Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions
|
|
- Rolf McDaniel
- 5 years ago
- Views:
Transcription
1 Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia NetCod, 205 NSF support under CCF and CCF / 9
2 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm 2 / 9
3 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm / 9
4 Problems of Interest MSNC Multisource Network Coding Described by tuple (G, S, T, β) Sources Network Sinks β : T 2 S \ allows arbitrary subset demands 4 / 9
5 Problems of Interest MSNC Multisource Network Coding Described by tuple (G, S, T, β) Sources Network Sinks X n RVs associated with a MSNC instance n S + E h : 2 Xn \ R 0 is the entropy function ω s, s S and R e, e E are the source and edge rates β : T 2 S \ allows arbitrary subset demands 4 / 9
6 Problems of Interest MSNC Multisource Network Coding Described by tuple (G, S, T, β) Sources Network Destinations. Paths.. In(i) i Out(i).. Y. s s. t β(t) ω. Ue e Re. s.. S T S T Entropy function must satisfy: (L ) s S h s = h S (L 2 ) a h In(i) = h In(i) Out(i)), i V (L ) h e R e, h s ω s a L 2 can be partitioned into L 2, L 2 2.L 2 (constraints associated with sources, intermmediate nodes and sinks resp.) 5 / 9
7 Implicit characterization Yan, Yeung and Zhang s Characterization The set of all source rate- edge rate tuples (ω, r) is given as R = proj ω,r (con(γ n L ) L ) () Notation L = L L 2 L 2, L = L L 2 proj ω,r ( ) stands for linear projection onto rate variables con( ) stands for conic hull, ( ) stands for closure Γ n stands for the unknown entropy function region: set of all 2 n dimensional vectors arising from entropy function 6 / 9
8 Explicit Characterization? Shannon entropy subspaces matroids class of polymatroids bound comment polymatroidal set functions necessary but not sufficient more restrictive polymatroidal set functions arising from random variables Arising from a column partition of matrices over finite field of size q necessary and sufficient every possible code sufficient but not necessary, vector linear codes Arising from matrices over finite field of size q sufficient but not necessary, scalar linear codes R k = proj ω,r (Γ k n L 2), k {in,out} 7 / 9
9 Explicit Characterization? Shannon entropy subspaces matroids class of polymatroids bound comment polymatroidal set functions necessary but not sufficient more restrictive polymatroidal set functions arising from random variables Arising from a column partition of matrices over finite field of size q necessary and sufficient every possible code sufficient but not necessary, vector linear codes Arising from matrices over finite field of size q sufficient but not necessary, scalar linear codes R k = proj ω,r (Γ k n L 2), k {in,out} Polyhedral Projection 7 / 9
10 Leave no stone unturned We developed a C software library for polyhedral projection called chm Accepts arbitrary polyhedra as input, uses rational arithmetic, rational LP solver QSopt ex, and gives exact answers The underlying algorithm Convex Hull Method was first used by Xu, Wang and Sun* for computing non-shannon information inequalities We have used it for computing non-shannon information inequalities and LP/Shannon outer bounds on rate regions Can also be used for solving interesting problems related to quantum information called marginal problems chm currently turns a blind eye to symmetries of input polyhedra *W. Xu, J. Wang, J. Sun, A projection method for derivation of non-shannon-type information inequalities, The proceedings of IEEE International Symposium on Information Theory (ISIT), pages , / 9
11 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm 9 / 9
12 Symmetry and Polyhedral Computation Symmetry can be exploited in polyhedral representation conversion (given extreme points compute inequalities or vice versa) Symmetry can be exploited in linear programming 2 D. Bremner and M. Sikiric and A. Schürmann. Polyhedral representation conversion up to symmetries, Proceedings of the 2006 CRM workshop on polyhedral computation, AMS/CRM Lecture Notes 48 (2009), R. Bödi and K. Herr, Symmetries in linear and integer programs, arxiv: [math.co] 0 / 9
13 Symmetry and Polyhedral Computation Symmetry can be exploited in polyhedral representation conversion (given extreme points compute inequalities or vice versa) Symmetry can be exploited in linear programming 2 What about polyhedral projection (esp. CHM)? D. Bremner and M. Sikiric and A. Schürmann. Polyhedral representation conversion up to symmetries, Proceedings of the 2006 CRM workshop on polyhedral computation, AMS/CRM Lecture Notes 48 (2009), R. Bödi and K. Herr, Symmetries in linear and integer programs, arxiv: [math.co] 0 / 9
14 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm / 9
15 Network Symmetry Group* Those permutations of {,..., n} that keep network constraints L 2 invariant Form a group called Network Symmetry Group (NSG) Can be computed using algorithms for computing automorphism groups of graphs *Jayant Apte, and John MacLaren Walsh, Symmetry in Network Coding, extended version, 2 / 9
