New Bounds for Distributed Storage Systems with Secure Repair

Size: px
Start display at page:

Download "New Bounds for Distributed Storage Systems with Secure Repair"

Transcription

1 New Bouns for Distribute Storage Systems with Secure Repair Ravi Tanon 1 an Soheil Mohajer 1 Discovery Analytics Center & Department of Computer Science, Virginia Tech, Blacksburg, VA Department of Electrical an Computer Engineering, University of Minnesota, Twin Cities, MN Abstract In this paper, we consier exact-repair istribute storage systems. Characterizing the optimal storage-vs-repair banwith traeoff for such systems remains an open problem, in general with results available in the literature for very specific instances. We characterize the optimal traeoff between storage an repair banwith if in aition to exact-repair requirements, an aitional requirement of pair-wise symmetry on the repair process is impose. The optimal traeoff surprisingly consists of only one efficient point, namely the minimum banwith regenerating (MBR point. These results are also extene to the case in which the store ata (or repair ata must be secure from an external wiretapper, an the corresponingly optimal secure traeoffs are also characterize. The main technical tool use in the converse proofs is a use of Han s inequality for sub-sets of ranom variables. Finally, we also present results in which the pair-wise symmetry constraint is relaxe an a new converse boun is obtaine for the case of exact repair in which an external aversary can access the repair ata of any one noe. This boun improves upon the existing best known results for the secure an exact repair problem. I. INTRODUCTION Contemporary istribute storage systems store massive amounts of ata over a set of istribute noes. Besies the traitional goals of achieving reliability by introucing reunancy, new aspects such as efficient repair of faile storage noes make their esign even more challenging. To overcome these issues, the concept of regenerating coes for istribute storage systems was introuce by Dimakis et al. 3]. A istribute storage system (DSS consists of n storage noes each with a storage capacity of α units of ata such that the entire file of size B can be recovere by accessing any k < n noes. This is calle as the reconstruction property of the DSS. Whenever a noe fails, noes (where k n 1 participate in the repair process by sening β units of ata each. This proceure is terme as the regeneration of a faile noe an β is referre to as the per-noe repair banwith. In 3], by using the concepts of network coing ], the authors show that the parameters of a DSS must satisfy B min (α, ( iβ. (1 i=0 Thus, in orer to store a file of size B, there exists a funamental traeoff between α (storage an β (total repair banwith. However, this traeoff is in general achievable tanonr@vt.eu, soheil@umn.eu only for the functional-repair case 3]. In functional repair, a faile noe is replace by a new noe such that the resulting DSS has the same reconstruction an regeneration capabilities as before. In particular, the contents of the repaire noe may not necessarily be ientical to the faile noe even though the esirable properties of the DSS are preserve. In contrast to functional repair, exact repair regeneration requires the repair process to replace a faile noe with an ientical new noe. Exact repair is a practically appealing property specially when it is esirable that the store contents remain intact over time. Furthermore, the file recovery process is also easier in this case as the reconstruction proceure nee not change whenever a faile noe is replace. While characterizing the storage-vs-banwith traeoff for the case of exact repair remains a challenging open problem in general, two extreme points of this traeoff (epening on whether α or β is minimize first namely, the minimum storage regenerating case (MSR an the minimum banwith regenerating (MBR case have been stuie extensively (see 5], 6] an references therein. Beyon these points, the optimal exact-repair traeoff for the (, 3, 3-DSS was characterize in 7] where it has been shown that the optimal traeoffs for functional an exact repair are ifferent. There have been several recent works in this regar, namely new outer bouns (converse results beyon (, 3, 3 in 1], as well as novel achievable schemes in 15] an 16], an new results for secure an exact repair in 17] 19]. Even though these recent avances have brought forth new insights on the funamental problem of exact repair, the general problem of characterizing the optimal traeoff for the exact repair problem remains open till ate. Besies the requirements of exact repair, another important esign concern for such systems is that of ata security. Pawar et.al 9] introuce the notion of information theoretic security for such systems where various moels for the aversary are introuce an investigate. In one of those moels (which we refer to as Type-I moel, the aversary can access the ata store in any l < k noes. In another moel (referre to as the Type-II moel, the aversary is more powerful an can access not only the content of the noes but the repair ata of any l < k noes sent by other noes to repair. The focus of this paper is on the exact repair problem with such security constraints an the main contributions of this paper are two fol: For the istribute storage system with an external

2 aversary, we obtain new outer bouns for the exact an secure repair problem. In particular, we consier the general (n, k, DSS operating in the presence of an eavesropper which can rea the repair ata of any l noes. The goal is to fin the maximum size of ata which can be store while being information theoretically secure from such aversary. An upper boun on the amissible file size for this general problem was obtaine in 9] together with some optimality results; however the general problem still remains open. We evelop a new boun for this problem for general parameters (n, k, an for l = 1 an show that it outperforms the bouns of 9]. We also focus on the exact repair problem with an aitional conition of pair-wise symmetric repair. The pair-wise symmetric repair conition refers to the following: consier any two storage noes, for example, noes i an j an a set of other ( 1 helper noes which we enote collectively as H. Now, consier the repair of noe i from noe j an the fixe ( 1 helper noes an enote the repair ata sen by noe j as S j i. Similarly, consiering the repair of noe j from noe i an the same set of fixe helper noes, we efine the repair ata sent from noe i to noe j as. Then, the pair-wise symmetric repair conition enforces that = S j i. In other wors, it means that given the fixe set of ( 1 helper noes, the ata which noe i sens to repair noe j must be the same as the ata which noe j must sen to repair noe i. Through a novel converse proof, we characterize the optimal traeoff of the exact repair problem along with the pair-wise symmetry conition. Interestingly, the traeoff only has one efficient point (namely the minimum banwith regenerating (MBR point, the achievability for which has been establishe in 11]. The pair-wise symmetry restriction also presents an operation interpretation of the MBR point an shows that there exists no other (more efficient exact repair point satisfying such a conition. Notation: We enote the set {1,,..., m} by m] for m Z +. For any set A n] we efine W A = {W i : i A}. For sets A, B n], we efine S A B = { : i A, j B}. Finally we use S A B to enote the union of repair ata in both irections, i.e, (S A B, S B A. II. SYSTEM MODEL A (n, k,, l DSS consists of n storage noes that store a file F of size B across n noes, with each noe storing up to α units of ata. A ata collector connects to any k < n noes in orer to reconstruct the file F. This is known as the MDS property of the DSS 3]. We focus on single noe failures in which at any given point only one noe in the system coul fail. For the repair of a faile noe, any out of the remaining (n 1 alive noes sen β α units of ata in orer to ai the repair process. The parameter β is referre to as the total repair banwith. From an information theoretic perspective, the goal is to store a file F, whose entropy is B, i.e., H(F = B. Let W i enote the storage content at noe i, for i = 1,..., n. Hence, H(W i α, i = 1,,..., n. ( Due to the MDS property we also have H (F W K = 0, K n] with K = k. (3 Let enote the ata sent by noe i to repair noe j. Due to the repair banwith constraint, we have H( β, i, j n] ( an for exact repair of noe j from noes, we also have H(W j S D j = 0, j / D n], D =. (5 Since is a function of the ata store in noe i, we have H( W i = 0. Secrecy Constraints: We also have another parameter l < k, which signifies the number of noes an aversary can wiretap. In particular, we consier two types of aversaries: Type-I: aversary can wiretap only the store ata on any l noes. For any l < k noes to be secure, we require I (F ; W L = 0, L n] with L l (6 where W L is the ata store on noes whose inex belong to L. Type-II: aversary can wiretap the repair ata of any l noes. For the repair of any l < k noes to be secure, we require I (F ; S n1, S n..., S nl = 0, (7 where S ni is the repair ata ownloae from any other noes to repair noe n i. Note that the noes repairing n i might be ifferent from those helping to repair n j. We first note that the Type-I aversary is in general weaker than Type-II aversary since the constraint (7 implies (6 but not the other way aroun. Finally, we note that by setting l = 0, we recover the original problem with no security constraints. III. MAIN RESULTS & DISCUSSION Theorem 1 The secrecy capacity of an (n, k, storage system with Type-II secrecy against an eavesropper who observes the repair ata for any l = 1 noe is upper boune by B S k 1 α + (k 1(3 k β. (8 The best existing results for the Type-II secrecy problem with general parameters are in 9] which shows that B S min (α, ( iβ. (9 i=l The result of Theorem 1 improves upon the above boun in general. We next illustrate our boun in (8 together with the

