joint work with Elona Erez Tel Aviv University Meir Feder Overcoming Delay, Synchronization
|
|
- Silas Rich
- 5 years ago
- Views:
Transcription
1 Overcoming Delay, Synchronization and Cyclic Paths Meir Feder Tel Aviv University joint work with Elona Erez nd Cyclic Paths
2 Root of the problem In much of network coding assume instantaneous coding Instantaneous coding cannot work with cycles Node delay, which may be beneficial cycles, introduces a synchronization problem in code implementation How to deal with node delay in case of long input sequence? What about decoding Delay? Solution: Convolutional codes oot of the problem 2
3 Motivating Example x ) S x 2 ( n ) ( n x x n ) + x ( n ) x n ) + x ( ) x 2 ( n ) ( n ) ( 2 ( 2 n t t t 2 3 t 4 t 5 6 t At n = 4 sink t receives x(0) on both of its incoming links. At time instant n = 5, t receives x() and x() + x2(0). The effective decoding delay is 5. Only a single memory element is required. Motivating Example 2-
4 Convolutional Network Codes - Definition Let F (D) be the ring of polynomials over the binary field. Link e is associated with b(e), whose elements are in F (D). 0 0 t S t 5 4 t t 3 2 t 6 t 0 D 0 a v onvolutional Network Codes - Definition 2
5 Input stream xi(n) can be represented by a power series: Xi(D) = n=0 x i(n)d n, i =,, h In linear convolutional network codes: Ye(D) = ye(n)d n = me(e )Ye (D) = b(e) T x(d) n=0 e ΓI (v) where ye(n) are the symbols transmitted on the link e. To achieve rate h, the global coding vectors on the incoming links to t have to span F [D] h, where F [D] is the field of rational function over the binary field. onvolutional Network Codes - Definition 3
6 Dealing with Cycles Previous Results Precoding Code Construction Algorithm Complexity Decoding Delay ealing with Cycles 4
7 Previous Results Ahlswede et al (00): the cyclic network was unrolled into an acyclic layered network. The resulting scheme is time-variant, requires complex encoding/decoding and large delay Koetter and Médard (02): if each edge has delay, then there exists a time-invariant linear code with optimal rate. Li et al (03): a heuristic code construction for a linear time-invariant code. revious Results 5
8 Line Graph Originally the network is modeled as a directed graph G = (V, E) L(V, E) is the line graph with: Vertex Set: V = E s T Edge Set: E = {(e, e ) E 2 : head(e) = tail(e )} {(s, e) : e outgoing from s} {(e, ti) : e incoming to ti, i d} If there are h edge-disjoint paths between s and t in G, there are corresponding h node-disjoint paths in L. ine Graph 6
9 Recall the following: h: the minimal min-cut between s and any of the sinks T = {t,, td} F (D): the ring of polynomials with binary coefficients F [D]: the field of rational function over the binary field. v(e): a global coding vector (whose components maybe in F [D]) assigned to node e L. The code can be used for multicast if and only if for all t T, the global coding vectors incoming into t span F [D] h. ine Graph 7
10 Precoding We find a set of nodes ED in L, such that if we eliminate them, there will be no directed cycles. To insure that each cycle will contain at least a single delay, the coding coefficients for this set will be restricted to be polynomials with D as a common component. To maintain the same number of possible coding coefficients, if we choose polynomials with maximal degree M, then for e ED the maximal polynomial degree is M +. recoding 8
11 In order to minimize the delay, it is desired to minimize ED. Finding the minimal ED is the long standing problem of finding the minimal arc feedback set, which is NP-hard. The best known approximation algorithm with polynomial complexity achieves performance ratio O(log V log log V ). For our purposes - use any approximate solution to insert enough delays in the cycles. recoding 9
12 Code Construction The code construction goes in steps over the terminals: Let Ll be the sub-graph consisting only of the nodes that participate in the flow from s to tl. Ll is acyclic. Go over the nodes e Ll in a topological order. Maintains a list of h nodes Cl = {e,l,, ei,l,, eh,l}, each belongs to a different path. ode Construction 0
13 Some definitions: Pj,l: the jth path of the flow from s to tl. pj,l Pj,l: the set of nodes following ej,l Cl (not including ej,l). cj,l: the set of coding coefficients of edges with tail in pj,l and head in L \ pj,l. rl: the union of these sets of coefficients: rl = j hcj,l ode Construction
14 s edges in p j, edges outgoing from p j, m = 0 for edges in r l l l n e,l m 0 e j, e h, e h, e,l l l l n e j, l m m 0 n e h, l 0 m 0 n e h, l m 0 m 0 m 0 t l ode Construction 2
15 The partial coding vector - u(e) u(e) is defined for all e Cl as the global coding vector of e when all the coefficients in rl are set to zero. Vl = {v(e) : e Cl}, Ul = {u(e) : e Cl}. Requiring Vl to span F [D] h is not sufficient. Requiring Ul to span F [D] h is sufficient. At the end of step l, Vl = Ul. he partial coding vector - u(e) 3
16 ; ' 9 he partial coding vector - u(e) 4 t l v ( e 2 ), ++ - ) * (( m n l ( e,, 2 ) :e m ( e 2, e 2, n l ) m ( e, e, n l n ( e, l ) v ) /0/ % $$ & " #!! v ( e ), v ( n 2, l e ) m ( e, l e, n l ) 0 m e n ( 2, l e 2, l v ( e, l ) 0 v ( e 2, l ), ) 0 0 s Requiring Vl to span F [D] h is not sufficient:
17 The dashed edges are edges in Lk for some k < l. The current edges in Cl are e,l and e2,l. We have reached e n 2,l in the topological order. The previous value m(e2,l, e n 2,l ) = 0 remains since v(en 2,l ) and v(e,l) are already a basis. Next we reach e n,l and we need to determine m(e,l, e n,l ). But for any value of m(e,l, e n,l ), we have v(en,l ) = v(en 2,l ) and the new set of vectors cannot be a basis! he partial coding vector - u(e) 5
18 Returning to the algorithm... The algorithm reached node ei,l; wishes to continue to e n i,l, the following node in Pi,l So far, the set Ul = {u(e) : e Cl} is a basis. A new list is generated: C n l = Cl e n i,l \ ei,l. There is a new set of partial coding vectors: U n l = {u n (e,l),, u n (e n i,l),, u n (eh,l)}. eturning to the algorithm... 6
19 The algorithm determines a coding coefficient m(ei,l, e n i,l) between node ei,l and e n i,l so that U n l will be a basis. Let m (ei,l, e n i,l) be the coding coefficient between ei,l and e n i,l before this stage of the algorithm. If with m (ei,l, e n i,l) U n l is a basis - done! Otherwise - we have the following Theorem: Theorem Suppose that with m (ei,l, e n i,l) the set U n l is not a basis. Then with any other value m(ei,l, e n i,l) the set U n l will be a basis. eturning to the algorithm... 7
20 But what about the previous sinks? Changing m (ei,l, e n i,l ) changes the coding vectors incoming at the previous sinks. May not be a basis anymore! Theorem 2 Let Ck be the set of nodes incoming into the sink tk, k < l. Denote by V k = {v (e,k),, v (eh,k)}, ej,k Ck, the set of global coding vectors of Ck with m (ei,l, e n i,l). If V k is a basis, then at most a single value of new coefficient m(ei,l, e n i,l) will cause the new set Vk = {v(e,k),, v(eh,k)} not to be a basis. ut what about the previous sinks? 8
21 Summing it all up If m (ei,l, e n i,l) must be replaced, pick a new value m(ei,l, e n i,l) according to some enumeration. Check if the independence condition is satisfied for all sinks. Otherwise take the next value for m(ei,l, e n i,l). Since for each sink only a single choice of m(ei,l, e n i,l) is bad, it is sufficient to enumerate over d + coefficients. The l-step continues until it reaches the sink tl, The algorithm terminates when it goes over all d sinks. umming it all up 9
22 Computation of transfer functions In the construction algorithm the transfer function from a certain node to another node has to be computed in each stage. Define for the line graph L the E E matrix C where Ci,j = m(ei, ej) for (ei, ej) L and zero otherwise. Koetter and Médard (02): The transfer function between ei and ej is Fi,j, of the matrix F = (I C) = I + C + C 2 +. Fi,j can be computed from C with complexity O( E 2 ). omputation of transfer functions 20
23 Complexity of Code Construction The complexity of the precoding depends on the specific algorithm chosen. The algorithm begins by finding the d flows from the source s to the sinks at complexity O(d E h). The algorithm has d steps and in each it may go over all nodes: For each stage, when check a possible m(, ): May compute dh transfer functions at complexity O(dh E 2 ) omplexity of Code Construction 2
24 Perform independence test for Ul at complexity O(h), and independence test for the other sinks at complexity O(dh 2 ) In the average case check a constant number of m(, ) s, thus stage complexity O(dh 2 + dh E 2 ) = O(dh E 2 ) At the worst case check d values - complexity O(d 2 h E 2 ). Total complexity: O(d 2 h E 3 ) in the average case and O(d 3 h E 3 ) in the worse case. omplexity of Code Construction 22
25 Comparison Jaggi el al, 2003, presented an algorithm for acyclic networks with complexity O( E dh 2 ) on average and O( E dh 2 + E hd 3 ) in the worst case. Our algorithm can also be used for acyclic networks at complexity O( E d 2 h 2 + E 2 ) in the average case and O( E d 3 h 2 + E 2 ) in the worst case. omparison 23
26 A single delay in a cycle In Koetter and Médard (02) analysis for cyclic networks it is assumed that each node in L has a single delay. But as we have shown it is sufficient to have only a single delay for each cycle in the network. Song et al (05) showed that for this asynchronous transmission the min-cut is an upper bound on the possible rate. Since this bound is achievable, this bound is tight. single delay in a cycle 24
27 Adding and Removing Sinks The existing construction algorithms (for acyclic networks) do not provide a simple way to add and remove sinks. In our algorithm - adding a new sink simply corresponds to a new step in the algorithm, as only coding coefficients in the flow between the source and the new sink might be changed. Removing sinks is analogous to adding sinks. The efficient algorithm for removing and adding sinks can be performed for block or convolutional linear network codes. dding and Removing Sinks 25
28 Decoding Delay of the Sequential Decoder I. Acyclic Networks The delay of the sequential decoder proposed in Erez and Feder (04) is defined by the determinant of the matrix A(D), whose columns are the coding vectors in Vl: If the term with the smallest power of the determinant is D N, then the delay is at most N. Acyclic Networks 26