16 Example: Butterfly Network source independence h +h 2 =h {,2} (,2)()(4,5)(6,7)(8,9) h +h 2 =h {,2} h =h {,4,6} h 2 =h {2,5,7} 2 node constraints h 2 =h {2,5,7} h {4,5} =h {,4,5} h =h {,8,9} h {6,8} =h {2,6,8} h =h {,4,6} h {4,5} =h {,4,5} h =h {,8,9} h {7,9} =h {,7,9} h {7,9} =h {,7,9} h {6,8} =h {2,6,8} rate constraints / 9
17 Example: M-Network Example An MSNC instance The Network Symmetry group is generated by: g =(, )(2, 4)(5, 7)(6, 8) (9, 2)(0, )(, 2) (4, 2)(5, 22)(6, 24)(8, 9) g 2 =(, 4)(7, 8)(, 4)(5, 6) (7, 8)(9, 20)(2, 22)(2, 24) g =(, 2)(5, 6)(, 5)(4, 6) (7, 9)(8, 20)(2, 2)(22, 24) A group of order 8 4 / 9
18 Example: Independent Distributed Source Coding 2 2 a a 2 2 b 2 b 2 c c <(a,b),(b,c)> <(2,)(b,c),(,2)(a,b)> 4 a,2 5 6 a,2 2 b, 2 b, 2 c 2, c 2, <(2,)(a,b),(,2)(b,c)> 2 2 <(2,)(b,c),(,2)(a,b)> 2 a b c a b c 2 2 <(2,)(a,b),(,2)(b,c)> <(2,)(b,c),(,2)(a,b)> 5 / 9
19 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm 6 / 9
20 Combinatorial Symmetries combinatorial symmetries 7 / 9
21 Combinatorial Symmetries combinatorial symmetries Very difficult to compute (require representation conversion*): *Volker Kaibel and Alexander Schwartz. On the complexity of polytope isomorphism problems. Graphs and Combinatorics, 9(2):25 20, 2007 / 9
22 Restricted Symmetries A subgroup of combinatorial symmetry group: combinatorial symmetries restricted symmetries (0,2) (0,) is a restricted symmetry of the triangle below (0,0) (,0) 8 / 9
23 Restricted Symmetries A subgroup of combinatorial symmetry group: combinatorial symmetries restricted symmetries (0,2) (0,) is a restricted symmetry of the triangle below (0,0) (,0) Can be obtained by computing automorphism group of an edge colored graph*: *Computing symmetry groups of polyhedra. David Bremner, Mathieu Dutour Sikiric, Dmitrii V. Pasechnik, Thomas Rehn, Achill Schrmann. arxiv: v [math.co], / 9
24 Permutational Symmetries A subgroup of restricted symmetry group: combinatorial symmetries restricted symmetries All! permutations of standard basis vectors of are permutational symmetries of the cube permutational symmetries Can be thought of as restricted symmetry arising from permutation matrices 9 / 9
25 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm 20 / 9
26 Symmetries of Rate Regions NSG can be interpreted as permutational symmetry group of rate region is achievable rate tuple iff is achievable rate tuple (bpnu), (bpnu), 0,0 (bpnu) (bpnu) (bpnu: bits per network use) 2 / 9
27 Symmetries of Rate Regions Let L 2 be the intersection of halfspaces and hyperplanes associated with network constraints NSG can be interpreted as permutational symmetry group of rate region R NSG can be interpreted as permutational symmetry group of Γ in n L 2, Γout n L 2 provided that Γ in n and Γ out n are setwise invariant under random variable permutations (which is indeed the case with most known bounds on entropy) 22 / 9
28 Symmetries of Rate Regions NSG can be interpreted as permutational symmetry group of proj ω,r (Γ in n L 2 ), proj ω,r(γ out n L 2 ) (,2) is a permutational symmetry (,2) is still a permutational symmetry after projection 2 / 9
29 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm 24 / 9
30 Key Idea ) Solve LP over with 0 in non-projection cost vector entries 2) Project extreme point of attaining the optimum ) Obtain an extreme point of projection 25 / 9
31 Key Idea 2 full-dimensional inner bound facet of inner bound that is not a facet of projection can be identified by solving an LP over facet Not a facet else is not a facet of projection is a facet of projection gives previously unknown vertex 26 / 9
32 Key Idea previously known full-dimensional inner bound new and improved improved fulldimensional inner bound Update the inner bound using an iteration of double description method* previously unknown vertex 27 / 9
33 Iterations of CHM 28 / 9
34 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm 29 / 9
35 Three uses of symmetry symmetric improvements symmetry exploitation symmetric linear programs symmetric updates 0 / 9
36 Exploitation : Symmetric Improvements symmetric improvements CHM iterations symmetric linear programs symmetry exploitation symmetric updates symchm iterations,0,,,0 If we know 0,, one of these then we know all of these! projection of a hypercube to -d / 9
37 Exploitation 2: Symmetric Updates symmetric improvements,0, 0,, facets incident to (0,,) symmetry exploitation,0,,,0 0,, facets incident to (,0,) symmetric linear programs symmetric updates (,2),,0 0,,,0, 2 / 9
38 Exploitation : Symmetric LPs symmetric improvements symmetry exploitation permutation of standard bases is a restricted symmetry of this polytope it also leaves cost invariant maximize symmetric linear programs symmetric updates there exists a solution of this LP in fixed space: the subspace of points mapping to themselves under the basis vector permutation / 9
