On the Locality of Codeword Symbols

Size: px
Start display at page:

Download "On the Locality of Codeword Symbols"

Transcription

1 On the Locality of Codewod Symbols Paikshit Gopalan Micosoft Reseach Cheng Huang Micosoft Reseach Segey Yekhanin Micosoft Reseach Huseyin Simitci Micosoft Copoation Abstact Conside a linea [n, k, d] q code C. We say that that i-th coodinate of C has locality, if the value at this coodinate can be ecoveed fom accessing some othe coodinates of C. Data stoage applications equie codes with small edundancy, low locality fo infomation coodinates, lage distance, and low locality fo paity coodinates. In this pape we cay out an in-depth study of the elations between these paametes. We establish a tight bound fo the edundancy n k in tems of the message length, the distance, and the locality of infomation coodinates. We efe to codes attaining the bound as optimal. We pove some stuctue theoems about optimal codes, which ae paticulaly stong fo small distances. This gives a faily complete pictue of the tadeoffs between codewods length, wost-case distance and locality of infomation symbols. We then conside the locality of paity check symbols and easue coection beyond wost case distance fo optimal codes. Using ou stuctue theoem, we obtain a tight bound fo the locality of paity symbols possible in such codes fo a boad class of paamete settings. We pove that thee is a tadeoff between having good locality fo paity checks and the ability to coect easues beyond the minimum distance. 1 Intoduction Moden lage scale distibuted stoage systems such as data centes stoe data in a edundant fom to ensue eliability against node (e.g., individual machine) failues. The simplest solution hee is the staightfowad eplication of data packets acoss diffeent nodes. Altenative solution involves easue coding: the data is patitioned into k infomation packets. Subsequently, using an easue code, n k paity packets ae geneated and all n packets ae stoed in diffeent nodes. Using easues codes instead of eplication may lead to damatic impovements both in tems of edundancy and eliability. Howeve to ealize these impovements one has to addess the challenge of maintaining an easue encoded epesentation. In paticula, when a node stoing some packet fails, one has to be able to quickly econstuct the lost packet in ode to keep the data eadily available fo the uses and to maintain the same level of edundancy in the system. We say that a cetain packet has locality if it can be ecoveed fom accessing only othe packets. One way to ensue fast econstuction is to use easue codes whee all packets have low locality k. Having small value of locality is paticulaly impotant fo infomation packets. These consideations lead us to intoduce the concept of an (, d)-code, i.e., a linea code of distance d, whee all infomation symbols have locality at most. Stoage system based on (, d)-codes 1

2 povide fast ecovey of infomation packets fom a single node failue (typical scenaio), and ensue that no data is lost even if up to d 1 nodes fail simultaneously. One specific class of (, d)-codes called Pyamid Codes has been consideed in [5]. Pyamid codes can be obtained fom any systematic Maxmimum Distance Sepeable (MDS) codes of distance d, such as Reed Solomon codes. Assume fo simplicity that the fist paity check symbol is the sum k x i of the infomation symbols. Replace this with k paity checks each of size at most on disjoint infomation symbols. It is not had to see that the esulting code C has infomation locality and distance d, while the edundancy of the code C is given by k n k = + d 2. (1) 1.1 Ou esults In this pape we cay out an in-depth study of the elations between edundancy, easue-coection and symbol locality in linea codes. Ou fist esult is a tight bound fo the edundancy in tems of the message length, the distance, and the infomation locality. We show that in any [n, k, d] q code of infomation locality, k n k + d 2. (2) We efe to codes attaining the bound above as optimal. Pyamid codes ae one such family of codes. The bound (2) is of paticula inteest in the case when k, since othewise one can impove the code by inceasing the dimension while maintaining the (, d)-popety and edundancy intact. A close examination of ou lowe bound gives a stuctue theoem fo optimal codes when k. This theoem is especially stong when d < + 3, it fixes the suppot of the paity check matix, the only feedom is in the choice of coefficients. We also show that the condition < d + 3 is in fact necessay fo such a stong statement to hold. We then tun ou attention to the locality of paity symbols. We pove tight bounds on the locality of paity symbols in optimal codes assuming d < + 3. In paticula we establish the existence of optimal (, d)-codes that ae significantly bette than pyamid codes with espect to locality of paity symbols. Ou codes ae explicit in the case of d = 4, and non-explicit othewise. The lowe bound is poved using the stuctue theoem. Finally, we elax the conditions d < + 3 and k and exhibit one specific family of optimal codes that gives locality fo all symbols. Ou last esult concens easue coection beyond the wost case distance of the code. Assume that we ae given a bipatite gaph which descibes the suppots of the paity check symbols. What choice of coefficients will maximize the set of easue pattens that can be coected by such a code? In [5] the authos gave a necessay condition fo an easue patten to be coectable, and showed that ove sufficiently lage fields, this condition is also sufficient. They called such codes Genealized Pyamid codes. We show that such codes cannot have any non-tivial paity locality; thus establishing a tadeoff between paity locality and easue coection beyond the wost case distance. 1.2 Related wok Thee ae two classes of easue codes poviding fast ecovey pocedues fo individual codewod coodinates (packets) in the liteatue. 2

3 Regeneating codes. These codes wee intoduced in [2] and developed futhe in e.g., [8, 1]. See [3] fo a suvey. One cucial idea behind egeneating codes is that of sub-packetization. Each packet is composed of few sub-packets, and when a node stoing a packet fails all (o most of) othe nodes send in some of thei sub-packets fo ecovey. Efficiency of the ecovey pocedue is measued in tems of the oveall bandwidth consumption, i.e., the total size of sub-packets equied to ecove fom a single failue. Somehow supisingly egeneating codes can in many cases achieve a athe significant eduction in bandwidth, compaed with codes that do not employ sub-packetization. Ou expeience with data centes howeve suggests that in pactice thee is a consideable ovehead elated to accessing exta stoage nodes. Theefoe pue bandwidth consumption is not necessaily the ight single measue of the ecovey time. In paticula, coding solutions that do not ely on sub-packetization and thus access less nodes (but download moe data) ae sometimes moe attactive. Locally decodable codes. These codes wee intoduced in [6] and developed futhe in e.g., [10, 4, 7]. See [11] fo a suvey. An -quey Locally Decodable Code (LDC) encodes messages in such a way that one can ecove any message symbol by accessing only codewod symbols even afte some abitaily chosen (say) 10% of codewod coodinates ae eased. Thus LDCs ae in fact vey simila to (, d)-codes addessed in the cuent pape, with an impotant distinction that LDCs allow fo local ecovey even afte a vey lage numbe of symbols is eased, while (, d)-codes povide locality only afte a single easue. Not supisingly locally decodable codes equie substantially lage codewod lengths then (, d)-codes. 1.3 Oganization In section 3 we establish the lowe bound fo edundancy of (, d)-codes and obtain a stuctual chaacteization of optimal codes, i.e., codes attaining the bound. In section 4 we stengthen the stuctual chaacteization fo optimal codes with d < + 3 and show that any such code has to be a canonical code. In section 5 we pove matching lowe and uppe bounds on the locality of paity symbols in canonical codes. Ou code constuction is not explicit and equies the undelying field to be faily lage. In the special case of codes of distance d = 4, we come up with an explicit family that does not need a lage field. In section 6 we pesent one optimal family of non-canonical codes that gives unifom locality fo all codewod symbols. Finally, in section 7 we study easue coection beyond the wost case distance and pove that systematic codes coecting the maximal numbe of easue pattens (conditioned on the suppot stuctue of the geneato matix) cannot have any non-tivial locality fo paity symbols. 2 Peliminaies We use standad mathematical notation Fo an intege t, [t] = {1,..., t}; Fo a vecto x, Supp(x) denotes the set {i : x i 0}; Fo a vecto x, wt(x) = Supp(x) denotes the Hamming weight; Fo a vecto x and an intege i, x(i) denotes the i-th coodinate of x; Fo sets A and B, A B denotes the disjoint union. 3

4 Let C be an [n, k, d] q linea code. Assume that the encoding of x F k q is by the vecto C(x) = (c 1 x, c 2 x,..., c n x) F n q. (3) Thus the code C is specified by the set of n points C = {c 1,..., c n } F k q. The set of points must have full ank fo C to have k infomation symbols. It is well known that the distance popety is captued by the following condition (e.g., [9, theoem 1.1.6]). Fact 1. The code C has distance d if and only if fo evey S C such that Rank(S) k 1, S n d. (4) In othe wods, evey hypeplane though the oigin misses at least d points fom C. In this wok, we ae inteested in the ecovey cost of each symbol in the code fom a single easue. Definition 2. Fo c i C, we define Loc(c i ) to be the smallest intege fo which thee exists R C of cadinality such that c i = j R λ j c j. We futhe define Loc(C) = max i [n] Loc(c i ). Note that Loc(c i ) k, povided d 2, since this guaantees that C \ {c i } has full dimension. We will be inteested in (systematic) codes which guaantee locality fo the infomation symbols. Definition 3. We say that a code C has infomation locality if thee exists I C of full ank such that Loc(c) fo all c I. Fo such a code we can choose I as ou basis fo F k q and patition C into I = {e 1,..., e k } coesponding to infomation symbols and C \ I = {c k+1,..., c n } coesponding to paity check symbols. Thus the code C can be made systematic. Definition 4. A code C is an (, d)-code if it has infomation locality and distance d. Fo any code C, the set of all linea dependencies of length at most + 1 on points in C defines a natual hypegaph H (V, E) whose vetex set V = [n] is in one-to-one coespondence to points in C. Thee is an edge coesponding to set S V if S + 1 λ i c i = 0, λ i 0. i S Equivalently S [n] is an edge in H if it suppots a codewod in C of weight at most + 1. Since will usually be clea fom the context, we will just say H(V, E). A code C has locality if thee ae no isolated vetices in H. A code C has infomation locality if the set points coesponding to vetices that ae incident to some edge in H has full ank. We conclude this section pesenting one specific class of (, d)-codes has been consideed in [5]: Pyamid codes. In what follows the dot poduct of vectos p and x is denoted by p x. To define an (, d) pyamid code C encoding messages of dimension k we fix an abitay linea systematic [k + d 1, k, d] q code E. Clealy, E is MDS. Let E(x) = (x, p 0 x, p 1 x,..., p d 2 x). 4

