On Multi-source Multi-sink Hyperedge Networks: Enumeration, Rate Region Computation, & Hierarchy
|
|
- Philip Sims
- 5 years ago
- Views:
Transcription
1 On Multi-ource Multi-ink Hyperedge Network: Enumeration, Rate Region Computation, & Hierarchy Ph D Diertation Defene Congduan Li ASPITRG & MANL Drexel Univerity congduanli@gmailcom May 9, 05 C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 / 73
2 Motivation: information flow in network Coding (mix the input) outperform routing (receive-forward) in many circumtance Efficient information flow in network: admiible ource rate v channel capacitie Data Source? Network? Relay Node/ Router Uer C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 / 73
3 Motivation: information torage in data center Coding (mix ource) ave reource, compared with imple replication Efficient information torage in data center: admiible ource file ize v hard dik capacitie? Source File? Hard Drive Uer C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 3 / 73
4 Generalized model A multiource multiink hyperedge network (hyperedge MSNC) Network Path Source S Sink T In(i) i Out(i) t e E U U e R e K T Y A[R,R,] T B[H(Y ),H(Y ),] T (t) Rate/capacity region: compute Notation: (K, E U ) mean K ource, E U intermediate hyperedge We made three major contribution C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 4 / 73
5 Contribution : Revolution, ue computer for rate region calculation Conventional: (pecial) network, info ineq, manually, paper Computational: 03, 06, 0 (arbitrary) network, computer, # of paper? In(i) In(i) i U e Re t T T In(i) T T T S T i U e Re t t U e Re In(i) Out(i) i U e Re Out(i) t e e Conventional way Out(i) S S S i t e S Out(i) S In(i) Out(i) e e C Li (ASPITRG & MANL) i U e Re S T S T S T S T Computational way Ph D Diertation Defene May 9, 05 5 / 73
6 Contribution : enumeration of all network Conventional: almot impoible to lit all network due to the large number of intance Computational: enumerate 09, 0 general network Trillion of Network In(i) i t i Out(i) t U e Re e e S T S T T S T S In(i) i U e Re t In(i) Out(i) i U e Re Out(i) t e e S T S T S T S T? Conventional way C Li (ASPITRG & MANL) In(i) Out(i) U e Re Enumeration Algorithm Computational way Ph D Diertation Defene May 9, 05 6 / 73
7 Contribution 3: build hierarchy between network Conventional: what to do with o many rate region? Computational: define embedding and combination operator, build a hierarchy, analyze the rate region and ue them to olve even more network in cale Trillion of Rate Region Build hierarchy between them and olve more network in cale? Conventional way C Li (ASPITRG & MANL) Hierarchy Operator Computational way Ph D Diertation Defene May 9, 05 7 / 73
8 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Rate Region Computation 3 Network Operation Enumerate network Software to calculate rate region or bound Combination operator Embedding operator Embedding Operation Combination Operation Play with both New network Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 8 / 73
9 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Enumerate network Software to calculate rate region or bound Rate Region Computation 3 Network Operation Embedding Operation Combination Operation Play with both Combination operator New network Embedding operator Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 9 / 73
10 Network Coding: Source We aume U Out() = Y Source S Network Sink T Path In(i) i Out(i) Y t e U S e R K e T (t) Source Rate Source Independence Source Encoding H(Y ) ω H(Y S ) = S H(Y ) H(U Out() Y ) = 0 C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 0 / 73
11 Network Coding: Edge Source S Network Sink T Path In(i) i Out(i) Y t e U S e R e K T (t) Coding Rate R e H(U e ), e E C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 / 73
12 Network Coding: Node Source S Network Sink T Path In(i) i Out(i) Y t e U S e R e K T (t) Coding Contraint H(U Out(i) U In(i) )=0, i V\(S T ) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 / 73
13 Network Coding: Sink Source S Network Sink T Path In(i) i Out(i) Y t e U S e R e K T (t) Decoding Contraint H(Y β(t) U In(t) )=0, t T C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 3 / 73
14 Special Cae: Independent Ditributed Source Coding (IDSC) Y Y U E U E U 3 E 3 D D D 3 Y Y Y Y Y g Y U U U 3 t t t3 Y Y Y Y Source available to all encoder Decoder demand variou ubet of of ource When ource are prioritized, it become MDCS C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 4 / 73
15 Special Cae: Index Coding Only one intermediate edge that tranmit all information of ource Source may be directly available at ink a ide information (K, ) hyperedge MSNC C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 5 / 73
16 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Enumerate network Software to calculate rate region or bound Rate Region Computation 3 Network Operation Embedding Operation Combination Operation Play with both Combination operator New network Embedding operator Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 6 / 73
17 Source minimality example Source minimality example: Source 3 redundant due to not demanded by any ink 3 Y 3 Y g U t Y Y g U t Y U t Y U t Y Y g t 3 U 3 Y Y g t 3 U 3 Y C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 7 / 73
18 Node minimality example Node minimality example: g, g can be merged due to ame input Y g U t Y Y U t Y U t g U Y t Y Y g t 3 U 3 Y Y t 3 U 3 Y C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 8 / 73
19 Edge minimality example Edge minimality example: U, U 3 are parallel and can be merged Y U U g t Y Y U g t Y Y g t U 3 Y Y g t Y U C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 9 / 73
20 Sink minimality example Sink minimality example: decoding ability of Y at t implied by t, equivalent to let t demand Y only Y g U U t t Y Y Y Y g U U t t Y Y Y g t 3 U 3 Y Y g t 3 U 3 Y C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 0 / 73
21 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Enumerate network Software to calculate rate region or bound Rate Region Computation 3 Network Operation Embedding Operation Combination Operation Play with both Combination operator New network Embedding operator Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 / 73
22 Equivalent Network Y g U t Y I) Y g U t Y II) III) Y Y Y $ Y & U $ U g U t Y g U t Y Y 6$ Y U Y g Y t U Y g t Y I, II are equivalent: permute ource and edge I, III are not equivalent: ource are only permuted at ource ide II, III are not equivalent: ource are only permuted at ink ide C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 / 73
23 Repreenting a Network Ordered pair (Q, W), ource K, edge K +,, K + E U ; Edge definition Q {(i, A) i {K +,, K + E U }, A {,, K + E U } \ {i}}; Sink definition W {(i, A) i {,, K}, A {,, K + E U } \ {i}}; Same i allowed to appear in W but not in Q (3, {, }) 3 (4, {, 3}) 4 Q W (, {3}) (, {3, 4}) (, {4}) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 3 / 73
24 Equivalence Under Group Action Symmetry group G := S {,,,K} S {K+,,K+ EU }; π G, then π(q) {π((i, A)) (i, A) Q}; π((q, W)) = (π(q), π(w)); Iomorphic or Equivalent: π G uch that π((q, W )) = (Q, W ) (3, {, }) 3 (4, {, 3}) 4 :permute, Q Q 0 (3, {, }) 3 (4, {, 3}) 4 W (, {3}) (, {3, 4}) (, {4}) W 0 (, {3}) (, {3, 4}) (, {4}) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 4 / 73