29 For each coding coefficient we can choose from M polynomials. For node e incoming into sink tl let Pm(e) be the path from s to e in the flow Ll; denote by lm(e) the length of Pm(e). It can be shown that for a random code the average delay at tl, for any M > d is bounded by delay(tl) = e Γin(tl) lm(e) Acyclic Networks 27
30 Probability Distribution of Delay The cost of the flow is given by lm = e Γin(tl) lm(e) For random codes, for large M, the distribution of the delay: P (delay = q) = ( ) ( l m + q )q+lm q 2 The distribution is better for smaller M, as long as M > d. robability Distribution of Delay 28
31 II. Cyclic Networks For cyclic networks, the precoding stage adds delays even for block codes the sequential decoder is useful both for block and convolutional codes. The elements of A(D) might in general be rational functions, where the denominator of each element is indivisible by D. Therefore the least common multiplier of the denominators, denoted by lcm is also indivisible by D. I. Cyclic Networks 29
32 If we multiply A(D) by lcm to yield Ã(D), then the determinant is multiplied by lcm h. A(D) and Ã(D) have the same delay with the sequential decoder. The delay for Ã(D) is determined by the sum of delays accumulated along the h paths between the source and the sink. In comparison to acyclic networks, this delay might increase only by the number of nodes in ED. I. Cyclic Networks 30
33 Proof of Theorems roof of Theorems 3
34 Lemma Lemma Consider a set of nodes {e,, eh} and their coding vectors W = {w(e),, w(ei),, w(eh)}, which may be partial or global coding vectors. Consider now the coding vectors of the same set of nodes W = { w(e ),, w(ei),, w(eh)}, when m(ei, e) = 0 for e L. The set W is a basis iff the set W is a basis. emma 32
35 Proof Outline Split node ei into 3 nodes: etail, emid and ehead, connected by edges (etail, emid) and (emid, ehead). Gee: the transfer function from ehead to etail in L \ emid. The relation between w(ei) and w(ei) is: w(ei) = w(ei) + Gee w(ei) + = Gee w(ei) roof Outline 33
36 The other vectors are given by: w(ej) = w(ej) + Fij w(ei), j i Gee where Fij is the transfer function from ei to ej. The relation between W and W is linear and inverse a basis W will be mapped to a basis W and vice versa. roof Outline 34
37 Proof of Theorem Denote the coding vectors of C n l when all the coefficients in rl are zero by Ũ n l = {ũ n (e,l),, ũ n (e n i,l ),, ũn (eh,l)}. Assume Ul = {u(e,l),, u(ei,l),, u(eh,l)} is a basis. After replacing m (ei,l, e n i,l ) by m(e i,l, e n i,l ), ũn (e n i,l ) equals: ũ n (e n i,l) = ũ (e n i,l) + (m(ei,l, e n i,l) m (ei,l, e n i,l))u(ei,l) roof of Theorem 35
38 Using this relation it can be shown that if Ul is a basis and if with m (ei,l, e n i,l ) the set Ũ n l is not a basis, then for any other m(ei,l, e n i,l ) the set Ũ n l is a basis. From Lemma it follows that the set U n l is also a basis. roof of Theorem 36
39 Proof of Theorem 2 Before the replacement of m (ei,l, e n i,l ) the set V k = {v (e,k),, v (eh,k)} is a basis. We want to analyze when after the replacement to m(ei,l, e n i,l ) the new set of global coding vectors Vk = {v(e,k),, v(eh,k)}, is also basis. Assume that the edges outgoing from ei,l, except (ei,l, e n i,l ), are Γo = {(ei,l, e),, (ei,l, eq)}. roof of Theorem 2 37
40 The system Gee can be expressed as Gee = G + m(ei,l, e n i,l )G 2, The global coding vector v(ei,l) is given by: v(ei,l) = ṽ(ei,l) + Geeṽ(ei,l) + = Gee ṽ(ei,l) = m(ei,l, e n i,l )Qy(e i,l) where Q = G2/( G) and y(ei,l) = ṽ(ei,l)/( G). roof of Theorem 2 38
41 Using the linearity of the code, it can be shown that for j h: v(ej,k) v (ej,k) = f(m(ei,l, e n i,l))hjy(ei,l) where Hj F,j + QF2,j and F,j is the transfer function from ei,l to ej,k, when m(ei,l, e) = 0, e Γo \ (ei,l, e n i,l ), and F2,j when only the coefficient m(ei,l, e n i,l ) = 0. roof of Theorem 2 39
42 Suppose the representation of y(ei,l) in basis V k is: y(ei,l) = βv (e,k) + β2v (e2,k) + + βhv (eh,k) Using this relation and the assumption that V k is a basis, the set Vk is not a basis only if the following set of equation has a non trivial solution: f(m(ei,l, e n i,l )) α... αh = Hβ Hhβ Hβh Hhβh α... αh roof of Theorem 2 40
43 A non trivial solution exist only if the matrix has eigenvalue: λ = f(m(ei,l, e n i,l )) The matrix has eigenvalue 0 with multitude h and: λ = trace(a) = Hβ + H2β2 + + Hhβh with multitude. roof of Theorem 2 4
44 It can be shown that Vk is not a basis only for, m(ei,l, e n i,l) = m (ei,l, e n i,l ) m (e i,l,e n i,l )Q trace(a) Q m (ei,l,e n i,l )Q trace(a) for at most a single choice of m(ei,l, e n i,l ) the set V k will not be a basis. roof of Theorem 2 42
Code Construction for Two-Source Interference Networks
Code Construction for Two-Source Interference Networks Elona Erez and Meir Feder Dept. of Electrical Engineering-Systems, Tel Aviv University, Tel Aviv, 69978, Israel, E-mail:{elona, meir}@eng.tau.ac.il
More informationTHE idea of network coding over error-free networks,
Path Gain Algebraic Formulation for the Scalar Linear Network Coding Problem Abhay T. Subramanian and Andrew Thangaraj, Member, IEEE arxiv:080.58v [cs.it] 9 Jun 00 Abstract In the algebraic view, the solution
More informationAlphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach
ALPHABET SIZE REDUCTION FOR SECURE NETWORK CODING: A GRAPH THEORETIC APPROACH 1 Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach Xuan Guang, Member, IEEE, and Raymond W. Yeung,