5 We patition the set [k] into t = k subsets of size up to, [k] = i [t] S i. Fo a k-dimensional vecto x and a set S [k] let x S denote the S -dimensional estiction of x to coodinates in the set S. We define the systematic code C by C(x) = (x, (p 0 S1 x S1 ),..., (p 0 St x St ), p 1 x,..., p d 2 x). It is not had to see that the code C has distance d. To see that all infomation symbols and the fist k paity symbols of C have locality one needs to obseve that (since E is an MDS code) the vecto p 0 has full Hamming weight. The last d 2 paity symbols of C may have locality as lage as k. 3 Lowe Bound and the Stuctue Theoem We ae inteested in systematic codes with infomation locality. Given k,, d ou goal is to minimize the codewod length n. Since the code is systematic, this amounts to minimizing the edundancy h = n k. Pyamid codes have h = k + d 2. Ou goal is to pove a matching lowe bound. Lowe bounds of k/ and d 1 ae easy to show, just fom the locality and distance constaints espectively. The had pat is to sum them up. Theoem 5. Fo any [n, k, d] q linea code with infomation locality, k n k + d 2. (5) Poof. Ou lowe bound poceeds by constucting a lage set S C whee Rank(S) k 1 and then applying Fact 1. The set S is constucted by the following algoithm: 1. Let i = 1, S 0 = {}. 2. While Rank(S i 1 ) k 2: 3. Pick c i C \ S i 1 such that thee is a hypeedge T i in H containing c i. 4. If Rank(S i 1 T i ) < k, set S i = S i 1 T i. 5. Else pick T T i so that Rank(S i 1 T ) = k 1 and set S i = S i 1 T. 6. Incement i. In Line 3, since Rank(S i 1 ) k 2 and Rank(I) = k, thee exists c i as desied. Let l denote the numbe of times the set S i is gown. Obseve that the final set S l has Rank(S l ) = k 1. We now lowe bound S. We define s i, t i to measue the incease in the size and ank of S i espectively: s i = S i S i 1, S l = l s i, t i = Rank(S i ) Rank(S i 1 ), Rank(S l ) = l t i = k 1. We analyze two cases, depending on whethe the condition Rank(S i 1 T i ) = k is eve eached. Obseve that this condition can only be eached when i = l. Case 1: Assume Rank(S i 1 T i ) k 1 thoughout. In each step we add s i + 1 vectos. Note that these vectos ae always such that some nontivial linea combination of them yields a (possibly zeo) vecto in Span(S i 1 ). Theefoe we have t i s i 1. So thee ae l k 1 steps in all. Thus l l k 1 S = s i (t i + 1) k 1 + (6) 5

6 Note that k 1 + k 1 k + k 2 with equality holding wheneve = 1 o k 1 mod. Case 2: In the last step, we hit the condition Rank(S l 1 T l ) = k. Since the ank only inceases by pe step, l k. Fo i l 1, we add a set Ti of s i + 1 vectos. Again note that these vectos ae always such that some nontivial linea combination of them yields a (possibly zeo) vecto in Span(S i 1 ). Theefoe Rank(S i ) gows by t i whee t i s i 1. In Step l, we add T T l to S. This inceases Rank(S) by t l 1 (since Rank(S) k 2 at the stat) and S by s l t l. Thus S = l l 1 s i (t i + 1) + t l = k + The conclusion now follows fom Fact 1 which implies that S n d. k 2. (7) Definition 6. We say that an (, d)-code C is optimal if its paametes satisfy (5) with equality. Pyamid codes [5] yield optimal (, d)-codes fo all values of, d, and k when the alphabet q is sufficiently lage. The poof of theoem 5 eveals infomation about the stuctue of optimal (, d)-codes. We think of the algoithm as attempting to maximize S l Rank(S) = s i l t. i With this in mind, at step i we can choose c i such that s i t i is maximized. An optimal length code should yield the same value fo S fo this (o any) choice of c i. This obsevation yields an insight into the stuctue of local dependencies in optimal codes, as given by the following stuctue theoem. Theoem 7. Let C be an [n, k, d] q code with infomation locality. Suppose k, < k, and n = k + k + d 2; (8) then hypeedges in the hypegaph H(V, E) ae disjoint and each has size exactly + 1. Poof. We execute the algoithm pesented in the poof of theoem 5 to obtain a set S and sequences {s i } and {t i }. We conside the case of = 1 sepaately. Since all t i 1 we fall into Case 1. Combining fomulas (6), (4) and (8) we get S = l s i = l t i + l = 2k 2. Combining this with l t i = k 1 we conclude that l = k 1, all s i equal 2, and all t i equal 1. The latte two conditions peclude the existence of hypeedges of size 1 o intesecting edges in H. We now poceed to the case of > 1. When k, the bound in equation (6) is lage than that in equation (7). Thus, we must be in Case 2. Combining fomulas (7), (4) and (8) we get S = l s i = l t i + l 1 = k + k 2. 6

7 Obseve that l t i = k 1 and thus l = k. Togethe with the constaint t i, this implies that t j = 1 fo some j [l] and t i = fo i j. We claim that in fact j = l. Indeed, if j < l, we would have i l 1 t i = k 1 and t l =, hence we would be in Case 1. Now assume that thee is an edge T with T. By adding this edge to S at the fist step, we would get t 1 1. Next assume that T 1 T 2 is non-empty. Obseve that this implies Rank(T 1 T 2 ) < 2. So if we add edges T 1 and T 2 to S, we have t 1 + t Clealy these conditions lead to contadiction if l = k 3. In fact, they also give a contadiction fo k = 2, since they put us in Case 1. 4 Canonical Codes The stuctue theoem implies then when d is sufficiently small (which in ou expeience is the setting of inteest in most data stoage applications), optimal (, d)-codes have athe igid stuctue. We fomalize this by defining the notion of a canonical code. Definition 8. Let C be a systematic [n, k, d] q code with infomation locality whee k, < k, and n = k + k + d 2. We say that C is canonical if the set C can patitioned into thee goups C = I C C such that: 1. Points I = {e 1,..., e k }. 2. Points C = {c 1,..., c k/ } whee wt(c i ) =. The suppots of these vectos ae disjoint sets which patition [k]. 3. Points C = {c 1,..., c d 2 } whee wt(c i ) = k. Clealy any canonical code is systematic and has infomation locality. The distance popety equies a suitable choice of vectos {c } and {c }. Pyamid codes [5] ae an example of canonical codes. We note that since < k, thee is always a distinction between symbols {c } and {c }. Theoem 9. Assume that d < + 3, < k, and k. Let n = k + k + d 2. Evey systematic [n, k, d] q code with infomation locality is a canonical code. Poof. Let C be a systematic [n, k, d] code with infomation locality. We stat by showing that the hypegaph H(V, E) has k edges. Since C is systematic, we know that I = {e 1,..., e k } C. By theoem 7, H(V, E) consists of m disjoint, ( + 1)-egula edges and evey vetex in I appeas in some edge. But since the points in I ae linealy independent, evey edges involves at least one vetex fom C \ I and at most fom I. So we have m k. We show that equality holds. Assume fo contadiction that m k + 1. Since the edges ae egula and disjoint, we have n m( + 1) = k + k > k + k + d 2 which contadicts the choice of n. Thus m = k. This means that evey edge T i is incident on exactly vetices e i1..., e i fom I and one vetex c i outside it. Hence c i = λ ij e ij. j=1 7

8 Since the T i s ae disjoint, the vectos c 1,..., c k/ have disjoint suppots which patition [k]. We now show that the emaining vectos c 1,..., c d 2 must all have wt(c ) = k. Fo this, we conside the encoding of e j. We note e i e j 0 iff i = j and c i e j 0 iff j Supp(c i ). Thus only 2 of these inne poducts ae non-zeo. Since the code has distance d, all the d 2 inne poducts c i e j ae non-zeo. This shows that wt(c i ) = k fo all i. The above bound is stong enough to sepaate having locality of fom having just infomation locality of. The following coollay follows fom the obsevation that the hypegaph H(V, E) must contain n k ( + 1) = d 2 isolated vetices, which do not paticipate in any linea elations of size + 1. Coollay 10. Assume that 2 < d < + 3 and k. Let n = k + k + d 2. Thee ae no [n, k, d] q linea codes with locality. 5 Canonical codes: paity locality Theoem 9 gives a vey good undestanding optimal (, d)-codes in the case < d+3 and k. Fo any such code the coodinate set C = {c i } i [n] can be patitioned into sets I, C, C whee fo all c I C, Loc(c) =, and fo all c C, Loc(c ) >. It is natual to ask how low can the locality of symbols c C be. In this section we addess and esolve this question. 5.1 Paity locality lowe bound We begin with a lowe bound. Theoem 11. Let C be a systematic optimal (, d)-code with paametes [n, k, d] q. Suppose d < + 3, < k, and k. Then some k paity symbols of C have locality exactly, and d 2 othe paity symbols of C have locality no less than ( ) k k 1 (d 3). (9) Poof. Theoem 9 implies that C is a canonical code. Let C = I C C be the canonical patition of the coodinates of C. Clealy, fo all k symbols c C we have Loc(c ). We now pove lowe bounds on the locality of symbols in C C. We stat with ( symbols ) c C. Fo evey j [k/] we define a subset R j C that we call a ow. Let S j = Supp c j. The j-th ow contains the vecto c j, all unit vectos in the suppot of c j and the set C. R j = {c j} i S j e i C. Obseve that esticted to I C ows {R j } j [k/] fom a patition. Conside an abitay symbol c C. Let l = Loc(c ). We have c = c i, (10) i L whee L = l. In what follows we show that fo each ow R j, R j L (11) 8

