IN THE paradigm of network coding, a set of source nodes

Size: px
Start display at page:

Download "IN THE paradigm of network coding, a set of source nodes"

Transcription

1 4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 Sngle-Uncast Secure Network Codng and Network Error Correcton are as Hard as Multple-Uncast Network Codng Wentao Huang, Tracey Ho, Senor Member, IEEE, Mchael Langberg, Senor Member, IEEE, and Jörg Klewer, Senor Member, IEEE Abstract Ths paper reduces multple-uncast network codng to sngle-uncast secure network codng and sngle-uncast network error correcton. Specfcally, we present reductons that map an arbtrary multple-uncast network codng nstance to a uncast secure network codng nstance n whch at most one lnk s eavesdropped, or a uncast network error correcton nstance n whch at most one lnk s erroneous, such that a rate tuple s achevable n the multple-uncast network codng nstance f and only f a correspondng rate s achevable n the uncast secure network codng nstance, or n the uncast network error correcton nstance. Conversely, we show that an arbtrary uncast secure network codng nstance n whch at most one lnk s eavesdropped can be reduced back to a multple-uncast network codng nstance. In addton, we show that the capacty of a uncast network error correcton nstance n general s not (exactly) achevable. Index Terms Network codng, equvalence, securty, error correcton, capacty. I. INTRODUCTION IN THE paradgm of network codng, a set of source nodes transmts nformaton to a set of termnal nodes over a network wth noseless lnks; nternal nodes of the network may mx receved nformaton before forwardng t. Ths mxng (or encodng) of nformaton has been extensvely studed over the last decade (see e.g., [4] [8], and references theren). In partcular, the problems of determnng the capacty of the network and desgnng optmal codes achevng the capacty Manuscrpt receved January 14, 2016; revsed January 6, 2017; accepted February 28, Date of publcaton March 29, 2018; date of current verson May 18, Ths work was supported n part by NSF under Grant CCF and Grant CNS and n part by the Caltech Lee Center. Ths paper was presented n part at the 2013 Internatonal Symposum on Network Codng [1], the 2014 Allerton Conference on Communcaton, Control and Computng [2], and the 2015 IEEE Internatonal Symposum on Informaton Theory [3]. W. Huang was wth the Department of Electrcal Engneerng, Calforna Insttute of Technology, Pasadena, CA USA. He s now wth Snap Inc., Vence, CA USA (e-mal: whuang@snap.com). T. Ho was wth the Department of Electrcal Engneerng, Calforna Insttute of Technology, Pasadena, CA USA. He s now wth Second Spectrum Inc., Los Angeles, CA USA (e-mal: tracey@secondspectrum.com). M. Langberg s wth the Department of Electrcal Engneerng, The State Unversty of New York at Buffalo, Buffalo, NY USA (emal: mkel@buffalo.edu). J. Klewer s wth the Department of Electrcal and Computer Engneerng, New Jersey Insttute of Technology, Newark, NJ USA (emal: jklewer@njt.edu). Communcated by C.-C. Wang, Assocate Edtor for Codng Technques. Dgtal Object Identfer /TIT are well understood under the multcast settng, where there s a sngle source node whose nformaton s demanded by all termnal nodes. However, much less s known regardng the multple-uncast settng where there are multple source nodes, each of them demanded by a sngle and dfferent termnal node (the more general settng of multple-multcast, where each termnal node may demand the nformaton from an arbtrary subset of source nodes, can be converted to an equvalent multple-uncast settng usng the constructons n [9], [10]). Determnng the capacty or the achevablty of a rate tuple n a multple-uncast network codng nstance remans an ntrgung, central, open problem, e.g., [11] [13]. Ths work connects multple-uncast network codng to two other fundamental network codng problems, namely secure network codng and network error correcton, usng the dea of reducton. We focus on the decson problem of determnng whether a rate tuple s achevable n the network, as well as the decson problem of determnng whether a rate tuple s n the capacty regon of the network. Here a rate tuple s achevable f there exsts a code that exactly acheves t, and the capacty regon s the closure of the set of all achevable rate tuples. Note that by defnton, a rate tuple that s achevable s always n the capacty regon, and a rate tuple that s n the capacty regon s always asymptotcally achevable but may not be (exactly) achevable. We study these problems usng the technque of reducton. Loosely speakng, we say a class of decson problems I can be reduced to a class of decson problems J f there exsts a scheme that maps any problem nstance n I to a correspondng problem nstance n J,such that the answers to the two nstances are the same. In other words, usng such a reducton methodology, one may take an nstance of I, map t to a correspondng nstance of J, solve the decson problem on the nstance of J, and deduce a soluton for the orgnal nstance of I; mplyng that f there s a way to solve the problems n J, then there s a way to solve the problems n I. In ths paper we construct a reducton,.e., a mappng, from the problem of multple-uncast network codng to the problem of uncast secure network codng. Note that the latter problem s asked under the smplest settng of uncast, where there s a sngle source node and a sngle termnal node n the network. Therefore under the uncast settng the rate tuple degenerates to a scalar, whch s referred to as rate. Our reducton addresses the problem of determnng whether IEEE. Personal use s permtted, but republcaton/redstrbuton requres IEEE permsson. See for more nformaton.