39 Outline Motivation and Background Explicit Expressions for MSNC Rate Regions Symmetry Can Help in Polyhedral Computation Symmetry in Network Coding Classes of Polyhedral Symmetries 2 Symmetries of polyhedral Bounds and NSG NSG and Rate Region Symmetries Convex Hull method (CHM) Basic ideas behind CHM 4 Symmetry Exploiting CHM (symchm) Symmetry Exploitation in symchm Comparison of CHM and symchm 4 / 9
40 Comparison of CHM (top) and symchm (bottom) Initial Hull New vertex Old vertex Initial Hull 5 / 9
41 Complexity Comparison (No. and dimension of linear programs) 2 a b c <(a,b),(b,c)> No. of LPs solved CHM symchm CHM symchm CHM symchm CHM symchm CHM symchm CHM symchm d=64 d=2 d=28 d=24 d=20 d=6 2 2 a b c 2 2 <(2,)(b,c),(,2)(a,b)> a 25 4 a,2 2 2 b, b 2 20 c 2, c <(2,)(a,b),(,2)(b,c)> 5 <(2,)(a,b),(,2)(b,c)> a a,2 2 b 2 2 b, 5 c c 2, 0 <(2,)(b,c),(,2)(a,b)> <(2,)(b,c),(,2)(a,b)> I-DSC instance 6 / 9
42 Conclusion In this paper, We related network symmetries to symmetries of polyhedral bounds Developed a symmetry exploiting variant of Convex Hull Method Future work: A Python implementation of symchm in SageMath A C implementation of symchm to go with the Entropic Vectors Computation Package Extensive computational experimemnts with arbitrary symmetric polyhedra 7 / 9
43 Selected References I D. Bremner and M. Sikiric and A. Schürmann. Polyhedral representation conversion up to symmetries, Proceedings of the 2006 CRM workshop on polyhedral computation, AMS/CRM Lecture Notes 48 (2009), R. Bödi and K. Herr, Symmetries in linear and integer programs, [Online]. Available: 8 / 9
44 Questions 9 / 9
Symmetry in Network Coding
Symmetry in Network Coding Formalization, Graph-theoretic Characterization, and Computation Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia ISIT,
More informationSymmetry in Network Coding
Symmetry in Network Coding Jayant Apte, John MacLaren Walsh Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA jsa46@drexel.edu, jwalsh@coe.drexel.edu Abstract We establish connections between
More informationNetwork Combination Operations Preserving the Sufficiency of Linear Network Codes
Network Combination Operations Preserving the Sufficiency of Linear Network Codes Congduan Li, Steven Weber, John MacLaren Walsh ECE Department, Drexel University Philadelphia, PA 904 Abstract Operations
More informationMultiterminal Networks: Rate Regions, Codes, Computations, & Forbidden Minors
Multiterminal etworks: Rate Regions, Codes, Computations, & Forbidden Minors Ph D Thesis Proposal Congduan Li ASPITRG & MAL Drexel University congduanli@gmailcom October 5, 204 C Li (ASPITRG & MAL) Thesis
More informationAlgorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids
Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids Jayant Apte, Congduan Li, John MacLaren Walsh Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA
More informationMatroid Bounds on the Region of Entropic Vectors
Matroid Bounds on the Region of Entropic Vectors Congduan Li, John MacLaren Walsh, Steven Weber Drexel University, Dept of ECE, Philadelphia, PA 19104, USA congduanli@drexeledu, jwalsh@coedrexeledu, sweber@coedrexeledu
More informationSymmetries in the Entropy Space
Symmetries in the Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Abstract This paper investigates when Shannon-type inequalities completely characterize the part of the closure of the entropy
More informationCharacterizing the Region of Entropic Vectors via Information Geometry
Characterizing the Region of Entropic Vectors via Information Geometry John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks
More information. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables
. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables John MacLaren Walsh and Steven Weber Department of Electrical and Computer Engineering, Drexel University, Philadelphia,
More informationSymmetries in Entropy Space
1 Symmetries in Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks to NSF CCF-1421828
More informationNon-isomorphic Distribution Supports for Calculating Entropic Vectors
Non-isomorphic Distribution Supports for Calculating Entropic Vectors Yunshu Liu & John MacLaren Walsh Adaptive Signal Processing and Information Theory Research Group Department of Electrical and Computer
More informationPartition Symmetrical Entropy Functions*
Partition Symmetrical Entropy Functions* Jayant Apte ASPITRG *Chen, Qi; Yeung, Raymond W., Partition Symmetrical Entropy Functions, arxiv:1407.7405v1 [cs.it] Outline Sneak Peak Background: Basic facts
More informationEntropic Vectors: Polyhedral Computation & Information Geometry
Entropic Vectors: Polyhedral Computation & Information Geometry John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks to
More informationNetwork Coding on Directed Acyclic Graphs
Network Coding on Directed Acyclic Graphs John MacLaren Walsh, Ph.D. Multiterminal Information Theory, Spring Quarter, 0 Reference These notes are directly derived from Chapter of R. W. Yeung s Information