9 needs to hold. It is not had to see that this togethe with the stuctue of the sets {R j } implies inequality (9). To pove (11) we conside the code C j = {C(x) x F k q such that Supp(x) S j }. (12) It is not had to see that Supp(C j ) = R j and dim C j =. Obseving that the distance of the code C j is at least d and R j = + d 1 we conclude that (esticted to its suppot) C j is an MDS code. Thus any symbols of C j ae independent. It emains to note that (10) esticted to coodinates in S j yields a non-tivial dependency of length at most R j L + 1 between the symbols of C j. We poceed to the lowe bound on the locality of symbols in C. Fix an abitay c j C. A easoning simila to the one above implies that if Loc(c j ) < ; then thee is a dependency of length below + 1 between the coodinates of the [ + d 1,, d] q code C j (defined by (12)) esticted to its suppot. Obseve that the bound (9) is close to k only when is lage and d is small. In othe cases theoem 11 does not ule out existence of canonical codes with low locality fo all symbols (including those in C ). In the next section we show that such codes indeed exist. In paticula we show that the bound (9) can be always met with equality. 5.2 Paity locality uppe bounds Ou main esults in this section ae given by theoems 15 and 16. Theoem 15 gives a geneal uppe bound matching the lowe bound of theoem 11. The poof is not explicit. Theoem 16 gives an explicit family of codes in the naow case of d = 4. We stat by intoducing some concepts we need fo the poof of theoem 15. Definition 12. Let L F n q be a linea space and S [n] be a set, S = k. We say that S is a k-coe fo L if fo all vectos v L, Supp(v) S. It is not had to veify that S is a k-coe fo L, if and only if S is a subset of some set of infomation coodinates in the space L. In othe wods S is a k-coe fo L, if and only k columns in the (n dim L)- by-n geneato matix of L that coespond to elements of S ae linealy independent. Definition 13. Let L F n q be a linea space. Let {c 1,..., c n } be a sequence of n vectos in F k q. We say that vectos {c i } ae in geneal position subject to L if the following conditions hold: 1. Fo all vectos v L we have n v(i)c i = 0; 2. Fo all k-coes S of L we have Rank ({c i } i S ) = k. The next lemma assets existence of vectos that ae in geneal position subject to an abitay linea space povided the undelying field is lage enough. Lemma 14. Let L F n q be a linea space and k be a positive intege. Suppose q > kn k ; then thee exists a family of vectos {c i } i [n] in F k q that ae in geneal position subject to L. Poof. We obtain a matix M F k n q picking the ows of M at andom (unifomly and independently) fom the linea space L. We choose vectos {c i } to be the columns of M. Obseve that the fist condition in definition 13 is always satisfied. Futhe obseve that ou choice of M induces a unifom distibution on evey set of k columns of M that fom a k-coe. The second condition in definition 13 9

10 is satisfied as long as all k-by-k minos of M that coespond to k-coes ae invetible. This happens with pobability at least ( ( n ) k ( ) ) ( ( n ) ( k q i ) ) k 1 n k k k q q > 0. This concludes the poof. We poceed to the main esult of this section. Theoem 15. Let 2 < d < + 3, < k, k. Let q > kn k be a pime powe. Let n = k + k + d 2. Thee exists a systematic [n, k, d] q code C of infomation locality, whee k paity symbols have locality, and d 2 othe paity symbols have locality k ( k 1) (d 3). Poof. Let t = k. Fix some t + 1 subsets P 0, P 1,..., P t of [n] subject to the following constaints: 1. P 0 = k (t 1) (d 3) + 1; 2. Fo all i [t], P i = + 1; 3. Fo all i, j [t] such that i j, P i P j = ; 4. Fo all i [t], P 0 P i = d + 3. Fo evey set P i, 0 i t we fix a vecto v i F n q, such that Supp(v i ) = P i. We ensue that non-zeo coodinates of v 0 contain the same value. We also ensue that fo all i [t] non-zeo coodinates of v i contain distinct values. The lowe bound on q implies that these conditions can be met. Fo a finite set A let A denote a set that is obtained fom A by dopping at most one element. Note that fo all i [t] and all non-zeo α, β in F q we have Supp(αv 0 + βv i ) = (P 0 \ P i ) (P 0 P i ) (P i \ P 0 ). (13) Conside the space L = Span ({v i } 0 i t ). Let M = P 0 \ t P i. Obseve that M = k (t 1)(d 3) + 1 t( d + 3) = d 2. By (13) fo any v L we have P i, i T Supp(v) = M i [n]\t fo some T [t] OR (P 0 P i ) (P 0 P i ) (P i \ P 0 ) fo some T [t]. i T Obseve that a set K [n], K = k is a k-coe fo L if and only if fo all i [t], P i K and M K; OR [ Pi P M K and i [t] such that 0 K < d + 2; OR P i P 0 K = d + 2 and P i \ P 0 K. i T (14) (15) Let I [n] be such that M I = and fo all i [t], I P i =. By (15) I is a k-coe fo L. We use lemma 14 to obtain vectos {c i } i [n] F k q that ae in geneal position subject to the space L. We choose vectos {c i } i I as ou basis fo F k q and conside the code C defined as in (3). 10

11 ( In it not had to see that C is a systematic code of infomation locality. All t paity symbols in the set i [t] i) P \ I also have locality. Futhemoe all d 2 paity symbols in the set M have locality k (t 1)(d 3). It emains to pove that the code C has distance d = n k t + 2. (16) Accoding to Fact 1 the distance of C equals n S whee S [n] is the lagest set such that vectos {c i } i S do not have full ank. By definition 13 fo any k-coe K of L we have Rank{c i } i K = k. Thus in ode to establish (16) it suffices to show that evey set S [n] of size k + t 1 contains a k-coe of L. Ou poof involves case analysis. Let S [n], S = k + t 1 be an abitay set. Set b = #{i [t] P i S}. Note that since t( + 1) > S we have b t 1. Case 1: M S. We dop t 1 elements fom S to obtain a set K S, K = k such that fo all i [t], P i K. By (15) K is a k-coe. Case 2: M S and b t 2. We dop t 1 elements fom S to obtain a set K S, K = k such that M K and fo all i [t], P i K. By (15) K is a k-coe. Case 3: M S and b = t 1. Let i [t] be such that P i S. Such i is unique. Obseve that P i S = k + t 1 (d 2) (t 1)( + 1) = d + 2. Also obseve that P i \ P 0 = + 1 ( d + 3) = d 2 1. Combining the last two obsevations we conclude that eithe [ Pi P 0 S < d + 2; OR (17) P i P 0 S = d + 2 and P i \ P 0 S. Finally, we dop t 1 elements fom S to obtain a set K S, K = k such that fo all i [t], P i K. By (15) and (17) K is a k-coe. Theoem 15 gave a geneal constuction of (, d)-codes that ae optimal not only with espect to infomation locality and edundancy but also with espect to locality of paity symbols. That theoem howeve is weak in two espects. Fistly, the constuction is not explicit. Secondly, the constuction equies a lage undelying field. The next theoem gives an explicit constuction that woks even ove small fields in the naow case of codes of distance 4. Theoem 16. Let < k, k be positive integes. Let q + 2 be a pime powe. Let n = k + k + 2. Thee exists a systematic [n, k, 4] q code C of infomation locality, whee k paity symbols have locality, and 2 othe paity symbols have locality k k + 1. Poof. Fix an abitay systematic [ + 3,, 4] q code E. Fo instance, one can choose E to be a Reed Solomon code. Let E(y) = (y, p 0 y, p 1 y, p 2 y). Since E is a MDS code all vectos {p i } have weight. Thus fo some non-zeo {α j } j [] we have 1 p 1 = α j e j + α p 2, (18) j=1 11

12 whee {e j } j [] ae the -dimensional unit vectos. To define a systematic code C we patition the input vecto x F n q into t = k vectos y 1,..., y t F q. We set C(x) = ( y 1,..., y t, p 0 y 1,..., p 0 y t, (p 1 ) y i, (p 2 )) y i, (19) whee the summation is ove all i [t]. It is not had to see that the fist k + t coodinates of C have locality. We ague that the last two coodinates have locality k t + 1. Fom (18) we have (p 1 ) 1 ( y i = α j e j ) ( y i + α p 2 ) y i, j=1 whee the summation is ove all i [t]. Equivalently, (p 1 ) 1 y i = j=1 i [t] α j y i (j) + α ( p 2 y i ). Thus the next-to-last coodinate of C can be ecoveed fom accessing ( 1)t infomation coodinates and the last coodinate. Similaly, the last coodinate can be ecoveed fom k t infomation coodinates and the next-to-last coodinate. To pove that the code C has distance 4 we give an algoithm to coect 3 easues in C. The algoithm has two steps. Step 1: Fo evey i [t], we efe to a subset (y i, p 0 y i ) of + 1 coodinates of C as a block. We go ove all t blocks. If we encounte a block whee one symbol is eased, we ecove this symbol fom othe symbols in the block. Step 2: Obseve that afte the execution of Step 1 thee can be at most one block that has easues. If no such block exists; then on Step 1 we have successfully ecoveed all infomation symbols and thus we ae done. Othewise, let the unique block with easues be (y j, p 0 y j ) fo some j [t]. Since we know all vectos {y i } i j, i [t], fom (p 1 i [t] y i ) and (p 2 i [t] y i ) (if these symbols ae not eased) we ecove symbols p 1 y j and p 2 y j. Finally, we invoke the decoding pocedue fo the code E to ecove y j fom at most 3 easues in E(y j ) = (y j, p 0 y j, p 1 y j, p 2 y j ). 6 Non-Canonical Codes In this section we obseve that canonical codes detailed in sections 4 and 5 ae not the only family of optimal (, d)-codes. If one elaxes conditions of theoem 9 one can get othe families. One such family that yields unifom locality fo all symbols is given below. The (non-explicit) poof esembles the poof of theoem 15 albeit is much simple. Theoem 17. Let n, k,, and d 2 be positive integes. Let q > kn k be a pime powe. Suppose ( + 1) n and k n k = + d 2; then thee exists an [n, k, d] q code whee all symbols have locality. Poof. Let t = n +1. We patition the set [n] into t subsets P 1,..., P t each of size + 1. Fo evey i [t] we fix a vecto v i F n q, such that Supp(v i ) = P i. We set all non-zeo coodinates in vectos {v i } i [t] 12