2 HUANG et al.: SINGLE-UNICAST SECURE NETWORK CODING AND NETWORK ERROR CORRECTION 4497 a rate/rate tuple s achevable, as well as the problem of determnng whether a rate/rate tuple s n the capacty regon. Secondly, we construct another reducton from the problem of multple-uncast network codng to the problem of uncast network error correcton. Note that agan the latter problem s asked under the smplest settng of uncast. Surprsngly, we show that our reducton only works for the problem of determnng whether a rate/rate tuple s achevable. In contrast, for the problem of determnng whether a rate/rate tuple s n the capacty regon, we show that the same reducton mappng no longer guarantees that t does not change the answers to the nstances. An nterestng consequence of ths negatve result s that the capacty of a uncast network error correcton nstance n general s not (exactly) achevable. Compared to the standard network codng problem, secure network codng and network error correcton have addtonal secrecy and relablty requrements, descrbed n the followng subsectons. A. Secure Network Codng Secure network codng s a natural generalzaton of network communcaton to networks wth eavesdroppers. Specfcally, n the secure network codng problem, a subset A A of lnks may be eavesdropped, where A s gven and s the collecton of all possble eavesdroppng patterns. A vald code desgn for the secure network codng problem needs to ensure the secrecy of the source nformaton. Namely, for any choce of A from A, the mutual nformaton between the set of sgnals transmtted on the lnks n A and the source messages must be neglgble. The secure network codng problem s well studed n the lterature and n partcular s well understood n the multcast settng under the assumpton that 1) all lnks have equal capactes, and 2) A s unform,.e., A ncludes all subsets of lnks of sze z w,wherez w s the number of wretapped lnks, and 3) only the source node can generate randomness, e.g., [14] [17]. In the cases that ether lnk capactes are not equal, or A s arbtrary, or non-source nodes may generate randomness, determnng the capacty or the achevablty of a rate n a secure network codng nstance remans an open problem, e.g., [18] [22]. Ths paper shows that an arbtrary multple-uncast network codng nstance I can be reduced to a partcular uncast secure network codng nstance I s that has a very smple setup. Specfcally, the reducton mappng ensures that n I s :a)there s a sngle source node and a sngle termnal node n an acyclc network; b) all lnks have equal capacty; c) there s a sngle wretapped lnk and ths lnk can be any lnk n the network, namely, A s unform wth z w = 1; and d) non-source nodes are allowed to generate randomness. The setup of I s s smple n the sense that setup a) s the smplest connecton requrement, b) s the smplest assumpton on lnk capactes, and c) gves the smplest structure of a non-trval A. Indeed, under the setup of a) - c) the secure capacty of the network s characterzed by the cut-set bound and s acheved by lnear codes [14]. In ths sense, our reducton suggests that the addton of setup d) s crtcal; as the secure network codng problem s smple and well understood under settng a) - c), but under settng a) - d) we show that t s as hard as the long standng open problem of multple-uncast network codng. We remark that allowng non-source nodes to generate randomness s realstc and preferable because ths can sgnfcantly ncrease the capacty of the network [21], [23]. Our reducton addresses the problem of determnng the achevablty of a rate/rate tuple, as well as the problem of determnng whether a rate/rate tuple s n the capacty regon. Furthermore, our reducton holds for dfferent types of securty requrements. Namely, n I s we may assume ether perfect, strong, or weak securty. Our reducton has an operatonal aspect. Namely, n our reducton, from a code for I s one can construct a code for I. Thus, usng our reducton, to solve an nstance of the multpleuncast network codng problem, one may frst reduce t to an nstance of the uncast secure network codng problem, then solve the latter, and fnally use ths soluton to obtan a soluton to the orgnal multple-uncast problem. We conclude, speakng loosely, that uncast secure network codng under the smple settng descrbed above s at least as hard as multple-uncast network codng. Our formal results are gven n Theorem 1 of Secton III. The hardness of general secure network codng problems are prevously studed n [18] and [21]. Specfcally, Chan and Grant [18] show that determnng the zero-error achevablty of a rate n the multcast secure network codng problem wth general setup (.e., arbtrary edge capactes, arbtrary A, and arbtrary nodes may generate randomness) and wth perfect securty s at least as hard as determnng the zero-error achevablty of a rate tuple n the multplemultcast network codng problem. Cu et al. [21] show that determnng the capacty of a uncast secure network codng problem s NP-hard f ether the edge capactes are arbtrary or A s arbtrary. Our work strengthens the result n [18] by showng that the secure network codng problem under an extremely smple setup (.e., uncast, equal lnk capactes, unform A wth a sngle wretap lnk) s stll hard, under varous defntons of achevablty and securty. B. Network Error Correcton We now turn to the network error correcton problem, whch s a natural generalzaton of network communcaton to networks wth adversaral errors. Specfcally, n the network error correcton problem a subset B B of lnks may be erroneous, where B s gven and s the collecton of all possble lnk error patterns. A vald code desgn for the error correcton problem needs to ensure relable communcaton between the sources and termnals n the worst case no matter whch set B B of lnks are erroneous or whch error has been mposed on these lnks. Namely, n ths context, the communcaton of a message s successful f for any choce of B from B, and for any (error) sgnals to be transmtted on the lnks n B, the message s correctly decoded at the termnal node. The network error correcton problem s extensvely studed and n partcular s well understood under the multcast settng wth the assumpton that 1) all lnks have equal capactes, and 2) B s unform,.e., B ncludes all subsets of lnks of sze z e, where z e s the number of erroneous lnks, e.g., [24] [29]. In the cases that ether lnk capactes are