25 Canonical Network: minimal repreentative in each orbit Orbit: O (Q,W) := {(π(q), π(w)) π G} Network in an orbit are iomorphic or equivalent to each other Tranveral: one repreentative for each orbit, the canonical one Lexicographically order the pair (i, A) according to (i, A) > (j, A ) if j < i or i = j, A < A under the lexicographic ordering Canonical: apply order to (Q, W) and get the minimal one # 3 4 ` # 3 4 ` # 3 4 ` # 3 4 ` # i the canonical repreentative # Q W {(3, {, }), (4, {, 3})} {(, {3, 4}), (, {3}), (, {4})} {(3, {, }), (4, {, 3})} {(, {3}), (, {4}), (, {3, 4})} 3 {(3, {, 4}), (4, {, })} {(, {3, 4}), (, {3}), (, {4})} 4 {(3, {, 4}), (4, {, })} {(, {3}), (, {4}), (, {3, 4})} # 3 4 ` # 3 4 ` # 3 4 ` C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 5 / 73
26 Why thi repreentation Some minimality contraint eaily to take care, eg, repeated edge, redundant node, etc Smaller orbit, compared with node repreentation Orbit-tabilizer theorem: O (Q,W) = G Stab((Q,W)) # ` # ` 3 3 # ` # ` 4 4 a b c d e f # a b c d e f # ` # ` # ` # Q W {(3, {, }), (4, {, })} {(, {3, 4}), (, {3}), (, {4})} {(3, {, }), (4, {, })} {(, {3}), (, {4}), (, {3, 4})} Subgroup of S {,} S {3,4} tabilizing (G, T )=S {3,4} a b Subgroup of S {a,b} S {c,d,e,f} tabilizing (V, E) =S {d,f} a Iomorph in Node Repreentation (4) Iomorph in Edge and Sink Definition Repreentation () C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 6 / 73
27 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Enumerate network Software to calculate rate region or bound Rate Region Computation 3 Network Operation Embedding Operation Combination Operation Play with both Combination operator New network Embedding operator Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 7 / 73
28 Leiterpiel Algorithm [BettenBraunFripertinger, 006] Compute tranveral of orbit on ize j ubet P j (X ) of et X, incrementally in j; alo give ymmetry group (tabilizer) Lit directly the canonical repreentative atifying ome tet function f, a long a thi tet ha the inherited property, ie, if a uperet atifie, it ubet alo atify Input: et X, group G, inherited tet function f Output: tranveral of ubet of different ize until top, either fixed j or other top condition, ymmetry group (tabilizer) Tranveral: canonical repreentative Orbit on P j (X ) Extenion obeying f Orbit on P j (X ) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 8 / 73
29 Enumeration baed on Leiterpiel Algorithm Target: (K, E U ) non-iomorphic network Recall repreentation of network: (Q, W), lit pool for Q firt Leiterpiel define edge incrementally from to E U X := {(i, A) i {K +,,K + E U }, A {,,K + E U } \ {i}} With ome minimality contraint inherited Acting group G := S {,,K} S {K+,,K+ EU } Call Leiterpiel T EU = Leiterpiel(G, P f E U (X )) Stop condition: reach number of edge C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 9 / 73
30 Enumeration baed on Leiterpiel Algorithm Now for each Q T EU, lit poible W Leiterpiel incrementally add ink from to no poible new ink Y := {(i, A) 9 a directed path in Q from i to at leat one edge in A} With ome minimality contraint inherited Acting group G := S {,,K} S {K+,,K+ EU } Call Leiterpiel T T = Leiterpiel(G, P f T (Y)) Stop condition: cannot increae j obeying f For each W {T,, T T }, tet all the other minimality condition on (Q, W), if it pae, we obtain a non-iomorphic network intance C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
31 Enumeration Reult M : number of non-iomorphic network, lited; ˆM : number of network with edge iomorphim, counted; ˆM n : number of network with node iomorphim, counted; (K, E U ) (,) (,3) (,) (,) (,3) (3,) (3,) M ˆM ˆM n 39 8, C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 3 / 73
32 All (, ) network: no direct acce btw ource & ink t Y Y g U Y U g t Y Y U g t Y Y U g t Y Y U g t YY Y U U g t Y Y g t t YY Y U U Y Y U Y U Y U Y g U g t YY g t Y g t YY g t Y Y U g t Y Y g t3 Y Intance # Intance # Intance #3 Intance #4 Intance #5 Intance #6 Intance #7 Y g Y U t YY g U Y U g t Y Y U g t Y Y U g t Y Y U g t Y Y U g t Y Y t YY U g U Y Y U U g U g t Y Y U Y Y U YY g t Y g t Y g t Y g t Y Intance #8 Intance #9 Intance #0 Intance # Intance # Intance #3 Intance #4 t Y U Y Y U g g t Y Y U g t YY Y U g t Y U Y g Y U t Y g t Y t Y U Y t Y U g U Y g Y U U t g t YY Y g t Y Y U Y g t Y Y g t Y Y g t Y U t3 Y U Y g t3 Y Intance #5 Intance #6 Intance #7 Intance #8 Intance #9 Intance #0 Intance # Y g Y U g U Y g t U YY Y g U U t Y U t YY t YY Y g Y t YY g Y U t Y g t Y U Y g U Y g U Y g t U YY Y U U U g t YY Y g t Y Y g t YY Y g t Y Intance # Intance #3 Intance #4 Intance #5 Intance #6 Intance #7 Intance #8 t Y U Y U g t Y Y U U g t YY Y g t Y Y g t Y U U U Y g t Y Y g t Y Y g t Y U U U U U Y g t Y Y U g t Y Y g t Y Y g t Y Y g t Y Y g t Y Y g t3 Y U Intance #9 Intance #30 Intance #3 Intance #3 Intance #33 Intance #34 Intance #35 t Y t Y U U Y g Y U t Y Y U t Y Y U t Y Y U Y U g t Y Y g t YY t Y g g g g t Y Y U Y U Y g t3 Y U t YY U Y t Y Y U t Y Y g t YY Y U g t Y t3 Y U Intance #4 Intance #36 Intance #37 Intance #38 Intance #39 Intance #40 Intance #4 U U U t Y Y Y g t g t Y U Y Y g t Y Y g t Y Y U Y U Y U Y g t Y g t Y g t Y g t3 Y U Intance #43 Intance #44 Intance #45 Intance #46 C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 3 / 73
33 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Rate Region Computation 3 Network Operation Enumerate network Software to calculate rate region or bound Combination operator Embedding operator Embedding Operation Combination Operation Play with both New network Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
34 Rate region Rate region: all poible rate and ource entropy vector atifying all network contraint Collect the N network random variable and their joint entropie Define Γ N : N -dim cone, region of valid entropy vector (reviit later) Contraint from network A: L = {h Γ N : h Y S = Σ S h Y } () L = {h Γ N : h X Out(k) Y = 0} () L 3 = {h Γ N : h X Out(i) X In(i) = 0} (3) L 4 = {(h T, R T ) T R N + E + : R e h Ue, e E} (4) L 5 = {h Γ N : h Y β(t) U In(t) = 0} (5) Rate region (cone) in term of edge rate and ource entropie (derived from [Yan, Yeung, Zhang TranIT 0]): R (A) = proj RE,H(Y S )(con(γ N L 3) L 45 ) (6) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
35 Rate Region Example A (3, 3) network and it rate region R (A) Rate region: a cone with dimenion of all variable in the network Y Y g g g U 3 3 t Y Y R H(Y 3 ) U U R H(Y ) t Y 3 R + R H(Y )+H(Y )+H(Y 3 ) t 3 3 Y 3 Y 3 R + R 3 H(Y )+H(Y 3 ) R + R +R 3 H(Y )+H(Y )+H(Y 3 ) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
36 Rate region Rate region: a cone in term of edge rate and ource entropie: R (A) = proj RE,H(Y S )(con(γ N L 3) L 45 ) (7) Involve Γ N : N -dim cone, region of valid entropy vector C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
37 Region of Entropic Vector Γ N : Open et in general Γ N not fully characterized for N 4: convex but contain non-polyhedral part Outer bound Inner bound N C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