More informationBounding the Entropic Region via Information Geometry
Bounding the ntropic Region via Information Geometry Yunshu Liu John MacLaren Walsh Dept. of C, Drexel University, Philadelphia, PA 19104, USA yunshu.liu@drexel.edu jwalsh@coe.drexel.edu Abstract This
More informationA computational approach for determining rate regions and codes using entropic vector bounds
1 A computational approach for determining rate regions and codes using entropic vector bounds Congduan Li, John MacLaren Walsh, Steven Weber Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA
More informationACO Comprehensive Exam March 20 and 21, Computability, Complexity and Algorithms
1. Computability, Complexity and Algorithms Part a: You are given a graph G = (V,E) with edge weights w(e) > 0 for e E. You are also given a minimum cost spanning tree (MST) T. For one particular edge
More informationEntropy Vectors and Network Information Theory
Entropy Vectors and Network Information Theory Sormeh Shadbakht and Babak Hassibi Department of Electrical Engineering Caltech Lee Center Workshop May 25, 2007 1 Sormeh Shadbakht and Babak Hassibi Entropy
More informationA new computational approach for determining rate regions and optimal codes for coded networks
A new computational approach for determining rate regions and optimal codes for coded networks Congduan Li, Jayant Apte, John MacLaren Walsh, Steven Weber Drexel University, Dept. of ECE, Philadelphia,
More information3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology 18.433: Combinatorial Optimization Michel X. Goemans February 28th, 2013 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the introductory
More informationFundamental Domains for Integer Programs with Symmetries
Fundamental Domains for Integer Programs with Symmetries Eric J. Friedman Cornell University, Ithaca, NY 14850, ejf27@cornell.edu, WWW home page: http://www.people.cornell.edu/pages/ejf27/ Abstract. We
More informationOptimization WS 13/14:, by Y. Goldstein/K. Reinert, 9. Dezember 2013, 16: Linear programming. Optimization Problems
Optimization WS 13/14:, by Y. Goldstein/K. Reinert, 9. Dezember 2013, 16:38 2001 Linear programming Optimization Problems General optimization problem max{z(x) f j (x) 0,x D} or min{z(x) f j (x) 0,x D}
More informationOrbitopes. Marc Pfetsch. joint work with Volker Kaibel. Zuse Institute Berlin
Orbitopes Marc Pfetsch joint work with Volker Kaibel Zuse Institute Berlin What this talk is about We introduce orbitopes. A polyhedral way to break symmetries in integer programs. Introduction 2 Orbitopes
More informationCS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi
CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source Shortest
More informationA Parametric Simplex Algorithm for Linear Vector Optimization Problems
A Parametric Simplex Algorithm for Linear Vector Optimization Problems Birgit Rudloff Firdevs Ulus Robert Vanderbei July 9, 2015 Abstract In this paper, a parametric simplex algorithm for solving linear
More informationDual Consistent Systems of Linear Inequalities and Cardinality Constrained Polytopes. Satoru FUJISHIGE and Jens MASSBERG.
RIMS-1734 Dual Consistent Systems of Linear Inequalities and Cardinality Constrained Polytopes By Satoru FUJISHIGE and Jens MASSBERG December 2011 RESEARCH INSTITUTE FOR MATHEMATICAL SCIENCES KYOTO UNIVERSITY,
More informationCS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi
CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source
More informationSherali-Adams Relaxations of Graph Isomorphism Polytopes. Peter N. Malkin* and Mohammed Omar + UC Davis
Sherali-Adams Relaxations of Graph Isomorphism Polytopes Peter N. Malkin* and Mohammed Omar + UC Davis University of Washington May 18th 2010 *Partly funded by an IBM OCR grant and the NSF. + Partly funded
More informationLinearly Representable Entropy Vectors and their Relation to Network Coding Solutions
2009 IEEE Information Theory Workshop Linearly Representable Entropy Vectors and their Relation to Network Coding Solutions Asaf Cohen, Michelle Effros, Salman Avestimehr and Ralf Koetter Abstract In this
More informationA Geometric Approach to Graph Isomorphism
A Geometric Approach to Graph Isomorphism Pawan Aurora and Shashank K Mehta Indian Institute of Technology, Kanpur - 208016, India {paurora,skmehta}@cse.iitk.ac.in Abstract. We present an integer linear
More informationGeneralized Network Sharing Outer Bound and the Two-Unicast Problem
Generalized Network Sharing Outer Bound and the Two-Unicast Problem Sudeep U. Kamath, David N. C. Tse and Venkat Anantharam Wireless Foundations, Dept of EECS, University of California at Berkeley, Berkeley,
More informationThe Capacity Region for Multi-source Multi-sink Network Coding
The Capacity Region for Multi-source Multi-sink Network Coding Xijin Yan Dept. of Electrical Eng. - Systems University of Southern California Los Angeles, CA, U.S.A. xyan@usc.edu Raymond W. Yeung Dept.