13 to be equal to 1. We conside the linea space L = Span ( {v i } i [t] ). Fo evey any v L we have Supp(v) = i T P i fo some fo some T [t]. Obseve that a set K [n], K = k is a k-coe fo L if and only if fo all i [t], P i K. Also obseve that conditions of the theoem imply k n t. Theefoe k-coes fo L exist. We use lemma 14 to obtain vectos {c i } i [n] F k q that ae in geneal position subject to the space L. We conside the code C defined as in (3). In it not had to see that C has dimension k and locality fo all symbols. It emains to pove that the code C has distance k d = n k + 2. (20) Ou poof elies on Fact 1. Let S [n] be an abitay subset such that Rank{c i } i S < k. Clealy, no k-coe of L is in S. Let b = #{i [t] P i S}. We have S b k 1 since dopping b elements fom S (one fom each P i S) tuns S into an ( S b)-coe. We also have b k 1 since dopping one element fom each P i S gives us a b-coe in S. Combining the last two inequalities we conclude that k 1 S k + 1. Combining this inequality with the identity k 1 = k 1 and Fact 1 we obtain (20). 7 Beyond Wost-Case Distance In this section, codes ae assumed to be systematic unless othewise stated. They will have k infomation symbols and h = n k paity check symbols. 7.1 Genealized Pyamid Codes The suppots of the paity check symbols in a code can be descibed using a bipatite gaph. Moe geneally, we define the notion of a set of points with suppots matching a gaph G. Definition 18. Let G([k], [h], E) be a bipatite gaph. We say that c 1,..., c h F k q have suppots matching G if Supp(c j ) = Γ(j) fo all j [h] whee Γ(j) denotes the neighbohood of j in G. Given points c 1,..., c h, conside the k h matix C with columns c 1,..., c h. Fo I [k] and J [h], let C I,J denote the sub-matix of C with ows indexed by I and columns indexed by J. Definition 19. Points c 1,..., c h F k q with suppots matching G ae in geneal position if fo evey I [h] and J [k] such that thee is a pefect matching fom I to J in G, the sub-matix C I,J is invetible. Standad aguments show that ove sufficiently lage fields F q, choosing c 1,..., c h andomly fom the set of vectos with suppot matching G gives points in geneal position. Coming back to codes, the suppots of the paity checks define a bipatite gaph which we will call the suppot gaph. This is closely elated to but distinct fom the Tanne gaph. 13

14 Definition 20. Let C be a systematic code with point set C = {e 1,..., e k, c 1,..., c h }. The suppot gaph G([k], [h], E) of C is a bipatite gaph whee (i, j) E if e i Supp(c j ). Fo instance in any canonical (, d)-code, the suppot gaph is specified up to elabeling. Thee ae k vetices in V of degee coesponding to C C, whose neighbohood patitions the set U and d 2 vetices of degee k coesponding to C C. The minimum distance of such a code is exactly d, and hence thee ae some pattens of d easues that the code cannot coect. Howeve it is possible that the code could coect many pattens of easues of weight d and highe, fo a suitable choice of c i s. In geneal one could ask: among all codes with a suppot gaph G, which codes can coect the most easue pattens? A Pioi, it is unclea that thee should be a single code that is optimal in the sense that it coects the maximal possible set of pattens. As shown by [5] such codes do exist ove sufficiently lage fields. Conside a systematic code C with suppot gaph G([k], [h], E). Given I [k] and J [h], let Γ J (I) denote Γ(I) J (define Γ I (J) similaly). Conside a set of easues S T whee S [k] and T [h] ae the sets of infomation and paity check symbols espectively that ae eased. To coect these easues, we need to ecove the symbols coesponding to {e i : i S} fom the paity checks coesponding to {c j : j T = [h] \ T }. Fo this to be possible, a necessay condition is that fo evey S S, Γ T (S ) S. By Hall s theoem, this is equivalent to the existance of a matching in G fom S to T. We say that such a set of easues satisfies Hall s condition. Definition 21. A systematic code C with suppot gaph G is a genealized pyamid code if evey set of easues satisfying Hall s condition can be coected. We can ephase this definition in algebaic tems using the notion of points with specified suppots in geneal position. Theoem 22. [5] Let C be a systematic code with suppot gaph G. C is a genealized pyamid code iff c 1,..., c h ae in geneal position with suppots matching G. 7.2 The Tadeoff between Locality and Easue Coection Fo any paity check symbol c j, it is clea that Loc(c j ) wt(c j ) = deg(j). We will show that no bette locality is possible fo a genealized pyamid code. This esult elies on a chaacteization of the suppot of the vectos in the space V spanned by {c 1,..., c h } in tems of the gaph G. Let V denote the space spanned by {c 1,..., c h } which ae in geneal position with suppots matching G. Let Supp(V) 2 [k] denote the set of suppots of vectos in V. We give a necessay condition fo membeship in Supp(V). Ou condition is in tems of sets of coodinates that can be eliminated by combination of cetain c j s. Definition 23. Let c = j J µ jc j whee µ j 0. Let I = j J Γ(j) \ Supp(c). We say that the set I has been eliminated fom j J Γ(j). Theoem 24. Let {c 1,..., c h } be vectos with suppots matching G in geneal position. The set I can be eliminated fom j J Γ(j) only if Γ J (I ) > I fo evey I I. Poof. Let c = j J µ jc j whee µ j 0. Let I = j J Γ(j) \ Supp(c). Assume fo contadiction that thee exists Ĩ I whee Γ J(Ĩ) Ĩ. We will show that thee exists I Ĩ so that Γ J(I ) = I and that Γ J (I ) > I fo evey non-empty subset I I. 14

15 It suffices to pove the existence of I Ĩ whee Γ J(I ) = I ; the claim about subsets of I will then follow by taking a minimal such I. Obseve that evey i I must have Γ J (i) 2, since if i occus in exactly one S j, then it cannot be eliminated. Hence we must have Ĩ 2. One can constuct the set I stating fom a singleton and adding elements one at a time, giving a sequence I 1,..., I l = I. We claim that fo any l l, Γ J (I l ) I l Γ J (I l 1 ) I l 1 1. This holds since Γ J (I l ) can only incease on adding i to I l 1 while I l inceases by 1. Since Γ J (I 1 ) I 1 1 wheeas Γ(I l ) I l 0, we must have Γ J (I l ) I l = 0 fo some l l. Thus we have a set whee Γ J (I l ) = I l as desied. Since the set I satisfies Hall s matching condition, thee is a pefect matching fom I to J = Γ J (I ) in G. But this means that the sub-matix C I,J has full ank. On the othe hand, c = j µ jc j and I I = j Γ(j) \ Supp(c). Let π(c) denote the estiction of c onto the co-odinates in I. Then we have µ j π(c j ) = µ j π(c j ) = π(c) = 0. j J j J The fist equality holds because π(c j ) = 0 fo j Γ(I ), the second by lineaity of π and the last since π(c) = 0. Hence the vecto µ J = {µ j} j J lies in the kenel of C I,J which contadicts the assumption that it has full ank. This shows that the condition Γ J (I ) > I fo all I I is necessay. Coollay 25. If the set I can be eliminated fom j J Γ(j), then I J 1. If the field size q is sufficiently lage, the necessay condition given by theoem 24 is also sufficient. We defe the poof of this statement to Appendix A and pove ou lowe bound on the locality of genealized pyamid codes. Theoem 26. In a genealized pyamid code, Loc(c j ) = deg(j) fo all j [h]. Poof. Assume fo contadiction that Loc(c t ) deg(t) 1 fo some t [h]. Hence thee exist A [k] and B [h] (not containing t) such that c t = i A λ i e i + j B µ j c j. We have A = a, B = b and a + b deg(t) 1. Hence c t j B µ j c j = i A λ i e i. Thus we have eliminated at least deg(t) a b + 1 indices fom j B {t} Supp(c j ) using a linea combination of b + 1 vectos. By coollay 25 this is not possible fo vectos in geneal position. Refeences [1] Viveck R. Cadambe, Syed A. Jafa, and Hamed Maleki. Distibuted data stoage with minimum stoage egeneating codes - exact and functional epai ae asymptotically equally efficient. Axiv ,