38 Sandwich Bound Γ N ΓOut N : R out(a) = proj RE,H(Y S )(Γ Out N L 345) Γ N ΓIn N : R in(a) = proj RE,H(Y S )(Γ In N L 345) R (A) = R out (A) = R in (A), if R out (A) = R in (A) It become: Initial polyhedra contraint projection Our work following thi idea: Li, et al, Allerton 0, NetCod 03, ubmiion TranIT 04 Contraint P rojection Contraint N N Contraint N N In N In N C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
39 Notion of ufficiency Outer bound typically ued i Shannon outer bound R o (A); inner bound from repreentable matroid: calar and vector bound Scalar ufficiency: R (A) = R,q (A) Vector ufficiency: R (A) = R N q (A) Scalar R,q (A) Vector R N 0 q (A) Sufficient Inufficient C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
40 Rate Region Computation Reult M : number of all network intance; The other number repreent the number of intance we can cloe the gap uing variou bound, and hence exact rate region can be obtained (K, E ) M R, (A) R N+ (A) R N+ (A) R N+4 (A) (, ) (, 3) (, ) (, ) (, 3) (3, ) (3, ) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
41 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Rate Region Computation 3 Network Operation Enumerate network Software to calculate rate region or bound Combination operator Embedding operator Embedding Operation Combination Operation Play with both New network Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 4 / 73
42 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Rate Region Computation 3 Network Operation Embedding Operation Combination Operation Enumerate network Software to calculate rate region or bound Combination operator New network Embedding operator Forbidden Minor Play with both C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 4 / 73
43 Motivated from graph and matroid theory Inheritance property regarding ufficiency of cla of code Minor-cloed graph: finite number of forbidden minor [RobertonSeymour ] Rota conjecture in matroid theory: finite number of forbidden minor for F q repreentability [Oxley0] Not Fobidden Forbidden Size N New Minimal Forbidden Minor N N C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
44 Similar characterization for network? If network have imilar characterization? Poible lit of forbidden embedded network for ufficiency of linear code over a field Network operation to obtain uch embedded network preerving inufficiency, & region relationhip Three operation Source Network Detination C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
45 Source deletion A = A \ k Source Y k deleted, ource k top ending information to the network, H(Y k ) = 0 Sink requiring Y k will no longer demand it H(Y k 0)=0 k Y k kt (t) \ k C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
46 Edge deletion A = A \ e Edge e deleted, nothing on U e, R e = H(U e ) = 0 e e R e 0 =0 C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
47 Edge contraction A = A/e Edge e contracted, input to tail of e available for head of e, R e =, H(U e ) free e e R e 0 = C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
48 Source deletion: A = A \ k For each i {, q, (, q), o}, R i (A ) = Proj Y\k,R E ({R R i(a) H(Y k ) = 0}) (8) Sufficiency preerved from large to mall network a the equation how Equivalently, inufficiency preerved from mall to large network R(A) H(Y k )=0 P rojection R(A 0 ) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
49 Example: Forbidden embedded network Goal: minimal forbidden network for ufficiency Scalar binary code conidered k =,, 3; E =, 3, 4, 7360 non-iomorphic MDCS 9 ufficient, 5438 inufficient minimal forbidden minor (Li, et al ubmiion TranIT 04) 5438 / 7360 inu cient 9 / 7360 u cient forbidden embedded network C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
50 Summary for embedding operator Three embedding operator: ource deletion, edge deletion, edge contraction Rate region of maller network derivable from the aociated larger network Sufficiency of linear code preerved from larger to maller network under embedding operation Equivalently, inufficiency of linear code preerved from maller network to larger one C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
51 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Rate Region Computation 3 Network Operation Enumerate network Software to calculate rate region or bound Combination operator Embedding operator Embedding Operation Combination Operation Play with both New network Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 5 / 73
52 Source merge After merge: Merged ource erve a common ource to the two network C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 5 / 73
53 Sink merge After merge: Union the input and requet of ink being merged, repectively C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
54 Intermediate node merge After merge: union input and output of the two node C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
55 Edge merge Edge merge: create one extra node and four aociated edge to replace the two original edge Firt two edge are ordinary edge connecting with the extra node, the other two edge connect the extra node with all the head node of the original two edge, repectively Equivalent: create a relay node on the two edge, repectively, and then merge the two relay node C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
56 Source merge A i obtained by merging A Ŝ = A π(ŝ), then for each i {, q, (, q), o} R i (A) = Proj ((R \π(ŝ) i(a ) R i (A )) L 0 ), { } L 0 = H(Y ) = H(Y π() ), Ŝ Remark: eentially replace variable Y π() with the Y for each Ŝ R(A ) 8 Ŝ,H(Y )=H(Y () ) R(A ) + C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
57 Obtain Rate Region for Larger Network X X X3 X4 X5 X6 R R R3 3 3 R5 4 R4 5 R7 0 R4 0 R R R0 R0 0 R R R9 7 9 {,3} {,3} {5} {6} {,3} {,,4} {4} {6} {5} {6} A 4 : A : A : A 3 : ' 3' ' A 5 : X 0 X0 6' 5' 4' X3 X X X3 X4 X5 X6 0 X60 X50 X ' R9 R0 R5 R3 R8 R6 R7 R R R4 R0 0 R 8 7 R 3 ' ' {',3'} {',3'} {6} {6} {5} {,} {} {4} {4} {3} R6 H(X6) R9 H(X3 0) {5'} {6'} {4'5'} Ri H(X4),i=3, 4 R H(X) R7 + R8 H(X6) R0 H(X 0)+H(X0)+H(X30) R H(X5 R3 + R4 H(X3)+ H(X4) 0) R H(X) R H(X4 R6 + R7 H(X5)+ H(X6) R3 + R4 +R5 H(X3)+H(X4) 0)+H(X50) R + R H(X)+ H(X) R00 + R + R R6 + R7 +R8 H(X5)+H(X6) H(X40)+H(X50)+H(X60) A : 0 {4,5} Ri H(X),i=, R + R H(X)+ H(X) Ri H(X4),i=3, 4, 4 0 R3 + Ri H(X3)+H(X4),i=4, 4 0 R3 + Ri + R5 H(X3)+H(X4),i=4, 4 0 R6 H(X6) Ri + R8 H(X6),i=7, 7 0 R6 + Ri H(X5)+H(X6),i=7, 7 0 R6 + Ri +R8 H(X5)+H(X6),i=7, 7 0 R9 R0 R R R00 + R + R H(X4)+H(X5)+H(X6) H(X3) P 3 i= H(Xi) H(X5) H(X4)+H(X5) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
58 Summary for combination operator Four combination operator: ource, ink, node, and edge merge Rate region of combined network derivable from region of maller network in the combination C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
59 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Rate Region Computation 3 Network Operation Embedding Operation Combination Operation Enumerate network Software to calculate rate region or bound Combination operator New network Embedding operator Forbidden Minor Play with both C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