3 (n, k, =(5,, ` =1 1/3 5/1 1/5 New boun (8 = B S = B S Pair-wise Symmetric Repair (10 Theorem The optimal (α, β trae-off for an (n, k,, l istribute storage system with exact an pair-wise symmetric repair is given by B S (k l (( k for both Type-I an Type-II secrecy. ( ] l ( α min, β (11 1/6 1/3 8/1 /5 Pawar et.al s boun (9 1/ /3 = (MBR Fig. 1: Bouns for (n, k, = (5,, an l = 1. boun in (9 for the case of (n, k, = (5,, an l = 1 in Figure 1. We strongly believe that even being tighter, the boun in Theorem 1 is not achievable. We in fact conjecture that the secrecy capacity for a general (n, k,, l system with strong secrecy constraint is upper boune by B S (k l (( k ( l ] min ( α, β (10 In particular, this conjecture suggests that the MBR point in the only efficient point on the optimum trae-off for the strong secrecy capacity of DSSs. Specific scenarios for which the Type-II secrecy problem has been completely solve are in 17] 19], an correspon to the following cases: All (n, k,, l, 3 (n, k, = (n, n 1, n 1 an l = n. For all these cases, this conjecture has been prove to be true. Even though we are unable to prove this conjecture uner the general setting, we next consier a constraine version of this problem with a pair-wise symmetric repair conition an prove that the optimal trae-off for this restricte problem is inee given by the above boun. The pair-wise symmetric repair conition refers to the following: consier any two storage noes, for example, noes i an j an a set of other ( 1 helper noes which we enote collectively as H. Now, consier the repair of noe i from noe j an noes in H an enote the repair ata sen by noe j as S j i. Similarly, consiering the repair of noe j from noe i an the same set of fixe helper noes H, we efine the repair ata sent from noe i to noe j as. Then, the pair wise symmetric repair conition enforces that = S j i. In other wors, it means that given the fixe set of ( 1 helper noes, the ata which noe i sens to repair noe j must be the same as the ata which noe j must sen to repair noe i an hence the name pair-wise symmetric repair. This result shows that with the symmetric pair-wise repair constraint, the only efficient point in the storage-banwith traeoff is the MBR point. This also provies another operational interpretation of the MBR point. The proofs for Theorems 1 an are presente next. IV. PROOF OF THEOREM 1 In this section we focus on the case of Type-II secrecy with l = 1, an present the proof of Theorem 1. Let A + 1] be an arbitrary set with A = k 1, an i + 1] \ A be an inex not in A. We have B S = H(F = H(F S +1]\{i} i = H(F, S +1] i H(S +1] i (1 H(F, W A, S +1] i H(S +1] i = H(W A, S +1] i H(S +1] i = H(W A + H(S +1] i W A H(S +1] i H(W A + H(S +1] i S A i H(S +1] i = H(W A H(S A i. (13 where in (1 we just ae S i i to what the eavesropper observes, an set S i i to be a ummy variable with zero entropy. In orer to boun H(S A i we can write H(S A i = ( 1 k 1 A +1]\{i} A = 1 ( A +1]\{i} A = H(S A i (1 H(S A i (15 k 1 H(W i. (16 where (1 follows from the symmetry of the repair variables, that is, H(S A i is invariant w.r.t. the choice of A + 1] \ {i} provie that A = k 1; (15 follows from Han s inequality 13]; an inequality in (16 hols since the content of noe i can be reconstructe from repair ata ownloae from noes in A with A =. In orer to upper boun H(W A, we can write H(W A = H(W i W i 1] = H(Wi I(W i ; W i 1] ], (17

4 an boun the mutual information above by I(W i ; W i 1] I(S i i 1] ; S i 1] i = I(S i i] ; S i] i (18 = H(S i i] + H(S i] i H(S i i] (19 where in (18 we just ae S i i which is a ummy ranom variable, with zero entropy. Next we boun terms in (19 iniviually. First note that H(S i i] + H(S k:+1] 1:] j=1 j=1 i=j = H i +1 j=1 i=j = H +1 j=1 i=j j=1 W j (0 H(W A. (1 Note that in orer to get (0, we can argue that W 1 can be recovere from +1 j=1 S j 1. Once W 1 is available, we can construct S 1, which together with +1 j= S j can reconstruct W. Now, from W 1 an W, we fin S 1 3 an S 3, respectively, an then with the help of +1 j=3 S j 3 we recover W 3. Continuing this proceure, all the content of all iscs in k 1] can be recovere. Similarly, H(S i] i + H(S k:+1] 1:] j=1 = H i S j i, j=1 i=j+1 j=1 i=j+1 S j i, S j i, +1 j=k S j i W i H(W A. ( Finally we can boun the last term in (19 using the following lemma. The proof of lemma is presente in Appenix I. Lemma 1 For the (n, k, istribute storage system with exact repair requirements, we have H(S i i] H(S +1] i H(S +1] ] H(S +1] i H(W A. (3 Plugging (19, (1, (, an (3 in (17, we get H(W A H(W i + H(S k:+1] 1:] + which together with (16 imply H(S +1] i ( B S 1 H(W i + 1 H(S k:+1] 1:] ( k 1 + k 1 H(S +1] i k 1 ( (k 1( + k (k 1( α + + β = k 1 (k 1(3 k α + β, which is the esire boun. Note that this boun is a vali one for. For <, the problem has been completely solve from the results in 17] 19]. V. PROOF OF THEOREM We prove the boun for Type-I secrecy. Valiity of the boun for Type-II secrecy is just an immeiate consequence of the fact that Type-II secrecy is stronger than Type-I. We boun the entropy of the file, F as follows B S = H(F = H(F W 1,..., W l (5 H(F, W l+1,..., W k W 1,..., W l = H(W l+1,..., W k W 1,..., W l + H(F W 1,..., W l, W l+1,..., W k = H(W l+1,..., W k W 1,..., W l (6 k = H(W i W 1,..., W i 1 (7 where (5 follows from the Type-I (weaker secrecy constraint, an (6 follows from the property that the file F must be recoverable from the ata store in any k noes. Next, the rest of the proof is evote to upper bouning the terms appearing in the summation. In particular, there are two ways to upper boun the terms. The first one is rather