More informationRobust Network Codes for Unicast Connections: A Case Study
Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,
More informationAnalyzing Large Communication Networks
Analyzing Large Communication Networks Shirin Jalali joint work with Michelle Effros and Tracey Ho Dec. 2015 1 The gap Fundamental questions: i. What is the best achievable performance? ii. How to communicate
More informationCommunicating the sum of sources in a 3-sources/3-terminals network
Communicating the sum of sources in a 3-sources/3-terminals network Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel Email: mikel@openu.ac.il Aditya Ramamoorthy
More informationLow Complexity Encoding for Network Codes
Low Complexity Encoding for Network Codes Sidharth Jaggi 1 Laboratory of Information and Decision Sciences Massachusetts Institute of Technology Cambridge, MA 02139, USA Email: jaggi@mit.edu Yuval Cassuto
More informationSum-networks from undirected graphs: Construction and capacity analysis
Electrical and Computer Engineering Conference Papers Posters and Presentations Electrical and Computer Engineering 014 Sum-networks from undirected graphs: Construction and capacity analysis Ardhendu
More informationWorst case analysis for a general class of on-line lot-sizing heuristics
Worst case analysis for a general class of on-line lot-sizing heuristics Wilco van den Heuvel a, Albert P.M. Wagelmans a a Econometric Institute and Erasmus Research Institute of Management, Erasmus University
More informationNetwork Coding on Directed Acyclic Graphs
Network Coding on Directed Acyclic Graphs John MacLaren Walsh, Ph.D. Multiterminal Information Theory, Spring Quarter, 0 Reference These notes are directly derived from Chapter of R. W. Yeung s Information
More information1 1 0, g Exercise 1. Generator polynomials of a convolutional code, given in binary form, are g
Exercise Generator polynomials of a convolutional code, given in binary form, are g 0, g 2 0 ja g 3. a) Sketch the encoding circuit. b) Sketch the state diagram. c) Find the transfer function TD. d) What
More informationDistributed Decoding of Convolutional Network Error Correction Codes
1 Distributed Decoding of Convolutional Network Error Correction Codes Hengjie Yang and Wangmei Guo arxiv:1701.06283v2 [cs.it] 18 Feb 2017 Abstract A Viterbi-like decoding algorithm is proposed in this
More informationInitialization Algorithms For Convolutional Network Coding
Initialization Algorithms For Convolutional Network Coding Maxim Lvov and Haim H. Permuter 1 arxiv:1406.6087v1 [cs.it] 23 Jun 2014 Abstract We present algorithms for initializing a convolutional network
More informationAlgebraic gossip on Arbitrary Networks
Algebraic gossip on Arbitrary etworks Dinkar Vasudevan and Shrinivas Kudekar School of Computer and Communication Sciences, EPFL, Lausanne. Email: {dinkar.vasudevan,shrinivas.kudekar}@epfl.ch arxiv:090.444v
More informationIndex Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago
Index Coding Algorithms for Constructing Network Codes Salim El Rouayheb Illinois Institute of Technology, Chicago Matlab Code with GUI for Constructing Linear Network Codes Matlab outputs network code
More informationAn Algebraic Approach to Network Coding
An Algebraic Approach to July 30 31, 2009 Outline 1 2 a 3 Linear 4 Digital Communication Digital communication networks are integral parts of our lives these days; so, we want to know how to most effectively
More informationLecture 3 : Introduction to Binary Convolutional Codes
Lecture 3 : Introduction to Binary Convolutional Codes Binary Convolutional Codes 1. Convolutional codes were first introduced by Elias in 1955 as an alternative to block codes. In contrast with a block
More informationIntroduction to Binary Convolutional Codes [1]
Introduction to Binary Convolutional Codes [1] Yunghsiang S. Han Graduate Institute of Communication Engineering, National Taipei University Taiwan E-mail: yshan@mail.ntpu.edu.tw Y. S. Han Introduction
More informationAn Ins t Ins an t t an Primer
An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,
More informationTime stealing: An adventure in tropical land
1/ 21 Time stealing: An adventure in tropical land Marianne Johnson Manchester, 16th November 2010 2/ 21 Time stealing: An adventure in tropical land For Dave on the occasion of his 60th Birthday (with
More informationConvolutional Codes. Telecommunications Laboratory. Alex Balatsoukas-Stimming. Technical University of Crete. November 6th, 2008
Convolutional Codes Telecommunications Laboratory Alex Balatsoukas-Stimming Technical University of Crete November 6th, 2008 Telecommunications Laboratory (TUC) Convolutional Codes November 6th, 2008 1
More informationOn Randomized Network Coding
On Randomized Network Coding Tracey Ho, Muriel Médard, Jun Shi, Michelle Effros and David R. Karger Massachusetts Institute of Technology, University of California, Los Angeles, California Institute of
More informationThe Lovász Local Lemma : A constructive proof
The Lovász Local Lemma : A constructive proof Andrew Li 19 May 2016 Abstract The Lovász Local Lemma is a tool used to non-constructively prove existence of combinatorial objects meeting a certain conditions.