60 Combination operation uffice? Anwer i NO Need cap to limit the network ize in the combination Network Cap: no beyond Large ize Moderate ize Combination reach a portion of large network Small ize Embedding enlarge the reachable portion Tiny ize C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
61 Partial cloure of network Seed lit of network Wort cae partial cloure of network: cap the predicted ize of network involved in the proce Let the pool produce new network until no new network can be generated If within network cap Combination of pair New network? Ye Add to eed lit Minor from embedding NO Stop C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 6 / 73
62 New network found from a tiny eed lit Start with the ingle (, ), ingle (, ), and the four (, ) network; :6:;75/< 939==45>75= ; ;4?9@08!"#"$!"#%$!%#%$!"#"$!"#%$!%#%$!&#"$ % % % % % %!&#%$ ' &' &' ' &' &'!(#($ " " " ) &* &+!(#"$ &" &+ &+ "' &"& &**!(#%$ ',- &'& ' *&+ +%)!"#($ ( " ( % &' &&!"#"$ (% (% (% %( "*" )""!"#%$ ' &"* &"* ' ("+& *%)&!%#($ ' ' " ' ' "!%#"$ ' ' &- ' ' %%!%#%$ ' ' (*" ' ' %%"' // %+ (,( *+) )) "%'' &&+"* C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 6 / 73
63 New network found from a tiny eed lit 6 tiny network can generate new 635 network with mall cap! :6:;75/< 939==45>75= ; ;4?9@08!"#"$!"#%$!%#%$!"#"$!"#%$!%#%$!&#"$ % % % % % %!&#%$ ' &' &' ' &' &'!(#($ " " " ) &* &+!(#"$ &" &+ &+ "' &"& &**!(#%$ ',- &'& ' *&+ +%)!"#($ ( " ( % &' &&!"#"$ (% (% (% %( "*" )""!"#%$ ' &"* &"* ' ("+& *%)&!%#($ ' ' " ' ' "!%#"$ ' ' &- ' ' %%!%#%$ ' ' (*" ' ' %%"' // %+ (,( *+) )) "%'' &&+"* C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
64 New network found from a tiny eed lit With the increae of cap ize, number of new network increae! :6:;75/< 939==45>75= ; ;4?9@08!"#"$!"#%$!%#%$!"#"$!"#%$!%#%$!&#"$ % % % % % %!&#%$ ' &' &' ' &' &'!(#($ " " " ) &* &+!(#"$ &" &+ &+ "' &"& &**!(#%$ ',- &'& ' *&+ +%)!"#($ ( " ( % &' &&!"#"$ (% (% (% %( "*" )""!"#%$ ' &"* &"* ' ("+& *%)&!%#($ ' ' " ' ' "!%#"$ ' ' &- ' ' %%!%#%$ ' ' (*" ' ' %%"' // %+ (,( *+) )) "%'' &&+"* C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
65 New network found from a tiny eed lit Embedding operation are important in the proce! :6:;75/< 939==45>75= ; ;4?9@08!"#"$!"#%$!%#%$!"#"$!"#%$!%#%$!&#"$ % % % % % %!&#%$ ' &' &' ' &' &'!(#($ " " " ) &* &+!(#"$ &" &+ &+ "' &"& &**!(#%$ ',- &'& ' *&+ +%)!"#($ ( " ( % &' &&!"#"$ (% (% (% %( "*" )""!"#%$ ' &"* &"* ' ("+& *%)&!%#($ ' ' " ' ' "!%#"$ ' ' &- ' ' %%!%#%$ ' ' (*" ' ' %%"' // %+ (,( *+) )) "%'' &&+"* C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
66 Example to ee why integrating embedding i important Start with the ingle (, ), ingle (, ), and the four (, ) network Only combination with cap (3, 4), get only 3 network with ize (, ) (,) (,) (,) ource merge = (,) ALL (,), (,), (,) MINIMAL NETWORK CODING PROBLEMS (there are 6) ALL POSSIBLE COMBINATION OPERATORS = All (,) Minimal Network Coding Problem That are direct Combination of (,),(,),and (,) Problem (There are only 3 out of 333 total (,) problem) = ource merge node merge C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
67 Example to ee why integrating embedding i important Start with the ingle (, ), ingle (, ), and the four (, ) network Conider both combination and embedding with ame cap, found (, ) network unreachable by combination only Contracting edge Contracting edge Source merge [,] with [,] Contracting edge , Contracting edge 3, Deleting edge 3 Contracting edge 4 Edge merge 3 & Merge two ink , C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
68 Summary of work thu far Enumeration, Rate Region Computation, Forbidden Minor, New Network Enumerate > non-iomorphic network Calculate their exact rate region or bound Combination operation Embedding operation New olvable network in cale Forbidden Minor for u ciency C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
69 Dream Draw or input a network Minimality & canonical converion Though we have online repoitory Want a uer-friendly interface to eaily get anwer Get the anwer Ye Ye In Databae? No Directly Computable? No Ye Reachable by contruction? No Not olvable right now C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
70 Future work When Shannon outer bound i tight? Any common tructure? I Shannon outer bound tight for all MDCS, or IDSC? I the number of forbidden minor regarding the ufficiency of a cla of linear code finite? Coverage of the operator in all problem More operation: node & edge merge, ource & ink merge A notion of forbidden minor which can harne both combination and embedding operator C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
71 Publication Lit Steven Weber, Congduan Li, and John Walh, Rate Region for a cla of delay mitigatting code and PP network, 46th Annual Conference on Information Science and Sytem, Princeton Univerity, March, 0, Invited Paper Congduan Li, John Walh, and Steven Weber, A Computational Approach for Determining Rate Region and Code uing Entropic Vector Bound, 50th Allerton Conference, UIUC, Oct 0 3 Congduan Li, Jayant Apte, John M Walh, and Steven Weber, A new computational approach for determining rate region and optimal code for coded network, The 03 IEEE International Sympoium on Network Coding (NetCod 03), Calgary, Canada, Jun 7-9, 03 4 Congduan Li, John M Walh, and Steven Weber, Matroid bound on region of entropic vector, 5th Allerton conference on Communication, Control and Computation, UIUC, IL, Oct 03 5 Jayant Apte, Congduan Li, John MacLaren Walh, and Steven Weber, Exact pepair problem with multiple ource, in The 48th annual IEEE Conference on Information Science and Sytem(CISS), Mar 04 6 Jayant Apte, Congduan Li, and John MacLaren Walh, Algorithm for Computing Network Coding Rate Region via Single Element Extenion of Matroid, IEEE International Sympoium on Information Theory (ISIT) 04, Honolulu, Hawaii 7 Congduan Li, Steven Weber, and John M Walh, Network Embedding Operation Preerving the Inufficiency of Linear Network Code, 5th Allerton conference on Communication, Control and Computation, UIUC, IL, Oct 04 8 Congduan Li, Steven Weber, and John M Walh, Multilevel Diverity Coding Sytem: Rate Region, Code, Computation, & Forbidden Minor, IEEE Tranaction on Information Theory, 04, ubmitted 9 Congduan Li, Steven Weber, and John M Walh, Computer Aided Proof for Independent Ditributed Source Coding Problem, The 05 IEEE International Sympoium on Network Coding (NetCod 05), Jun, 05 0 Congduan Li, Steven Weber, and John M Walh, Network Combination Operation Preerving the Sufficiency of Linear Network Code, The 05 IEEE Information Theory Workhop (ITW 05), ubmitted Congduan Li, Steven Weber, and John M Walh, On Multi-ource Network: Enumeration, Rate Region Computation, and Hierarchy, IEEE Tranaction on Information Theory, 05, ready to ubmit C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 7 / 73
72 Selected Reference X Yan, RW Yeung, and Z Zhang (0) An Implicit Characterization of the Achievable Rate Region for Acyclic Multiource Multiink Network Coding IEEE Tranaction on Information Theory 58(9), A Betten, M Braun, H Fripertinger (006) Error-Correcting Linear Code: Claification by Iometry and Application Springer Berlin Heidelberg N Roberton, P Seymour (004) Graph minor xx wagner conjecture Journal of Combinatorial Theory, Serie B, 9(), JG Oxley (0) Matroid Theory Oxford Univerity, 0 C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 7 / 73