More information3. Linear Programming and Polyhedral Combinatorics
Massachusetts Institute of Technology 18.453: Combinatorial Optimization Michel X. Goemans April 5, 2017 3. Linear Programming and Polyhedral Combinatorics Summary of what was seen in the introductory
More informationNonlinear Discrete Optimization
Nonlinear Discrete Optimization Technion Israel Institute of Technology http://ie.technion.ac.il/~onn Billerafest 2008 - conference in honor of Lou Billera's 65th birthday (Update on Lecture Series given
More informationLearning with Submodular Functions: A Convex Optimization Perspective
Foundations and Trends R in Machine Learning Vol. 6, No. 2-3 (2013) 145 373 c 2013 F. Bach DOI: 10.1561/2200000039 Learning with Submodular Functions: A Convex Optimization Perspective Francis Bach INRIA
More informationRate region for a class of delay mitigating codes and P2P networks
Rate region for a class of delay mitigating codes and P2P networks Steven Weber, Congduan Li, John MacLaren Walsh Drexel University, Dept of ECE, Philadelphia, PA 19104 Abstract This paper identifies the
More informationLinear Algebra Review: Linear Independence. IE418 Integer Programming. Linear Algebra Review: Subspaces. Linear Algebra Review: Affine Independence
Linear Algebra Review: Linear Independence IE418: Integer Programming Department of Industrial and Systems Engineering Lehigh University 21st March 2005 A finite collection of vectors x 1,..., x k R n
More informationCapacity Region of the Permutation Channel
Capacity Region of the Permutation Channel John MacLaren Walsh and Steven Weber Abstract We discuss the capacity region of a degraded broadcast channel (DBC) formed from a channel that randomly permutes
More informationInteger Programming ISE 418. Lecture 12. Dr. Ted Ralphs
Integer Programming ISE 418 Lecture 12 Dr. Ted Ralphs ISE 418 Lecture 12 1 Reading for This Lecture Nemhauser and Wolsey Sections II.2.1 Wolsey Chapter 9 ISE 418 Lecture 12 2 Generating Stronger Valid
More informationExtremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences.
Extremal Entropy: Information Geometry, Numerical Entropy Mapping, and Machine Learning Application of Associated Conditional Independences A Thesis Submitted to the Faculty of Drexel University by Yunshu
More informationPartial cubes: structures, characterizations, and constructions
Partial cubes: structures, characterizations, and constructions Sergei Ovchinnikov San Francisco State University, Mathematics Department, 1600 Holloway Ave., San Francisco, CA 94132 Abstract Partial cubes
More information1 Matroid intersection
CS 369P: Polyhedral techniques in combinatorial optimization Instructor: Jan Vondrák Lecture date: October 21st, 2010 Scribe: Bernd Bandemer 1 Matroid intersection Given two matroids M 1 = (E, I 1 ) and
More informationOn Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region. Computation, and Hierarchy. A Thesis. Submitted to the Faculty
On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region Computation, and Hierarchy A Thesis Submitted to the Faculty of Drexel University by Congduan Li in partial fulfillment of the requirements
More informationOn mixed-integer sets with two integer variables
On mixed-integer sets with two integer variables Sanjeeb Dash IBM Research sanjeebd@us.ibm.com Santanu S. Dey Georgia Inst. Tech. santanu.dey@isye.gatech.edu September 8, 2010 Oktay Günlük IBM Research
More informationA notion of Total Dual Integrality for Convex, Semidefinite and Extended Formulations
A notion of for Convex, Semidefinite and Extended Formulations Marcel de Carli Silva Levent Tunçel April 26, 2018 A vector in R n is integral if each of its components is an integer, A vector in R n is
More informationFacets for Node-Capacitated Multicut Polytopes from Path-Block Cycles with Two Common Nodes
Facets for Node-Capacitated Multicut Polytopes from Path-Block Cycles with Two Common Nodes Michael M. Sørensen July 2016 Abstract Path-block-cycle inequalities are valid, and sometimes facet-defining,
More informationTropical decomposition of symmetric tensors
Tropical decomposition of symmetric tensors Melody Chan University of California, Berkeley mtchan@math.berkeley.edu December 11, 008 1 Introduction In [], Comon et al. give an algorithm for decomposing
More informationThe Ellipsoid Algorithm
The Ellipsoid Algorithm John E. Mitchell Department of Mathematical Sciences RPI, Troy, NY 12180 USA 9 February 2018 Mitchell The Ellipsoid Algorithm 1 / 28 Introduction Outline 1 Introduction 2 Assumptions
More informationNetworks and Matroids
Adaptive Signal Processing and Information Theory Research Group ECE Department, Drexel University June 1, 2012 Outline 1 Mappings and Definitions Source Mapping: S : V 2 µ, µ is message set. Message Assignment:
More informationA thesis presented to the faculty of San Francisco State University In partial fulfilment of The Requirements for The Degree
ON THE POLYHEDRAL GEOMETRY OF t DESIGNS A thesis presented to the faculty of San Francisco State University In partial fulfilment of The Requirements for The Degree Master of Arts In Mathematics by Steven
More information1 Integer Decomposition Property