More informationGraph independent field size bounds on failure protecting network codes
Egerváry Research Group on Combinatorial Optimization Technical reports TR-25-. Published by the Egerváry Research Group, Pázmány P. sétány /C, H 7, Budapest, Hungary. Web site: www.cs.elte.hu/egres. ISSN
More informationLecture 3. 1 Polynomial-time algorithms for the maximum flow problem
ORIE 633 Network Flows August 30, 2007 Lecturer: David P. Williamson Lecture 3 Scribe: Gema Plaza-Martínez 1 Polynomial-time algorithms for the maximum flow problem 1.1 Introduction Let s turn now to considering
More informationA Relation Between Weight Enumerating Function and Number of Full Rank Sub-matrices
A Relation Between Weight Enumerating Function and Number of Full Ran Sub-matrices Mahesh Babu Vaddi and B Sundar Rajan Department of Electrical Communication Engineering, Indian Institute of Science,
More informationCoding on a Trellis: Convolutional Codes
.... Coding on a Trellis: Convolutional Codes Telecommunications Laboratory Alex Balatsoukas-Stimming Technical University of Crete November 6th, 2008 Telecommunications Laboratory (TUC) Coding on a Trellis:
More informationA Complexity Theory for Parallel Computation
A Complexity Theory for Parallel Computation The questions: What is the computing power of reasonable parallel computation models? Is it possible to make technology independent statements? Is it possible
More informationFountain Codes. Amin Shokrollahi EPFL
Fountain Codes Amin Shokrollahi EPFL Content Fountain Codes LT-Codes Raptor Codes Extensions Transmission Problem Transmit information from one sender to multiple receivers where the channel between sender
More informationACO Comprehensive Exam March 20 and 21, Computability, Complexity and Algorithms
1. Computability, Complexity and Algorithms Part a: You are given a graph G = (V,E) with edge weights w(e) > 0 for e E. You are also given a minimum cost spanning tree (MST) T. For one particular edge
More informationDesign of linear Boolean network codes for combination networks
Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2006 Design of linear Boolean network codes for combination networks Shoupei Li Louisiana State University and Agricultural
More informationCases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem
Cases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem Soheil Feizi, Muriel Médard RLE at MIT Emails: {sfeizi,medard}@mit.edu Abstract In this paper, we
More informationAn Equivalence between Network Coding and Index Coding
An Equivalence between Network Coding and Index Coding Michelle Effros, Fellow, IEEE, Salim El Rouayheb, Member, IEEE, Michael Langberg, Member, IEEE 1 Abstract We show that the network coding and index
More informationWeek 4. (1) 0 f ij u ij.
Week 4 1 Network Flow Chapter 7 of the book is about optimisation problems on networks. Section 7.1 gives a quick introduction to the definitions of graph theory. In fact I hope these are already known
More informationFlows and Cuts. 1 Concepts. CS 787: Advanced Algorithms. Instructor: Dieter van Melkebeek
CS 787: Advanced Algorithms Flows and Cuts Instructor: Dieter van Melkebeek This lecture covers the construction of optimal flows and cuts in networks, their relationship, and some applications. It paves
More informationComputer Science 385 Analysis of Algorithms Siena College Spring Topic Notes: Limitations of Algorithms
Computer Science 385 Analysis of Algorithms Siena College Spring 2011 Topic Notes: Limitations of Algorithms We conclude with a discussion of the limitations of the power of algorithms. That is, what kinds
More informationPRAM lower bounds. 1 Overview. 2 Definitions. 3 Monotone Circuit Value Problem
U.C. Berkeley CS273: Parallel and Distributed Theory PRAM lower bounds. Professor Satish Rao October 16, 2006 Lecturer: Satish Rao Last revised Scribe so far: Satish Rao cribbing from previous years lectures
More informationAn Extension of Menger s Theorem
An Extension of Menger s Theorem April 2015 Merging Merging Merging merging Merging Merging merging Merging merging merging A Theorem Mergings Congestions a.s.! A Proof Motivation in Transportation Networks
More informationMinimal Decompositions of Hypergraphs into Mutually Isomorphic Subhypergraphs
JOURNALOF COMBINATORIAL THEORY, Series A 32,241-251 (1982) Minimal Decompositions of Hypergraphs into Mutually Isomorphic Subhypergraphs F. R. K. CHUNG Bell Laboratories, Murray Hill, New Jersey 07974
More information15.1 Matching, Components, and Edge cover (Collaborate with Xin Yu)
15.1 Matching, Components, and Edge cover (Collaborate with Xin Yu) First show l = c by proving l c and c l. For a maximum matching M in G, let V be the set of vertices covered by M. Since any vertex in
More informationGeometric Steiner Trees
Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 3: Computational Complexity and the Steiner Tree Problem Marcus Brazil 2015
More informationOn Two Class-Constrained Versions of the Multiple Knapsack Problem
On Two Class-Constrained Versions of the Multiple Knapsack Problem Hadas Shachnai Tami Tamir Department of Computer Science The Technion, Haifa 32000, Israel Abstract We study two variants of the classic
More informationQuasi-linear Network Coding
Quasi-linear Network Coding Moshe Schwartz Electrical and Computer Engineering Ben-Gurion University of the Negev Beer Sheva 8410501, Israel schwartz@ee.bgu.ac.il Abstract We present a heuristic for designing
More informationOn the Feasibility of Precoding-Based Network Alignment for Three Unicast Sessions
On the Feasibility of Precoding-Based Network Alignment for Three Unicast Sessions Chun Meng, Abinesh Ramakrishnan, Athina Markopoulou, Syed Ali Jafar Department of Electrical Engineering and Computer
More informationOn the Exponent of the All Pairs Shortest Path Problem
On the Exponent of the All Pairs Shortest Path Problem Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Zvi Galil Department of Computer Science Sackler Faculty
More informationSums of Products. Pasi Rastas November 15, 2005
Sums of Products Pasi Rastas November 15, 2005 1 Introduction This presentation is mainly based on 1. Bacchus, Dalmao and Pitassi : Algorithms and Complexity results for #SAT and Bayesian inference 2.