73 Q & A Thank you! C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73
Multiterminal Networks: Rate Regions, Codes, Computations, & Forbidden Minors
Multiterminal etworks: Rate Regions, Codes, Computations, & Forbidden Minors Ph D Thesis Proposal Congduan Li ASPITRG & MAL Drexel University congduanli@gmailcom October 5, 204 C Li (ASPITRG & MAL) Thesis
More informationSymmetry in Network Coding
Symmetry in Network Coding Formalization, Graph-theoretic Characterization, and Computation Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia ISIT,
More informationOn Multi-source Networks: Enumeration, Rate Region Computation, and Hierarchy
On Multi-ource Network: Enumeration, Rate Region Computation, and Hierarchy Congduan Li, Student Member, IEEE, Steven Weber, Senior Member, IEEE, and John MacLaren Walh, Member, IEEE arxiv:5070578v [cit]
More informationNetwork Combination Operations Preserving the Sufficiency of Linear Network Codes
Network Combination Operations Preserving the Sufficiency of Linear Network Codes Congduan Li, Steven Weber, John MacLaren Walsh ECE Department, Drexel University Philadelphia, PA 904 Abstract Operations
More informationOn Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region. Computation, and Hierarchy. A Thesis. Submitted to the Faculty
On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region Computation, and Hierarchy A Thesis Submitted to the Faculty of Drexel University by Congduan Li in partial fulfillment of the requirements
More informationExploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions
Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia NetCod, 205 NSF
More informationMulticast Network Coding and Field Sizes
Multicat Network Coding and Field Size Qifu (Tyler) Sun, Xunrui Yin, Zongpeng Li, and Keping Long Intitute of Advanced Networking Technology and New Service, Univerity of Science and Technology Beijing,
More informationA computational approach for determining rate regions and codes using entropic vector bounds
1 A computational approach for determining rate regions and codes using entropic vector bounds Congduan Li, John MacLaren Walsh, Steven Weber Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA
More informationMatroid Bounds on the Region of Entropic Vectors
Matroid Bounds on the Region of Entropic Vectors Congduan Li, John MacLaren Walsh, Steven Weber Drexel University, Dept of ECE, Philadelphia, PA 19104, USA congduanli@drexeledu, jwalsh@coedrexeledu, sweber@coedrexeledu
More informationON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang
Proceeding of the 2008 Winter Simulation Conference S. J. Maon, R. R. Hill, L. Mönch, O. Roe, T. Jefferon, J. W. Fowler ed. ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION Xiaoqun Wang
More informationAlgorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids
Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids Jayant Apte, Congduan Li, John MacLaren Walsh Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA
More informationGeometric Measure Theory
Geometric Meaure Theory Lin, Fall 010 Scribe: Evan Chou Reference: H. Federer, Geometric meaure theory L. Simon, Lecture on geometric meaure theory P. Mittila, Geometry of et and meaure in Euclidean pace
More informationSymmetry in Network Coding
Symmetry in Network Coding Jayant Apte, John MacLaren Walsh Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA jsa46@drexel.edu, jwalsh@coe.drexel.edu Abstract We establish connections between
More informationNetwork Coding on Directed Acyclic Graphs
Network Coding on Directed Acyclic Graphs John MacLaren Walsh, Ph.D. Multiterminal Information Theory, Spring Quarter, 0 Reference These notes are directly derived from Chapter of R. W. Yeung s Information
More informationCharacterizing the Region of Entropic Vectors via Information Geometry
Characterizing the Region of Entropic Vectors via Information Geometry John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks
More informationNon-isomorphic Distribution Supports for Calculating Entropic Vectors
Non-isomorphic Distribution Supports for Calculating Entropic Vectors Yunshu Liu & John MacLaren Walsh Adaptive Signal Processing and Information Theory Research Group Department of Electrical and Computer
More informationLecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004
18.997 Topic in Combinatorial Optimization April 29th, 2004 Lecture 21 Lecturer: Michel X. Goeman Scribe: Mohammad Mahdian 1 The Lovaz plitting-off lemma Lovaz plitting-off lemma tate the following. Theorem
More informationCS 170: Midterm Exam II University of California at Berkeley Department of Electrical Engineering and Computer Sciences Computer Science Division
1 1 April 000 Demmel / Shewchuk CS 170: Midterm Exam II Univerity of California at Berkeley Department of Electrical Engineering and Computer Science Computer Science Diviion hi i a cloed book, cloed calculator,
More informationBeyond Cut-Set Bounds - The Approximate Capacity of D2D Networks
Beyond Cut-Set Bound - The Approximate Capacity of DD Network Avik Sengupta Hume Center for National Security and Technology Department of Electrical and Computer Engineering Virginia Tech, Blackburg,
More informationA new computational approach for determining rate regions and optimal codes for coded networks
A new computational approach for determining rate regions and optimal codes for coded networks Congduan Li, Jayant Apte, John MacLaren Walsh, Steven Weber Drexel University, Dept. of ECE, Philadelphia,
More informationFlag-transitive non-symmetric 2-designs with (r, λ) = 1 and alternating socle
Flag-tranitive non-ymmetric -deign with (r, λ = 1 and alternating ocle Shenglin Zhou, Yajie Wang School of Mathematic South China Univerity of Technology Guangzhou, Guangdong 510640, P. R. China lzhou@cut.edu.cn
More informationSocial Studies 201 Notes for March 18, 2005
1 Social Studie 201 Note for March 18, 2005 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the
More informationSymmetric Determinantal Representation of Formulas and Weakly Skew Circuits
Contemporary Mathematic Symmetric Determinantal Repreentation of Formula and Weakly Skew Circuit Bruno Grenet, Erich L. Kaltofen, Pacal Koiran, and Natacha Portier Abtract. We deploy algebraic complexity
More informationRELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS
www.arpapre.com/volume/vol29iue1/ijrras_29_1_01.pdf RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS Sevcan Demir Atalay 1,* & Özge Elmataş Gültekin
More informationLecture 4 Topic 3: General linear models (GLMs), the fundamentals of the analysis of variance (ANOVA), and completely randomized designs (CRDs)
Lecture 4 Topic 3: General linear model (GLM), the fundamental of the analyi of variance (ANOVA), and completely randomized deign (CRD) The general linear model One population: An obervation i explained
More informationCHAPTER 6. Estimation
CHAPTER 6 Etimation Definition. Statitical inference i the procedure by which we reach a concluion about a population on the bai of information contained in a ample drawn from that population. Definition.
