On Multi-source Multi-sink Hyperedge Networks: Enumeration, Rate Region Computation, & Hierarchy

Size: px
Start display at page:

Download "On Multi-source Multi-sink Hyperedge Networks: Enumeration, Rate Region Computation, & Hierarchy"

Transcription

1 On Multi-ource Multi-ink Hyperedge Network: Enumeration, Rate Region Computation, & Hierarchy Ph D Diertation Defene Congduan Li ASPITRG & MANL Drexel Univerity congduanli@gmailcom May 9, 05 C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 / 73

2 Motivation: information flow in network Coding (mix the input) outperform routing (receive-forward) in many circumtance Efficient information flow in network: admiible ource rate v channel capacitie Data Source? Network? Relay Node/ Router Uer C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 / 73

3 Motivation: information torage in data center Coding (mix ource) ave reource, compared with imple replication Efficient information torage in data center: admiible ource file ize v hard dik capacitie? Source File? Hard Drive Uer C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 3 / 73

4 Generalized model A multiource multiink hyperedge network (hyperedge MSNC) Network Path Source S Sink T In(i) i Out(i) t e E U U e R e K T Y A[R,R,] T B[H(Y ),H(Y ),] T (t) Rate/capacity region: compute Notation: (K, E U ) mean K ource, E U intermediate hyperedge We made three major contribution C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 4 / 73

5 Contribution : Revolution, ue computer for rate region calculation Conventional: (pecial) network, info ineq, manually, paper Computational: 03, 06, 0 (arbitrary) network, computer, # of paper? In(i) In(i) i U e Re t T T In(i) T T T S T i U e Re t t U e Re In(i) Out(i) i U e Re Out(i) t e e Conventional way Out(i) S S S i t e S Out(i) S In(i) Out(i) e e C Li (ASPITRG & MANL) i U e Re S T S T S T S T Computational way Ph D Diertation Defene May 9, 05 5 / 73

6 Contribution : enumeration of all network Conventional: almot impoible to lit all network due to the large number of intance Computational: enumerate 09, 0 general network Trillion of Network In(i) i t i Out(i) t U e Re e e S T S T T S T S In(i) i U e Re t In(i) Out(i) i U e Re Out(i) t e e S T S T S T S T? Conventional way C Li (ASPITRG & MANL) In(i) Out(i) U e Re Enumeration Algorithm Computational way Ph D Diertation Defene May 9, 05 6 / 73

7 Contribution 3: build hierarchy between network Conventional: what to do with o many rate region? Computational: define embedding and combination operator, build a hierarchy, analyze the rate region and ue them to olve even more network in cale Trillion of Rate Region Build hierarchy between them and olve more network in cale? Conventional way C Li (ASPITRG & MANL) Hierarchy Operator Computational way Ph D Diertation Defene May 9, 05 7 / 73

8 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Rate Region Computation 3 Network Operation Enumerate network Software to calculate rate region or bound Combination operator Embedding operator Embedding Operation Combination Operation Play with both New network Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 8 / 73

9 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Enumerate network Software to calculate rate region or bound Rate Region Computation 3 Network Operation Embedding Operation Combination Operation Play with both Combination operator New network Embedding operator Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 9 / 73

10 Network Coding: Source We aume U Out() = Y Source S Network Sink T Path In(i) i Out(i) Y t e U S e R K e T (t) Source Rate Source Independence Source Encoding H(Y ) ω H(Y S ) = S H(Y ) H(U Out() Y ) = 0 C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 0 / 73

11 Network Coding: Edge Source S Network Sink T Path In(i) i Out(i) Y t e U S e R e K T (t) Coding Rate R e H(U e ), e E C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 / 73

12 Network Coding: Node Source S Network Sink T Path In(i) i Out(i) Y t e U S e R e K T (t) Coding Contraint H(U Out(i) U In(i) )=0, i V\(S T ) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 / 73

13 Network Coding: Sink Source S Network Sink T Path In(i) i Out(i) Y t e U S e R e K T (t) Decoding Contraint H(Y β(t) U In(t) )=0, t T C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 3 / 73

14 Special Cae: Independent Ditributed Source Coding (IDSC) Y Y U E U E U 3 E 3 D D D 3 Y Y Y Y Y g Y U U U 3 t t t3 Y Y Y Y Source available to all encoder Decoder demand variou ubet of of ource When ource are prioritized, it become MDCS C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 4 / 73

15 Special Cae: Index Coding Only one intermediate edge that tranmit all information of ource Source may be directly available at ink a ide information (K, ) hyperedge MSNC C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 5 / 73

16 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Enumerate network Software to calculate rate region or bound Rate Region Computation 3 Network Operation Embedding Operation Combination Operation Play with both Combination operator New network Embedding operator Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 6 / 73

17 Source minimality example Source minimality example: Source 3 redundant due to not demanded by any ink 3 Y 3 Y g U t Y Y g U t Y U t Y U t Y Y g t 3 U 3 Y Y g t 3 U 3 Y C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 7 / 73

18 Node minimality example Node minimality example: g, g can be merged due to ame input Y g U t Y Y U t Y U t g U Y t Y Y g t 3 U 3 Y Y t 3 U 3 Y C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 8 / 73

19 Edge minimality example Edge minimality example: U, U 3 are parallel and can be merged Y U U g t Y Y U g t Y Y g t U 3 Y Y g t Y U C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 9 / 73

20 Sink minimality example Sink minimality example: decoding ability of Y at t implied by t, equivalent to let t demand Y only Y g U U t t Y Y Y Y g U U t t Y Y Y g t 3 U 3 Y Y g t 3 U 3 Y C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 0 / 73

21 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Enumerate network Software to calculate rate region or bound Rate Region Computation 3 Network Operation Embedding Operation Combination Operation Play with both Combination operator New network Embedding operator Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 / 73

22 Equivalent Network Y g U t Y I) Y g U t Y II) III) Y Y Y $ Y & U $ U g U t Y g U t Y Y 6$ Y U Y g Y t U Y g t Y I, II are equivalent: permute ource and edge I, III are not equivalent: ource are only permuted at ource ide II, III are not equivalent: ource are only permuted at ink ide C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 / 73

23 Repreenting a Network Ordered pair (Q, W), ource K, edge K +,, K + E U ; Edge definition Q {(i, A) i {K +,, K + E U }, A {,, K + E U } \ {i}}; Sink definition W {(i, A) i {,, K}, A {,, K + E U } \ {i}}; Same i allowed to appear in W but not in Q (3, {, }) 3 (4, {, 3}) 4 Q W (, {3}) (, {3, 4}) (, {4}) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 3 / 73

24 Equivalence Under Group Action Symmetry group G := S {,,,K} S {K+,,K+ EU }; π G, then π(q) {π((i, A)) (i, A) Q}; π((q, W)) = (π(q), π(w)); Iomorphic or Equivalent: π G uch that π((q, W )) = (Q, W ) (3, {, }) 3 (4, {, 3}) 4 :permute, Q Q 0 (3, {, }) 3 (4, {, 3}) 4 W (, {3}) (, {3, 4}) (, {4}) W 0 (, {3}) (, {3, 4}) (, {4}) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 4 / 73

25 Canonical Network: minimal repreentative in each orbit Orbit: O (Q,W) := {(π(q), π(w)) π G} Network in an orbit are iomorphic or equivalent to each other Tranveral: one repreentative for each orbit, the canonical one Lexicographically order the pair (i, A) according to (i, A) > (j, A ) if j < i or i = j, A < A under the lexicographic ordering Canonical: apply order to (Q, W) and get the minimal one # 3 4 ` # 3 4 ` # 3 4 ` # 3 4 ` # i the canonical repreentative # Q W {(3, {, }), (4, {, 3})} {(, {3, 4}), (, {3}), (, {4})} {(3, {, }), (4, {, 3})} {(, {3}), (, {4}), (, {3, 4})} 3 {(3, {, 4}), (4, {, })} {(, {3, 4}), (, {3}), (, {4})} 4 {(3, {, 4}), (4, {, })} {(, {3}), (, {4}), (, {3, 4})} # 3 4 ` # 3 4 ` # 3 4 ` C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 5 / 73