5 straightforwar an is as follows: B S k k H(W i W 1,..., W i 1 H(S +1] i S i 1] i k ( i + 1β (8 to obtain one of the terms in Theorem an has the epenence on the repair banwith, β. We next prove the other boun (which epens on the storage parameter α. To this en, we rewrite the summation in (7 as k B S H(W i W 1,..., W i 1 (9 = k ] H(W i I(W i ; W i 1] (30 In orer to further upper boun the above expression, we state the following Lemma which is central to the proof. We present the proof of Lemma in Appenix II. Intuitively, this lemma states that with exact an pair-wise symmetric repair constraint, the mutual information between the content on a noe W s+1 an the ata store at s other noes is lower boune as a fraction of the entropy of the noe W s+1. Lemma For the (n, k, istribute storage system with exact an pair-wise symmetric repair requirements, we have ( s I(W s+1 ; W 1,..., W s H(W s+1 (31 for any 1 s. Using Lemma, we further upper boun (30 as follows: B S = = k k k k ] H(W i I(W i ; W i 1] H(W i ( i + 1 ( i + 1 ( i 1 H(W i Hence, from (8 an (3, we arrive at k ( α B S ( i + 1 min, β = (k l (( k ] H(W i α (3 ( ] l ( α min, β (33 thus completing the proof of Theorem. VI. CONCLUSIONS We consiere the istribute storage problem with exact repair an information theoretic secrecy constraints. We evelope a novel outer boun on the storage an repair banwith traeoff. Our results for the general problem improve upon the best known outer bouns for this problem for all (n, k, parameters when the eavesropper can access the repair ata of any one noe. Furthermore, uner a more restrictive scenario of pair-wise symmetric repair, we completely characterize the corresponing traeoff an show that it correspons to the MBR point. The key technical element in the proofs of these results involves a novel use of Han s inequality. Future work inclues extensions of this technique for tightening of the bouns for l 1. APPENDIX I PROOF OF LEMMA 1 We can prove a stronger claim, that is, for any τ, we have τ τ H(S +1] i H(S i i] + H(S +1] τ]. (3 This can be prove by inuction on τ. It is clear that for τ = 1, the summation in the RHS reuces to the entropy of a ummy variable S 1 1, which is zero. The remaining terms are just ientical, an so the inequality hols with equality. Now, assume the claim hols for τ 1. Then we have τ H(S +1] i = H(S +1] i + H(S +1] τ ] H(S i i] + H(S +1] ] + H(S +1] τ = H(S i i] + H(S +1] ], S ] τ (35 + H(S +1] τ, S τ ] (36 = H(S i i] + H(S +1] ], S τ τ] + H(S +1] τ, S τ τ] (37 H(S i i] + H(S τ τ] + H(S +1] ], S +1] τ, S τ τ] (38 τ H(S i i] + H(S +1] τ]. (39 Note that (35 hols because of the inuction assumption for τ 1. in (36 we use the fact that for any 1 j τ, having repair ata from ( + 1 (from noes excluing itself one can recover W j, an hence S j i, for any i. In particular, S i i 1] is a function of the repair ata;

6 in (37 we just use the efinition of S τ τ], an the fact that S τ τ is a ummy variable; an (38 follows from inequality H(XZ + H(Y Z H(XY Z + H(Z. This completes the proof. First note that APPENDIX II PROOF OF LEMMA H(S s+1 s] W s+1 = 0 (0 ue to the fact that S s+1 i is the repair ata sent by the noe s + 1 in the repair of noe i, for i = 1,..., s. Furthermore, we also note that H(S s] s+1 W s] = 0 (1 since S i s+1 is the repair ata sent by noe i in the repair of noe s+1. We can thus lower boun the mutual information I(W s+1 ; W s] as I(W s+1 ; W s] I(S s+1 s] ; S s] s+1 = I(S s] s+1 ; S s] s+1 ( = H(S s] s+1. (3 In (, we invoke the pair-wise symmetric repair constraint, i.e., = S j i an replace S s+1 i by S i s+1 for i = 1,..., s. To complete the proof of the lemma, we next show the following H(S s] s+1 s H(W s+1. ( To prove (, we can write H(S s] s+1 = ( 1 s s 1 ( A +1]\{s+1} A =s A +1]\{s+1} A = H(S A s+1 (5 H(S A s+1 (6 s H(W s+1 (7 where (5 follows from the fact that the system is symmetric, an H(S A s+1 is the same for all A with A = s; in (6 we have use Han s inequality 13] for ranom variables X i = S i s+1, for i + 1] \ {s + 1}, which is 1 ( s A: A =s H(X(A s 1 ( A : A = H(X(A. Finally, (7 follows from the fact that W s+1 must be recoverable from the repair ata coming in from noes. Substituting (7 in (3 we get the esire boun. ] K. V. Rashmi, N. B. Shah an P. V. Kumar, Enabling noe repair in any erasure coe for istribute storage, in arxiv: , Jun ] A. G. Dimakis, P. B. Gofrey, Y. Wu, M. Wainwright an K. Ramchanran, Network coing for istribute storage systems, IEEE Trans. Inf. Theory, vol. 56, no. 9, pp , Sept ] R. Ahlswee, N. Cai, S.-Y. R. Li an R. W. Yeung, Network information flow, IEEE Trans. Inf. Theory, vol. 6, pp , Jul ] N. B. Shah, K. V. Rashmi, P. V. Kumar an K. Ramchanran, Distribute storage coes with repair-by-transfer an non-achievability of interior points on the storage-banwith traeoff, IEEE Trans. Inf. Theory, vol. 58, no. 3, pp , Mar ] V. Caambe, S. Jafar, H. Maleki, K. Ramchanran an C. Suh, Asymptotic interference alignment for optimal repair of MDS coes in istribute storage, IEEE Trans Inf. Theory, vol. 59, no. 5, pp , May ] C. Tian, Rate region of the (,3,3 exact-repair regenerating coes, in Proc. Intern. Symp. Inf Theory, ISIT, Istanbul, Turkey, Jun ] A. S. Rawat, O. O. Koyluoglu, N. Silberstein, an S. Vishwanath, Optimal locally repairable an secure coes for istribute storage systems, in arxiv: , Aug ] S. Pawar, S. El Rouayheb, an K. Ramchanran, Securing ynamic istribute storage systems against eavesropping an aversarial attacks, IEEE Trans. Inf. Theory, vol. 58, pp , Mar ] O. O. Koyluoglu, A. S. Rawat, an S. Vishwanath, Secure Cooperative Regenerating Coes for Distribute Storage Systems,, in arxiv: , Oct ] N. B. Shah, K. V. Rashmi, an P. V. Kumar, Information-theoretically secure regenerating coes for istribute storage, in Proc. IEEE Global Commun. Conf., GLOBECOM, Houston, TX, Dec ] S. Goparaju, S. El Rouayheb, R. Calerbank an H. Vincent Poor, Data Secrecy in Distribute Storage Systems uner Exact Repair, in Proc. IEEE International Symposium on Network Coing, NETCOD, Calgary, Canaa, Jun ] T. M. Cover an J. A. Thomas, Elements of Information Theory, New York: Wiley. 1] B. Sasiharan, K. Senthoor, P. V. Kumar, An Improve Outer Boun on the Storage-Repair-Banwith Traeoff of Exact-Repair Regenerating Coes, in arxiv: , Dec ] C. Tian, B. Sasiharan, V. Aggarwal, V. A. Vaishampayan, P. V. Kumar, Layere, Exact-Repair Regenerating Coes Via Embee Error Correction an Block Designs, in arxiv: , Aug ] S. Goparaju, S. El Rouayheb, R. Calerbank, New Coes an Inner Bouns for Exact Repair in Distribute Storage Systems, in arxiv:10.33, Feb ] R. Tanon, S. Amuru, T. C. Clancy an R. M. Buehrer, Towars Optimal Secure Distribute Storage Systems with Exact Repair, in arxiv: , Oct ] R. Tanon, S. Amuru, T. C. Clancy an R. M. Buehrer, On Secure Distribute Storage Systems with Exact Repair, in Proc. IEEE International Conference on Communications (ICC, Syney, Australia, June ] R. Tanon, S. Amuru, T. C. Clancy an R. M. Buehrer, Distribute Storage Systems with Secure an Exact Repair - New Results, in Proc. Information Theory an Applications Workshop (ITA, San Diego, CA, Feb. 01. REFERENCES 1] K. V. Rashmi, N. B. Shah, D. Gu, H. Kuang, D. Borthakur an K. Ramchanran, A Solution to the Network Challenges of Data Recovery in Erasure-coe Distribute Storage Systems: A Stuy on the Facebook Warehouse Cluster, in arxiv: , Sept. 013.