More informationTuning of High-Power Antenna Resonances by Appropriately Reactive Sources
Senor and Simulation Note Note 50 Augut 005 Tuning of High-Power Antenna Reonance by Appropriately Reactive Source Carl E. Baum Univerity of New Mexico Department of Electrical and Computer Engineering
More informationEntropic Vectors: Polyhedral Computation & Information Geometry
Entropic Vectors: Polyhedral Computation & Information Geometry John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks to
More informationSome Applications of Spanning Trees in K s,t
Some Application of Spanning Tree in K,t L.H. Clark, A.T. Mohr, and T.D. Porter Department of Mathematic Southern Illinoi Univerity Carbondale, IL 62901-4408 tporter@math.iu.edu Abtract We partition the
More informationChip-firing game and a partial Tutte polynomial for Eulerian digraphs
Chip-firing game and a partial Tutte polynomial for Eulerian digraph Kévin Perrot Aix Mareille Univerité, CNRS, LIF UMR 7279 3288 Mareille cedex 9, France. kevin.perrot@lif.univ-mr.fr Trung Van Pham Intitut
More informationLinear System Fundamentals
Linear Sytem Fundamental MEM 355 Performance Enhancement of Dynamical Sytem Harry G. Kwatny Department of Mechanical Engineering & Mechanic Drexel Univerity Content Sytem Repreentation Stability Concept
More informationIEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation
IEOR 316: Fall 213, Profeor Whitt Topic for Dicuion: Tueday, November 19 Alternating Renewal Procee and The Renewal Equation 1 Alternating Renewal Procee An alternating renewal proce alternate between
More information. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables
. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables John MacLaren Walsh and Steven Weber Department of Electrical and Computer Engineering, Drexel University, Philadelphia,
More informationSuggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall
Beyond Significance Teting ( nd Edition), Rex B. Kline Suggeted Anwer To Exercie Chapter. The tatitic meaure variability among core at the cae level. In a normal ditribution, about 68% of the core fall
More informationNonlinear Single-Particle Dynamics in High Energy Accelerators
Nonlinear Single-Particle Dynamic in High Energy Accelerator Part 6: Canonical Perturbation Theory Nonlinear Single-Particle Dynamic in High Energy Accelerator Thi coure conit of eight lecture: 1. Introduction
More information7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281
72 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 28 and i 2 Show how Euler formula (page 33) can then be ued to deduce the reult a ( a) 2 b 2 {e at co bt} {e at in bt} b ( a) 2 b 2 5 Under what condition
More informationA BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH
Mathematical and Computational Application Vol. 11 No. pp. 181-191 006. Aociation for Scientific Reearch A BATCH-ARRIVA QEE WITH MTIPE SERVERS AND FZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Jau-Chuan
More informationLDPC Convolutional Codes Based on Permutation Polynomials over Integer Rings
LDPC Convolutional Code Baed on Permutation Polynomial over Integer Ring Marco B. S. Tavare and Gerhard P. Fettwei Vodafone Chair Mobile Communication Sytem, Dreden Univerity of Technology, 01062 Dreden,
More informationBy Xiaoquan Wen and Matthew Stephens University of Michigan and University of Chicago
Submitted to the Annal of Applied Statitic SUPPLEMENTARY APPENDIX TO BAYESIAN METHODS FOR GENETIC ASSOCIATION ANALYSIS WITH HETEROGENEOUS SUBGROUPS: FROM META-ANALYSES TO GENE-ENVIRONMENT INTERACTIONS
More informationProblem Set 8 Solutions
Deign and Analyi of Algorithm April 29, 2015 Maachuett Intitute of Technology 6.046J/18.410J Prof. Erik Demaine, Srini Devada, and Nancy Lynch Problem Set 8 Solution Problem Set 8 Solution Thi problem
More informationCodes Correcting Two Deletions
1 Code Correcting Two Deletion Ryan Gabry and Frederic Sala Spawar Sytem Center Univerity of California, Lo Angele ryan.gabry@navy.mil fredala@ucla.edu Abtract In thi work, we invetigate the problem of
More informationMarch 18, 2014 Academic Year 2013/14
POLITONG - SHANGHAI BASIC AUTOMATIC CONTROL Exam grade March 8, 4 Academic Year 3/4 NAME (Pinyin/Italian)... STUDENT ID Ue only thee page (including the back) for anwer. Do not ue additional heet. Ue of
More informationAvoiding Forbidden Submatrices by Row Deletions
Avoiding Forbidden Submatrice by Row Deletion Sebatian Wernicke, Jochen Alber, Jen Gramm, Jiong Guo, and Rolf Niedermeier Wilhelm-Schickard-Intitut für Informatik, niverität Tübingen, Sand 13, D-72076
More informationPreemptive scheduling on a small number of hierarchical machines
Available online at www.ciencedirect.com Information and Computation 06 (008) 60 619 www.elevier.com/locate/ic Preemptive cheduling on a mall number of hierarchical machine György Dóa a, Leah Eptein b,
More informationChapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover
Coping With NP-Hardne Chapter 12 Local Search Q Suppoe I need to olve an NP-hard problem What hould I do? A Theory ay you're unlikely to find poly-time algorithm Mut acrifice one of three deired feature
More informationBogoliubov Transformation in Classical Mechanics
Bogoliubov Tranformation in Claical Mechanic Canonical Tranformation Suppoe we have a et of complex canonical variable, {a j }, and would like to conider another et of variable, {b }, b b ({a j }). How
More informationA Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems
A Contraint Propagation Algorithm for Determining the Stability Margin of Linear Parameter Circuit and Sytem Lubomir Kolev and Simona Filipova-Petrakieva Abtract The paper addree the tability margin aement
More informationGain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays
Gain and Phae Margin Baed Delay Dependent Stability Analyi of Two- Area LFC Sytem with Communication Delay Şahin Sönmez and Saffet Ayaun Department of Electrical Engineering, Niğde Ömer Halidemir Univerity,
More informationEmittance limitations due to collective effects for the TOTEM beams
LHC Project ote 45 June 0, 004 Elia.Metral@cern.ch Andre.Verdier@cern.ch Emittance limitation due to collective effect for the TOTEM beam E. Métral and A. Verdier, AB-ABP, CER Keyword: TOTEM, collective
More informationSome Sets of GCF ϵ Expansions Whose Parameter ϵ Fetch the Marginal Value
Journal of Mathematical Reearch with Application May, 205, Vol 35, No 3, pp 256 262 DOI:03770/jin:2095-26520503002 Http://jmredluteducn Some Set of GCF ϵ Expanion Whoe Parameter ϵ Fetch the Marginal Value
More informationSymmetries in the Entropy Space
Symmetries in the Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Abstract This paper investigates when Shannon-type inequalities completely characterize the part of the closure of the entropy
More informationRate region for a class of delay mitigating codes and P2P networks
Rate region for a class of delay mitigating codes and P2P networks Steven Weber, Congduan Li, John MacLaren Walsh Drexel University, Dept of ECE, Philadelphia, PA 19104 Abstract This paper identifies the
More informationSOLUTIONS TO ALGEBRAIC GEOMETRY AND ARITHMETIC CURVES BY QING LIU. I will collect my solutions to some of the exercises in this book in this document.