26 Why thi repreentation Some minimality contraint eaily to take care, eg, repeated edge, redundant node, etc Smaller orbit, compared with node repreentation Orbit-tabilizer theorem: O (Q,W) = G Stab((Q,W)) # ` # ` 3 3 # ` # ` 4 4 a b c d e f # a b c d e f # ` # ` # ` # Q W {(3, {, }), (4, {, })} {(, {3, 4}), (, {3}), (, {4})} {(3, {, }), (4, {, })} {(, {3}), (, {4}), (, {3, 4})} Subgroup of S {,} S {3,4} tabilizing (G, T )=S {3,4} a b Subgroup of S {a,b} S {c,d,e,f} tabilizing (V, E) =S {d,f} a Iomorph in Node Repreentation (4) Iomorph in Edge and Sink Definition Repreentation () C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 6 / 73

27 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Enumerate network Software to calculate rate region or bound Rate Region Computation 3 Network Operation Embedding Operation Combination Operation Play with both Combination operator New network Embedding operator Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 7 / 73

28 Leiterpiel Algorithm [BettenBraunFripertinger, 006] Compute tranveral of orbit on ize j ubet P j (X ) of et X, incrementally in j; alo give ymmetry group (tabilizer) Lit directly the canonical repreentative atifying ome tet function f, a long a thi tet ha the inherited property, ie, if a uperet atifie, it ubet alo atify Input: et X, group G, inherited tet function f Output: tranveral of ubet of different ize until top, either fixed j or other top condition, ymmetry group (tabilizer) Tranveral: canonical repreentative Orbit on P j (X ) Extenion obeying f Orbit on P j (X ) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 8 / 73

29 Enumeration baed on Leiterpiel Algorithm Target: (K, E U ) non-iomorphic network Recall repreentation of network: (Q, W), lit pool for Q firt Leiterpiel define edge incrementally from to E U X := {(i, A) i {K +,,K + E U }, A {,,K + E U } \ {i}} With ome minimality contraint inherited Acting group G := S {,,K} S {K+,,K+ EU } Call Leiterpiel T EU = Leiterpiel(G, P f E U (X )) Stop condition: reach number of edge C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 9 / 73

30 Enumeration baed on Leiterpiel Algorithm Now for each Q T EU, lit poible W Leiterpiel incrementally add ink from to no poible new ink Y := {(i, A) 9 a directed path in Q from i to at leat one edge in A} With ome minimality contraint inherited Acting group G := S {,,K} S {K+,,K+ EU } Call Leiterpiel T T = Leiterpiel(G, P f T (Y)) Stop condition: cannot increae j obeying f For each W {T,, T T }, tet all the other minimality condition on (Q, W), if it pae, we obtain a non-iomorphic network intance C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

31 Enumeration Reult M : number of non-iomorphic network, lited; ˆM : number of network with edge iomorphim, counted; ˆM n : number of network with node iomorphim, counted; (K, E U ) (,) (,3) (,) (,) (,3) (3,) (3,) M ˆM ˆM n 39 8, C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 3 / 73

32 All (, ) network: no direct acce btw ource & ink t Y Y g U Y U g t Y Y U g t Y Y U g t Y Y U g t YY Y U U g t Y Y g t t YY Y U U Y Y U Y U Y U Y g U g t YY g t Y g t YY g t Y Y U g t Y Y g t3 Y Intance # Intance # Intance #3 Intance #4 Intance #5 Intance #6 Intance #7 Y g Y U t YY g U Y U g t Y Y U g t Y Y U g t Y Y U g t Y Y U g t Y Y t YY U g U Y Y U U g U g t Y Y U Y Y U YY g t Y g t Y g t Y g t Y Intance #8 Intance #9 Intance #0 Intance # Intance # Intance #3 Intance #4 t Y U Y Y U g g t Y Y U g t YY Y U g t Y U Y g Y U t Y g t Y t Y U Y t Y U g U Y g Y U U t g t YY Y g t Y Y U Y g t Y Y g t Y Y g t Y U t3 Y U Y g t3 Y Intance #5 Intance #6 Intance #7 Intance #8 Intance #9 Intance #0 Intance # Y g Y U g U Y g t U YY Y g U U t Y U t YY t YY Y g Y t YY g Y U t Y g t Y U Y g U Y g U Y g t U YY Y U U U g t YY Y g t Y Y g t YY Y g t Y Intance # Intance #3 Intance #4 Intance #5 Intance #6 Intance #7 Intance #8 t Y U Y U g t Y Y U U g t YY Y g t Y Y g t Y U U U Y g t Y Y g t Y Y g t Y U U U U U Y g t Y Y U g t Y Y g t Y Y g t Y Y g t Y Y g t Y Y g t3 Y U Intance #9 Intance #30 Intance #3 Intance #3 Intance #33 Intance #34 Intance #35 t Y t Y U U Y g Y U t Y Y U t Y Y U t Y Y U Y U g t Y Y g t YY t Y g g g g t Y Y U Y U Y g t3 Y U t YY U Y t Y Y U t Y Y g t YY Y U g t Y t3 Y U Intance #4 Intance #36 Intance #37 Intance #38 Intance #39 Intance #40 Intance #4 U U U t Y Y Y g t g t Y U Y Y g t Y Y g t Y Y U Y U Y U Y g t Y g t Y g t Y g t3 Y U Intance #43 Intance #44 Intance #45 Intance #46 C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 3 / 73

33 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Rate Region Computation 3 Network Operation Enumerate network Software to calculate rate region or bound Combination operator Embedding operator Embedding Operation Combination Operation Play with both New network Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

34 Rate region Rate region: all poible rate and ource entropy vector atifying all network contraint Collect the N network random variable and their joint entropie Define Γ N : N -dim cone, region of valid entropy vector (reviit later) Contraint from network A: L = {h Γ N : h Y S = Σ S h Y } () L = {h Γ N : h X Out(k) Y = 0} () L 3 = {h Γ N : h X Out(i) X In(i) = 0} (3) L 4 = {(h T, R T ) T R N + E + : R e h Ue, e E} (4) L 5 = {h Γ N : h Y β(t) U In(t) = 0} (5) Rate region (cone) in term of edge rate and ource entropie (derived from [Yan, Yeung, Zhang TranIT 0]): R (A) = proj RE,H(Y S )(con(γ N L 3) L 45 ) (6) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

35 Rate Region Example A (3, 3) network and it rate region R (A) Rate region: a cone with dimenion of all variable in the network Y Y g g g U 3 3 t Y Y R H(Y 3 ) U U R H(Y ) t Y 3 R + R H(Y )+H(Y )+H(Y 3 ) t 3 3 Y 3 Y 3 R + R 3 H(Y )+H(Y 3 ) R + R +R 3 H(Y )+H(Y )+H(Y 3 ) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

36 Rate region Rate region: a cone in term of edge rate and ource entropie: R (A) = proj RE,H(Y S )(con(γ N L 3) L 45 ) (7) Involve Γ N : N -dim cone, region of valid entropy vector C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

37 Region of Entropic Vector Γ N : Open et in general Γ N not fully characterized for N 4: convex but contain non-polyhedral part Outer bound Inner bound N C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

38 Sandwich Bound Γ N ΓOut N : R out(a) = proj RE,H(Y S )(Γ Out N L 345) Γ N ΓIn N : R in(a) = proj RE,H(Y S )(Γ In N L 345) R (A) = R out (A) = R in (A), if R out (A) = R in (A) It become: Initial polyhedra contraint projection Our work following thi idea: Li, et al, Allerton 0, NetCod 03, ubmiion TranIT 04 Contraint P rojection Contraint N N Contraint N N In N In N C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

39 Notion of ufficiency Outer bound typically ued i Shannon outer bound R o (A); inner bound from repreentable matroid: calar and vector bound Scalar ufficiency: R (A) = R,q (A) Vector ufficiency: R (A) = R N q (A) Scalar R,q (A) Vector R N 0 q (A) Sufficient Inufficient C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

40 Rate Region Computation Reult M : number of all network intance; The other number repreent the number of intance we can cloe the gap uing variou bound, and hence exact rate region can be obtained (K, E ) M R, (A) R N+ (A) R N+ (A) R N+4 (A) (, ) (, 3) (, ) (, ) (, 3) (3, ) (3, ) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

41 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Rate Region Computation 3 Network Operation Enumerate network Software to calculate rate region or bound Combination operator Embedding operator Embedding Operation Combination Operation Play with both New network Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 4 / 73

42 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Rate Region Computation 3 Network Operation Embedding Operation Combination Operation Enumerate network Software to calculate rate region or bound Combination operator New network Embedding operator Forbidden Minor Play with both C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 4 / 73

