1 hg) s = s} = g{k G k s = s} g 1 = g Stab(s)g 1. 1. Group Theory II In this section we consider groups operating on sets. This is not particularly new. For example, the permutation group S n acts on the subset N n = {1, 2,...,n} of N. Also the group

More information

Group connectivity of certain graphs

Group connectivity of certain graphs Group connectivity of certain graphs Jingjing Chen, Elaine Eschen, Hong-Jian Lai May 16, 2005 Abstract Let G be an undirected graph, A be an (additive) Abelian group and A = A {0}. A graph G is A-connected

More information

We begin with some definitions which apply to sets in general, not just groups.

We begin with some definitions which apply to sets in general, not just groups. Chapter 8 Cosets In this chapter, we develop new tools which will allow us to extend to every finite group some of the results we already know for cyclic groups. More specifically, we will be able to generalize

More information