SOLUTIONS TO ALGEBRAIC GEOMETRY AND ARITHMETIC CURVES BY QING LIU CİHAN BAHRAN I will collect my olution to ome of the exercie in thi book in thi document. Section 2.1 1. Let A = k[[t ]] be the ring of
More informationSocial Studies 201 Notes for November 14, 2003
1 Social Studie 201 Note for November 14, 2003 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the
More informationC up (E) C low (E) E 2 E 1 E 0
Spreading in lock-fading hannel. Muriel Médard David N.. Te medardmit.edu Maachuett Intitute of Technoy dteeec.berkeley.edu Univerity of alifornia at erkeley btract We conider wideband fading channel which
More information3.1 The Revised Simplex Algorithm. 3 Computational considerations. Thus, we work with the following tableau. Basic observations = CARRY. ... m.
3 Computational conideration In what follow, we analyze the complexity of the Simplex algorithm more in detail For thi purpoe, we focu on the update proce in each iteration of thi procedure Clearly, ince,
More informationWhite Rose Research Online URL for this paper: Version: Accepted Version
Thi i a repoitory copy of Identification of nonlinear ytem with non-peritent excitation uing an iterative forward orthogonal leat quare regreion algorithm. White Roe Reearch Online URL for thi paper: http://eprint.whiteroe.ac.uk/107314/
More informationCONGESTION control is a key functionality in modern
IEEE TRANSACTIONS ON INFORMATION TEORY, VOL. X, NO. X, XXXXXXX 2008 On the Connection-Level Stability of Congetion-Controlled Communication Network Xiaojun Lin, Member, IEEE, Ne B. Shroff, Fellow, IEEE,
More informationEC381/MN308 Probability and Some Statistics. Lecture 7 - Outline. Chapter Cumulative Distribution Function (CDF) Continuous Random Variables
EC38/MN38 Probability and Some Statitic Yanni Pachalidi yannip@bu.edu, http://ionia.bu.edu/ Lecture 7 - Outline. Continuou Random Variable Dept. of Manufacturing Engineering Dept. of Electrical and Computer
More informationPartition Symmetrical Entropy Functions*
Partition Symmetrical Entropy Functions* Jayant Apte ASPITRG *Chen, Qi; Yeung, Raymond W., Partition Symmetrical Entropy Functions, arxiv:1407.7405v1 [cs.it] Outline Sneak Peak Background: Basic facts
More informationThe Impact of Imperfect Scheduling on Cross-Layer Rate. Control in Multihop Wireless Networks
The mpact of mperfect Scheduling on Cro-Layer Rate Control in Multihop Wirele Network Xiaojun Lin and Ne B. Shroff Center for Wirele Sytem and Application (CWSA) School of Electrical and Computer Engineering,
More informationSignaling over MIMO Multi-Base Systems: Combination of Multi-Access and Broadcast Schemes
Signaling over MIMO Multi-Bae Sytem: Combination of Multi-Acce and Broadcat Scheme Mohammad Ali Maddah-Ali Abolfazl S. Motahari and Amir K. Khandani Coding & Signal Tranmiion Laboratory (www.ct.uwaterloo.ca)
More informationJul 4, 2005 turbo_code_primer Revision 0.0. Turbo Code Primer
Jul 4, 5 turbo_code_primer Reviion. Turbo Code Primer. Introduction Thi document give a quick tutorial on MAP baed turbo coder. Section develop the background theory. Section work through a imple numerical
More informationTHE SPLITTING SUBSPACE CONJECTURE
THE SPLITTING SUBSPAE ONJETURE ERI HEN AND DENNIS TSENG Abtract We anwer a uetion by Niederreiter concerning the enumeration of a cla of ubpace of finite dimenional vector pace over finite field by proving
More information(3) A bilinear map B : S(R n ) S(R m ) B is continuous (for the product topology) if and only if there exist C, N and M such that
The material here can be found in Hörmander Volume 1, Chapter VII but he ha already done almot all of ditribution theory by thi point(!) Johi and Friedlander Chapter 8. Recall that S( ) i a complete metric
More informationMulticolor Sunflowers
Multicolor Sunflower Dhruv Mubayi Lujia Wang October 19, 2017 Abtract A unflower i a collection of ditinct et uch that the interection of any two of them i the ame a the common interection C of all of
More informationChapter 4. The Laplace Transform Method
Chapter 4. The Laplace Tranform Method The Laplace Tranform i a tranformation, meaning that it change a function into a new function. Actually, it i a linear tranformation, becaue it convert a linear combination
More informationConvex Hulls of Curves Sam Burton
Convex Hull of Curve Sam Burton 1 Introduction Thi paper will primarily be concerned with determining the face of convex hull of curve of the form C = {(t, t a, t b ) t [ 1, 1]}, a < b N in R 3. We hall
More informationList coloring hypergraphs
Lit coloring hypergraph Penny Haxell Jacque Vertraete Department of Combinatoric and Optimization Univerity of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematic Univerity
More informationThe simplex method is strongly polynomial for deterministic Markov decision processes
The implex method i trongly polynomial for determinitic Markov deciion procee Ian Pot Yinyu Ye May 31, 2013 Abtract We prove that the implex method with the highet gain/mot-negative-reduced cot pivoting
More informationMath 273 Solutions to Review Problems for Exam 1
Math 7 Solution to Review Problem for Exam True or Fale? Circle ONE anwer for each Hint: For effective tudy, explain why if true and give a counterexample if fale (a) T or F : If a b and b c, then a c
More informationUnavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes
European Wirele, April 7-9,, Vienna, Autria ISBN 978--87-4-9 VE VERLAG GMBH Unavoidable Cycle in Polynomial-Baed Time-Invariant LPC Convolutional Code Hua Zhou and Norbert Goertz Intitute of Telecommunication
More informationTHE dynamics of traffic over wireless networks has undergone
940 IEEE TRASACTIOS O COUICATIOS, VO. 65, O. 5, AY 207 Improved Approximation of Storage-Rate Tradeoff for Caching With ultiple Demand Avik Sengupta, ember, IEEE, and Ravi Tandon, Senior ember, IEEE Abtract
More informationOn the Stability Region of Congestion Control
On the Stability Region of Congetion Control Xiaojun Lin and Ne B. Shroff School of Electrical and Computer Engineering Purdue Univerity, Wet Lafayette, IN 47906 {linx,hroff}@ecn.purdue.edu Abtract It
More informationarxiv: v1 [math.mg] 25 Aug 2011
ABSORBING ANGLES, STEINER MINIMAL TREES, AND ANTIPODALITY HORST MARTINI, KONRAD J. SWANEPOEL, AND P. OLOFF DE WET arxiv:08.5046v [math.mg] 25 Aug 20 Abtract. We give a new proof that a tar {op i : i =,...,
More informationTRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL
GLASNIK MATEMATIČKI Vol. 38583, 73 84 TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL p-laplacian Haihen Lü, Donal O Regan and Ravi P. Agarwal Academy of Mathematic and Sytem Science, Beijing, China, National