43 Motivated from graph and matroid theory Inheritance property regarding ufficiency of cla of code Minor-cloed graph: finite number of forbidden minor [RobertonSeymour ] Rota conjecture in matroid theory: finite number of forbidden minor for F q repreentability [Oxley0] Not Fobidden Forbidden Size N New Minimal Forbidden Minor N N C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

44 Similar characterization for network? If network have imilar characterization? Poible lit of forbidden embedded network for ufficiency of linear code over a field Network operation to obtain uch embedded network preerving inufficiency, & region relationhip Three operation Source Network Detination C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

45 Source deletion A = A \ k Source Y k deleted, ource k top ending information to the network, H(Y k ) = 0 Sink requiring Y k will no longer demand it H(Y k 0)=0 k Y k kt (t) \ k C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

46 Edge deletion A = A \ e Edge e deleted, nothing on U e, R e = H(U e ) = 0 e e R e 0 =0 C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

47 Edge contraction A = A/e Edge e contracted, input to tail of e available for head of e, R e =, H(U e ) free e e R e 0 = C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

48 Source deletion: A = A \ k For each i {, q, (, q), o}, R i (A ) = Proj Y\k,R E ({R R i(a) H(Y k ) = 0}) (8) Sufficiency preerved from large to mall network a the equation how Equivalently, inufficiency preerved from mall to large network R(A) H(Y k )=0 P rojection R(A 0 ) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

49 Example: Forbidden embedded network Goal: minimal forbidden network for ufficiency Scalar binary code conidered k =,, 3; E =, 3, 4, 7360 non-iomorphic MDCS 9 ufficient, 5438 inufficient minimal forbidden minor (Li, et al ubmiion TranIT 04) 5438 / 7360 inu cient 9 / 7360 u cient forbidden embedded network C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

50 Summary for embedding operator Three embedding operator: ource deletion, edge deletion, edge contraction Rate region of maller network derivable from the aociated larger network Sufficiency of linear code preerved from larger to maller network under embedding operation Equivalently, inufficiency of linear code preerved from maller network to larger one C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

51 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Rate Region Computation 3 Network Operation Enumerate network Software to calculate rate region or bound Combination operator Embedding operator Embedding Operation Combination Operation Play with both New network Forbidden Minor C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 5 / 73

52 Source merge After merge: Merged ource erve a common ource to the two network C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 5 / 73

53 Sink merge After merge: Union the input and requet of ink being merged, repectively C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

54 Intermediate node merge After merge: union input and output of the two node C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

55 Edge merge Edge merge: create one extra node and four aociated edge to replace the two original edge Firt two edge are ordinary edge connecting with the extra node, the other two edge connect the extra node with all the head node of the original two edge, repectively Equivalent: create a relay node on the two edge, repectively, and then merge the two relay node C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

56 Source merge A i obtained by merging A Ŝ = A π(ŝ), then for each i {, q, (, q), o} R i (A) = Proj ((R \π(ŝ) i(a ) R i (A )) L 0 ), { } L 0 = H(Y ) = H(Y π() ), Ŝ Remark: eentially replace variable Y π() with the Y for each Ŝ R(A ) 8 Ŝ,H(Y )=H(Y () ) R(A ) + C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

57 Obtain Rate Region for Larger Network X X X3 X4 X5 X6 R R R3 3 3 R5 4 R4 5 R7 0 R4 0 R R R0 R0 0 R R R9 7 9 {,3} {,3} {5} {6} {,3} {,,4} {4} {6} {5} {6} A 4 : A : A : A 3 : ' 3' ' A 5 : X 0 X0 6' 5' 4' X3 X X X3 X4 X5 X6 0 X60 X50 X ' R9 R0 R5 R3 R8 R6 R7 R R R4 R0 0 R 8 7 R 3 ' ' {',3'} {',3'} {6} {6} {5} {,} {} {4} {4} {3} R6 H(X6) R9 H(X3 0) {5'} {6'} {4'5'} Ri H(X4),i=3, 4 R H(X) R7 + R8 H(X6) R0 H(X 0)+H(X0)+H(X30) R H(X5 R3 + R4 H(X3)+ H(X4) 0) R H(X) R H(X4 R6 + R7 H(X5)+ H(X6) R3 + R4 +R5 H(X3)+H(X4) 0)+H(X50) R + R H(X)+ H(X) R00 + R + R R6 + R7 +R8 H(X5)+H(X6) H(X40)+H(X50)+H(X60) A : 0 {4,5} Ri H(X),i=, R + R H(X)+ H(X) Ri H(X4),i=3, 4, 4 0 R3 + Ri H(X3)+H(X4),i=4, 4 0 R3 + Ri + R5 H(X3)+H(X4),i=4, 4 0 R6 H(X6) Ri + R8 H(X6),i=7, 7 0 R6 + Ri H(X5)+H(X6),i=7, 7 0 R6 + Ri +R8 H(X5)+H(X6),i=7, 7 0 R9 R0 R R R00 + R + R H(X4)+H(X5)+H(X6) H(X3) P 3 i= H(Xi) H(X5) H(X4)+H(X5) C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

58 Summary for combination operator Four combination operator: ource, ink, node, and edge merge Rate region of combined network derivable from region of maller network in the combination C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

59 Outline Enumeration Network Model Minimality Network Equivalence Cla Enumeration algorithm Rate Region Computation 3 Network Operation Embedding Operation Combination Operation Enumerate network Software to calculate rate region or bound Combination operator New network Embedding operator Forbidden Minor Play with both C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

60 Combination operation uffice? Anwer i NO Need cap to limit the network ize in the combination Network Cap: no beyond Large ize Moderate ize Combination reach a portion of large network Small ize Embedding enlarge the reachable portion Tiny ize C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

61 Partial cloure of network Seed lit of network Wort cae partial cloure of network: cap the predicted ize of network involved in the proce Let the pool produce new network until no new network can be generated If within network cap Combination of pair New network? Ye Add to eed lit Minor from embedding NO Stop C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 6 / 73

62 New network found from a tiny eed lit Start with the ingle (, ), ingle (, ), and the four (, ) network; :6:;75/< 939==45>75= ; ;4?9@08!"#"$!"#%$!%#%$!"#"$!"#%$!%#%$!&#"$ % % % % % %!&#%$ ' &' &' ' &' &'!(#($ " " " ) &* &+!(#"$ &" &+ &+ "' &"& &**!(#%$ ',- &'& ' *&+ +%)!"#($ ( " ( % &' &&!"#"$ (% (% (% %( "*" )""!"#%$ ' &"* &"* ' ("+& *%)&!%#($ ' ' " ' ' "!%#"$ ' ' &- ' ' %%!%#%$ ' ' (*" ' ' %%"' // %+ (,( *+) )) "%'' &&+"* C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 6 / 73

63 New network found from a tiny eed lit 6 tiny network can generate new 635 network with mall cap! :6:;75/< 939==45>75= ; ;4?9@08!"#"$!"#%$!%#%$!"#"$!"#%$!%#%$!&#"$ % % % % % %!&#%$ ' &' &' ' &' &'!(#($ " " " ) &* &+!(#"$ &" &+ &+ "' &"& &**!(#%$ ',- &'& ' *&+ +%)!"#($ ( " ( % &' &&!"#"$ (% (% (% %( "*" )""!"#%$ ' &"* &"* ' ("+& *%)&!%#($ ' ' " ' ' "!%#"$ ' ' &- ' ' %%!%#%$ ' ' (*" ' ' %%"' // %+ (,( *+) )) "%'' &&+"* C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

64 New network found from a tiny eed lit With the increae of cap ize, number of new network increae! :6:;75/< 939==45>75= ; ;4?9@08!"#"$!"#%$!%#%$!"#"$!"#%$!%#%$!&#"$ % % % % % %!&#%$ ' &' &' ' &' &'!(#($ " " " ) &* &+!(#"$ &" &+ &+ "' &"& &**!(#%$ ',- &'& ' *&+ +%)!"#($ ( " ( % &' &&!"#"$ (% (% (% %( "*" )""!"#%$ ' &"* &"* ' ("+& *%)&!%#($ ' ' " ' ' "!%#"$ ' ' &- ' ' %%!%#%$ ' ' (*" ' ' %%"' // %+ (,( *+) )) "%'' &&+"* C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