3 4498 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 not equal or B s arbtrary, determnng the capacty of the network or the achevablty of a rate remans an open problem, e.g., [30] [34]. In a flavor smlar to the reducton descrbed n Secton I.A, we show that an arbtrary multple-uncast network codng nstance I can be reduced to a partcular uncast network error correcton nstance I c that has a very smple setup. Specfcally, the reducton mappng ensures that n I c :a)there s a sngle source node and a sngle termnal node n an acyclc network; b) all lnks have equal capacty; c) there s a sngle error lnk; and d) the error lnk can be any lnk n the network except a gven subset of (well protected) lnks. The setup of I c s smple n the sense that setup a) s the smplest connecton requrement, b) s the smplest assumpton on lnk capactes and c) gves the smallest number of error lnks. Indeed, f the error lnk can be any one lnk n the network (namely f B s unform), then under the setup of a) - c) the capacty of the network s characterzed by the cut-set bounds and s acheved by lnear codes [24]. In ths sense, our reducton suggests that the addton of setup d), whch wll result n a non-unform B, s crtcal; as a network error correcton problem s smple and well understood under settng a) - c), but under settng a) - d) we show that t s as hard as the long standng open problem of multple-uncast network codng. Our reducton addresses the problem of determnng the achevablty of a rate/rate tuple. Namely we show, usng our reducton, that one can determne the achevablty of a rate tuple n I by determnng the achevablty of a correspondng rate n I c. However, rather nterestngly, the same reducton (.e., the same mappng) does not address the problem of determnng whether a rate/rate tuple s n the capacty regon. Specfcally, we show that there exsts a multple-uncast network codng nstance I and a rate tuple, such that the rate tuple s not n the capacty regon of I, and that after usng our reducton mappng, the correspondng rate s n the capacty regon of the correspondng uncast network error correcton nstance I c. The fact that our reducton works when consderng (exact) achevablty and does not work when consderng capacty, mples that n general the capacty of a uncast network error correcton nstance s not (exactly) achevable, whch s a result of separate nterest. Smlar to the prevous dscusson, our reducton has an operatonal aspect that from a code for I c one can construct a code for I. Indeed, usng our reducton, to solve an nstance of the multple-uncast network codng problem, one may frst reduce t to an nstance of the uncast network error correcton problem, then solve the latter, and fnally use ths soluton to obtan a soluton to the orgnal problem. We conclude, speakng loosely, that uncast network error correcton under the smple settng descrbed above s at least as hard as multple-uncast network codng. Our formal results are gven n Theorems 3, 4 and 5 of Secton V. C. Equvalence va Reverse Reducton The above constructons reduce nstances of the multpleuncast network codng problem to nstances of the uncast secure network codng or the uncast network error correcton problem. A natural and ntrgung queston s whether these problems are equvalent, namely, whether t s possble to construct the reverse reductons. Usng the technque of A-enhanced networks [35], we show that an arbtrary uncast secure network codng nstance n whch at most one lnk s eavesdropped (.e., A ncludes only sngleton sets) can be reduced to a multple-uncast network codng nstance, thus mplyng an equvalence between the two problems. For more complcated A whether a reverse reducton exsts or not remans an open problem. Smlarly, the exstence of a reverse reducton from uncast network error correcton to multpleuncast network codng remans open. The paper s organzed as follows. In Secton II we ntroduce the models and defntons. Secton III reduces multpleuncast network codng to uncast secure network codng. The reverse reducton s dscussed n Secton IV. In Secton V we reduce multple-uncast network codng to uncast network error correcton. Secton VI concludes the paper. II. MODELS AND DEFINITIONS A. Multple-Uncast Network Codng A network s a drected acyclc graph G = (V, E), where vertces represent network nodes and edges represent lnks. Each edge e E has a capacty c e, whch s the number of bts that can be transmtted on e n one transmsson. An nstance I = (G, S, T, B) of the multple-uncast network codng problem, ncludes a network G, a set of source nodes S V, a set of termnal nodes T V and an S by T connecton requrement matrx B. The(, j)-th entry of B equals 1 f termnal j requres the nformaton from source and equals 0 otherwse. B s assumed to be a permutaton matrx so that each source s pared wth a sngle termnal. Denote by s(t) the source requred by termnal t. Denote [n] {1,.., n}. Each source s S s assocated wth an ndependent message, represented by a random varable M s unformly dstrbuted over [2 nr s ].Anetwork code of length n s a set of encodng functons φ e for every e E and a set of decodng functons φ t for each t T. For each e = (u,v), the encodng functon φ e s a functon takng as nput the sgnals receved from the ncomng edges of node u, aswell as the random varable M u f u S. φ e evaluates to a value n {0, 1} nc e, whch s the sgnal transmtted on e. For each t T, the decodng functon φ t maps the tuple of sgnals receved from the ncomng edges of t, toanestmatedmessage ˆM s(t) wth values n [2 nr s(t)]. A network code {φ e,φ t } e E,t T s sad to satsfy atermnal t under transmsson (m s, s S) f ˆM s(t) = m s(t) when (M s, s S) = (m s, s S), namely, termnal t decodes correctly when the message tuple takes the specfc value (m s, s S). A network code s sad to satsfy the multpleuncast network codng problem I wth error probablty ɛ f the probablty that all t T are smultaneously satsfed s at least 1 ɛ. The probablty s taken over the jont dstrbuton on (M s, s S). Formally, the network code satsfes I wth error probablty ɛ f { } Pr t s satsfed under (M s, s S) 1 ɛ. (M s,s S) t T