16 [2] Alexandos G. Dimakis, Bighten Godfey, Yunnan Wu, Matin J. Wainwight, and Kannan Ramchandan. Netwok coding fo distibuted stoage systems. IEEE Tansactions on Infomation Theoy, 56: , [3] Alexandos G. Dimakis, Kannan Ramchandan, Yunnan Wu, and Changho Suh. A suvey on netwok codes fo distibuted stoage. Poceedings of the IEEE, 99: , [4] Klim Efemenko. 3-quey locally decodable codes of subexponential length. In 41st ACM Symposium on Theoy of Computing (STOC), pages 39 44, [5] Cheng Huang, Minghua Chen, and Jin Li. Pyamid codes: flexible schemes to tade space fo access efficiency in eliable data stoage systems. In 6th IEEE Intenational Symposium on Netwok Computing and Applications (NCA 2007), pages 79 86, [6] Jonathan Katz and Luca Tevisan. On the efficiency of local decoding pocedues fo eocoecting codes. In 32nd ACM Symposium on Theoy of Computing (STOC), pages 80 86, [7] Swastik Koppaty, Shubhangi Saaf, and Segey Yekhanin. High-ate codes with sublinea-time decoding. In 43nd ACM Symposium on Theoy of Computing (STOC), pages , [8] K. V. Rashmi, Niha B. Shah, and P. Vijay Kuma. Optimal exact-egeneating codes fo distibuted stoage at the MSR and MBR points via a poduct-matix constuction. Axiv , [9] Michael Tsfasman, Sege Vladut, and Dmity Nogin. Algebaic geometic codes: basic notions. Ameican Mathematical Society, Povidence, Rhode Island, USA, [10] Segey Yekhanin. Towads 3-quey locally decodable codes of subexponential length. Jounal of the ACM, 55:1 16, [11] Segey Yekhanin. Locally decodable codes. Foundations and tends in theoetical compute science, To appea. Peliminay vesion available fo download at now.pdf. A Spaces spanned by geneal position vectos Lemma 27. Let q n be a pime powe. The set of suppots of vectos in any linea space V F n q is closed unde union. Poof. Conside two vectos a and b in V with Supp(a) = S and Supp(b) = T. We may assume that S, T n 1 and that one set does not contain the othe. Now conside a + λb fo λ F q. It suffices to find λ such that a(i) + λb(i) 0 fo each i S T. This ules out at most S T n 2 values of λ, so thee is a solution povided q 1 > n 2 o q n. It is easy to see that the condition q n is tight by consideing the length 3 paity check code ove F 2, whee the set of suppots is not closed unde union. Theoem 28. Let q n. Let {c 1,..., c h } be vectos with suppots matching G in geneal position which span a space V. Supp(V) consists of all sets of the fom j J Γ(j) \ I whee I satisfies the condition Γ J (I ) > I fo evey I I. 16

17 Poof. Theoem 24 shows that the condition on I is necessay, we now show that it is sufficient. Fo j Γ(I) the sets Γ(j) and I ae disjoint. Hence we can wite j J Γ(j) \ I = ( j J Γ(I) Γ(j) \ I) ( j J Γ(I) Γ(j)). By the closue unde union, it suffices to pove the statement in the case when J Γ(I). Fix j 0 J and let J = J \ {j 0 }. Since Γ J (I ) > I we have Γ J (I ) I fo evey I I. So thee is a matching fom I to some subset J J whee J = I, and the matix C I,J is of full ank since the c j s ae in geneal position. Let π(c) denote the estiction of a vecto c onto coodinates in I. Since C I,J is invetible, the ow vectos {π(c j )} j J have full ank. Note that π(c j0 ) is not a zeo vecto since j 0 Γ(I). So thee exist {µ j } fo j J which ae not all 0 and π(c j0 ) = j J µ j π(c j ). Now conside the vecto c j 0 = c j0 j J µ jc j. Note that π(c j 0 ) is a zeo vecto, which shows that Supp(c j 0 ) j J {j 0 }Γ(j) \ I. We will show that equality holds by using coollay 25. Since we have eliminated I vectos, the linea combination must involve at least I + 1 vectos, which means that µ j 0 fo all j. Futhe the set of eliminated co-odinates cannot be lage than I, since this would violate coollay 25. Hence we have Supp(c j 0 ) = j J {j 0 }Γ(j) \ I. (21) By epeating this agument fo evey j 0 J, we will be able to find J(j 0 ) J of size I + 1 which contains j 0 and a vecto c j 0 such that Supp(c j 0 ) = j J(j0 )Γ(j) \ I. Using the closue unde union of suppots, we conclude that Supp(V) contains the set j0 J j J(j0 ) Γ(j) \ I = j J Γ(j) \ I. 17

Lifting Private Information Retrieval from Two to any Number of Messages

Lifting Private Information Retrieval from Two to any Number of Messages Lifting Pivate Infomation Retieval fom Two to any umbe of Messages Rafael G.L. D Oliveia, Salim El Rouayheb ECE, Rutges Univesity, Piscataway, J Emails: d746@scaletmail.utges.edu, salim.elouayheb@utges.edu

More information

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES

A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES AGU Intenational Jounal of Science and Technology A STUDY OF HAMMING CODES AS ERROR CORRECTING CODES Ritu Ahuja Depatment of Mathematics Khalsa College fo Women, Civil Lines, Ludhiana-141001, Punjab, (India)

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Mach 6, 013 Abstact To study how balanced o unbalanced a maximal intesecting

More information

Quasi-Randomness and the Distribution of Copies of a Fixed Graph

Quasi-Randomness and the Distribution of Copies of a Fixed Graph Quasi-Randomness and the Distibution of Copies of a Fixed Gaph Asaf Shapia Abstact We show that if a gaph G has the popety that all subsets of vetices of size n/4 contain the coect numbe of tiangles one

More information

Locality and Availability in Distributed Storage

Locality and Availability in Distributed Storage Locality and Availability in Distibuted Stoage Ankit Singh Rawat, Dimitis S. Papailiopoulos, Alexandos G. Dimakis, and Siam Vishwanath developed, each optimized fo a diffeent epai cost metic. Codes that

More information

arxiv: v1 [cs.it] 18 Jun 2011

arxiv: v1 [cs.it] 18 Jun 2011 On the Locality of Codeword Symbols arxiv:1106.3625v1 [cs.it] 18 Jun 2011 Parikshit Gopalan Microsoft Research parik@microsoft.com Cheng Huang Microsoft Research chengh@microsoft.com Sergey Yekhanin Microsoft

More information

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0},

ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION. 1. Introduction. 1 r r. r k for every set E A, E \ {0}, ON INDEPENDENT SETS IN PURELY ATOMIC PROBABILITY SPACES WITH GEOMETRIC DISTRIBUTION E. J. IONASCU and A. A. STANCU Abstact. We ae inteested in constucting concete independent events in puely atomic pobability

More information

arxiv: v1 [math.co] 4 May 2017

arxiv: v1 [math.co] 4 May 2017 On The Numbe Of Unlabeled Bipatite Gaphs Abdullah Atmaca and A Yavuz Ouç axiv:7050800v [mathco] 4 May 207 Abstact This pape solves a poblem that was stated by M A Haison in 973 [] This poblem, that has

More information

On the ratio of maximum and minimum degree in maximal intersecting families

On the ratio of maximum and minimum degree in maximal intersecting families On the atio of maximum and minimum degee in maximal intesecting families Zoltán Lóánt Nagy Lale Özkahya Balázs Patkós Máté Vize Septembe 5, 011 Abstact To study how balanced o unbalanced a maximal intesecting

More information

arxiv: v1 [math.co] 1 Apr 2011

arxiv: v1 [math.co] 1 Apr 2011 Weight enumeation of codes fom finite spaces Relinde Juius Octobe 23, 2018 axiv:1104.0172v1 [math.co] 1 Ap 2011 Abstact We study the genealized and extended weight enumeato of the - ay Simplex code and

More information

Binary Codes with Locality for Multiple Erasures Having Short Block Length

Binary Codes with Locality for Multiple Erasures Having Short Block Length Binay Codes with Locality fo Multiple Easues Having Shot Bloc Length S. B. Balaji, K. P. Pasanth and P. Vijay Kuma, Fellow, IEEE Depatment of Electical Communication Engineeing, Indian Institute of Science,

More information

Fractional Zero Forcing via Three-color Forcing Games

Fractional Zero Forcing via Three-color Forcing Games Factional Zeo Focing via Thee-colo Focing Games Leslie Hogben Kevin F. Palmowski David E. Robeson Michael Young May 13, 2015 Abstact An -fold analogue of the positive semidefinite zeo focing pocess that

More information

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi

ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS. D.A. Mojdeh and B. Samadi Opuscula Math. 37, no. 3 (017), 447 456 http://dx.doi.og/10.7494/opmath.017.37.3.447 Opuscula Mathematica ON THE INVERSE SIGNED TOTAL DOMINATION NUMBER IN GRAPHS D.A. Mojdeh and B. Samadi Communicated

More information

A Converse to Low-Rank Matrix Completion

A Converse to Low-Rank Matrix Completion A Convese to Low-Rank Matix Completion Daniel L. Pimentel-Alacón, Robet D. Nowak Univesity of Wisconsin-Madison Abstact In many pactical applications, one is given a subset Ω of the enties in a d N data

More information

New problems in universal algebraic geometry illustrated by boolean equations

New problems in universal algebraic geometry illustrated by boolean equations New poblems in univesal algebaic geomety illustated by boolean equations axiv:1611.00152v2 [math.ra] 25 Nov 2016 Atem N. Shevlyakov Novembe 28, 2016 Abstact We discuss new poblems in univesal algebaic

More information

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution

Central Coverage Bayes Prediction Intervals for the Generalized Pareto Distribution Statistics Reseach Lettes Vol. Iss., Novembe Cental Coveage Bayes Pediction Intevals fo the Genealized Paeto Distibution Gyan Pakash Depatment of Community Medicine S. N. Medical College, Aga, U. P., India

More information

MDS Array Codes with Optimal Rebuilding

MDS Array Codes with Optimal Rebuilding 0 IEEE Intenational Symposium on Infomation Theoy Poceedings MDS Aay Codes with Optimal Reuilding Itzhak Tamo, Zhiying Wang and Jehoshua Buck Electical Engineeing Depatment, Califonia Institute of Technology,

More information

Fall 2014 Randomized Algorithms Oct 8, Lecture 3

Fall 2014 Randomized Algorithms Oct 8, Lecture 3 Fall 204 Randomized Algoithms Oct 8, 204 Lectue 3 Pof. Fiedich Eisenband Scibes: Floian Tamè In this lectue we will be concened with linea pogamming, in paticula Clakson s Las Vegas algoithm []. The main

More information

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012

Stanford University CS259Q: Quantum Computing Handout 8 Luca Trevisan October 18, 2012 Stanfod Univesity CS59Q: Quantum Computing Handout 8 Luca Tevisan Octobe 8, 0 Lectue 8 In which we use the quantum Fouie tansfom to solve the peiod-finding poblem. The Peiod Finding Poblem Let f : {0,...,