65 New network found from a tiny eed lit Embedding operation are important in the proce! :6:;75/< 939==45>75= ; ;4?9@08!"#"$!"#%$!%#%$!"#"$!"#%$!%#%$!&#"$ % % % % % %!&#%$ ' &' &' ' &' &'!(#($ " " " ) &* &+!(#"$ &" &+ &+ "' &"& &**!(#%$ ',- &'& ' *&+ +%)!"#($ ( " ( % &' &&!"#"$ (% (% (% %( "*" )""!"#%$ ' &"* &"* ' ("+& *%)&!%#($ ' ' " ' ' "!%#"$ ' ' &- ' ' %%!%#%$ ' ' (*" ' ' %%"' // %+ (,( *+) )) "%'' &&+"* C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

66 Example to ee why integrating embedding i important Start with the ingle (, ), ingle (, ), and the four (, ) network Only combination with cap (3, 4), get only 3 network with ize (, ) (,) (,) (,) ource merge = (,) ALL (,), (,), (,) MINIMAL NETWORK CODING PROBLEMS (there are 6) ALL POSSIBLE COMBINATION OPERATORS = All (,) Minimal Network Coding Problem That are direct Combination of (,),(,),and (,) Problem (There are only 3 out of 333 total (,) problem) = ource merge node merge C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

67 Example to ee why integrating embedding i important Start with the ingle (, ), ingle (, ), and the four (, ) network Conider both combination and embedding with ame cap, found (, ) network unreachable by combination only Contracting edge Contracting edge Source merge [,] with [,] Contracting edge , Contracting edge 3, Deleting edge 3 Contracting edge 4 Edge merge 3 & Merge two ink , C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

68 Summary of work thu far Enumeration, Rate Region Computation, Forbidden Minor, New Network Enumerate > non-iomorphic network Calculate their exact rate region or bound Combination operation Embedding operation New olvable network in cale Forbidden Minor for u ciency C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

69 Dream Draw or input a network Minimality & canonical converion Though we have online repoitory Want a uer-friendly interface to eaily get anwer Get the anwer Ye Ye In Databae? No Directly Computable? No Ye Reachable by contruction? No Not olvable right now C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

70 Future work When Shannon outer bound i tight? Any common tructure? I Shannon outer bound tight for all MDCS, or IDSC? I the number of forbidden minor regarding the ufficiency of a cla of linear code finite? Coverage of the operator in all problem More operation: node & edge merge, ource & ink merge A notion of forbidden minor which can harne both combination and embedding operator C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

71 Publication Lit Steven Weber, Congduan Li, and John Walh, Rate Region for a cla of delay mitigatting code and PP network, 46th Annual Conference on Information Science and Sytem, Princeton Univerity, March, 0, Invited Paper Congduan Li, John Walh, and Steven Weber, A Computational Approach for Determining Rate Region and Code uing Entropic Vector Bound, 50th Allerton Conference, UIUC, Oct 0 3 Congduan Li, Jayant Apte, John M Walh, and Steven Weber, A new computational approach for determining rate region and optimal code for coded network, The 03 IEEE International Sympoium on Network Coding (NetCod 03), Calgary, Canada, Jun 7-9, 03 4 Congduan Li, John M Walh, and Steven Weber, Matroid bound on region of entropic vector, 5th Allerton conference on Communication, Control and Computation, UIUC, IL, Oct 03 5 Jayant Apte, Congduan Li, John MacLaren Walh, and Steven Weber, Exact pepair problem with multiple ource, in The 48th annual IEEE Conference on Information Science and Sytem(CISS), Mar 04 6 Jayant Apte, Congduan Li, and John MacLaren Walh, Algorithm for Computing Network Coding Rate Region via Single Element Extenion of Matroid, IEEE International Sympoium on Information Theory (ISIT) 04, Honolulu, Hawaii 7 Congduan Li, Steven Weber, and John M Walh, Network Embedding Operation Preerving the Inufficiency of Linear Network Code, 5th Allerton conference on Communication, Control and Computation, UIUC, IL, Oct 04 8 Congduan Li, Steven Weber, and John M Walh, Multilevel Diverity Coding Sytem: Rate Region, Code, Computation, & Forbidden Minor, IEEE Tranaction on Information Theory, 04, ubmitted 9 Congduan Li, Steven Weber, and John M Walh, Computer Aided Proof for Independent Ditributed Source Coding Problem, The 05 IEEE International Sympoium on Network Coding (NetCod 05), Jun, 05 0 Congduan Li, Steven Weber, and John M Walh, Network Combination Operation Preerving the Sufficiency of Linear Network Code, The 05 IEEE Information Theory Workhop (ITW 05), ubmitted Congduan Li, Steven Weber, and John M Walh, On Multi-ource Network: Enumeration, Rate Region Computation, and Hierarchy, IEEE Tranaction on Information Theory, 05, ready to ubmit C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 7 / 73

72 Selected Reference X Yan, RW Yeung, and Z Zhang (0) An Implicit Characterization of the Achievable Rate Region for Acyclic Multiource Multiink Network Coding IEEE Tranaction on Information Theory 58(9), A Betten, M Braun, H Fripertinger (006) Error-Correcting Linear Code: Claification by Iometry and Application Springer Berlin Heidelberg N Roberton, P Seymour (004) Graph minor xx wagner conjecture Journal of Combinatorial Theory, Serie B, 9(), JG Oxley (0) Matroid Theory Oxford Univerity, 0 C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, 05 7 / 73

73 Q & A Thank you! C Li (ASPITRG & MANL) Ph D Diertation Defene May 9, / 73

Multiterminal Networks: Rate Regions, Codes, Computations, & Forbidden Minors

Multiterminal Networks: Rate Regions, Codes, Computations, & Forbidden Minors Multiterminal etworks: Rate Regions, Codes, Computations, & Forbidden Minors Ph D Thesis Proposal Congduan Li ASPITRG & MAL Drexel University congduanli@gmailcom October 5, 204 C Li (ASPITRG & MAL) Thesis

More information

Symmetry in Network Coding

Symmetry in Network Coding Symmetry in Network Coding Formalization, Graph-theoretic Characterization, and Computation Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia ISIT,

More information

On Multi-source Networks: Enumeration, Rate Region Computation, and Hierarchy

On Multi-source Networks: Enumeration, Rate Region Computation, and Hierarchy On Multi-ource Network: Enumeration, Rate Region Computation, and Hierarchy Congduan Li, Student Member, IEEE, Steven Weber, Senior Member, IEEE, and John MacLaren Walh, Member, IEEE arxiv:5070578v [cit]

More information

Network Combination Operations Preserving the Sufficiency of Linear Network Codes

Network Combination Operations Preserving the Sufficiency of Linear Network Codes Network Combination Operations Preserving the Sufficiency of Linear Network Codes Congduan Li, Steven Weber, John MacLaren Walsh ECE Department, Drexel University Philadelphia, PA 904 Abstract Operations

More information

On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region. Computation, and Hierarchy. A Thesis. Submitted to the Faculty

On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region. Computation, and Hierarchy. A Thesis. Submitted to the Faculty On Multi-source Multi-Sink Hyperedge Networks: Enumeration, Rate Region Computation, and Hierarchy A Thesis Submitted to the Faculty of Drexel University by Congduan Li in partial fulfillment of the requirements

More information

Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions

Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions Exploiting Symmetry in Computing Polyhedral Bounds on Network Coding Rate Regions Jayant Apte John Walsh Department of Electrical and Computer Engineering Drexel University, Philadelphia NetCod, 205 NSF

More information

Multicast Network Coding and Field Sizes

Multicast Network Coding and Field Sizes Multicat Network Coding and Field Size Qifu (Tyler) Sun, Xunrui Yin, Zongpeng Li, and Keping Long Intitute of Advanced Networking Technology and New Service, Univerity of Science and Technology Beijing,

More information

A computational approach for determining rate regions and codes using entropic vector bounds

A computational approach for determining rate regions and codes using entropic vector bounds 1 A computational approach for determining rate regions and codes using entropic vector bounds Congduan Li, John MacLaren Walsh, Steven Weber Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA

More information

Matroid Bounds on the Region of Entropic Vectors

Matroid Bounds on the Region of Entropic Vectors Matroid Bounds on the Region of Entropic Vectors Congduan Li, John MacLaren Walsh, Steven Weber Drexel University, Dept of ECE, Philadelphia, PA 19104, USA congduanli@drexeledu, jwalsh@coedrexeledu, sweber@coedrexeledu