More informationShortest paths with negative lengths
Chapter 8 Shortest paths with negative lengths In this chapter we give a linear-space, nearly linear-time algorithm that, given a directed planar graph G with real positive and negative lengths, but no
More informationOn the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation
On the complexity of maximizing the minimum Shannon capacity in wireless networks by joint channel assignment and power allocation Mikael Fallgren Royal Institute of Technology December, 2009 Abstract
More informationCommunicating the Sum of Sources Over a Network View Document
Electrical and Computer Engineering Publications Electrical and Computer Engineering 4-2013 Communicating the Sum of Sources Over a Network View Document Aditya Ramamoorthy Iowa State University, adityar@iastate.edu
More informationClearly C B, for every C Q. Suppose that we may find v 1, v 2,..., v n
10. Algebraic closure Definition 10.1. Let K be a field. The algebraic closure of K, denoted K, is an algebraic field extension L/K such that every polynomial in K[x] splits in L. We say that K is algebraically
More informationMTAT Complexity Theory October 13th-14th, Lecture 6
MTAT.07.004 Complexity Theory October 13th-14th, 2011 Lecturer: Peeter Laud Lecture 6 Scribe(s): Riivo Talviste 1 Logarithmic memory Turing machines working in logarithmic space become interesting when
More informationAcyclic Digraphs arising from Complete Intersections
Acyclic Digraphs arising from Complete Intersections Walter D. Morris, Jr. George Mason University wmorris@gmu.edu July 8, 2016 Abstract We call a directed acyclic graph a CI-digraph if a certain affine
More informationGeneralized Network Sharing Outer Bound and the Two-Unicast Problem
Generalized Network Sharing Outer Bound and the Two-Unicast Problem Sudeep U. Kamath, David N. C. Tse and Venkat Anantharam Wireless Foundations, Dept of EECS, University of California at Berkeley, Berkeley,
More informationMulticast Packing for Coding across Multiple Unicasts
Multicast Packing for Coding across Multiple Unicasts Chun Meng INC, CUHK & EECS, UC Irvine cmeng1@uci.edu Hulya Seferoglu LIDS, MIT hseferog@mit.edu Athina Markopoulou EECS, UC Irvine athina@uci.edu Kenneth
More informationApproximation Algorithms for Asymmetric TSP by Decomposing Directed Regular Multigraphs
Approximation Algorithms for Asymmetric TSP by Decomposing Directed Regular Multigraphs Haim Kaplan Tel-Aviv University, Israel haimk@post.tau.ac.il Nira Shafrir Tel-Aviv University, Israel shafrirn@post.tau.ac.il
More informationPreliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}
Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)
More informationThe Capacity of a Network
The Capacity of a Network April Rasala Lehman MIT Collaborators: Nick Harvey and Robert Kleinberg MIT What is the Capacity of a Network? Source a Source b c d e Sink f Sink What is the Capacity of a Network?