Distributed Storage Systems with Secure and Exact Repair - New Results

Distributed Storage Systems with Secure and Exact Repair - New Results Distributed torage ystems with ecure and Exact Repair - New Results Ravi Tandon, aidhiraj Amuru, T Charles Clancy, and R Michael Buehrer Bradley Department of Electrical and Computer Engineering Hume Center

More information

Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach

Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Linear Exact Repair Rate Region of (k + 1, k, k) Distributed Storage Systems: A New Approach Mehran Elyasi Department of ECE University of Minnesota melyasi@umn.edu Soheil Mohajer Department of ECE University

More information

Security in Locally Repairable Storage

Security in Locally Repairable Storage 1 Security in Locally Repairable Storage Abhishek Agarwal and Arya Mazumdar Abstract In this paper we extend the notion of locally repairable codes to secret sharing schemes. The main problem we consider

More information

Can Linear Minimum Storage Regenerating Codes be Universally Secure?

Can Linear Minimum Storage Regenerating Codes be Universally Secure? Can Linear Minimum Storage Regenerating Codes be Universally Secure? Sreechakra Goparaju University of California, San Diego La Jolla, CA, USA Email: sgoparaju@ucsd.edu Salim El Rouayheb Illinois Institute

More information

On the Tradeoff Region of Secure Exact-Repair Regenerating Codes

On the Tradeoff Region of Secure Exact-Repair Regenerating Codes 1 On the Tradeoff Region of Secure Exact-Repair Regenerating Codes Shuo Shao, Tie Liu, Chao Tian, and Cong Shen any k out of the total n storage nodes; 2 when a node failure occurs, the failed node can

More information

arxiv: v1 [cs.it] 5 Aug 2016

arxiv: v1 [cs.it] 5 Aug 2016 A Note on Secure Minimum Storage Regenerating Codes Ankit Singh Rawat arxiv:1608.01732v1 [cs.it] 5 Aug 2016 Computer Science Department, Carnegie Mellon University, Pittsburgh, 15213. E-mail: asrawat@andrew.cmu.edu

More information

Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes

Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Progress on High-rate MSR Codes: Enabling Arbitrary Number of Helper Nodes Ankit Singh Rawat CS Department Carnegie Mellon University Pittsburgh, PA 523 Email: asrawat@andrewcmuedu O Ozan Koyluoglu Department

More information

Explicit MBR All-Symbol Locality Codes

Explicit MBR All-Symbol Locality Codes Explicit MBR All-Symbol Locality Codes Govinda M. Kamath, Natalia Silberstein, N. Prakash, Ankit S. Rawat, V. Lalitha, O. Ozan Koyluoglu, P. Vijay Kumar, and Sriram Vishwanath 1 Abstract arxiv:1302.0744v2

More information

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012

Lecture Introduction. 2 Examples of Measure Concentration. 3 The Johnson-Lindenstrauss Lemma. CS-621 Theory Gems November 28, 2012 CS-6 Theory Gems November 8, 0 Lecture Lecturer: Alesaner Mąry Scribes: Alhussein Fawzi, Dorina Thanou Introuction Toay, we will briefly iscuss an important technique in probability theory measure concentration

More information

Capacity Analysis of MIMO Systems with Unknown Channel State Information

Capacity Analysis of MIMO Systems with Unknown Channel State Information Capacity Analysis of MIMO Systems with Unknown Channel State Information Jun Zheng an Bhaskar D. Rao Dept. of Electrical an Computer Engineering University of California at San Diego e-mail: juzheng@ucs.eu,

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi, Nihar B Shah, and P Vijay Kumar, Fellow, IEEE Abstract Regenerating codes

More information

Least-Squares Regression on Sparse Spaces

Least-Squares Regression on Sparse Spaces Least-Squares Regression on Sparse Spaces Yuri Grinberg, Mahi Milani Far, Joelle Pineau School of Computer Science McGill University Montreal, Canaa {ygrinb,mmilan1,jpineau}@cs.mcgill.ca 1 Introuction

More information

Weakly Secure Regenerating Codes for Distributed Storage

Weakly Secure Regenerating Codes for Distributed Storage Weakly Secure Regenerating Codes for Distributed Storage Swanand Kadhe and Alex Sprintson 1 arxiv:1405.2894v1 [cs.it] 12 May 2014 Abstract We consider the problem of secure distributed data storage under

More information

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes

Leaving Randomness to Nature: d-dimensional Product Codes through the lens of Generalized-LDPC codes Leaving Ranomness to Nature: -Dimensional Prouct Coes through the lens of Generalize-LDPC coes Tavor Baharav, Kannan Ramchanran Dept. of Electrical Engineering an Computer Sciences, U.C. Berkeley {tavorb,