More information

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang

ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION. Xiaoqun Wang Proceeding of the 2008 Winter Simulation Conference S. J. Maon, R. R. Hill, L. Mönch, O. Roe, T. Jefferon, J. W. Fowler ed. ON THE APPROXIMATION ERROR IN HIGH DIMENSIONAL MODEL REPRESENTATION Xiaoqun Wang

More information

Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids

Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids Algorithms for Computing Network Coding Rate Regions via Single Element Extensions of Matroids Jayant Apte, Congduan Li, John MacLaren Walsh Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA

More information

Geometric Measure Theory

Geometric Measure Theory Geometric Meaure Theory Lin, Fall 010 Scribe: Evan Chou Reference: H. Federer, Geometric meaure theory L. Simon, Lecture on geometric meaure theory P. Mittila, Geometry of et and meaure in Euclidean pace

More information

Symmetry in Network Coding

Symmetry in Network Coding Symmetry in Network Coding Jayant Apte, John MacLaren Walsh Drexel University, Dept. of ECE, Philadelphia, PA 19104, USA jsa46@drexel.edu, jwalsh@coe.drexel.edu Abstract We establish connections between

More information

Network Coding on Directed Acyclic Graphs

Network Coding on Directed Acyclic Graphs Network Coding on Directed Acyclic Graphs John MacLaren Walsh, Ph.D. Multiterminal Information Theory, Spring Quarter, 0 Reference These notes are directly derived from Chapter of R. W. Yeung s Information

More information

Characterizing the Region of Entropic Vectors via Information Geometry

Characterizing the Region of Entropic Vectors via Information Geometry Characterizing the Region of Entropic Vectors via Information Geometry John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks

More information

Non-isomorphic Distribution Supports for Calculating Entropic Vectors

Non-isomorphic Distribution Supports for Calculating Entropic Vectors Non-isomorphic Distribution Supports for Calculating Entropic Vectors Yunshu Liu & John MacLaren Walsh Adaptive Signal Processing and Information Theory Research Group Department of Electrical and Computer

More information

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004

Lecture 21. The Lovasz splitting-off lemma Topics in Combinatorial Optimization April 29th, 2004 18.997 Topic in Combinatorial Optimization April 29th, 2004 Lecture 21 Lecturer: Michel X. Goeman Scribe: Mohammad Mahdian 1 The Lovaz plitting-off lemma Lovaz plitting-off lemma tate the following. Theorem

More information

CS 170: Midterm Exam II University of California at Berkeley Department of Electrical Engineering and Computer Sciences Computer Science Division

CS 170: Midterm Exam II University of California at Berkeley Department of Electrical Engineering and Computer Sciences Computer Science Division 1 1 April 000 Demmel / Shewchuk CS 170: Midterm Exam II Univerity of California at Berkeley Department of Electrical Engineering and Computer Science Computer Science Diviion hi i a cloed book, cloed calculator,

More information

Beyond Cut-Set Bounds - The Approximate Capacity of D2D Networks

Beyond Cut-Set Bounds - The Approximate Capacity of D2D Networks Beyond Cut-Set Bound - The Approximate Capacity of DD Network Avik Sengupta Hume Center for National Security and Technology Department of Electrical and Computer Engineering Virginia Tech, Blackburg,

More information

A new computational approach for determining rate regions and optimal codes for coded networks

A new computational approach for determining rate regions and optimal codes for coded networks A new computational approach for determining rate regions and optimal codes for coded networks Congduan Li, Jayant Apte, John MacLaren Walsh, Steven Weber Drexel University, Dept. of ECE, Philadelphia,

More information

Flag-transitive non-symmetric 2-designs with (r, λ) = 1 and alternating socle

Flag-transitive non-symmetric 2-designs with (r, λ) = 1 and alternating socle Flag-tranitive non-ymmetric -deign with (r, λ = 1 and alternating ocle Shenglin Zhou, Yajie Wang School of Mathematic South China Univerity of Technology Guangzhou, Guangdong 510640, P. R. China lzhou@cut.edu.cn

More information

Social Studies 201 Notes for March 18, 2005

Social Studies 201 Notes for March 18, 2005 1 Social Studie 201 Note for March 18, 2005 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

Symmetric Determinantal Representation of Formulas and Weakly Skew Circuits

Symmetric Determinantal Representation of Formulas and Weakly Skew Circuits Contemporary Mathematic Symmetric Determinantal Repreentation of Formula and Weakly Skew Circuit Bruno Grenet, Erich L. Kaltofen, Pacal Koiran, and Natacha Portier Abtract. We deploy algebraic complexity

More information

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS

RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS www.arpapre.com/volume/vol29iue1/ijrras_29_1_01.pdf RELIABILITY OF REPAIRABLE k out of n: F SYSTEM HAVING DISCRETE REPAIR AND FAILURE TIMES DISTRIBUTIONS Sevcan Demir Atalay 1,* & Özge Elmataş Gültekin

More information

Lecture 4 Topic 3: General linear models (GLMs), the fundamentals of the analysis of variance (ANOVA), and completely randomized designs (CRDs)

Lecture 4 Topic 3: General linear models (GLMs), the fundamentals of the analysis of variance (ANOVA), and completely randomized designs (CRDs) Lecture 4 Topic 3: General linear model (GLM), the fundamental of the analyi of variance (ANOVA), and completely randomized deign (CRD) The general linear model One population: An obervation i explained

More information

CHAPTER 6. Estimation

CHAPTER 6. Estimation CHAPTER 6 Etimation Definition. Statitical inference i the procedure by which we reach a concluion about a population on the bai of information contained in a ample drawn from that population. Definition.

More information

Tuning of High-Power Antenna Resonances by Appropriately Reactive Sources

Tuning of High-Power Antenna Resonances by Appropriately Reactive Sources Senor and Simulation Note Note 50 Augut 005 Tuning of High-Power Antenna Reonance by Appropriately Reactive Source Carl E. Baum Univerity of New Mexico Department of Electrical and Computer Engineering

More information

Entropic Vectors: Polyhedral Computation & Information Geometry

Entropic Vectors: Polyhedral Computation & Information Geometry Entropic Vectors: Polyhedral Computation & Information Geometry John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks to

More information

Some Applications of Spanning Trees in K s,t

Some Applications of Spanning Trees in K s,t Some Application of Spanning Tree in K,t L.H. Clark, A.T. Mohr, and T.D. Porter Department of Mathematic Southern Illinoi Univerity Carbondale, IL 62901-4408 tporter@math.iu.edu Abtract We partition the

More information

Chip-firing game and a partial Tutte polynomial for Eulerian digraphs

Chip-firing game and a partial Tutte polynomial for Eulerian digraphs Chip-firing game and a partial Tutte polynomial for Eulerian digraph Kévin Perrot Aix Mareille Univerité, CNRS, LIF UMR 7279 3288 Mareille cedex 9, France. kevin.perrot@lif.univ-mr.fr Trung Van Pham Intitut

More information

Linear System Fundamentals

Linear System Fundamentals Linear Sytem Fundamental MEM 355 Performance Enhancement of Dynamical Sytem Harry G. Kwatny Department of Mechanical Engineering & Mechanic Drexel Univerity Content Sytem Repreentation Stability Concept

More information

IEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation

IEOR 3106: Fall 2013, Professor Whitt Topics for Discussion: Tuesday, November 19 Alternating Renewal Processes and The Renewal Equation IEOR 316: Fall 213, Profeor Whitt Topic for Dicuion: Tueday, November 19 Alternating Renewal Procee and The Renewal Equation 1 Alternating Renewal Procee An alternating renewal proce alternate between

More information

. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables

. Relationships Among Bounds for the Region of Entropic Vectors in Four Variables . Relationships Among Bounds for the Region of Entropic Vectors in Four Variables John MacLaren Walsh and Steven Weber Department of Electrical and Computer Engineering, Drexel University, Philadelphia,

More information

Suggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall

Suggested Answers To Exercises. estimates variability in a sampling distribution of random means. About 68% of means fall Beyond Significance Teting ( nd Edition), Rex B. Kline Suggeted Anwer To Exercie Chapter. The tatitic meaure variability among core at the cae level. In a normal ditribution, about 68% of the core fall