4 HUANG et al.: SINGLE-UNICAST SECURE NETWORK CODING AND NETWORK ERROR CORRECTION 4499 For an nstance I of the multple-uncast network codng problem, the rate tuple (R s, s S) s sad to be achevable f for any ɛ>0, there exsts a network code that satsfes I wth error probablty at most ɛ. (R s, s S) s sad to be achevable wth zero error f there exsts a network code that satsfes I wth zero error probablty. (R s, s S) s sad to be asymptotcally achevable f for any δ>0, rate tuple ((1 δ)r s, s S) s achevable. Loosely speakng, under our defnton, zeroerror achevablty does not allow any slackness n nether the probablty of error nor rate; achevablty allows slackness n the probablty of error but not n rate; and asymptotc achevablty allows slackness n both the probablty of error and rate. We remark that asymptotc achevablty s the most commonly used defnton n the lteratures. However, n addton to asymptotc achevablty, extra efforts wll be placed on exact achevablty wth vanshng error n Secton V because nterestngly, the reducton theren allows slackness n the probablty of error but does not allow slackness n rate. Wthout loss of generalty, n the remanng part of the paper we assume that all entres n the rate tuple are unt,.e., R s = 1, s S, because a varyng rate source s can be modeled by multple unt rate sources co-located at s. We say that unt rate s achevable, achevable wth zero error, or asymptotcally achevable f R s = 1, s S and (R s, s S) s achevable, achevable wth zero error, or asymptotcally achevable, respectvely. B. Uncast Secure Network Codng An nstance I s = (G, s, t, A) of the uncast secure network codng problem ncludes a network G, a source node s, a termnal node t and a collecton of subsets of lnks A 2 E susceptble to eavesdroppng. Each node V generates an ndependent random varable K. 1 The source node holds a rate-r s secret message M unformly dstrbuted over [2 nr s ]. A (secure) network code of length n s a set of encodng functons φ e for every e E and a decodng functon φ t.for each e = (u,v), the encodng functon φ e s a functon takng as nput the locally generated randomness K u, the sgnals receved from the ncomng edges of node u, and the message M f u = s. φ e evaluates to a value n {0, 1} nc e, whch s the sgnal transmtted on e. The decodng functon φ t maps the tuple of sgnals receved from the ncomng edges of t, toan estmated message ˆM wth values n [2 nr s ]. A secure network code {φ e,φ t } e E s sad to satsfy nstance I s wth error probablty ɛ f the probablty that M = ˆM s at least 1 ɛ, where the probablty s taken over the dstrbuton on M and K, V. For any edge e E, denote by X (e) the sgnal transmtted on e durng the -th channel use. For a subset of edges A, denote by X n (A) = (X (e) : 1 n, e A). The network code s sad to satsfy the perfect securty requrement f for all A A, I (M; X n (A)) = 0; the strong securty requrement f for all A A, 1 We remark that n the secure network codng problem, allowng non-source nodes to generate randomness can sgnfcantly ncrease the capacty [21], [23] and therefore s preferable. In contrast, for smplcty n the multple-uncast problem and the network error correcton problem we do not assume that non-source nodes can generate randomness. I (M; X n (A)) 0asn ; and the weak securty I (M;X requrement f A A, n (A)) n 0asn. For a uncast secure network codng problem I s,rater s s sad to be achevable wth perfect, strong, or weak securty f for any ɛ > 0, there exst network codes that satsfy I s wth error probablty at most ɛ and the correspondng securty requrement. Rate R s s sad to be achevable wth zero error and wth perfect, strong, or weak securty f there exsts network codes that satsfy I s wth zero error probablty and the correspondng securty requrement. Rate R s s sad to be asymptotcally achevable wth perfect, strong, or weak securty f for any δ>0, rate (1 δ)r s s achevable wth the correspondng securty requrement. The capacty of I s under perfect, strong, or weak securty s the supremum over all rates that are asymptotcally achevable wth the correspondng securty requrement. C. Uncast Network Error Correcton An nstance I c = (G, s, t, B) of the uncast network error correcton problem ncludes a network G, a source node s, a termnal node t and a collecton of subsets of lnks B 2 E susceptble to errors. An error occurs n a lnk f the output of the lnk s dfferent from the nput. More precsely, the output of a lnk e s the addton of the nput sgnal and an error sgnal r e {0, 1} nc e, and an error occurs n lnk e f and only f r e s not the zero vector. 2 For a subset B of lnks, a B-error s sad to occur f errors occur n every lnk n B. The source node holds a rate-r c message M unformly dstrbuted over [2 nr c ], and the decoder of the termnal outputs an estmated message ˆM. Let r = (r e ) e E be the tuple of error sgnals, called an error pattern. Denote by R B the set of all possble error patterns,.e., R B = {r : non-zero entres n r correspond to B-errors, B B}. A network code {φ e,φ t } e E, defned smlarly as n Secton II-A, s sad to satsfy I c under transmsson m f ˆM = m when M = m, regardless of the occurrence of any error pattern r R B. A network code s sad to satsfy problem I c wth error probablty ɛ f the probablty that I c s satsfed s at least 1 ɛ. The probablty s taken over the dstrbuton on the source message M. Note that our model targets the worst-case (or adversaral) scenaro, namely the probablty of error s upper bounded by ɛ even n the occurrence of the worst case error pattern. For a uncast network error correcton problem I c, rate R c s sad to be achevable f for any ɛ > 0, there exsts a network code that satsfes I c wth error probablty at most ɛ. RateR c s sad to be achevable wth zero error f there exsts a network code that satsfes I c wth zero error probablty. Rate R c s sad to be asymptotcally achevable f for any δ>0, rate (1 δ)r c s achevable. The capacty of I c s the supremum over all rates that are asymptotcally achevable. 2 Note that our model and results can be generalzed naturally to arbtrary alphabets n whch addton may not be defned, as long as we make the conventon that r e = 0 f and only f the output of e s dentcal to the nput.