More information

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions

Computing Exact Confidence Coefficients of Simultaneous Confidence Intervals for Multinomial Proportions and their Functions Working Paper 2013:5 Department of Statistics Computing Exact Confience Coefficients of Simultaneous Confience Intervals for Multinomial Proportions an their Functions Shaobo Jin Working Paper 2013:5

More information

On MBR codes with replication

On MBR codes with replication On MBR codes with replication M. Nikhil Krishnan and P. Vijay Kumar, Fellow, IEEE Department of Electrical Communication Engineering, Indian Institute of Science, Bangalore. Email: nikhilkrishnan.m@gmail.com,

More information

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments

Time-of-Arrival Estimation in Non-Line-Of-Sight Environments 2 Conference on Information Sciences an Systems, The Johns Hopkins University, March 2, 2 Time-of-Arrival Estimation in Non-Line-Of-Sight Environments Sinan Gezici, Hisashi Kobayashi an H. Vincent Poor

More information

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems

Regenerating Codes and Locally Recoverable. Codes for Distributed Storage Systems Regenerating Codes and Locally Recoverable 1 Codes for Distributed Storage Systems Yongjune Kim and Yaoqing Yang Abstract We survey the recent results on applying error control coding to distributed storage

More information

Distributed storage systems from combinatorial designs

Distributed storage systems from combinatorial designs Distributed storage systems from combinatorial designs Aditya Ramamoorthy November 20, 2014 Department of Electrical and Computer Engineering, Iowa State University, Joint work with Oktay Olmez (Ankara

More information

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d

A new proof of the sharpness of the phase transition for Bernoulli percolation on Z d A new proof of the sharpness of the phase transition for Bernoulli percolation on Z Hugo Duminil-Copin an Vincent Tassion October 8, 205 Abstract We provie a new proof of the sharpness of the phase transition

More information

Fractional Repetition Codes For Repair In Distributed Storage Systems

Fractional Repetition Codes For Repair In Distributed Storage Systems Fractional Repetition Codes For Repair In Distributed Storage Systems 1 Salim El Rouayheb, Kannan Ramchandran Dept. of Electrical Engineering and Computer Sciences University of California, Berkeley {salim,

More information

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage 1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,

More information

Improved Rate-Based Pull and Push Strategies in Large Distributed Networks

Improved Rate-Based Pull and Push Strategies in Large Distributed Networks Improve Rate-Base Pull an Push Strategies in Large Distribute Networks Wouter Minnebo an Benny Van Hout Department of Mathematics an Computer Science University of Antwerp - imins Mielheimlaan, B-00 Antwerp,

More information

Secure RAID Schemes from EVENODD and STAR Codes

Secure RAID Schemes from EVENODD and STAR Codes Secure RAID Schemes from EVENODD and STAR Codes Wentao Huang and Jehoshua Bruck California Institute of Technology, Pasadena, USA {whuang,bruck}@caltechedu Abstract We study secure RAID, ie, low-complexity

More information

SYNCHRONOUS SEQUENTIAL CIRCUITS

SYNCHRONOUS SEQUENTIAL CIRCUITS CHAPTER SYNCHRONOUS SEUENTIAL CIRCUITS Registers an counters, two very common synchronous sequential circuits, are introuce in this chapter. Register is a igital circuit for storing information. Contents

More information

Cloud-Aided Interference Management with Cache-Enabled Edge Nodes and Users

Cloud-Aided Interference Management with Cache-Enabled Edge Nodes and Users F arxiv:90.06698v [cs.it] 0 Jan 09 C F ireless nel Clou-Aie Interference Management with Cache-Enable Ege Noes an Users Seye Pooya Shariatpanahi,, Jingjing Zhang 3, Osvalo Simeone 3, Babak Hossein Khalaj

More information

Topic 7: Convergence of Random Variables

Topic 7: Convergence of Random Variables Topic 7: Convergence of Ranom Variables Course 003, 2016 Page 0 The Inference Problem So far, our starting point has been a given probability space (S, F, P). We now look at how to generate information

More information

Lower Bounds for the Smoothed Number of Pareto optimal Solutions

Lower Bounds for the Smoothed Number of Pareto optimal Solutions Lower Bouns for the Smoothe Number of Pareto optimal Solutions Tobias Brunsch an Heiko Röglin Department of Computer Science, University of Bonn, Germany brunsch@cs.uni-bonn.e, heiko@roeglin.org Abstract.

More information

Lecture 2 Lagrangian formulation of classical mechanics Mechanics

Lecture 2 Lagrangian formulation of classical mechanics Mechanics Lecture Lagrangian formulation of classical mechanics 70.00 Mechanics Principle of stationary action MATH-GA To specify a motion uniquely in classical mechanics, it suffices to give, at some time t 0,

More information

Relative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation

Relative Entropy and Score Function: New Information Estimation Relationships through Arbitrary Additive Perturbation Relative Entropy an Score Function: New Information Estimation Relationships through Arbitrary Aitive Perturbation Dongning Guo Department of Electrical Engineering & Computer Science Northwestern University

More information

On colour-blind distinguishing colour pallets in regular graphs

On colour-blind distinguishing colour pallets in regular graphs J Comb Optim (2014 28:348 357 DOI 10.1007/s10878-012-9556-x On colour-blin istinguishing colour pallets in regular graphs Jakub Przybyło Publishe online: 25 October 2012 The Author(s 2012. This article

More information

Product-matrix Construction

Product-matrix Construction IERG60 Coding for Distributed Storage Systems Lecture 0-9//06 Lecturer: Kenneth Shum Product-matrix Construction Scribe: Xishi Wang In previous lectures, we have discussed about the minimum storage regenerating

More information

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs

Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Perfect Matchings in Õ(n1.5 ) Time in Regular Bipartite Graphs Ashish Goel Michael Kapralov Sanjeev Khanna Abstract We consier the well-stuie problem of fining a perfect matching in -regular bipartite

More information

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets

Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Proceeings of the 4th East-European Conference on Avances in Databases an Information Systems ADBIS) 200 Estimation of the Maximum Domination Value in Multi-Dimensional Data Sets Eleftherios Tiakas, Apostolos.

More information

Fluid model for a data network with α-fair bandwidth sharing and general document size distributions: two examples of stability

Fluid model for a data network with α-fair bandwidth sharing and general document size distributions: two examples of stability IMS Lecture Notes Monograph Series??? Vol. 0 (0000) 1 c Institute of Mathematical Statistics, 0000 Flui moel for a ata network with α-fair banwith sharing an general ocument size istributions: two examples

More information

Agmon Kolmogorov Inequalities on l 2 (Z d )

Agmon Kolmogorov Inequalities on l 2 (Z d ) Journal of Mathematics Research; Vol. 6, No. ; 04 ISSN 96-9795 E-ISSN 96-9809 Publishe by Canaian Center of Science an Eucation Agmon Kolmogorov Inequalities on l (Z ) Arman Sahovic Mathematics Department,

More information

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes

Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Codes Stopping-Set Enumerator Approximations for Finite-Length Protograph LDPC Coes Kaiann Fu an Achilleas Anastasopoulos Electrical Engineering an Computer Science Dept. University of Michigan, Ann Arbor, MI