More information

Nonlinear Single-Particle Dynamics in High Energy Accelerators

Nonlinear Single-Particle Dynamics in High Energy Accelerators Nonlinear Single-Particle Dynamic in High Energy Accelerator Part 6: Canonical Perturbation Theory Nonlinear Single-Particle Dynamic in High Energy Accelerator Thi coure conit of eight lecture: 1. Introduction

More information

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281

7.2 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 281 72 INVERSE TRANSFORMS AND TRANSFORMS OF DERIVATIVES 28 and i 2 Show how Euler formula (page 33) can then be ued to deduce the reult a ( a) 2 b 2 {e at co bt} {e at in bt} b ( a) 2 b 2 5 Under what condition

More information

A BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH

A BATCH-ARRIVAL QUEUE WITH MULTIPLE SERVERS AND FUZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Mathematical and Computational Application Vol. 11 No. pp. 181-191 006. Aociation for Scientific Reearch A BATCH-ARRIVA QEE WITH MTIPE SERVERS AND FZZY PARAMETERS: PARAMETRIC PROGRAMMING APPROACH Jau-Chuan

More information

LDPC Convolutional Codes Based on Permutation Polynomials over Integer Rings

LDPC Convolutional Codes Based on Permutation Polynomials over Integer Rings LDPC Convolutional Code Baed on Permutation Polynomial over Integer Ring Marco B. S. Tavare and Gerhard P. Fettwei Vodafone Chair Mobile Communication Sytem, Dreden Univerity of Technology, 01062 Dreden,

More information

By Xiaoquan Wen and Matthew Stephens University of Michigan and University of Chicago

By Xiaoquan Wen and Matthew Stephens University of Michigan and University of Chicago Submitted to the Annal of Applied Statitic SUPPLEMENTARY APPENDIX TO BAYESIAN METHODS FOR GENETIC ASSOCIATION ANALYSIS WITH HETEROGENEOUS SUBGROUPS: FROM META-ANALYSES TO GENE-ENVIRONMENT INTERACTIONS

More information

Problem Set 8 Solutions

Problem Set 8 Solutions Deign and Analyi of Algorithm April 29, 2015 Maachuett Intitute of Technology 6.046J/18.410J Prof. Erik Demaine, Srini Devada, and Nancy Lynch Problem Set 8 Solution Problem Set 8 Solution Thi problem

More information

Codes Correcting Two Deletions

Codes Correcting Two Deletions 1 Code Correcting Two Deletion Ryan Gabry and Frederic Sala Spawar Sytem Center Univerity of California, Lo Angele ryan.gabry@navy.mil fredala@ucla.edu Abtract In thi work, we invetigate the problem of

More information

March 18, 2014 Academic Year 2013/14

March 18, 2014 Academic Year 2013/14 POLITONG - SHANGHAI BASIC AUTOMATIC CONTROL Exam grade March 8, 4 Academic Year 3/4 NAME (Pinyin/Italian)... STUDENT ID Ue only thee page (including the back) for anwer. Do not ue additional heet. Ue of

More information

Avoiding Forbidden Submatrices by Row Deletions

Avoiding Forbidden Submatrices by Row Deletions Avoiding Forbidden Submatrice by Row Deletion Sebatian Wernicke, Jochen Alber, Jen Gramm, Jiong Guo, and Rolf Niedermeier Wilhelm-Schickard-Intitut für Informatik, niverität Tübingen, Sand 13, D-72076

More information

Preemptive scheduling on a small number of hierarchical machines

Preemptive scheduling on a small number of hierarchical machines Available online at www.ciencedirect.com Information and Computation 06 (008) 60 619 www.elevier.com/locate/ic Preemptive cheduling on a mall number of hierarchical machine György Dóa a, Leah Eptein b,

More information

Chapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover

Chapter Landscape of an Optimization Problem. Local Search. Coping With NP-Hardness. Gradient Descent: Vertex Cover Coping With NP-Hardne Chapter 12 Local Search Q Suppoe I need to olve an NP-hard problem What hould I do? A Theory ay you're unlikely to find poly-time algorithm Mut acrifice one of three deired feature

More information

Bogoliubov Transformation in Classical Mechanics

Bogoliubov Transformation in Classical Mechanics Bogoliubov Tranformation in Claical Mechanic Canonical Tranformation Suppoe we have a et of complex canonical variable, {a j }, and would like to conider another et of variable, {b }, b b ({a j }). How

More information

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems

A Constraint Propagation Algorithm for Determining the Stability Margin. The paper addresses the stability margin assessment for linear systems A Contraint Propagation Algorithm for Determining the Stability Margin of Linear Parameter Circuit and Sytem Lubomir Kolev and Simona Filipova-Petrakieva Abtract The paper addree the tability margin aement

More information

Gain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays

Gain and Phase Margins Based Delay Dependent Stability Analysis of Two- Area LFC System with Communication Delays Gain and Phae Margin Baed Delay Dependent Stability Analyi of Two- Area LFC Sytem with Communication Delay Şahin Sönmez and Saffet Ayaun Department of Electrical Engineering, Niğde Ömer Halidemir Univerity,

More information

Emittance limitations due to collective effects for the TOTEM beams

Emittance limitations due to collective effects for the TOTEM beams LHC Project ote 45 June 0, 004 Elia.Metral@cern.ch Andre.Verdier@cern.ch Emittance limitation due to collective effect for the TOTEM beam E. Métral and A. Verdier, AB-ABP, CER Keyword: TOTEM, collective

More information

Some Sets of GCF ϵ Expansions Whose Parameter ϵ Fetch the Marginal Value

Some Sets of GCF ϵ Expansions Whose Parameter ϵ Fetch the Marginal Value Journal of Mathematical Reearch with Application May, 205, Vol 35, No 3, pp 256 262 DOI:03770/jin:2095-26520503002 Http://jmredluteducn Some Set of GCF ϵ Expanion Whoe Parameter ϵ Fetch the Marginal Value

More information

Symmetries in the Entropy Space

Symmetries in the Entropy Space Symmetries in the Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Abstract This paper investigates when Shannon-type inequalities completely characterize the part of the closure of the entropy

More information

Rate region for a class of delay mitigating codes and P2P networks

Rate region for a class of delay mitigating codes and P2P networks Rate region for a class of delay mitigating codes and P2P networks Steven Weber, Congduan Li, John MacLaren Walsh Drexel University, Dept of ECE, Philadelphia, PA 19104 Abstract This paper identifies the

More information

SOLUTIONS TO ALGEBRAIC GEOMETRY AND ARITHMETIC CURVES BY QING LIU. I will collect my solutions to some of the exercises in this book in this document.

SOLUTIONS TO ALGEBRAIC GEOMETRY AND ARITHMETIC CURVES BY QING LIU. I will collect my solutions to some of the exercises in this book in this document. SOLUTIONS TO ALGEBRAIC GEOMETRY AND ARITHMETIC CURVES BY QING LIU CİHAN BAHRAN I will collect my olution to ome of the exercie in thi book in thi document. Section 2.1 1. Let A = k[[t ]] be the ring of

More information

Social Studies 201 Notes for November 14, 2003

Social Studies 201 Notes for November 14, 2003 1 Social Studie 201 Note for November 14, 2003 Etimation of a mean, mall ample ize Section 8.4, p. 501. When a reearcher ha only a mall ample ize available, the central limit theorem doe not apply to the

More information

C up (E) C low (E) E 2 E 1 E 0

C up (E) C low (E) E 2 E 1 E 0 Spreading in lock-fading hannel. Muriel Médard David N.. Te medardmit.edu Maachuett Intitute of Technoy dteeec.berkeley.edu Univerity of alifornia at erkeley btract We conider wideband fading channel which

More information

3.1 The Revised Simplex Algorithm. 3 Computational considerations. Thus, we work with the following tableau. Basic observations = CARRY. ... m.