CS 598CSC: Combinatorial Optimization Lecture date: Feb 2, 2010 Instructor: Chandra Chekuri Scribe: Siva Theja Maguluri Material taken mostly from [1] (Chapter 19). 1 Integer Decomposition Property A polyhedron
More informationOn Network Coding Capacity - Matroidal Networks and Network Capacity Regions. Anthony Eli Kim
On Network Coding Capacity - Matroidal Networks and Network Capacity Regions by Anthony Eli Kim S.B., Electrical Engineering and Computer Science (2009), and S.B., Mathematics (2009) Massachusetts Institute
More informationChapter 1. Preliminaries
Introduction This dissertation is a reading of chapter 4 in part I of the book : Integer and Combinatorial Optimization by George L. Nemhauser & Laurence A. Wolsey. The chapter elaborates links between
More informationIndex Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago
Index Coding Algorithms for Constructing Network Codes Salim El Rouayheb Illinois Institute of Technology, Chicago Matlab Code with GUI for Constructing Linear Network Codes Matlab outputs network code
More informationMAT-INF4110/MAT-INF9110 Mathematical optimization
MAT-INF4110/MAT-INF9110 Mathematical optimization Geir Dahl August 20, 2013 Convexity Part IV Chapter 4 Representation of convex sets different representations of convex sets, boundary polyhedra and polytopes:
More informationRESEARCH ARTICLE. An extension of the polytope of doubly stochastic matrices
Linear and Multilinear Algebra Vol. 00, No. 00, Month 200x, 1 15 RESEARCH ARTICLE An extension of the polytope of doubly stochastic matrices Richard A. Brualdi a and Geir Dahl b a Department of Mathematics,
More informationOn Multi-source Multi-sink Hyperedge Networks: Enumeration, Rate Region Computation, & Hierarchy
On Multi-ource Multi-ink Hyperedge Network: Enumeration, Rate Region Computation, & Hierarchy Ph D Diertation Defene Congduan Li ASPITRG & MANL Drexel Univerity congduanli@gmailcom May 9, 05 C Li (ASPITRG
More informationCS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III. Instructor: Shaddin Dughmi
CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III Instructor: Shaddin Dughmi Announcements Today: Spanning Trees and Flows Flexibility awarded
More informationKey Things We Learned Last Time. IE418 Integer Programming. Proving Facets Way #2 Indirect. A More Abstract Example
Key Things We Learned Last Time IE48: Integer Programming Department of Industrial and Systems Engineering Lehigh University 8th March 5 A face F is said to be a facet of P if dim(f ) = dim(p ). All facets
More informationCharacterising Probability Distributions via Entropies
1 Characterising Probability Distributions via Entropies Satyajit Thakor, Terence Chan and Alex Grant Indian Institute of Technology Mandi University of South Australia Myriota Pty Ltd arxiv:1602.03618v2
More informationEE595A Submodular functions, their optimization and applications Spring 2011
EE595A Submodular functions, their optimization and applications Spring 2011 Prof. Jeff Bilmes University of Washington, Seattle Department of Electrical Engineering Winter Quarter, 2011 http://ee.washington.edu/class/235/2011wtr/index.html
More informationA COMPUTATIONAL COMPARISON OF SYMMETRY HANDLING METHODS FOR MIXED INTEGER PROGRAMS
A COMPUTATIONAL COMPARISON OF SYMMETRY HANDLING METHODS FOR MIXED INTEGER PROGRAMS MARC E. PFETSCH AND THOMAS REHN Abstract. The handling of symmetries in mixed integer programs in order to speed up the
More informationChain Independence and Common Information
1 Chain Independence and Common Information Konstantin Makarychev and Yury Makarychev Abstract We present a new proof of a celebrated result of Gács and Körner that the common information is far less than
More informationSolving the MWT. Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP:
Solving the MWT Recall the ILP for the MWT. We can obtain a solution to the MWT problem by solving the following ILP: max subject to e i E ω i x i e i C E x i {0, 1} x i C E 1 for all critical mixed cycles
More informationParity Polytopes and Binarization
Parity Polytopes and Binarization Dominik Ermel 1 and Matthias Walter 1 Otto-von-Guericke-Universität Magdeburg, dominik.ermel@st.ovgu.de RWTH Aachen University, walter@or.rwth-aachen.de March 8, 018 Abstract
More informationA compositional approach to the max-flow problem
Boston University OpenBU Computer Science http://open.bu.edu CAS: Computer Science: Technical Reports 2014-06-09 A compositional approach to the max-flow problem Kfoury, Assaf Computer Science Department,
More informationNot Every GTSP Facet Induces an STSP Facet
Not Every GTSP Facet Induces an STSP Facet Marcus Oswald, Gerhard Reinelt, and Dirk Oliver Theis Institute of Computer Science University of Heidelberg Im Neuenheimer Feld 38, 9120 Heidelberg, Germany
More informationarxiv:math/ v1 [math.ac] 11 Nov 2005
A note on Rees algebras and the MFMC property arxiv:math/0511307v1 [math.ac] 11 Nov 2005 Isidoro Gitler, Carlos E. Valencia and Rafael H. Villarreal 1 Departamento de Matemáticas Centro de Investigación
More informationThe Geometry of Root Systems. Brian C. Hall
The Geometry of Root Systems A E Z S Brian C. Hall T G R S T G R S 1 1. I Root systems arise in the theory of Lie groups and Lie algebras, but can also be studied as mathematical objects in their own right.