More information

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms

On Characterizing the Delay-Performance of Wireless Scheduling Algorithms On Characterizing the Delay-Performance of Wireless Scheuling Algorithms Xiaojun Lin Center for Wireless Systems an Applications School of Electrical an Computer Engineering, Purue University West Lafayette,

More information

Qubit channels that achieve capacity with two states

Qubit channels that achieve capacity with two states Qubit channels that achieve capacity with two states Dominic W. Berry Department of Physics, The University of Queenslan, Brisbane, Queenslan 4072, Australia Receive 22 December 2004; publishe 22 March

More information

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21

'HVLJQ &RQVLGHUDWLRQ LQ 0DWHULDO 6HOHFWLRQ 'HVLJQ 6HQVLWLYLW\,1752'8&7,21 Large amping in a structural material may be either esirable or unesirable, epening on the engineering application at han. For example, amping is a esirable property to the esigner concerne with limiting

More information

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy,

NOTES ON EULER-BOOLE SUMMATION (1) f (l 1) (n) f (l 1) (m) + ( 1)k 1 k! B k (y) f (k) (y) dy, NOTES ON EULER-BOOLE SUMMATION JONATHAN M BORWEIN, NEIL J CALKIN, AND DANTE MANNA Abstract We stuy a connection between Euler-MacLaurin Summation an Boole Summation suggeste in an AMM note from 196, which

More information

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device

Closed and Open Loop Optimal Control of Buffer and Energy of a Wireless Device Close an Open Loop Optimal Control of Buffer an Energy of a Wireless Device V. S. Borkar School of Technology an Computer Science TIFR, umbai, Inia. borkar@tifr.res.in A. A. Kherani B. J. Prabhu INRIA

More information

Schrödinger s equation.

Schrödinger s equation. Physics 342 Lecture 5 Schröinger s Equation Lecture 5 Physics 342 Quantum Mechanics I Wenesay, February 3r, 2010 Toay we iscuss Schröinger s equation an show that it supports the basic interpretation of

More information

arxiv: v1 [cs.it] 21 Aug 2017

arxiv: v1 [cs.it] 21 Aug 2017 Performance Gains of Optimal Antenna Deployment for Massive MIMO ystems Erem Koyuncu Department of Electrical an Computer Engineering, University of Illinois at Chicago arxiv:708.06400v [cs.it] 2 Aug 207

More information

Logarithmic spurious regressions

Logarithmic spurious regressions Logarithmic spurious regressions Robert M. e Jong Michigan State University February 5, 22 Abstract Spurious regressions, i.e. regressions in which an integrate process is regresse on another integrate

More information

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013

Survey Sampling. 1 Design-based Inference. Kosuke Imai Department of Politics, Princeton University. February 19, 2013 Survey Sampling Kosuke Imai Department of Politics, Princeton University February 19, 2013 Survey sampling is one of the most commonly use ata collection methos for social scientists. We begin by escribing

More information

A PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks

A PAC-Bayesian Approach to Spectrally-Normalized Margin Bounds for Neural Networks A PAC-Bayesian Approach to Spectrally-Normalize Margin Bouns for Neural Networks Behnam Neyshabur, Srinah Bhojanapalli, Davi McAllester, Nathan Srebro Toyota Technological Institute at Chicago {bneyshabur,

More information

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics

This module is part of the. Memobust Handbook. on Methodology of Modern Business Statistics This moule is part of the Memobust Hanbook on Methoology of Moern Business Statistics 26 March 2014 Metho: Balance Sampling for Multi-Way Stratification Contents General section... 3 1. Summary... 3 2.

More information

Regular tree languages definable in FO and in FO mod

Regular tree languages definable in FO and in FO mod Regular tree languages efinable in FO an in FO mo Michael Beneikt Luc Segoufin Abstract We consier regular languages of labele trees. We give an effective characterization of the regular languages over

More information

On combinatorial approaches to compressed sensing

On combinatorial approaches to compressed sensing On combinatorial approaches to compresse sensing Abolreza Abolhosseini Moghaam an Hayer Raha Department of Electrical an Computer Engineering, Michigan State University, East Lansing, MI, U.S. Emails:{abolhos,raha}@msu.eu

More information

Lower bounds on Locality Sensitive Hashing

Lower bounds on Locality Sensitive Hashing Lower bouns on Locality Sensitive Hashing Rajeev Motwani Assaf Naor Rina Panigrahy Abstract Given a metric space (X, X ), c 1, r > 0, an p, q [0, 1], a istribution over mappings H : X N is calle a (r,

More information

Proof of SPNs as Mixture of Trees

Proof of SPNs as Mixture of Trees A Proof of SPNs as Mixture of Trees Theorem 1. If T is an inuce SPN from a complete an ecomposable SPN S, then T is a tree that is complete an ecomposable. Proof. Argue by contraiction that T is not a

More information

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS

ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS ALGEBRAIC AND ANALYTIC PROPERTIES OF ARITHMETIC FUNCTIONS MARK SCHACHNER Abstract. When consiere as an algebraic space, the set of arithmetic functions equippe with the operations of pointwise aition an

More information

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward

An Analytical Expression of the Probability of Error for Relaying with Decode-and-forward An Analytical Expression of the Probability of Error for Relaying with Decoe-an-forwar Alexanre Graell i Amat an Ingmar Lan Department of Electronics, Institut TELECOM-TELECOM Bretagne, Brest, France Email:

More information

Generalizing Kronecker Graphs in order to Model Searchable Networks

Generalizing Kronecker Graphs in order to Model Searchable Networks Generalizing Kronecker Graphs in orer to Moel Searchable Networks Elizabeth Boine, Babak Hassibi, Aam Wierman California Institute of Technology Pasaena, CA 925 Email: {eaboine, hassibi, aamw}@caltecheu

More information

The Exact Form and General Integrating Factors

The Exact Form and General Integrating Factors 7 The Exact Form an General Integrating Factors In the previous chapters, we ve seen how separable an linear ifferential equations can be solve using methos for converting them to forms that can be easily

More information

Permanent vs. Determinant

Permanent vs. Determinant Permanent vs. Determinant Frank Ban Introuction A major problem in theoretical computer science is the Permanent vs. Determinant problem. It asks: given an n by n matrix of ineterminates A = (a i,j ) an

More information

Transmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency

Transmission Line Matrix (TLM) network analogues of reversible trapping processes Part B: scaling and consistency Transmission Line Matrix (TLM network analogues of reversible trapping processes Part B: scaling an consistency Donar e Cogan * ANC Eucation, 308-310.A. De Mel Mawatha, Colombo 3, Sri Lanka * onarecogan@gmail.com

More information

Quantile function expansion using regularly varying functions

Quantile function expansion using regularly varying functions Quantile function expansion using regularly varying functions arxiv:705.09494v [math.st] 9 Aug 07 Thomas Fung a, an Eugene Seneta b a Department of Statistics, Macquarie University, NSW 09, Australia b