3.1 The Revised Simplex Algorithm. 3 Computational considerations. Thus, we work with the following tableau. Basic observations = CARRY. ... m. 3 Computational conideration In what follow, we analyze the complexity of the Simplex algorithm more in detail For thi purpoe, we focu on the update proce in each iteration of thi procedure Clearly, ince,

More information

White Rose Research Online URL for this paper: Version: Accepted Version

White Rose Research Online URL for this paper:   Version: Accepted Version Thi i a repoitory copy of Identification of nonlinear ytem with non-peritent excitation uing an iterative forward orthogonal leat quare regreion algorithm. White Roe Reearch Online URL for thi paper: http://eprint.whiteroe.ac.uk/107314/

More information

CONGESTION control is a key functionality in modern

CONGESTION control is a key functionality in modern IEEE TRANSACTIONS ON INFORMATION TEORY, VOL. X, NO. X, XXXXXXX 2008 On the Connection-Level Stability of Congetion-Controlled Communication Network Xiaojun Lin, Member, IEEE, Ne B. Shroff, Fellow, IEEE,

More information

EC381/MN308 Probability and Some Statistics. Lecture 7 - Outline. Chapter Cumulative Distribution Function (CDF) Continuous Random Variables

EC381/MN308 Probability and Some Statistics. Lecture 7 - Outline. Chapter Cumulative Distribution Function (CDF) Continuous Random Variables EC38/MN38 Probability and Some Statitic Yanni Pachalidi yannip@bu.edu, http://ionia.bu.edu/ Lecture 7 - Outline. Continuou Random Variable Dept. of Manufacturing Engineering Dept. of Electrical and Computer

More information

Partition Symmetrical Entropy Functions*

Partition Symmetrical Entropy Functions* Partition Symmetrical Entropy Functions* Jayant Apte ASPITRG *Chen, Qi; Yeung, Raymond W., Partition Symmetrical Entropy Functions, arxiv:1407.7405v1 [cs.it] Outline Sneak Peak Background: Basic facts

More information

The Impact of Imperfect Scheduling on Cross-Layer Rate. Control in Multihop Wireless Networks

The Impact of Imperfect Scheduling on Cross-Layer Rate. Control in Multihop Wireless Networks The mpact of mperfect Scheduling on Cro-Layer Rate Control in Multihop Wirele Network Xiaojun Lin and Ne B. Shroff Center for Wirele Sytem and Application (CWSA) School of Electrical and Computer Engineering,

More information

Signaling over MIMO Multi-Base Systems: Combination of Multi-Access and Broadcast Schemes

Signaling over MIMO Multi-Base Systems: Combination of Multi-Access and Broadcast Schemes Signaling over MIMO Multi-Bae Sytem: Combination of Multi-Acce and Broadcat Scheme Mohammad Ali Maddah-Ali Abolfazl S. Motahari and Amir K. Khandani Coding & Signal Tranmiion Laboratory (www.ct.uwaterloo.ca)

More information

Jul 4, 2005 turbo_code_primer Revision 0.0. Turbo Code Primer

Jul 4, 2005 turbo_code_primer Revision 0.0. Turbo Code Primer Jul 4, 5 turbo_code_primer Reviion. Turbo Code Primer. Introduction Thi document give a quick tutorial on MAP baed turbo coder. Section develop the background theory. Section work through a imple numerical

More information

THE SPLITTING SUBSPACE CONJECTURE

THE SPLITTING SUBSPACE CONJECTURE THE SPLITTING SUBSPAE ONJETURE ERI HEN AND DENNIS TSENG Abtract We anwer a uetion by Niederreiter concerning the enumeration of a cla of ubpace of finite dimenional vector pace over finite field by proving

More information

(3) A bilinear map B : S(R n ) S(R m ) B is continuous (for the product topology) if and only if there exist C, N and M such that

(3) A bilinear map B : S(R n ) S(R m ) B is continuous (for the product topology) if and only if there exist C, N and M such that The material here can be found in Hörmander Volume 1, Chapter VII but he ha already done almot all of ditribution theory by thi point(!) Johi and Friedlander Chapter 8. Recall that S( ) i a complete metric

More information

Multicolor Sunflowers

Multicolor Sunflowers Multicolor Sunflower Dhruv Mubayi Lujia Wang October 19, 2017 Abtract A unflower i a collection of ditinct et uch that the interection of any two of them i the ame a the common interection C of all of

More information

Chapter 4. The Laplace Transform Method

Chapter 4. The Laplace Transform Method Chapter 4. The Laplace Tranform Method The Laplace Tranform i a tranformation, meaning that it change a function into a new function. Actually, it i a linear tranformation, becaue it convert a linear combination

More information

Convex Hulls of Curves Sam Burton

Convex Hulls of Curves Sam Burton Convex Hull of Curve Sam Burton 1 Introduction Thi paper will primarily be concerned with determining the face of convex hull of curve of the form C = {(t, t a, t b ) t [ 1, 1]}, a < b N in R 3. We hall

More information

List coloring hypergraphs

List coloring hypergraphs Lit coloring hypergraph Penny Haxell Jacque Vertraete Department of Combinatoric and Optimization Univerity of Waterloo Waterloo, Ontario, Canada pehaxell@uwaterloo.ca Department of Mathematic Univerity

More information

The simplex method is strongly polynomial for deterministic Markov decision processes

The simplex method is strongly polynomial for deterministic Markov decision processes The implex method i trongly polynomial for determinitic Markov deciion procee Ian Pot Yinyu Ye May 31, 2013 Abtract We prove that the implex method with the highet gain/mot-negative-reduced cot pivoting

More information

Math 273 Solutions to Review Problems for Exam 1

Math 273 Solutions to Review Problems for Exam 1 Math 7 Solution to Review Problem for Exam True or Fale? Circle ONE anwer for each Hint: For effective tudy, explain why if true and give a counterexample if fale (a) T or F : If a b and b c, then a c

More information

Unavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes

Unavoidable Cycles in Polynomial-Based Time-Invariant LDPC Convolutional Codes European Wirele, April 7-9,, Vienna, Autria ISBN 978--87-4-9 VE VERLAG GMBH Unavoidable Cycle in Polynomial-Baed Time-Invariant LPC Convolutional Code Hua Zhou and Norbert Goertz Intitute of Telecommunication

More information

THE dynamics of traffic over wireless networks has undergone

THE dynamics of traffic over wireless networks has undergone 940 IEEE TRASACTIOS O COUICATIOS, VO. 65, O. 5, AY 207 Improved Approximation of Storage-Rate Tradeoff for Caching With ultiple Demand Avik Sengupta, ember, IEEE, and Ravi Tandon, Senior ember, IEEE Abtract

More information

On the Stability Region of Congestion Control

On the Stability Region of Congestion Control On the Stability Region of Congetion Control Xiaojun Lin and Ne B. Shroff School of Electrical and Computer Engineering Purdue Univerity, Wet Lafayette, IN 47906 {linx,hroff}@ecn.purdue.edu Abtract It

More information

arxiv: v1 [math.mg] 25 Aug 2011

arxiv: v1 [math.mg] 25 Aug 2011 ABSORBING ANGLES, STEINER MINIMAL TREES, AND ANTIPODALITY HORST MARTINI, KONRAD J. SWANEPOEL, AND P. OLOFF DE WET arxiv:08.5046v [math.mg] 25 Aug 20 Abtract. We give a new proof that a tar {op i : i =,...,

More information

TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL

TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL GLASNIK MATEMATIČKI Vol. 38583, 73 84 TRIPLE SOLUTIONS FOR THE ONE-DIMENSIONAL p-laplacian Haihen Lü, Donal O Regan and Ravi P. Agarwal Academy of Mathematic and Sytem Science, Beijing, China, National

More information

Lecture 8: Period Finding: Simon s Problem over Z N

Lecture 8: Period Finding: Simon s Problem over Z N Quantum Computation (CMU 8-859BB, Fall 205) Lecture 8: Period Finding: Simon Problem over Z October 5, 205 Lecturer: John Wright Scribe: icola Rech Problem A mentioned previouly, period finding i a rephraing

More information

A CATEGORICAL CONSTRUCTION OF MINIMAL MODEL

A CATEGORICAL CONSTRUCTION OF MINIMAL MODEL A ATEGORIAL ONSTRUTION OF MINIMAL MODEL A. Behera, S. B. houdhury M. Routaray Department of Mathematic National Intitute of Technology ROURKELA - 769008 (India) abehera@nitrkl.ac.in 512ma6009@nitrkl.ac.in

More information

arxiv: v1 [quant-ph] 22 Oct 2010

arxiv: v1 [quant-ph] 22 Oct 2010 The extenion problem for partial Boolean tructure in Quantum Mechanic Cotantino Budroni 1 and Giovanni Morchio 1, 2 1) Dipartimento di Fiica, Univerità di Pia, Italy 2) INFN, Sezione di Pia, Italy Alternative