5 4500 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 Fg. 1. In the uncast secure network codng problem I s, the source s communcates wth the termnal t. N s the network on whch I s defned. All lnks outsde N (.e., lnks for whch at least one end-pont does not belong to N ) have unt capacty. The eavesdropper can wretap on any sngle lnk n the network. Namely, A ncludes all sets of a sngle edge. Note that there are k parallel branches n total gong from s to t but only the frst and the k-th branches are drawn explctly. Fg. 2. A scheme of length n that asymptotcally acheves rate k n I s.fxanyɛ>0, for node u, letv u be a length-(1 ɛ)n random vector generated by node u. TheV u s are ndependently generated and are unformly dstrbuted over {0, 1} (1 ɛ)n. The source message s a k-tuple of..d. unformly dstrbuted length-(1 ɛ)n vectors,.e., M = (M, = 1,...,k), wherethem s are..d. unformly dstrbuted over {0, 1} (1 ɛ)n. Snce unt rate s asymptotcally achevable n I, node t obtans ˆV B such that ˆV B = V B wth hgh probablty. ˆV B s then transmtted to node C for key cancellaton. III. REDUCING MULTIPLE-UNICAST TO SECURE UNICAST Recall from Secton II-A that n a multple-uncast problem, unt rate s asymptotcally achevable f R s = 1, s S and rate tuple (R s, s S) s asymptotcally achevable. The followng theorem reduces the problem of determnng the asymptotcal achevablty of unt rate n a general multple-uncast network codng nstance to the problem of determnng the asymptotcal achevablty of a rate n a partcular uncast secure network codng nstance that has a very smple setup. We remark that although the theorem addresses the achevablty of unt rate nstead of a general rate tuple n the multple-uncast network codng problem, ths s wthout loss of generalty, because the problem of determnng the achevablty of an arbtrary rate tuple wth ratonal entres n a multple-uncast problem can be converted to the problem of determnng the achevablty of unt rate n a correspondng multple-uncast problem, by modelng a varyng rate source s as multple unt rate sources co-located at s. Theorem 1: Gven any multple-uncast network codng problem I wth source-destnaton pars {(s, t ), = 1,...,k}, a correspondng uncast secure network codng problem I s = (G, s, t, A), n whch A ncludes all sets of a sngle edge (.e., all sngletons), can be constructed accordng to Constructon 1, such that unt rate s asymptotcally achevable n I f and only f rate k s asymptotcally achevable n I s under ether perfect, strong, or weak securty. Constructon 1: Gven any multple-uncast network codng problem I on a network N wth source-destnaton pars {(s, t ), = 1,...,k}, a uncast secure network codng problem I s s constructed as specfed n Fgure 1. Proof (of Theorem 1):. In ths drecton, we show that the asymptotc achevablty of unt rate n I mples the asymptotc achevablty of rate k n I s under perfect secrecy, whch n turn mples the asymptotc achevablty of rate k n I s under strong and weak secrecy. The scheme asymptotcally achevng rate k s descrbed n Fgure 2. Specfcally, the rate of the scheme s (1 ɛ)k f rate 1 ɛ s achevable n I. Letɛ = Pr{ ˆV B = V B },then the probablty of error n I s s upper bounded by k =1 ɛ, whch can be made arbtrarly small by choosng the ɛ s to be small enough. Note that the scheme acheves perfect securty, snce lnks n N are not downstream of s (and therefore the sgnals transmtted on them are ndependent of the message), and all other lnks are one-tme padded by unformly chosen keys.. To prove ths drecton t suffces to show that asymptotc achevablty of rate k n I s under weak securty mples asymptotc achevablty of unt rate n I, because asymptotc achevablty of rate k n I s under perfect or strong securty

6 HUANG et al.: SINGLE-UNICAST SECURE NETWORK CODING AND NETWORK ERROR CORRECTION 4501 mples asymptotc achevablty of the same rate under weak securty. Suppose n I s rate k s asymptotcally acheved by a code wth length n. Let M be the source nput message, then H (M) = kn. We use the notaton of Fgure 1. Our objectve s lower bound the mutual nformaton between sgnals b n and d n,for = 1,...,k. Wthout loss of generalty our analyss wll focus on the case of = 1. We start wth, H (M c1 n, dn 1, f 2 n,..., f k n ) (a) = H (M, c1 n dn 1, f 2 n,..., f k n ) H (cn 1 dn 1, f 2 n,..., f k n ) H (M d1 n, f 2 n,..., f k n ) H (cn 1 dn 1, f 2 n,..., f k n ) (b) kn H (c1 n dn 1, f 2 n,..., f k n ) kn n = (k 1)n, (1) where (a) follows from the chan rule, and (b) follows from our constructon whch guarantees ndependence between M and {d1 n, f n, = 1,...,k}. On the other hand, H (M c1 n, dn 1, f 2 n,..., f k n ) H (M, e2 n,...,en k cn 1, dn 1, f 2 n,..., f k n ) H (M c1 n, dn 1, f 2 n,..., f k n, en 2,...,en k ) +H (e2 n,...,en k cn 1, dn 1, f 2 n,..., f k n ) (c) nɛ n + H (e2 n,...,en k cn 1, dn 1, f 2 n,..., f k n ) nɛ n + (k 1)n, (2) where ɛ n 0 as n and (c) s due to the cutset {c1 n, dn 1, f 2 n,..., f k n, en 2,...,en k } from s to t and Fano s nequalty. We lower bound the entropy of c1 n, H (c1 n ) H (cn 1 dn 1, f 2 n,..., f k n ) = H (M, c1 n dn 1, f 2 n,..., f k n ) H (M c1 n, dn 1, f 2 n,..., f k n ) H (M d1 n, f 2 n,..., f k n ) H (M cn 1, dn 1, f 2 n,..., f k n ) = H (M) H (M c1 n, dn 1, f 2 n,..., f k n ) (d) kn ((k 1)n + nɛ n ) = n nɛ n, (3) where (d) follows from (2). We next lower bound the entropy of d1 n, H (d1 n ) H (dn 1 cn 1, f 2 n,..., f k n ) = H (M, d1 n cn 1, f 2 n,..., f k n ) H (M c1 n, dn 1, f 2 n,..., f k n ) H (M c1 n, f 2 n,..., f k n ) H (M cn 1, dn 1, f 2 n,..., f k n ) (e) = H (M c n 1 ) H (M cn 1, dn 1, f n 2,..., f n k ) ( f ) kn nδ n H (M c n 1, dn 1, f n 2,..., f n k ) (g) n nɛ n nδ n, (4) where δ n 0asn 0, (e) follows from the ndependence between {M, c1 n} and { f n, = 1,...,k}, (f) follows from the weak securty requrement, and (g) follows from (2). By the ndependence between {M, c1 n, dn 1 } and { f n, = 1,...,k} we have H (M c1 n, dn 1, f 2 n,..., f k n ) = H (M cn 1, dn 1 ). (5) By (1) and (2), the R.H.S of (5) s sandwched by (k 1)n H (M c n 1, dn 1 ) nɛ n + (k 1)n. (6) Now consder the jont entropy of M, c1 n, dn 1 and expand t n two ways H (M, c1 n, dn 1 ) = H (cn 1 M, dn 1 ) + H (M dn 1 ) + H (dn 1 ) = H (M c1 n, dn 1 ) + H (dn 1 cn 1 ) + H (cn 1 ) (k + 1)n + nɛ n, where the last nequalty holds because of (6) and H (d1 n cn 1 ) n, H (c1 n ) n. Therefore H (c1 n M, dn 1 ) = H (M, cn 1, dn 1 ) H (M dn 1 ) H (dn 1 ) = H (M c1 n, dn 1 ) + H (dn 1 cn 1 ) + H (cn 1 ) H (M d1 n ) H (dn 1 ) (h) (k + 1)n + nɛ n H (M d n 1 ) H (dn 1 ) () = (k + 1)n + nɛ n kn H (d n 1 ) ( j) 2nɛ n + nδ n, (7) where (h) follows from (6) and H (d1 n cn 1 ) n, H (cn 1 ) n; () follows from the ndependence between M and d1 n ; (j) follows from (4). Now we have, H (b1 n M, cn 1 ) = H (M, b1 n, cn 1 ) H (M cn 1 ) H (cn 1 ) = H (c1 n M, bn 1 ) + H (M bn 1 ) + H (bn 1 ) H (M cn 1 ) H (cn 1 ) (k + 1)n + H (c1 n M, bn 1 ) H (M cn 1 ) H (cn 1 ) (k) = (k + 1)n + H (c1 n M, bn 1, dn 1 ) H (M cn 1 ) H (cn 1 ) (k + 1)n + H (c1 n M, dn 1 ) H (M cn 1 ) H (cn 1 ) (l) (k + 1)n + 2nɛ n + nδ n H (M c n 1 ) H (cn 1 ) (m) n + 2nɛ n + 2nδ n H (c n 1 ) (n) 3nɛ n + 2nδ n, (8) where (k) follows from constructon,.e., H (c1 n M, bn 1 ) = H (c1 n M, bn 1, dn 1 ); (l) follows from (7); (m) follows from the weak securty requrement; (n) follows from (3). Therefore, H (b1 n dn 1 ) (o) = H (b1 n M, dn 1 ) H (b1 n, cn 1 M, dn 1 ) = H (b1 n cn 1, M, dn 1 ) + H (cn 1 M, dn 1 ) H (b1 n cn 1, M) + H (cn 1 M, dn 1 ) (p) 3nɛ n + 2nδ n + 2nɛ n + nδ n = 5nɛ n + 3nδ n, (9) where (o) follows as M s ndependent of {b1 n, dn 1 }, and (p) follows from (8) and (7). (9) suggests that the sgnals b1 n and dn 1 are strongly dependent. Next we need to lower

7 4502 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 bound H (b n 1 ). H (b1 n ) = H (M, bn 1, cn 1 ) H (cn 1 M, bn 1 ) H (M bn 1 ) = H (b1 n M, cn 1 ) + H (M cn 1 ) + H (cn 1 ) H (c1 n M, bn 1 ) H (M bn 1 ) H (M c1 n ) + H (cn 1 ) H (cn 1 M, bn 1 ) H (M bn 1 ) (q) kn nδ n + H (c n 1 ) H (cn 1 M, bn 1 ) H (M bn 1 ) (r) (k + 1)n nɛ n nδ n H (c n 1 M, bn 1 ) H (M bn 1 ) (s) n nɛ n 2nδ n H (c n 1 M, bn 1 ) (t) = n nɛ n 2nδ n H (c1 n M, bn 1, dn 1 ) n nɛ n 2nδ n H (c1 n M, dn 1 ) (u) n 3nɛ n 3nδ n, (10) where (q) follows from the weak securty requrement; (r) follows from (3); (s) follows agan from the weak securty; (t) follows from constructon; (u) follows from (7). Fnally, by (9) and (10), I (b n 1 ; dn 1 ) = H (bn 1 ) H (bn 1 dn 1 ) n 8nɛ n 6nδ n, The above argument extends to all other paths naturally (by renumberng the notaton accordngly), so I (b n ; dn ) n 8nɛ n 6nδ n, = 1,...,k. (11) Lemma 1, stated below and proved n the Appendx, shows that (11) mples the asymptotc achevablty of unt rate n I, whch completes the proof of ths drecton. Intutvely, snce the mutual nformaton between b n and d n s asymptotcally n, we can use a random codng argument smlar to that used n the proof of the channel codng theorem to show the exstence of a network code achevng unt rate asymptotcally n I. The reason that we do not use the standard pont-to-pont channel codng theorem s that there are multple nteractng sourcetermnal pars n I and we need to make sure the exstence of a code that s good for all pars. Lemma 1: For any ɛ>0, f there exsts a network code of length n for I s such that I (b n; dn )>n(1 ɛ), then unt rate s asymptotcally achevable n I. Ths completes the proof. Theorem 1 can be easly adapted to the case of zero-error communcaton. Corollary 1: Gven any multple-uncast network codng problem I wth source-destnaton pars {(s, t ), = 1,...,k}, a correspondng uncast secure network codng problem I s = (G, s, t, A), nwhcha ncludes all sets of a sngle edge (.e., all sngletons), can be constructed accordng to Constructon 1, such that unt rate s achevable wth zero error n I f and only f rate k s achevable wth zero error n I s under perfect securty. The proof of Corollary 1 follows the same lne as the proof of Theorem 1, wth the dfference that all ɛ and δ become strctly 0. For example, (9) mples that b1 n s a functon of dn 1, and hence that t can be perfectly decoded from d1 n. We remark that our reducton has an operatonal aspect that from a code for I s one can construct a code for I. Indeed, usng our reducton, to solve a multple-uncast network codng problem, one may frst reduce t to a uncast secure network codng problem, then solve the latter, and fnally use ths soluton to obtan a soluton to the orgnal multple-uncast problem. Chan and Grant [18] prevously show that determnng the zero-error achevablty of a rate n a multcast secure network codng problem wth general setup (.e., arbtrary edge capactes, arbtrary A, and arbtrary nodes may generate randomness) and wth perfect securty s at least as hard as determnng the zero-error achevablty of a rate tuple n multple-multcast network codng. The result n ths secton sgnfcantly strengthens the result n [18] by showng that the secure network codng problem under a much smpler setup (.e., uncast, equal lnk capactes, unform A wth a sngle wretap lnk) s stll hard, under varous defntons of achevablty and securty. IV. REDUCING SECURE UNICAST TO MULTIPLE-UNICAST In the prevous secton we have reduced an arbtrary multple-uncast network codng problem nto a partcular uncast secure network codng problem wth a very smple setup, n whch at most one lnk can be eavesdropped. Conversely, gven an arbtrary uncast secure