More information

Optimal Locally Repairable and Secure Codes for Distributed Storage Systems

Optimal Locally Repairable and Secure Codes for Distributed Storage Systems Optimal Locally Repairable and Secure Codes for Distributed Storage Systems Ankit Singh Rawat, O. Ozan Koyluoglu, Natalia Silberstein, and Sriram Vishwanath arxiv:0.6954v [cs.it] 6 Aug 03 Abstract This

More information

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering,

Lyapunov Functions. V. J. Venkataramanan and Xiaojun Lin. Center for Wireless Systems and Applications. School of Electrical and Computer Engineering, On the Queue-Overflow Probability of Wireless Systems : A New Approach Combining Large Deviations with Lyapunov Functions V. J. Venkataramanan an Xiaojun Lin Center for Wireless Systems an Applications

More information

arxiv: v4 [math.pr] 27 Jul 2016

arxiv: v4 [math.pr] 27 Jul 2016 The Asymptotic Distribution of the Determinant of a Ranom Correlation Matrix arxiv:309768v4 mathpr] 7 Jul 06 AM Hanea a, & GF Nane b a Centre of xcellence for Biosecurity Risk Analysis, University of Melbourne,

More information

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels.

Technion - Computer Science Department - M.Sc. Thesis MSC Constrained Codes for Two-Dimensional Channels. Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Constraine Coes for Two-Dimensional Channels Keren Censor Technion - Computer Science Department - M.Sc. Thesis MSC-2006- - 2006 Technion

More information

Prep 1. Oregon State University PH 213 Spring Term Suggested finish date: Monday, April 9

Prep 1. Oregon State University PH 213 Spring Term Suggested finish date: Monday, April 9 Oregon State University PH 213 Spring Term 2018 Prep 1 Suggeste finish ate: Monay, April 9 The formats (type, length, scope) of these Prep problems have been purposely create to closely parallel those

More information

Euler equations for multiple integrals

Euler equations for multiple integrals Euler equations for multiple integrals January 22, 2013 Contents 1 Reminer of multivariable calculus 2 1.1 Vector ifferentiation......................... 2 1.2 Matrix ifferentiation........................

More information

Introduction to the Vlasov-Poisson system

Introduction to the Vlasov-Poisson system Introuction to the Vlasov-Poisson system Simone Calogero 1 The Vlasov equation Consier a particle with mass m > 0. Let x(t) R 3 enote the position of the particle at time t R an v(t) = ẋ(t) = x(t)/t its

More information

Quantum Stochastic Walks: A Generalization of Classical Random Walks and Quantum Walks

Quantum Stochastic Walks: A Generalization of Classical Random Walks and Quantum Walks Quantum Stochastic Walks: A Generalization of Classical Ranom Walks an Quantum Walks The Harvar community has mae this article openly available. Please share how this access benefits you. Your story matters

More information

Fundamental Properties of Full-Duplex Radio for Secure Wireless Communications

Fundamental Properties of Full-Duplex Radio for Secure Wireless Communications Funamental Properties of Full-Duplex Raio for Secure Wireless Communications Yingbo Hua, Qiping Zhu, Reza Sohrabi arxiv:7.v [cs.it] 27 Nov 27 Abstract This paper presents a number of funamental properties

More information

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient

Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Distributed Data Storage with Minimum Storage Regenerating Codes - Exact and Functional Repair are Asymptotically Equally Efficient Viveck R Cadambe, Syed A Jafar, Hamed Maleki Electrical Engineering and

More information

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y

ensembles When working with density operators, we can use this connection to define a generalized Bloch vector: v x Tr x, v y Tr y Ph195a lecture notes, 1/3/01 Density operators for spin- 1 ensembles So far in our iscussion of spin- 1 systems, we have restricte our attention to the case of pure states an Hamiltonian evolution. Toay

More information

Equilibrium in Queues Under Unknown Service Times and Service Value

Equilibrium in Queues Under Unknown Service Times and Service Value University of Pennsylvania ScholarlyCommons Finance Papers Wharton Faculty Research 1-2014 Equilibrium in Queues Uner Unknown Service Times an Service Value Laurens Debo Senthil K. Veeraraghavan University

More information

Necessary and Sufficient Conditions for Sketched Subspace Clustering

Necessary and Sufficient Conditions for Sketched Subspace Clustering Necessary an Sufficient Conitions for Sketche Subspace Clustering Daniel Pimentel-Alarcón, Laura Balzano 2, Robert Nowak University of Wisconsin-Maison, 2 University of Michigan-Ann Arbor Abstract This

More information

Interconnected Systems of Fliess Operators

Interconnected Systems of Fliess Operators Interconnecte Systems of Fliess Operators W. Steven Gray Yaqin Li Department of Electrical an Computer Engineering Ol Dominion University Norfolk, Virginia 23529 USA Abstract Given two analytic nonlinear

More information

On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks

On the Connectivity Analysis over Large-Scale Hybrid Wireless Networks This full text paper was peer reviewe at the irection of IEEE Communications Society subject matter experts for publication in the IEEE INFOCOM proceeings This paper was presente as part of the main Technical

More information

Throughput Optimal Control of Cooperative Relay Networks

Throughput Optimal Control of Cooperative Relay Networks hroughput Optimal Control of Cooperative Relay Networks Emun Yeh Dept. of Electrical Engineering Yale University New Haven, C 06520, USA E-mail: emun.yeh@yale.eu Ranall Berry Dept. of Electrical an Computer

More information

Convergence rates of moment-sum-of-squares hierarchies for optimal control problems

Convergence rates of moment-sum-of-squares hierarchies for optimal control problems Convergence rates of moment-sum-of-squares hierarchies for optimal control problems Milan Kora 1, Diier Henrion 2,3,4, Colin N. Jones 1 Draft of September 8, 2016 Abstract We stuy the convergence rate

More information

A Sketch of Menshikov s Theorem

A Sketch of Menshikov s Theorem A Sketch of Menshikov s Theorem Thomas Bao March 14, 2010 Abstract Let Λ be an infinite, locally finite oriente multi-graph with C Λ finite an strongly connecte, an let p

More information

Ramsey numbers of some bipartite graphs versus complete graphs

Ramsey numbers of some bipartite graphs versus complete graphs Ramsey numbers of some bipartite graphs versus complete graphs Tao Jiang, Michael Salerno Miami University, Oxfor, OH 45056, USA Abstract. The Ramsey number r(h, K n ) is the smallest positive integer

More information

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz

A note on asymptotic formulae for one-dimensional network flow problems Carlos F. Daganzo and Karen R. Smilowitz A note on asymptotic formulae for one-imensional network flow problems Carlos F. Daganzo an Karen R. Smilowitz (to appear in Annals of Operations Research) Abstract This note evelops asymptotic formulae

More information

Private Information Retrieval from Coded Databases

Private Information Retrieval from Coded Databases Private Information Retrieval from Coded Databases arim Banawan Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, MD 20742 kbanawan@umdedu ulukus@umdedu

More information

REVERSIBILITY FOR DIFFUSIONS VIA QUASI-INVARIANCE. 1. Introduction We look at the problem of reversibility for operators of the form

REVERSIBILITY FOR DIFFUSIONS VIA QUASI-INVARIANCE. 1. Introduction We look at the problem of reversibility for operators of the form REVERSIBILITY FOR DIFFUSIONS VIA QUASI-INVARIANCE OMAR RIVASPLATA, JAN RYCHTÁŘ, AND BYRON SCHMULAND Abstract. Why is the rift coefficient b associate with a reversible iffusion on R given by a graient?