More informationTesting Equality in Communication Graphs
Electronic Colloquium on Computational Complexity, Report No. 86 (2016) Testing Equality in Communication Graphs Noga Alon Klim Efremenko Benny Sudakov Abstract Let G = (V, E) be a connected undirected
More informationKernelization by matroids: Odd Cycle Transversal
Lecture 8 (10.05.2013) Scribe: Tomasz Kociumaka Lecturer: Marek Cygan Kernelization by matroids: Odd Cycle Transversal 1 Introduction The main aim of this lecture is to give a polynomial kernel for the
More informationNP-COMPLETE PROBLEMS. 1. Characterizing NP. Proof
T-79.5103 / Autumn 2006 NP-complete problems 1 NP-COMPLETE PROBLEMS Characterizing NP Variants of satisfiability Graph-theoretic problems Coloring problems Sets and numbers Pseudopolynomial algorithms
More informationPhysical Layer and Coding
Physical Layer and Coding Muriel Médard Professor EECS Overview A variety of physical media: copper, free space, optical fiber Unified way of addressing signals at the input and the output of these media:
More informationHomework Assignment 4 Solutions
MTAT.03.86: Advanced Methods in Algorithms Homework Assignment 4 Solutions University of Tartu 1 Probabilistic algorithm Let S = {x 1, x,, x n } be a set of binary variables of size n 1, x i {0, 1}. Consider
More informationLimitations of Algorithm Power
Limitations of Algorithm Power Objectives We now move into the third and final major theme for this course. 1. Tools for analyzing algorithms. 2. Design strategies for designing algorithms. 3. Identifying
More informationConvolutional Codes Klaus von der Heide
Convolutional Codes Klaus von der Heide Convolutional codes encode a stream of symbols into n streams of symbols. 1/n = R is called the code rate. A second important parameter is the constraint length
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 54, NO. 5, MAY 2008 2303 Linear Network Codes and Systems of Polynomial Equations Randall Dougherty, Chris Freiling, and Kenneth Zeger, Fellow, IEEE Abstract
More informationFundamental Algorithms for System Modeling, Analysis, and Optimization
Fundamental Algorithms for System Modeling, Analysis, and Optimization Edward A. Lee, Jaijeet Roychowdhury, Sanjit A. Seshia UC Berkeley EECS 144/244 Fall 2010 Copyright 2010, E. A. Lee, J. Roydhowdhury,
More informationLimits of Feasibility. Example. Complexity Relationships among Models. 1. Complexity Relationships among Models
Limits of Feasibility Wolfgang Schreiner Wolfgang.Schreiner@risc.jku.at Research Institute for Symbolic Computation (RISC) Johannes Kepler University, Linz, Austria http://www.risc.jku.at 1. Complexity
More information1 Primals and Duals: Zero Sum Games
CS 124 Section #11 Zero Sum Games; NP Completeness 4/15/17 1 Primals and Duals: Zero Sum Games We can represent various situations of conflict in life in terms of matrix games. For example, the game shown
More informationBeyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions
Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Chih-Chun Wang Center for Wireless Systems and Applications (CWSA) School of
More informationHow to Assign Papers to Referees Objectives, Algorithms, Open Problems p.1/21
How to Assign Papers to Referees Objectives, Algorithms, Open Problems Kurt Mehlhorn Max-Planck-Institut für Informatik Saarbrücken Germany based on discussions with N. Garg, T. Kavitha, A. Kumar, J. Mestre
More informationOnline Interval Coloring and Variants
Online Interval Coloring and Variants Leah Epstein 1, and Meital Levy 1 Department of Mathematics, University of Haifa, 31905 Haifa, Israel. Email: lea@math.haifa.ac.il School of Computer Science, Tel-Aviv
More informationCombinatorial Optimization
Combinatorial Optimization Problem set 8: solutions 1. Fix constants a R and b > 1. For n N, let f(n) = n a and g(n) = b n. Prove that f(n) = o ( g(n) ). Solution. First we observe that g(n) 0 for all
More informationarxiv: v2 [cs.ds] 3 Oct 2017
Orthogonal Vectors Indexing Isaac Goldstein 1, Moshe Lewenstein 1, and Ely Porat 1 1 Bar-Ilan University, Ramat Gan, Israel {goldshi,moshe,porately}@cs.biu.ac.il arxiv:1710.00586v2 [cs.ds] 3 Oct 2017 Abstract
More informationOptimal File Sharing in Distributed Networks
Optimal File Sharing in Distributed Networks Moni Naor Ron M. Roth Abstract The following file distribution problem is considered: Given a network of processors represented by an undirected graph G = (V,
More informationApproximating Multicut and the Demand Graph
Approximating Multicut and the Demand Graph Chandra Chekuri Vivek Madan November 2, 2016 Abstract In the minimum Multicut problem, the input is an edgeweighted supply graph G (V, E) and a demand graph
More informationRing Sums, Bridges and Fundamental Sets
1 Ring Sums Definition 1 Given two graphs G 1 = (V 1, E 1 ) and G 2 = (V 2, E 2 ) we define the ring sum G 1 G 2 = (V 1 V 2, (E 1 E 2 ) (E 1 E 2 )) with isolated points dropped. So an edge is in G 1 G
More informationWe say that a flow is feasible for G (or just feasible if the graph and capacity function in question are obvious) if
CS787: Advanced Algorithms Lecture 4: Network Flow We devote this lecture to the network flow problem and the max-flow min-cut theorem. A number of other problems can be cast into a maximum flow or minimum
More informationSection Summary. Relations and Functions Properties of Relations. Combining Relations
Chapter 9 Chapter Summary Relations and Their Properties n-ary Relations and Their Applications (not currently included in overheads) Representing Relations Closures of Relations (not currently included
More informationCANONICAL FORMS FOR LINEAR TRANSFORMATIONS AND MATRICES. D. Katz
CANONICAL FORMS FOR LINEAR TRANSFORMATIONS AND MATRICES D. Katz The purpose of this note is to present the rational canonical form and Jordan canonical form theorems for my M790 class. Throughout, we fix
More informationLecture 19 IIR Filters
Lecture 19 IIR Filters Fundamentals of Digital Signal Processing Spring, 2012 Wei-Ta Chu 2012/5/10 1 General IIR Difference Equation IIR system: infinite-impulse response system The most general class
More informationPacking and Covering Dense Graphs
Packing and Covering Dense Graphs Noga Alon Yair Caro Raphael Yuster Abstract Let d be a positive integer. A graph G is called d-divisible if d divides the degree of each vertex of G. G is called nowhere
More informationMore Approximation Algorithms
CS 473: Algorithms, Spring 2018 More Approximation Algorithms Lecture 25 April 26, 2018 Most slides are courtesy Prof. Chekuri Ruta (UIUC) CS473 1 Spring 2018 1 / 28 Formal definition of approximation
More informationSpecral Graph Theory and its Applications September 7, Lecture 2 L G1,2 = 1 1.