More informationDiscrete Optimization 2010 Lecture 7 Introduction to Integer Programming
Discrete Optimization 2010 Lecture 7 Introduction to Integer Programming Marc Uetz University of Twente m.uetz@utwente.nl Lecture 8: sheet 1 / 32 Marc Uetz Discrete Optimization Outline 1 Intro: The Matching
More informationEquivariant semidefinite lifts and sum of squares hierarchies
Equivariant semidefinite lifts and sum of squares hierarchies Pablo A. Parrilo Laboratory for Information and Decision Systems Electrical Engineering and Computer Science Massachusetts Institute of Technology
More informationInteger Programming, Part 1
Integer Programming, Part 1 Rudi Pendavingh Technische Universiteit Eindhoven May 18, 2016 Rudi Pendavingh (TU/e) Integer Programming, Part 1 May 18, 2016 1 / 37 Linear Inequalities and Polyhedra Farkas
More informationFrom the Zonotope Construction to the Minkowski Addition of Convex Polytopes
From the Zonotope Construction to the Minkowski Addition of Convex Polytopes Komei Fukuda School of Computer Science, McGill University, Montreal, Canada Abstract A zonotope is the Minkowski addition of
More informationLattice closures of polyhedra
Lattice closures of polyhedra Sanjeeb Dash IBM Research sanjeebd@us.ibm.com Oktay Günlük IBM Research gunluk@us.ibm.com April 10, 2017 Diego A. Morán R. Universidad Adolfo Ibañez diego.moran@uai.cl Abstract
More information47-831: Advanced Integer Programming Lecturer: Amitabh Basu Lecture 2 Date: 03/18/2010
47-831: Advanced Integer Programming Lecturer: Amitabh Basu Lecture Date: 03/18/010 We saw in the previous lecture that a lattice Λ can have many bases. In fact, if Λ is a lattice of a subspace L with
More informationLecture notes on the ellipsoid algorithm
Massachusetts Institute of Technology Handout 1 18.433: Combinatorial Optimization May 14th, 007 Michel X. Goemans Lecture notes on the ellipsoid algorithm The simplex algorithm was the first algorithm
More informationLinear equations in linear algebra
Linear equations in linear algebra Samy Tindel Purdue University Differential equations and linear algebra - MA 262 Taken from Differential equations and linear algebra Pearson Collections Samy T. Linear
More informationHamiltonian Tournaments and Gorenstein Rings
Europ. J. Combinatorics (2002) 23, 463 470 doi:10.1006/eujc.2002.0572 Available online at http://www.idealibrary.com on Hamiltonian Tournaments and Gorenstein Rings HIDEFUMI OHSUGI AND TAKAYUKI HIBI Let
More informationThe Witt designs, Golay codes and Mathieu groups
The Witt designs, Golay codes and Mathieu groups 1 The Golay codes Let V be a vector space over F q with fixed basis e 1,..., e n. A code C is a subset of V. A linear code is a subspace of V. The vector
More informationOptimization methods NOPT048
Optimization methods NOPT048 Jirka Fink https://ktiml.mff.cuni.cz/ fink/ Department of Theoretical Computer Science and Mathematical Logic Faculty of Mathematics and Physics Charles University in Prague
More informationThe Strength of Multi-row Aggregation Cuts for Sign-pattern Integer Programs
The Strength of Multi-row Aggregation Cuts for Sign-pattern Integer Programs Santanu S. Dey 1, Andres Iroume 1, and Guanyi Wang 1 1 School of Industrial and Systems Engineering, Georgia Institute of Technology
More informationLECTURE 25: REVIEW/EPILOGUE LECTURE OUTLINE
LECTURE 25: REVIEW/EPILOGUE LECTURE OUTLINE CONVEX ANALYSIS AND DUALITY Basic concepts of convex analysis Basic concepts of convex optimization Geometric duality framework - MC/MC Constrained optimization
More informationInteger Programming ISE 418. Lecture 13. Dr. Ted Ralphs
Integer Programming ISE 418 Lecture 13 Dr. Ted Ralphs ISE 418 Lecture 13 1 Reading for This Lecture Nemhauser and Wolsey Sections II.1.1-II.1.3, II.1.6 Wolsey Chapter 8 CCZ Chapters 5 and 6 Valid Inequalities
More informationarxiv: v3 [math.co] 1 Oct 2018
NON-SPANNING LATTICE 3-POLYTOPES arxiv:7.07603v3 [math.co] Oct 208 Abstract. We completely classify non-spanning 3-polytopes, by which we mean lattice 3-polytopes whose lattice points do not affinely span
More informationVertex subsets with minimal width and dual width
Vertex subsets with minimal width and dual width in Q-polynomial distance-regular graphs University of Wisconsin & Tohoku University February 2, 2011 Every face (or facet) of a hypercube is a hypercube...