More information

Total Energy Shaping of a Class of Underactuated Port-Hamiltonian Systems using a New Set of Closed-Loop Potential Shape Variables*

Total Energy Shaping of a Class of Underactuated Port-Hamiltonian Systems using a New Set of Closed-Loop Potential Shape Variables* 51st IEEE Conference on Decision an Control December 1-13 212. Maui Hawaii USA Total Energy Shaping of a Class of Uneractuate Port-Hamiltonian Systems using a New Set of Close-Loop Potential Shape Variables*

More information

Lecture 5. Symmetric Shearer s Lemma

Lecture 5. Symmetric Shearer s Lemma Stanfor University Spring 208 Math 233: Non-constructive methos in combinatorics Instructor: Jan Vonrák Lecture ate: January 23, 208 Original scribe: Erik Bates Lecture 5 Symmetric Shearer s Lemma Here

More information

A New Converse Bound for Coded Caching

A New Converse Bound for Coded Caching A ew Converse Boun for Coe Caching Chien-Yi Wang, Sung Hoon Lim, an Michael Gastpar School of Computer an Communication Sciences EPFL Lausanne, Switzerlan {chien-yiwang, sunglim, michaelgastpar}@epflch

More information

Hybrid Centralized-Distributed Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks

Hybrid Centralized-Distributed Resource Allocation for Device-to-Device Communication Underlaying Cellular Networks Hybri Centralize-Distribute Resource Allocation for Device-to-Device Communication Unerlaying Cellular Networks 1 arxiv:1502.04539v1 [cs.gt] 16 Feb 2015 Setareh Maghsui an Sławomir Stańczak, Senior Member,

More information

Witt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread]

Witt#5: Around the integrality criterion 9.93 [version 1.1 (21 April 2013), not completed, not proofread] Witt vectors. Part 1 Michiel Hazewinkel Sienotes by Darij Grinberg Witt#5: Aroun the integrality criterion 9.93 [version 1.1 21 April 2013, not complete, not proofrea In [1, section 9.93, Hazewinkel states

More information

A New Minimum Description Length

A New Minimum Description Length A New Minimum Description Length Soosan Beheshti, Munther A. Dahleh Laboratory for Information an Decision Systems Massachusetts Institute of Technology soosan@mit.eu,ahleh@lis.mit.eu Abstract The minimum

More information

MAINTAINING LIMITED-RANGE CONNECTIVITY AMONG SECOND-ORDER AGENTS

MAINTAINING LIMITED-RANGE CONNECTIVITY AMONG SECOND-ORDER AGENTS MAINTAINING LIMITED-RANGE CONNECTIVITY AMONG SECOND-ORDER AGENTS KETAN SAVLA, GIUSEPPE NOTARSTEFANO AND FRANCESCO BULLO Abstract. In this paper we consier a-hoc networks of robotic agents with ouble integrator

More information

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE

TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS. Yannick DEVILLE TEMPORAL AND TIME-FREQUENCY CORRELATION-BASED BLIND SOURCE SEPARATION METHODS Yannick DEVILLE Université Paul Sabatier Laboratoire Acoustique, Métrologie, Instrumentation Bât. 3RB2, 8 Route e Narbonne,

More information

arxiv: v1 [physics.flu-dyn] 8 May 2014

arxiv: v1 [physics.flu-dyn] 8 May 2014 Energetics of a flui uner the Boussinesq approximation arxiv:1405.1921v1 [physics.flu-yn] 8 May 2014 Kiyoshi Maruyama Department of Earth an Ocean Sciences, National Defense Acaemy, Yokosuka, Kanagawa

More information

Quantum mechanical approaches to the virial

Quantum mechanical approaches to the virial Quantum mechanical approaches to the virial S.LeBohec Department of Physics an Astronomy, University of Utah, Salt Lae City, UT 84112, USA Date: June 30 th 2015 In this note, we approach the virial from

More information

Coded Sparse Matrix Multiplication

Coded Sparse Matrix Multiplication Coe Sparse Matrix Multiplication Sinong Wang, Jiashang Liu an Ness Shroff Department of Electrical an Computer Engineering Department of Computer Science an Engineering The Ohio State University {wang.7691,

More information

Distributed coordination control for multi-robot networks using Lyapunov-like barrier functions

Distributed coordination control for multi-robot networks using Lyapunov-like barrier functions IEEE TRANSACTIONS ON 1 Distribute coorination control for multi-robot networks using Lyapunov-like barrier functions Dimitra Panagou, Dušan M. Stipanović an Petros G. Voulgaris Abstract This paper aresses

More information

On non-antipodal binary completely regular codes

On non-antipodal binary completely regular codes Discrete Mathematics 308 (2008) 3508 3525 www.elsevier.com/locate/isc On non-antipoal binary completely regular coes J. Borges a, J. Rifà a, V.A. Zinoviev b a Department of Information an Communications

More information

u!i = a T u = 0. Then S satisfies

u!i = a T u = 0. Then S satisfies Deterministic Conitions for Subspace Ientifiability from Incomplete Sampling Daniel L Pimentel-Alarcón, Nigel Boston, Robert D Nowak University of Wisconsin-Maison Abstract Consier an r-imensional subspace

More information

Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners

Lower Bounds for Local Monotonicity Reconstruction from Transitive-Closure Spanners Lower Bouns for Local Monotonicity Reconstruction from Transitive-Closure Spanners Arnab Bhattacharyya Elena Grigorescu Mahav Jha Kyomin Jung Sofya Raskhonikova Davi P. Wooruff Abstract Given a irecte

More information

arxiv: v2 [math.st] 29 Oct 2015

arxiv: v2 [math.st] 29 Oct 2015 EXPONENTIAL RANDOM SIMPLICIAL COMPLEXES KONSTANTIN ZUEV, OR EISENBERG, AND DMITRI KRIOUKOV arxiv:1502.05032v2 [math.st] 29 Oct 2015 Abstract. Exponential ranom graph moels have attracte significant research

More information

REAL ANALYSIS I HOMEWORK 5

REAL ANALYSIS I HOMEWORK 5 REAL ANALYSIS I HOMEWORK 5 CİHAN BAHRAN The questions are from Stein an Shakarchi s text, Chapter 3. 1. Suppose ϕ is an integrable function on R with R ϕ(x)x = 1. Let K δ(x) = δ ϕ(x/δ), δ > 0. (a) Prove

More information

Tractability results for weighted Banach spaces of smooth functions

Tractability results for weighted Banach spaces of smooth functions Tractability results for weighte Banach spaces of smooth functions Markus Weimar Mathematisches Institut, Universität Jena Ernst-Abbe-Platz 2, 07740 Jena, Germany email: markus.weimar@uni-jena.e March

More information