Specral Graph Theory and its Applications September 7, 2004 Lecturer: Daniel A. Spielman Lecture 2 2.1 The Laplacian, again We ll begin by redefining the Laplacian. First, let G 1,2 be the graph on two
More informationTree Decomposition of Graphs
Tree Decomposition of Graphs Raphael Yuster Department of Mathematics University of Haifa-ORANIM Tivon 36006, Israel. e-mail: raphy@math.tau.ac.il Abstract Let H be a tree on h 2 vertices. It is shown
More informationCSE200: Computability and complexity Space Complexity
CSE200: Computability and complexity Space Complexity Shachar Lovett January 29, 2018 1 Space complexity We would like to discuss languages that may be determined in sub-linear space. Lets first recall
More informationChapter 10 Search Structures
Chapter 1 Search Structures 1 1.2 AVL Trees : 동기 Objective : maintain binary search tree structure for O(log n) access time with dynamic changes of identifiers (i.e., elements) in the tree. JULY APR AUG
More informationDeterministic Network Coding by Matrix Completion. Nicholas James Alexander Harvey Bachelor of Mathematics, University of Waterloo, 2000
Deterministic Network Coding by Matrix Completion by Nicholas James Alexander Harvey Bachelor of Mathematics, University of Waterloo, 2000 Submitted to the Department of Electrical Engineering and Computer
More informationInformation and Entropy
Information and Entropy Shannon s Separation Principle Source Coding Principles Entropy Variable Length Codes Huffman Codes Joint Sources Arithmetic Codes Adaptive Codes Thomas Wiegand: Digital Image Communication
More informationMulti-Agent Systems. Bernhard Nebel, Felix Lindner, and Thorsten Engesser. Summer Term Albert-Ludwigs-Universität Freiburg
Multi-Agent Systems Albert-Ludwigs-Universität Freiburg Bernhard Nebel, Felix Lindner, and Thorsten Engesser Summer Term 2017 Course outline 1 Introduction 2 Agent-Based Simulation 3 Agent Architectures
More informationOn queueing in coded networks queue size follows degrees of freedom
On queueing in coded networks queue size follows degrees of freedom Jay Kumar Sundararajan, Devavrat Shah, Muriel Médard Laboratory for Information and Decision Systems, Massachusetts Institute of Technology,
More informationACO Comprehensive Exam 19 March Graph Theory
1. Graph Theory Let G be a connected simple graph that is not a cycle and is not complete. Prove that there exist distinct non-adjacent vertices u, v V (G) such that the graph obtained from G by deleting
More informationACYCLIC DIGRAPHS GIVING RISE TO COMPLETE INTERSECTIONS
ACYCLIC DIGRAPHS GIVING RISE TO COMPLETE INTERSECTIONS WALTER D. MORRIS, JR. ABSTRACT. We call a directed acyclic graph a CIdigraph if a certain affine semigroup ring defined by it is a complete intersection.
More informationOn Network Coding Capacity - Matroidal Networks and Network Capacity Regions. Anthony Eli Kim
On Network Coding Capacity - Matroidal Networks and Network Capacity Regions by Anthony Eli Kim S.B., Electrical Engineering and Computer Science (2009), and S.B., Mathematics (2009) Massachusetts Institute
More informationACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms
1. Computability, Complexity and Algorithms (a) Let G(V, E) be an undirected unweighted graph. Let C V be a vertex cover of G. Argue that V \ C is an independent set of G. (b) Minimum cardinality vertex
More informationLinear Codes, Target Function Classes, and Network Computing Capacity
Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:
More informationOn the number of cycles in a graph with restricted cycle lengths
On the number of cycles in a graph with restricted cycle lengths Dániel Gerbner, Balázs Keszegh, Cory Palmer, Balázs Patkós arxiv:1610.03476v1 [math.co] 11 Oct 2016 October 12, 2016 Abstract Let L be a
More informationApproximation Algorithms and Hardness of Approximation. IPM, Jan Mohammad R. Salavatipour Department of Computing Science University of Alberta
Approximation Algorithms and Hardness of Approximation IPM, Jan 2006 Mohammad R. Salavatipour Department of Computing Science University of Alberta 1 Introduction For NP-hard optimization problems, we
More informationEquations in Quadratic Form
Equations in Quadratic Form MATH 101 College Algebra J. Robert Buchanan Department of Mathematics Summer 2012 Objectives In this lesson we will learn to: make substitutions that allow equations to be written
More informationTHE DYNAMICS OF SUCCESSIVE DIFFERENCES OVER Z AND R
THE DYNAMICS OF SUCCESSIVE DIFFERENCES OVER Z AND R YIDA GAO, MATT REDMOND, ZACH STEWARD Abstract. The n-value game is a dynamical system defined by a method of iterated differences. In this paper, we
More information2.2 Asymptotic Order of Growth. definitions and notation (2.2) examples (2.4) properties (2.2)
2.2 Asymptotic Order of Growth definitions and notation (2.2) examples (2.4) properties (2.2) Asymptotic Order of Growth Upper bounds. T(n) is O(f(n)) if there exist constants c > 0 and n 0 0 such that
More information