More information

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs

Math 301: The Erdős-Stone-Simonovitz Theorem and Extremal Numbers for Bipartite Graphs Math 30: The Edős-Stone-Simonovitz Theoem and Extemal Numbes fo Bipatite Gaphs May Radcliffe The Edős-Stone-Simonovitz Theoem Recall, in class we poved Tuán s Gaph Theoem, namely Theoem Tuán s Theoem Let

More information

Cyclic Lowest-Density MDS Array Codes

Cyclic Lowest-Density MDS Array Codes 1 Cyclic Lowest-Density MDS Aay Codes Yuval Cassuto, Membe, IEEE, and Jehoshua Buck, Fellow, IEEE Abstact Thee new families of lowest-density MDS aay codes ae constucted, which ae cyclic o quasicyclic

More information

COLLAPSING WALLS THEOREM

COLLAPSING WALLS THEOREM COLLAPSING WALLS THEOREM IGOR PAK AND ROM PINCHASI Abstact. Let P R 3 be a pyamid with the base a convex polygon Q. We show that when othe faces ae collapsed (otated aound the edges onto the plane spanned

More information

4/18/2005. Statistical Learning Theory

4/18/2005. Statistical Learning Theory Statistical Leaning Theoy Statistical Leaning Theoy A model of supevised leaning consists of: a Envionment - Supplying a vecto x with a fixed but unknown pdf F x (x b Teache. It povides a desied esponse

More information

An Integer Programming Based Bound for Locally Repairable Codes

An Integer Programming Based Bound for Locally Repairable Codes An Intege Pogamming Based Bound fo Locally Repaiable Codes Anyu Wang and Zhifang Zhang Key Laboatoy of Mathematics Mechanization NCMIS Academy of Mathematics and Systems Science CAS Beijing China Email:

More information

Surveillance Points in High Dimensional Spaces

Surveillance Points in High Dimensional Spaces Société de Calcul Mathématique SA Tools fo decision help since 995 Suveillance Points in High Dimensional Spaces by Benad Beauzamy Januay 06 Abstact Let us conside any compute softwae, elying upon a lage

More information

arxiv: v1 [math.nt] 12 May 2017

arxiv: v1 [math.nt] 12 May 2017 SEQUENCES OF CONSECUTIVE HAPPY NUMBERS IN NEGATIVE BASES HELEN G. GRUNDMAN AND PAMELA E. HARRIS axiv:1705.04648v1 [math.nt] 12 May 2017 ABSTRACT. Fo b 2 and e 2, let S e,b : Z Z 0 be the function taking

More information

Journal of Inequalities in Pure and Applied Mathematics

Journal of Inequalities in Pure and Applied Mathematics Jounal of Inequalities in Pue and Applied Mathematics COEFFICIENT INEQUALITY FOR A FUNCTION WHOSE DERIVATIVE HAS A POSITIVE REAL PART S. ABRAMOVICH, M. KLARIČIĆ BAKULA AND S. BANIĆ Depatment of Mathematics

More information

Chapter 5 Linear Equations: Basic Theory and Practice

Chapter 5 Linear Equations: Basic Theory and Practice Chapte 5 inea Equations: Basic Theoy and actice In this chapte and the next, we ae inteested in the linea algebaic equation AX = b, (5-1) whee A is an m n matix, X is an n 1 vecto to be solved fo, and

More information

On decompositions of complete multipartite graphs into the union of two even cycles

On decompositions of complete multipartite graphs into the union of two even cycles On decompositions of complete multipatite gaphs into the union of two even cycles A. Su, J. Buchanan, R. C. Bunge, S. I. El-Zanati, E. Pelttai, G. Rasmuson, E. Spaks, S. Tagais Depatment of Mathematics

More information

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany

Relating Branching Program Size and. Formula Size over the Full Binary Basis. FB Informatik, LS II, Univ. Dortmund, Dortmund, Germany Relating Banching Pogam Size and omula Size ove the ull Binay Basis Matin Saueho y Ingo Wegene y Ralph Wechne z y B Infomatik, LS II, Univ. Dotmund, 44 Dotmund, Gemany z ankfut, Gemany sauehof/wegene@ls.cs.uni-dotmund.de

More information

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE

ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE THE p-adic VALUATION OF STIRLING NUMBERS ANA BERRIZBEITIA, LUIS A. MEDINA, ALEXANDER C. MOLL, VICTOR H. MOLL, AND LAINE NOBLE Abstact. Let p > 2 be a pime. The p-adic valuation of Stiling numbes of the

More information

Query Complexity Lower Bounds for Reconstruction of Codes

Query Complexity Lower Bounds for Reconstruction of Codes Quey Complexity Lowe Bounds fo Reconstuction of Codes Souav Chakaboty Elda Fische Aie Matsliah Abstact We investigate the poblem of local econstuction, as defined by Saks and Seshadhi (2008), in the context

More information

SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER

SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Discussiones Mathematicae Gaph Theoy 39 (019) 567 573 doi:10.7151/dmgt.096 SUFFICIENT CONDITIONS FOR MAXIMALLY EDGE-CONNECTED AND SUPER-EDGE-CONNECTED GRAPHS DEPENDING ON THE CLIQUE NUMBER Lutz Volkmann

More information

Encapsulation theory: radial encapsulation. Edmund Kirwan *

Encapsulation theory: radial encapsulation. Edmund Kirwan * Encapsulation theoy: adial encapsulation. Edmund Kiwan * www.edmundkiwan.com Abstact This pape intoduces the concept of adial encapsulation, wheeby dependencies ae constained to act fom subsets towads

More information

10/04/18. P [P(x)] 1 negl(n).

10/04/18. P [P(x)] 1 negl(n). Mastemath, Sping 208 Into to Lattice lgs & Cypto Lectue 0 0/04/8 Lectues: D. Dadush, L. Ducas Scibe: K. de Boe Intoduction In this lectue, we will teat two main pats. Duing the fist pat we continue the

More information

3.1 Random variables

3.1 Random variables 3 Chapte III Random Vaiables 3 Random vaiables A sample space S may be difficult to descibe if the elements of S ae not numbes discuss how we can use a ule by which an element s of S may be associated

More information

ONE-POINT CODES USING PLACES OF HIGHER DEGREE

ONE-POINT CODES USING PLACES OF HIGHER DEGREE ONE-POINT CODES USING PLACES OF HIGHER DEGREE GRETCHEN L. MATTHEWS AND TODD W. MICHEL DEPARTMENT OF MATHEMATICAL SCIENCES CLEMSON UNIVERSITY CLEMSON, SC 29634-0975 U.S.A. E-MAIL: GMATTHE@CLEMSON.EDU, TMICHEL@CLEMSON.EDU

More information

The Chromatic Villainy of Complete Multipartite Graphs

The Chromatic Villainy of Complete Multipartite Graphs Rocheste Institute of Technology RIT Schola Wos Theses Thesis/Dissetation Collections 8--08 The Chomatic Villainy of Complete Multipatite Gaphs Anna Raleigh an9@it.edu Follow this and additional wos at:

More information

Lecture 18: Graph Isomorphisms

Lecture 18: Graph Isomorphisms INFR11102: Computational Complexity 22/11/2018 Lectue: Heng Guo Lectue 18: Gaph Isomophisms 1 An Athu-Melin potocol fo GNI Last time we gave a simple inteactive potocol fo GNI with pivate coins. We will

More information

Additive Approximation for Edge-Deletion Problems

Additive Approximation for Edge-Deletion Problems Additive Appoximation fo Edge-Deletion Poblems Noga Alon Asaf Shapia Benny Sudakov Abstact A gaph popety is monotone if it is closed unde emoval of vetices and edges. In this pape we conside the following

More information

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM

A NEW VARIABLE STIFFNESS SPRING USING A PRESTRESSED MECHANISM Poceedings of the ASME 2010 Intenational Design Engineeing Technical Confeences & Computes and Infomation in Engineeing Confeence IDETC/CIE 2010 August 15-18, 2010, Monteal, Quebec, Canada DETC2010-28496

More information

Exploration of the three-person duel

Exploration of the three-person duel Exploation of the thee-peson duel Andy Paish 15 August 2006 1 The duel Pictue a duel: two shootes facing one anothe, taking tuns fiing at one anothe, each with a fixed pobability of hitting his opponent.

More information

A Multivariate Normal Law for Turing s Formulae

A Multivariate Normal Law for Turing s Formulae A Multivaiate Nomal Law fo Tuing s Fomulae Zhiyi Zhang Depatment of Mathematics and Statistics Univesity of Noth Caolina at Chalotte Chalotte, NC 28223 Abstact This pape establishes a sufficient condition

More information

Compactly Supported Radial Basis Functions

Compactly Supported Radial Basis Functions Chapte 4 Compactly Suppoted Radial Basis Functions As we saw ealie, compactly suppoted functions Φ that ae tuly stictly conditionally positive definite of ode m > do not exist The compact suppot automatically

More information

6 PROBABILITY GENERATING FUNCTIONS

6 PROBABILITY GENERATING FUNCTIONS 6 PROBABILITY GENERATING FUNCTIONS Cetain deivations pesented in this couse have been somewhat heavy on algeba. Fo example, detemining the expectation of the Binomial distibution (page 5.1 tuned out to

More information

Deterministic vs Non-deterministic Graph Property Testing

Deterministic vs Non-deterministic Graph Property Testing Deteministic vs Non-deteministic Gaph Popety Testing Lio Gishboline Asaf Shapia Abstact A gaph popety P is said to be testable if one can check whethe a gaph is close o fa fom satisfying P using few andom

More information

Brief summary of functional analysis APPM 5440 Fall 2014 Applied Analysis

Brief summary of functional analysis APPM 5440 Fall 2014 Applied Analysis Bief summay of functional analysis APPM 5440 Fall 014 Applied Analysis Stephen Becke, stephen.becke@coloado.edu Standad theoems. When necessay, I used Royden s and Keyzsig s books as a efeence. Vesion

More information

CERFACS 42 av. Gaspard Coriolis, Toulouse, Cedex 1, France. Available at Date: April 2, 2008.