More informationLecture 8: Period Finding: Simon s Problem over Z N
Quantum Computation (CMU 8-859BB, Fall 205) Lecture 8: Period Finding: Simon Problem over Z October 5, 205 Lecturer: John Wright Scribe: icola Rech Problem A mentioned previouly, period finding i a rephraing
More informationA CATEGORICAL CONSTRUCTION OF MINIMAL MODEL
A ATEGORIAL ONSTRUTION OF MINIMAL MODEL A. Behera, S. B. houdhury M. Routaray Department of Mathematic National Intitute of Technology ROURKELA - 769008 (India) abehera@nitrkl.ac.in 512ma6009@nitrkl.ac.in
More informationarxiv: v1 [quant-ph] 22 Oct 2010
The extenion problem for partial Boolean tructure in Quantum Mechanic Cotantino Budroni 1 and Giovanni Morchio 1, 2 1) Dipartimento di Fiica, Univerità di Pia, Italy 2) INFN, Sezione di Pia, Italy Alternative
More informationPhysics 741 Graduate Quantum Mechanics 1 Solutions to Final Exam, Fall 2014
Phyic 7 Graduate Quantum Mechanic Solution to inal Eam all 0 Each quetion i worth 5 point with point for each part marked eparately Some poibly ueful formula appear at the end of the tet In four dimenion
More informationGiven the following circuit with unknown initial capacitor voltage v(0): X(s) Immediately, we know that the transfer function H(s) is
EE 4G Note: Chapter 6 Intructor: Cheung More about ZSR and ZIR. Finding unknown initial condition: Given the following circuit with unknown initial capacitor voltage v0: F v0/ / Input xt 0Ω Output yt -
More informationc n b n 0. c k 0 x b n < 1 b k b n = 0. } of integers between 0 and b 1 such that x = b k. b k c k c k
1. Exitence Let x (0, 1). Define c k inductively. Suppoe c 1,..., c k 1 are already defined. We let c k be the leat integer uch that x k An eay proof by induction give that and for all k. Therefore c n
More informationFebruary 5, :53 WSPC/INSTRUCTION FILE Mild solution for quasilinear pde
February 5, 14 1:53 WSPC/INSTRUCTION FILE Mild olution for quailinear pde Infinite Dimenional Analyi, Quantum Probability and Related Topic c World Scientific Publihing Company STOCHASTIC QUASI-LINEAR
More informationLecture 7: Testing Distributions
CSE 5: Sublinear (and Streaming) Algorithm Spring 014 Lecture 7: Teting Ditribution April 1, 014 Lecturer: Paul Beame Scribe: Paul Beame 1 Teting Uniformity of Ditribution We return today to property teting
More informationOptimal Coordination of Samples in Business Surveys
Paper preented at the ICES-III, June 8-, 007, Montreal, Quebec, Canada Optimal Coordination of Sample in Buine Survey enka Mach, Ioana Şchiopu-Kratina, Philip T Rei, Jean-Marc Fillion Statitic Canada New
More informationSymmetries in Entropy Space
1 Symmetries in Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks to NSF CCF-1421828
More informationMULTIPLE POSITIVE SOLUTIONS OF BOUNDARY VALUE PROBLEMS FOR P-LAPLACIAN IMPULSIVE DYNAMIC EQUATIONS ON TIME SCALES
Fixed Point Theory, 5(24, No. 2, 475-486 http://www.math.ubbcluj.ro/ nodeacj/fptcj.html MULTIPLE POSITIVE SOLUTIONS OF BOUNDARY VALUE PROBLEMS FOR P-LAPLACIAN IMPULSIVE DYNAMIC EQUATIONS ON TIME SCALES
More informationUtility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach
Utility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach 61 Tobia Hark Konrad-Zue-Zentrum für Informationtechnik Berlin (ZIB), Department Optimization, Takutr. 7, 14195 Berlin,
More informationSTOCHASTIC GENERALIZED TRANSPORTATION PROBLEM WITH DISCRETE DISTRIBUTION OF DEMAND
OPERATIONS RESEARCH AND DECISIONS No. 4 203 DOI: 0.5277/ord30402 Marcin ANHOLCER STOCHASTIC GENERALIZED TRANSPORTATION PROBLEM WITH DISCRETE DISTRIBUTION OF DEMAND The generalized tranportation problem
More informationElectronic Theses and Dissertations
Eat Tenneee State Univerity Digital Common @ Eat Tenneee State Univerity Electronic Thee and Diertation Student Work 5-208 Vector Partition Jennifer French Eat Tenneee State Univerity Follow thi and additional
More informationFast explicit formulae for genus 2 hyperelliptic curves using projective coordinates
Fat explicit formulae for genu hyperelliptic curve uing projective coordinate Thoma Wollinger Ecrypt embedded ecurity GmbH twollinger@ecryptde Abtract Thi contribution propoe a modification of method of
More informationMyriad of applications
Shortet Path Myriad of application Finding hortet ditance between location (Google map, etc.) Internet router protocol: OSPF (Open Shortet Path Firt) i ued to find the hortet path to interchange package
More informationUNIT 15 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS
UNIT 1 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS Structure 1.1 Introduction Objective 1.2 Redundancy 1.3 Reliability of k-out-of-n Sytem 1.4 Reliability of Standby Sytem 1. Summary 1.6 Solution/Anwer
More informationEquivalent Strain in Simple Shear Deformations
Equivalent Strain in Simple Shear Deformation Yan Beygelzimer Donetk Intitute of Phyic and Engineering The National Academy of Science of Ukraine Abtract We how that imple hear and pure hear form two group
More informationTHE HAUSDORFF MEASURE OF SIERPINSKI CARPETS BASING ON REGULAR PENTAGON
Anal. Theory Appl. Vol. 28, No. (202), 27 37 THE HAUSDORFF MEASURE OF SIERPINSKI CARPETS BASING ON REGULAR PENTAGON Chaoyi Zeng, Dehui Yuan (Hanhan Normal Univerity, China) Shaoyuan Xu (Gannan Normal Univerity,
More informationOne Class of Splitting Iterative Schemes
One Cla of Splitting Iterative Scheme v Ciegi and V. Pakalnytė Vilniu Gedimina Technical Univerity Saulėtekio al. 11, 2054, Vilniu, Lithuania rc@fm.vtu.lt Abtract. Thi paper deal with the tability analyi
More informationLINEAR ALGEBRA METHOD IN COMBINATORICS. Theorem 1.1 (Oddtown theorem). In a town of n citizens, no more than n clubs can be formed under the rules
LINEAR ALGEBRA METHOD IN COMBINATORICS 1 Warming-up example Theorem 11 (Oddtown theorem) In a town of n citizen, no more tha club can be formed under the rule each club have an odd number of member each
More informationList Coloring Graphs
Lit Coloring Graph February 6, 004 LIST COLORINGS AND CHOICE NUMBER Thomaen Long Grotzch girth 5 verion Thomaen Long Let G be a connected planar graph of girth at leat 5. Let A be a et of vertice in G
More informationWeakly Krull Inside Factorial Domains
Weakly Krull Inide Factorial Domain D. D. ANDERSON, The Univerity of Iowa, Department of Mathematic, Iowa City, Iowa 52242, dan-anderon@uiowa.edu MUHAMMED ZAFRULLAH, Idaho State Univerity, Department of
More informationCapacity Region of the Permutation Channel
Capacity Region of the Permutation Channel John MacLaren Walsh and Steven Weber Abstract We discuss the capacity region of a degraded broadcast channel (DBC) formed from a channel that randomly permutes
More information