More information

Physics 741 Graduate Quantum Mechanics 1 Solutions to Final Exam, Fall 2014

Physics 741 Graduate Quantum Mechanics 1 Solutions to Final Exam, Fall 2014 Phyic 7 Graduate Quantum Mechanic Solution to inal Eam all 0 Each quetion i worth 5 point with point for each part marked eparately Some poibly ueful formula appear at the end of the tet In four dimenion

More information

Given the following circuit with unknown initial capacitor voltage v(0): X(s) Immediately, we know that the transfer function H(s) is

Given the following circuit with unknown initial capacitor voltage v(0): X(s) Immediately, we know that the transfer function H(s) is EE 4G Note: Chapter 6 Intructor: Cheung More about ZSR and ZIR. Finding unknown initial condition: Given the following circuit with unknown initial capacitor voltage v0: F v0/ / Input xt 0Ω Output yt -

More information

c n b n 0. c k 0 x b n < 1 b k b n = 0. } of integers between 0 and b 1 such that x = b k. b k c k c k

c n b n 0. c k 0 x b n < 1 b k b n = 0. } of integers between 0 and b 1 such that x = b k. b k c k c k 1. Exitence Let x (0, 1). Define c k inductively. Suppoe c 1,..., c k 1 are already defined. We let c k be the leat integer uch that x k An eay proof by induction give that and for all k. Therefore c n

More information

February 5, :53 WSPC/INSTRUCTION FILE Mild solution for quasilinear pde

February 5, :53 WSPC/INSTRUCTION FILE Mild solution for quasilinear pde February 5, 14 1:53 WSPC/INSTRUCTION FILE Mild olution for quailinear pde Infinite Dimenional Analyi, Quantum Probability and Related Topic c World Scientific Publihing Company STOCHASTIC QUASI-LINEAR

More information

Lecture 7: Testing Distributions

Lecture 7: Testing Distributions CSE 5: Sublinear (and Streaming) Algorithm Spring 014 Lecture 7: Teting Ditribution April 1, 014 Lecturer: Paul Beame Scribe: Paul Beame 1 Teting Uniformity of Ditribution We return today to property teting

More information

Optimal Coordination of Samples in Business Surveys

Optimal Coordination of Samples in Business Surveys Paper preented at the ICES-III, June 8-, 007, Montreal, Quebec, Canada Optimal Coordination of Sample in Buine Survey enka Mach, Ioana Şchiopu-Kratina, Philip T Rei, Jean-Marc Fillion Statitic Canada New

More information

Symmetries in Entropy Space

Symmetries in Entropy Space 1 Symmetries in Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Department of Electrical and Computer Engineering Drexel University Philadelphia, PA jwalsh@ece.drexel.edu Thanks to NSF CCF-1421828

More information

MULTIPLE POSITIVE SOLUTIONS OF BOUNDARY VALUE PROBLEMS FOR P-LAPLACIAN IMPULSIVE DYNAMIC EQUATIONS ON TIME SCALES

MULTIPLE POSITIVE SOLUTIONS OF BOUNDARY VALUE PROBLEMS FOR P-LAPLACIAN IMPULSIVE DYNAMIC EQUATIONS ON TIME SCALES Fixed Point Theory, 5(24, No. 2, 475-486 http://www.math.ubbcluj.ro/ nodeacj/fptcj.html MULTIPLE POSITIVE SOLUTIONS OF BOUNDARY VALUE PROBLEMS FOR P-LAPLACIAN IMPULSIVE DYNAMIC EQUATIONS ON TIME SCALES

More information

Utility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach

Utility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach Utility Proportional Fair Bandwidth Allocation: An Optimization Oriented Approach 61 Tobia Hark Konrad-Zue-Zentrum für Informationtechnik Berlin (ZIB), Department Optimization, Takutr. 7, 14195 Berlin,

More information

STOCHASTIC GENERALIZED TRANSPORTATION PROBLEM WITH DISCRETE DISTRIBUTION OF DEMAND

STOCHASTIC GENERALIZED TRANSPORTATION PROBLEM WITH DISCRETE DISTRIBUTION OF DEMAND OPERATIONS RESEARCH AND DECISIONS No. 4 203 DOI: 0.5277/ord30402 Marcin ANHOLCER STOCHASTIC GENERALIZED TRANSPORTATION PROBLEM WITH DISCRETE DISTRIBUTION OF DEMAND The generalized tranportation problem

More information

Electronic Theses and Dissertations

Electronic Theses and Dissertations Eat Tenneee State Univerity Digital Common @ Eat Tenneee State Univerity Electronic Thee and Diertation Student Work 5-208 Vector Partition Jennifer French Eat Tenneee State Univerity Follow thi and additional

More information

Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates

Fast explicit formulae for genus 2 hyperelliptic curves using projective coordinates Fat explicit formulae for genu hyperelliptic curve uing projective coordinate Thoma Wollinger Ecrypt embedded ecurity GmbH twollinger@ecryptde Abtract Thi contribution propoe a modification of method of

More information

Myriad of applications

Myriad of applications Shortet Path Myriad of application Finding hortet ditance between location (Google map, etc.) Internet router protocol: OSPF (Open Shortet Path Firt) i ued to find the hortet path to interchange package

More information

UNIT 15 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS

UNIT 15 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS UNIT 1 RELIABILITY EVALUATION OF k-out-of-n AND STANDBY SYSTEMS Structure 1.1 Introduction Objective 1.2 Redundancy 1.3 Reliability of k-out-of-n Sytem 1.4 Reliability of Standby Sytem 1. Summary 1.6 Solution/Anwer

More information

Equivalent Strain in Simple Shear Deformations

Equivalent Strain in Simple Shear Deformations Equivalent Strain in Simple Shear Deformation Yan Beygelzimer Donetk Intitute of Phyic and Engineering The National Academy of Science of Ukraine Abtract We how that imple hear and pure hear form two group

More information

THE HAUSDORFF MEASURE OF SIERPINSKI CARPETS BASING ON REGULAR PENTAGON

THE HAUSDORFF MEASURE OF SIERPINSKI CARPETS BASING ON REGULAR PENTAGON Anal. Theory Appl. Vol. 28, No. (202), 27 37 THE HAUSDORFF MEASURE OF SIERPINSKI CARPETS BASING ON REGULAR PENTAGON Chaoyi Zeng, Dehui Yuan (Hanhan Normal Univerity, China) Shaoyuan Xu (Gannan Normal Univerity,

More information

One Class of Splitting Iterative Schemes

One Class of Splitting Iterative Schemes One Cla of Splitting Iterative Scheme v Ciegi and V. Pakalnytė Vilniu Gedimina Technical Univerity Saulėtekio al. 11, 2054, Vilniu, Lithuania rc@fm.vtu.lt Abtract. Thi paper deal with the tability analyi

More information

LINEAR ALGEBRA METHOD IN COMBINATORICS. Theorem 1.1 (Oddtown theorem). In a town of n citizens, no more than n clubs can be formed under the rules

LINEAR ALGEBRA METHOD IN COMBINATORICS. Theorem 1.1 (Oddtown theorem). In a town of n citizens, no more than n clubs can be formed under the rules LINEAR ALGEBRA METHOD IN COMBINATORICS 1 Warming-up example Theorem 11 (Oddtown theorem) In a town of n citizen, no more tha club can be formed under the rule each club have an odd number of member each

More information

List Coloring Graphs

List Coloring Graphs Lit Coloring Graph February 6, 004 LIST COLORINGS AND CHOICE NUMBER Thomaen Long Grotzch girth 5 verion Thomaen Long Let G be a connected planar graph of girth at leat 5. Let A be a et of vertice in G

More information

Weakly Krull Inside Factorial Domains

Weakly Krull Inside Factorial Domains Weakly Krull Inide Factorial Domain D. D. ANDERSON, The Univerity of Iowa, Department of Mathematic, Iowa City, Iowa 52242, dan-anderon@uiowa.edu MUHAMMED ZAFRULLAH, Idaho State Univerity, Department of

More information

Capacity Region of the Permutation Channel

Capacity Region of the Permutation Channel Capacity Region of the Permutation Channel John MacLaren Walsh and Steven Weber Abstract We discuss the capacity region of a degraded broadcast channel (DBC) formed from a channel that randomly permutes

More information