CERFACS 42 av. Gaspard Coriolis, Toulouse, Cedex 1, France. Available at   Date: April 2, 2008. ON THE BLOCK TRIANGULAR FORM OF SYMMETRIC MATRICES IAIN S. DUFF and BORA UÇAR Technical Repot: No: TR/PA/08/26 CERFACS 42 av. Gaspad Coiolis, 31057 Toulouse, Cedex 1, Fance. Available at http://www.cefacs.f/algo/epots/

More information

On the Combinatorics of Locally Repairable Codes via Matroid Theory

On the Combinatorics of Locally Repairable Codes via Matroid Theory On the Combinatoics of Locally Repaiable Codes via Matoid Theoy Thomas Westebäc, Ragna Feij-Hollanti, Toni Envall, and Camilla Hollanti 1 Abstact axiv:1501.00153v3 [cs.it] 21 Jan 2016 This pape povides

More information

EM Boundary Value Problems

EM Boundary Value Problems EM Bounday Value Poblems 10/ 9 11/ By Ilekta chistidi & Lee, Seung-Hyun A. Geneal Desciption : Maxwell Equations & Loentz Foce We want to find the equations of motion of chaged paticles. The way to do

More information

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic.

9.1 The multiplicative group of a finite field. Theorem 9.1. The multiplicative group F of a finite field is cyclic. Chapte 9 Pimitive Roots 9.1 The multiplicative goup of a finite fld Theoem 9.1. The multiplicative goup F of a finite fld is cyclic. Remak: In paticula, if p is a pime then (Z/p) is cyclic. In fact, this

More information

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland)

Syntactical content of nite approximations of partial algebras 1 Wiktor Bartol Inst. Matematyki, Uniw. Warszawski, Warszawa (Poland) Syntactical content of nite appoximations of patial algebas 1 Wikto Batol Inst. Matematyki, Uniw. Waszawski, 02-097 Waszawa (Poland) batol@mimuw.edu.pl Xavie Caicedo Dep. Matematicas, Univ. de los Andes,

More information

Vanishing lines in generalized Adams spectral sequences are generic

Vanishing lines in generalized Adams spectral sequences are generic ISSN 364-0380 (on line) 465-3060 (pinted) 55 Geomety & Topology Volume 3 (999) 55 65 Published: 2 July 999 G G G G T T T G T T T G T G T GG TT G G G G GG T T T TT Vanishing lines in genealized Adams spectal

More information

Chapter 3: Theory of Modular Arithmetic 38

Chapter 3: Theory of Modular Arithmetic 38 Chapte 3: Theoy of Modula Aithmetic 38 Section D Chinese Remainde Theoem By the end of this section you will be able to pove the Chinese Remainde Theoem apply this theoem to solve simultaneous linea conguences

More information

The Substring Search Problem

The Substring Search Problem The Substing Seach Poblem One algoithm which is used in a vaiety of applications is the family of substing seach algoithms. These algoithms allow a use to detemine if, given two chaacte stings, one is

More information

The Erdős-Hajnal conjecture for rainbow triangles

The Erdős-Hajnal conjecture for rainbow triangles The Edős-Hajnal conjectue fo ainbow tiangles Jacob Fox Andey Ginshpun János Pach Abstact We pove that evey 3-coloing of the edges of the complete gaph on n vetices without a ainbow tiangle contains a set

More information

A New Design of Binary MDS Array Codes with Asymptotically Weak-Optimal Repair

A New Design of Binary MDS Array Codes with Asymptotically Weak-Optimal Repair IEEE TRANSACTIONS ON INFORMATION THEORY 1 A New Design of Binay MDS Aay Codes with Asymptotically Weak-Optimal Repai Hanxu Hou, Membe, IEEE, Yunghsiang S. Han, Fellow, IEEE, Patick P. C. Lee, Senio Membe,

More information

Lecture 8 - Gauss s Law

Lecture 8 - Gauss s Law Lectue 8 - Gauss s Law A Puzzle... Example Calculate the potential enegy, pe ion, fo an infinite 1D ionic cystal with sepaation a; that is, a ow of equally spaced chages of magnitude e and altenating sign.

More information

Rate Splitting is Approximately Optimal for Fading Gaussian Interference Channels

Rate Splitting is Approximately Optimal for Fading Gaussian Interference Channels Rate Splitting is Appoximately Optimal fo Fading Gaussian Intefeence Channels Joyson Sebastian, Can Kaakus, Suhas Diggavi, I-Hsiang Wang Abstact In this pape, we study the -use Gaussian intefeence-channel

More information

NOTE. Some New Bounds for Cover-Free Families

NOTE. Some New Bounds for Cover-Free Families Jounal of Combinatoial Theoy, Seies A 90, 224234 (2000) doi:10.1006jcta.1999.3036, available online at http:.idealibay.com on NOTE Some Ne Bounds fo Cove-Fee Families D. R. Stinson 1 and R. Wei Depatment

More information

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity

Construction and Analysis of Boolean Functions of 2t + 1 Variables with Maximum Algebraic Immunity Constuction and Analysis of Boolean Functions of 2t + 1 Vaiables with Maximum Algebaic Immunity Na Li and Wen-Feng Qi Depatment of Applied Mathematics, Zhengzhou Infomation Engineeing Univesity, Zhengzhou,

More information

Do Managers Do Good With Other People s Money? Online Appendix

Do Managers Do Good With Other People s Money? Online Appendix Do Manages Do Good With Othe People s Money? Online Appendix Ing-Haw Cheng Haison Hong Kelly Shue Abstact This is the Online Appendix fo Cheng, Hong and Shue 2013) containing details of the model. Datmouth

More information

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22

C/CS/Phys C191 Shor s order (period) finding algorithm and factoring 11/12/14 Fall 2014 Lecture 22 C/CS/Phys C9 Sho s ode (peiod) finding algoithm and factoing /2/4 Fall 204 Lectue 22 With a fast algoithm fo the uantum Fouie Tansfom in hand, it is clea that many useful applications should be possible.

More information

Multiple Criteria Secretary Problem: A New Approach

Multiple Criteria Secretary Problem: A New Approach J. Stat. Appl. Po. 3, o., 9-38 (04 9 Jounal of Statistics Applications & Pobability An Intenational Jounal http://dx.doi.og/0.785/jsap/0303 Multiple Citeia Secetay Poblem: A ew Appoach Alaka Padhye, and

More information

Unobserved Correlation in Ascending Auctions: Example And Extensions

Unobserved Correlation in Ascending Auctions: Example And Extensions Unobseved Coelation in Ascending Auctions: Example And Extensions Daniel Quint Univesity of Wisconsin Novembe 2009 Intoduction In pivate-value ascending auctions, the winning bidde s willingness to pay

More information

On the Structure of Linear Programs with Overlapping Cardinality Constraints

On the Structure of Linear Programs with Overlapping Cardinality Constraints On the Stuctue of Linea Pogams with Ovelapping Cadinality Constaints Tobias Fische and Mac E. Pfetsch Depatment of Mathematics, TU Damstadt, Gemany tfische,pfetsch}@mathematik.tu-damstadt.de Januay 25,

More information

Solution to HW 3, Ma 1a Fall 2016

Solution to HW 3, Ma 1a Fall 2016 Solution to HW 3, Ma a Fall 206 Section 2. Execise 2: Let C be a subset of the eal numbes consisting of those eal numbes x having the popety that evey digit in the decimal expansion of x is, 3, 5, o 7.

More information

Bounds for Codimensions of Fitting Ideals

Bounds for Codimensions of Fitting Ideals Ž. JOUNAL OF ALGEBA 194, 378 382 1997 ATICLE NO. JA966999 Bounds fo Coensions of Fitting Ideals Michał Kwiecinski* Uniwesytet Jagiellonski, Instytut Matematyki, ul. eymonta 4, 30-059, Kakow, Poland Communicated

More information

6 Matrix Concentration Bounds

6 Matrix Concentration Bounds 6 Matix Concentation Bounds Concentation bounds ae inequalities that bound pobabilities of deviations by a andom vaiable fom some value, often its mean. Infomally, they show the pobability that a andom

More information

QIP Course 10: Quantum Factorization Algorithm (Part 3)

QIP Course 10: Quantum Factorization Algorithm (Part 3) QIP Couse 10: Quantum Factoization Algoithm (Pat 3 Ryutaoh Matsumoto Nagoya Univesity, Japan Send you comments to yutaoh.matsumoto@nagoya-u.jp Septembe 2018 @ Tokyo Tech. Matsumoto (Nagoya U. QIP Couse

More information

Duality between Statical and Kinematical Engineering Systems

Duality between Statical and Kinematical Engineering Systems Pape 00, Civil-Comp Ltd., Stiling, Scotland Poceedings of the Sixth Intenational Confeence on Computational Stuctues Technology, B.H.V. Topping and Z. Bittna (Editos), Civil-Comp Pess, Stiling, Scotland.

More information

An Application of Fuzzy Linear System of Equations in Economic Sciences

An Application of Fuzzy Linear System of Equations in Economic Sciences Austalian Jounal of Basic and Applied Sciences, 5(7): 7-14, 2011 ISSN 1991-8178 An Application of Fuzzy Linea System of Equations in Economic Sciences 1 S.H. Nassei, 2 M. Abdi and 3 B. Khabii 1 Depatment

More information

A Bijective Approach to the Permutational Power of a Priority Queue

A Bijective Approach to the Permutational Power of a Priority Queue A Bijective Appoach to the Pemutational Powe of a Pioity Queue Ia M. Gessel Kuang-Yeh Wang Depatment of Mathematics Bandeis Univesity Waltham, MA 02254-9110 Abstact A pioity queue tansfoms an input pemutation

More information

Encapsulation theory: the transformation equations of absolute information hiding.