More informationIntroduction to Semidefinite Programming I: Basic properties a
Introduction to Semidefinite Programming I: Basic properties and variations on the Goemans-Williamson approximation algorithm for max-cut MFO seminar on Semidefinite Programming May 30, 2010 Semidefinite
More informationAn enumeration of equilateral triangle dissections
arxiv:090.599v [math.co] Apr 00 An enumeration of equilateral triangle dissections Aleš Drápal Department of Mathematics Charles University Sokolovská 83 86 75 Praha 8 Czech Republic Carlo Hämäläinen Department
More informationEhrhart Positivity. Federico Castillo. December 15, University of California, Davis. Joint work with Fu Liu. Ehrhart Positivity
University of California, Davis Joint work with Fu Liu December 15, 2016 Lattice points of a polytope A (convex) polytope is a bounded solution set of a finite system of linear inequalities, or is the
More informationCOUNTING INTEGER POINTS IN POLYHEDRA. Alexander Barvinok
COUNTING INTEGER POINTS IN POLYHEDRA Alexander Barvinok Papers are available at http://www.math.lsa.umich.edu/ barvinok/papers.html Let P R d be a polytope. We want to compute (exactly or approximately)
More informationLIFTS OF CONVEX SETS AND CONE FACTORIZATIONS JOÃO GOUVEIA, PABLO A. PARRILO, AND REKHA THOMAS
LIFTS OF CONVEX SETS AND CONE FACTORIZATIONS Abstract. In this paper we address the basic geometric question of when a given convex set is the image under a linear map of an affine slice of a given closed
More informationarxiv: v1 [math.co] 10 Aug 2016
POLYTOPES OF STOCHASTIC TENSORS HAIXIA CHANG 1, VEHBI E. PAKSOY 2 AND FUZHEN ZHANG 2 arxiv:1608.03203v1 [math.co] 10 Aug 2016 Abstract. Considering n n n stochastic tensors (a ijk ) (i.e., nonnegative
More informationA combinatorial algorithm minimizing submodular functions in strongly polynomial time
A combinatorial algorithm minimizing submodular functions in strongly polynomial time Alexander Schrijver 1 Abstract We give a strongly polynomial-time algorithm minimizing a submodular function f given
More informationInteger programming: an introduction. Alessandro Astolfi
Integer programming: an introduction Alessandro Astolfi Outline Introduction Examples Methods for solving ILP Optimization on graphs LP problems with integer solutions Summary Introduction Integer programming
More informationLecture 1 Introduction
L. Vandenberghe EE236A (Fall 2013-14) Lecture 1 Introduction course overview linear optimization examples history approximate syllabus basic definitions linear optimization in vector and matrix notation
More informationResource Constrained Project Scheduling Linear and Integer Programming (1)
DM204, 2010 SCHEDULING, TIMETABLING AND ROUTING Lecture 3 Resource Constrained Project Linear and Integer Programming (1) Marco Chiarandini Department of Mathematics & Computer Science University of Southern
More informationDETECTION OF FXM ARBITRAGE AND ITS SENSITIVITY
DETECTION OF FXM ARBITRAGE AND ITS SENSITIVITY SFI FINANCIAL ALGEBRA PROJECT AT UCC: BH, AM & EO S 1. Definitions and basics In this working paper we have n currencies, labeled 1 through n inclusive and
More informationCutting planes from extended LP formulations
Cutting planes from extended LP formulations Merve Bodur University of Wisconsin-Madison mbodur@wisc.edu Sanjeeb Dash IBM Research sanjeebd@us.ibm.com March 7, 2016 Oktay Günlük IBM Research gunluk@us.ibm.com
More informationLecture Notes Introduction to Cluster Algebra
Lecture Notes Introduction to Cluster Algebra Ivan C.H. Ip Updated: April 14, 017 Total Positivity The final and historically the original motivation is from the study of total positive matrices, which
More informationIntroduction to Linear and Combinatorial Optimization (ADM I)
Introduction to Linear and Combinatorial Optimization (ADM I) Rolf Möhring based on the 20011/12 course by Martin Skutella TU Berlin WS 2013/14 1 General Remarks new flavor of ADM I introduce linear and
More informationON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS
INTEGERS: ELECTRONIC JOURNAL OF COMBINATORIAL NUMBER THEORY 4 (2004), #A21 ON MULTI-AVOIDANCE OF RIGHT ANGLED NUMBERED POLYOMINO PATTERNS Sergey Kitaev Department of Mathematics, University of Kentucky,
More information