Encapsulation theory: the transformation equations of absolute information hiding. 1 Encapsulation theoy: the tansfomation equations of absolute infomation hiding. Edmund Kiwan * www.edmundkiwan.com Abstact This pape descibes how the potential coupling of a set vaies as the set is tansfomed,

More information

A generalization of the Bernstein polynomials

A generalization of the Bernstein polynomials A genealization of the Benstein polynomials Halil Ouç and Geoge M Phillips Mathematical Institute, Univesity of St Andews, Noth Haugh, St Andews, Fife KY16 9SS, Scotland Dedicated to Philip J Davis This

More information

PROBLEM SET #1 SOLUTIONS by Robert A. DiStasio Jr.

PROBLEM SET #1 SOLUTIONS by Robert A. DiStasio Jr. POBLM S # SOLUIONS by obet A. DiStasio J. Q. he Bon-Oppenheime appoximation is the standad way of appoximating the gound state of a molecula system. Wite down the conditions that detemine the tonic and

More information

Likelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey

Likelihood vs. Information in Aligning Biopolymer Sequences. UCSD Technical Report CS Timothy L. Bailey Likelihood vs. Infomation in Aligning Biopolyme Sequences UCSD Technical Repot CS93-318 Timothy L. Bailey Depatment of Compute Science and Engineeing Univesity of Califonia, San Diego 1 Febuay, 1993 ABSTRACT:

More information

YINGHUA DONG AND GENNADY SAMORODNITSKY

YINGHUA DONG AND GENNADY SAMORODNITSKY CONTACT DISTRIBUTION IN A THINNED BOOLEAN MODEL WITH POWER LAW RADII YINGHUA DONG AND GENNADY SAMORODNITSKY Abstact. We conside a weighted stationay spheical Boolean model in R d. Assuming that the adii

More information

ON SPARSELY SCHEMMEL TOTIENT NUMBERS. Colin Defant 1 Department of Mathematics, University of Florida, Gainesville, Florida

ON SPARSELY SCHEMMEL TOTIENT NUMBERS. Colin Defant 1 Department of Mathematics, University of Florida, Gainesville, Florida #A8 INTEGERS 5 (205) ON SPARSEL SCHEMMEL TOTIENT NUMBERS Colin Defant Depatment of Mathematics, Univesity of Floida, Gainesville, Floida cdefant@ufl.edu Received: 7/30/4, Revised: 2/23/4, Accepted: 4/26/5,

More information

On a quantity that is analogous to potential and a theorem that relates to it

On a quantity that is analogous to potential and a theorem that relates to it Su une quantité analogue au potential et su un théoème y elatif C R Acad Sci 7 (87) 34-39 On a quantity that is analogous to potential and a theoem that elates to it By R CLAUSIUS Tanslated by D H Delphenich

More information

A pathway to matrix-variate gamma and normal densities

A pathway to matrix-variate gamma and normal densities Linea Algeba and its Applications 396 005 317 38 www.elsevie.com/locate/laa A pathway to matix-vaiate gamma and nomal densities A.M. Mathai Depatment of Mathematics and Statistics, McGill Univesity, 805

More information

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution

On the Quasi-inverse of a Non-square Matrix: An Infinite Solution Applied Mathematical Sciences, Vol 11, 2017, no 27, 1337-1351 HIKARI Ltd, wwwm-hikaicom https://doiog/1012988/ams20177273 On the Quasi-invese of a Non-squae Matix: An Infinite Solution Ruben D Codeo J

More information

An upper bound on the number of high-dimensional permutations

An upper bound on the number of high-dimensional permutations An uppe bound on the numbe of high-dimensional pemutations Nathan Linial Zu Luia Abstact What is the highe-dimensional analog of a pemutation? If we think of a pemutation as given by a pemutation matix,

More information

Parameter identification in Markov chain choice models

Parameter identification in Markov chain choice models Poceedings of Machine Leaning Reseach 76:1 11, 2017 Algoithmic Leaning Theoy 2017 Paamete identification in Makov chain choice models Aushi Gupta Daniel Hsu Compute Science Depatment Columbia Univesity

More information

New lower bounds for the independence number of sparse graphs and hypergraphs

New lower bounds for the independence number of sparse graphs and hypergraphs New lowe bounds fo the independence numbe of spase gaphs and hypegaphs Kunal Dutta, Dhuv Mubayi, and C.R. Subamanian May 23, 202 Abstact We obtain new lowe bounds fo the independence numbe of K -fee gaphs

More information

Probablistically Checkable Proofs

Probablistically Checkable Proofs Lectue 12 Pobablistically Checkable Poofs May 13, 2004 Lectue: Paul Beame Notes: Chis Re 12.1 Pobablisitically Checkable Poofs Oveview We know that IP = PSPACE. This means thee is an inteactive potocol

More information

Internal Accession Date Only

Internal Accession Date Only Reduced-Redundancy Poduct Codes fo Bust Eo Coection Ron M. Roth Gadiel Seoussi y Abstact Inatypical bust-eo coection application of a poduct code of n v n h aays, one uses an [n h ;n h h ]codec h that

More information

Lecture 28: Convergence of Random Variables and Related Theorems

Lecture 28: Convergence of Random Variables and Related Theorems EE50: Pobability Foundations fo Electical Enginees July-Novembe 205 Lectue 28: Convegence of Random Vaiables and Related Theoems Lectue:. Kishna Jagannathan Scibe: Gopal, Sudhasan, Ajay, Swamy, Kolla An

More information

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q

Secret Exponent Attacks on RSA-type Schemes with Moduli N = p r q Secet Exponent Attacks on RSA-type Schemes with Moduli N = p q Alexande May Faculty of Compute Science, Electical Engineeing and Mathematics Univesity of Padebon 33102 Padebon, Gemany alexx@uni-padebon.de

More information

arxiv: v1 [math.co] 6 Mar 2008

arxiv: v1 [math.co] 6 Mar 2008 An uppe bound fo the numbe of pefect matchings in gaphs Shmuel Fiedland axiv:0803.0864v [math.co] 6 Ma 2008 Depatment of Mathematics, Statistics, and Compute Science, Univesity of Illinois at Chicago Chicago,

More information

An intersection theorem for four sets

An intersection theorem for four sets An intesection theoem fo fou sets Dhuv Mubayi Novembe 22, 2006 Abstact Fix integes n, 4 and let F denote a family of -sets of an n-element set Suppose that fo evey fou distinct A, B, C, D F with A B C

More information

THE CONE THEOREM JOEL A. TROPP. Abstract. We prove a fixed point theorem for functions which are positive with respect to a cone in a Banach space.

THE CONE THEOREM JOEL A. TROPP. Abstract. We prove a fixed point theorem for functions which are positive with respect to a cone in a Banach space. THE ONE THEOEM JOEL A. TOPP Abstact. We pove a fixed point theoem fo functions which ae positive with espect to a cone in a Banach space. 1. Definitions Definition 1. Let X be a eal Banach space. A subset

More information

RELIABILITY is an important concept in the design

RELIABILITY is an important concept in the design Poceedings of the Wold Congess on Engineeing 0 Vol I WCE 0, July -, 0, London, U.K. Reliability Measues in Ciculant Netwok *Inda Rajasingh, Bhaati Rajan, and R. Sundaa Rajan Abstact Reliability and efficiency

More information

FEASIBLE FLOWS IN MULTICOMMODITY GRAPHS. Holly Sue Zullo. B. S., Rensselaer Polytechnic Institute, M. S., University of Colorado at Denver, 1993

FEASIBLE FLOWS IN MULTICOMMODITY GRAPHS. Holly Sue Zullo. B. S., Rensselaer Polytechnic Institute, M. S., University of Colorado at Denver, 1993 FEASIBLE FLOWS IN MULTICOMMODITY GRAPHS by Holly Sue Zullo B. S., Rensselae Polytechnic Institute, 1991 M. S., Univesity of Coloado at Denve, 1993 A thesis submitted to the Faculty of the Gaduate School

More information

Efficiency Loss in a Network Resource Allocation Game

Efficiency Loss in a Network Resource Allocation Game Efficiency Loss in a Netwok Resouce Allocation Game Ramesh Johai johai@mit.edu) John N. Tsitsiklis jnt@mit.edu) June 11, 2004 Abstact We exploe the popeties of a congestion game whee uses of a congested

More information

ASTR415: Problem Set #6

ASTR415: Problem Set #6 ASTR45: Poblem Set #6 Cuan D. Muhlbege Univesity of Mayland (Dated: May 7, 27) Using existing implementations of the leapfog and Runge-Kutta methods fo solving coupled odinay diffeential equations, seveal

More information

Appendix B The Relativistic Transformation of Forces

Appendix B The Relativistic Transformation of Forces Appendix B The Relativistic Tansfomation of oces B. The ou-foce We intoduced the idea of foces in Chapte 3 whee we saw that the change in the fou-momentum pe unit time is given by the expession d d w x

More information

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra

Analytical Solutions for Confined Aquifers with non constant Pumping using Computer Algebra Poceedings of the 006 IASME/SEAS Int. Conf. on ate Resouces, Hydaulics & Hydology, Chalkida, Geece, May -3, 006 (pp7-) Analytical Solutions fo Confined Aquifes with non constant Pumping using Compute Algeba

More information

β β β β β B B B B o (i) (ii) (iii)

β β β β β B B B B o (i) (ii) (iii) Output-Sensitive Algoithms fo Unifom Patitions of Points Pankaj K. Agawal y Binay K. Bhattachaya z Sandeep Sen x Octobe 19, 1999 Abstact We conside the following one and two-dimensional bucketing poblems:

More information

Method for Approximating Irrational Numbers

Method for Approximating Irrational Numbers Method fo Appoximating Iational Numbes Eic Reichwein Depatment of Physics Univesity of Califonia, Santa Cuz June 6, 0 Abstact I will put foth an algoithm fo poducing inceasingly accuate ational appoximations

More information