network codng problem where at most one lnk can be eavesdropped, we can reduce t nto a partcular multple-multcast network codng problem wthout securty requrements (whch can n turn be reduced nto an equvalent multple-uncast network codng problem [9]). A more general constructon was frst proposed n [35] for the purpose of lower boundng the capacty of a secure network codng nstance by studyng a correspondng multple-multcast network codng nstance. In ths paper we smplfy the constructon to address the specal case that at most one lnk can be eavesdropped,.e., A comprses only sngletons. Loosely speakng, we show that for ths specal case the multple-multcast network codng nstances not only lower bound but also upper bound the capacty of the secure network codng nstances, hence gvng a reducton. Constructon 2: Gven a uncast secure network codng problem I s on a drected graph G = (V, E) wth source s, termnal t, and a collecton of wretap sets A comprsng only sngletons. We construct a correspondng multple-multcast network codng problem I on an augmented graph Ǧ = ( ˇV, E). ˇ We defne Ě and ˇV from E and V. InE, denote by c e the capacty of lnk e, and by E out () the set of outgong edges of node. 1) For V, add to ˇV. Fore E such that {e} / A (n the remanng part of ths subsecton we wll wrte e / A or e A nstead, because the elements of A are sngletons), add e to Ě. 2) For e = (, j) E such that e A, create nodes u e, v e n ˇV; create edges (, u e ), (u e, j) and (u e,v e ) n Ě, all of capacty c e. 3) Create a key aggregaton node v T n ˇV. For each node V, create a key source node v n ˇV. Create two lnks ( v,v T ) and ( v, ) n Ě, both of

8 HUANG et al.: SINGLE-UNICAST SECURE NETWORK CODING AND NETWORK ERROR CORRECTION 4503 Fg. 3. An example of Constructon 2. (a) A uncast secure network codng nstance I s where s s the source, t s the termnal and A ={{e 1 }, {e 2 }}. (b) The multple-multcast network codng nstance I obtaned from I s accordng to Constructon 2. In ths problem, t demands the message orgnated from v s ; v e1 and v e2 demand the messages orgnated from v s, v s, v A, v B and v t. capacty č = e E out () 4) Create a vrtual source node v s n ˇV. For all e A, create lnks (v s, s) and (v s,v e ) n Ě, both of capacty out (s) c e. 5) For all e A, create a lnk (v T,v e ) n Ě of capacty c e c e. In I, nodes v s and v, V are assocated wth ndependent messages. Node t demands the message of v s. For all e A, node v e demands the messages of v s and all v. Note that n I there s no securty requrement. Refer to Fgure 3 for an example of Constructon 2. Denote for short č V = (č, V). Consder any uncast secure network codng nstance I s = (G, s, t, A) such that A comprses only sngletons. Let I be the multple-multcast network codng nstance obtaned from I s accordng to Constructon 2. The next theorem reveals a connecton between I s and I. Theorem 2: Rate R s asymptotcally achevable n I s subject to the weak or strong securty requrement f and only f c e. rate tuple (R, č V ) s asymptotcally achevable n I, wherer s the rate of the message of v s, and č V s the rate tuple of messages of v, V. Proof: We frst note that by [20], the capacty regon of I s subject to the weak securty requrement s the same as the capacty regon subject to the strong securty requrement. Therefore, a rate s asymptotcally achevable n I s subject to weak securty f and only f t s asymptotcally achevable subject to strong securty. In the proof we assume that weak securty s mposed n I s, and the case of strong securty follows drectly from the equvalence.. Assumng that rate tuple (R, č V ) s asymptotcally achevable n I, t s proved n [35] that rate R s asymptotcally achevable n I s under the weak securty requrement. Here we gve a smplfed proof of ths fact for completeness. By hypothess, for any ɛ > 0 and δ>0, there exsts a network code φ of length n that acheves rate tuple (R, č V ) ɛ n I wth error probablty δ. In problem I s, we smulate the network code φ. Specfcally, the message orgnally assocated wth v s s replaced by the secret source message, and the messages orgnally assocated wth v, V are replaced by the ndependent random keys generated at node. Let every edge e = (, j) n E smulate the encodng functon of edge e Ě f e / A or the encodng functon of (, u e ) n Ě f e A; then the termnal t, by smulatng the decodng functon, can

9 4504 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 decode the source message wth error probablty δ. Therefore decodablty s not a problem. It remans to show that smulatng the code φ meets the weak securty requrement. For an edge ě Ě, letxě be the sgnal transmtted on ě nduced by φ. We denote by M the message assocated wth v s, and by K the message assocated wth v.theforanye A, the nequalty n (12), as shown at the bottom of the next page follows, where (a) follows from expandng I (M; X (vs,v e ) X (ue,v e )) n two ways; (b) follows from the constructon that X (vs,v e ) s a functon of M; (c) follows form the chan rule; (d) follows from the fact that H (X (ue,v e )) nc (ue,v e ) = nc e and H (X (vt,v e ) X (ue,v e ), X (vs,v e )) nc (vt,v e ) = n c e nc e; (e) follows from the chan rule; (f) follows from H (M, K V ) nr + n c e nɛ, whereɛ s the sum of the entres of ɛ; and (g) follows from Fano s nequalty, where δ 0 as δ 0. (12) mples that I (M; X (ue,v e )) n(ɛ + δ ). And because X (ue,v e ) can be vewed as the observaton of an adversary eavesdroppng on edge e, the weak securty requrement s met.. Assumng that rate R s asymptotcally achevable n I s under the weak securty requrement, we show that rate tuple (R, č A ) s asymptotcally achevable n I. Fore E, denote by X e the sgnal transmtted on edge e. By hypothess, for arbtrary ɛ R > 0, ɛ S > 0andδ>0, there exsts a network code φ wth length n that acheves rate R ɛ R weakly securely n I s wth error probablty δ, such that I (M; X e ) nɛ S,for all e A. For arbtrary ɛ E > 0, wthout loss of generalty we assume that H (X e ) n(c e ɛ E ),foralle E. Thss because f H (X e )<nc e,.e.,fx e s not almost unform, then we can repeat φ for m tmes and perform a source code of length m (over the supersymbol alphabet {0, 1} n ) on edge e to compress X e by encodng only the typcal sequences [11, Sec. 3.2], and use the spare capacty of the edge to transmt random bts. Meanwhle, source s and termnal t perform an outer channel code of length m (also over alphabet {0, 1} n ) to keep the error probablty small. For suffcently large m, the overall concatenated code asymptotcally acheves the same rate weakly securely as φ does, and such that H (X e )/mn, as desred, s arbtrarly close to c e due to the asymptotc equpartton property. Note that n general a node V wll generate an ndependent random varable K as nput to the encodng functons. The rate of K s upper bounded by č,whchs the sum capactes of all outgong edges of. We now turn to the problem I. We construct a network code φ of a slghtly longer length n = (1 + ɛ L )n. Inthefrst n channel uses, φ smulates the operaton of φ. Specfcally, node v s generates a random varable M unformly dstrbuted over [2 n(r ɛr) ], and transmt t to s va edge (v s, s). For V, node v generates a random varable K unformly dstrbuted over [2 nč ], and transmt t to va edge ( v, ). The rate of M 1 (over code length n )s 1+ɛ L (R ɛ R ) and the rate of K s 1 1+ɛ L č.theratesofm and K V can be made arbtrarly close to R and č V by choosng suffcently small ɛ R and ɛ L. To smulate φ, φ performs the same encodng functon on edge e E (f e remans n Ě) asφ dd n I s. Otherwse f e s replaced by (, u e ) and (u e, j), thenφ performs the same encodng functon on (, u e ) Ě as φ dd on edge e E. The nduced sgnal X (,ue ) s then relayed to edge (u e, j) and (u e,v e ).Intheextraɛ L channel uses, these edges (from E) keep slent (or smply transmt dummy zeros). At termnal node t, by smulatng the decodng functon, t s able to decode M correctly wth probablty of error δ. We next show that (K, V) and M can be decoded at v e, for all e A. Note that v e has three ncomng edges,.e., (u e,v e ), (v s,v e ) and (v T,v e ). The sgnal X (ue,v e ) transmtted on (u e,v e ), as descrbed n the prevous paragraph, s the same as the sgnal X e on edge e n the secure network codng problem I s. Let edge (v s,v e ) transmt M. Now consder a dstrbuted source codng problem wth three correlated sources (K, V), X e and M. Note the X e and M are avalable at v e by constructon, and the queston s that whether v e can decode K V from X e, M and the sgnal receved from edge (v T,v e ). It follows that, H (K V X e, M) = H (X e, K V M) H (X e M) = H (X e K V, M) + H (K V M) H (X e M) (a) = H (K V M) H (X e M) (b) = H (K V ) H (X e M) n c e H (X e M) = n c e (H (X e ) I (M; X e )) (c) n( c e c e ) + n(ɛ S + ɛ E ) (d) < n( c e c e ) + nɛ L ( c e c e ) = n ( c e c e ), (13) where (a) follows because X e s a functon of K V and M; (b) follows from the fact that K V s ndependent of M; (c) follows from the weak securty requrement and that H (X e ) n(c e ɛ E ); and (d) follows by choosng a suffcently small ɛ S and ɛ E such that ɛ S + ɛ E <ɛ L ( c e c e), forall e A. Note that c e c e s the capacty of edge (v T,v e ), and so by (13) and the Slepan-Wolf Theorem of dstrbuted source codng, the rate tuple of the correlated sources are n the achevable regon. Therefore by concatenatng a (outer) Slepan-Wolf code wth the (nner) network code φ,foralle A, v e s able to decode (M, K V ) wth vanshng probablty of error. Ths completes the proof. V. REDUCING MULTIPLE-UNICAST TO UNICAST NETWORK ERROR CORRECTION In ths secton we reduce nstances of the multple-uncast network codng problem to nstances of the uncast network error correcton problem. We start wth the zero-error case. A. Zero-Error Achevablty The followng theorem reduces the problem of determnng the zero-error achevablty of a rate n a general multpleuncast network codng nstance to the problem of determnng

10 HUANG et al.: SINGLE-UNICAST SECURE NETWORK CODING AND NETWORK ERROR CORRECTION 4505 Fg. 4. In the uncast network error correcton problem I c, s s the source and t s the termnal. N s the network on whch I s defned. All edges outsde N (.e., edges for whch at least one of ts end-pont does not belong to N )have unt capacty. There s at most one error n ths network, and ths error can occur at any edge except {a, b, 1 k}. Namely, B ncludes all sngleton sets of a sngle edge n the network except {a } and {b }, = 1,...,k (the thckened edges). Note that there are k parallel branches n total gong from s to t but only the frst and the k-th branches are drawn explctly. the zero-error achevablty of a rate n a partcular uncast network error correcton nstance that has a very smple setup. Recall from the remark before Theorem 1 that there s no loss of generalty n addressng the achevablty of a rate nstead of a rate tuple n the multple-uncast network codng problem. Constructon 3: Gven any multple-uncast network codng problem I on a network N wth source-destnaton pars {(s, t ), = 1,...,k}, a uncast network error correcton problem I c s constructed as specfed n Fgure 4. Theorem 3: Gven any multple-uncast network codng problem I wth source-destnaton pars {(s, t ), = 1,...,k}, a correspondng uncast network error correcton Fg. 5. A scheme to acheve zero-error rate k n I c gven that unt rate s achevable wth zero error n I. M = (M 1,...,M k ) and node B performs majorty decodng. problem I c = (G, s, t, B) n whch B ncludes sets wth at most one edge can be constructed accordng to Constructon 3, such that unt rate s achevable wth zero-error n I f and only f rate k s achevable wth zero-error n I c. Proof:. We show that the zero-error achevablty of unt rate n I mples the zero-error achevablty of rate k n I c. A constructve scheme s shown n Fgure 5. In I c, the source lets M = (M 1,...,M k ),wherethem s are..d. unformly dstrbuted over [2 n ].InN, we smulate the network code for I that acheves unt rate wth zero error. Outsde N, let the network code be a (M) = x (M) = y (M) = z (M) = z (M) = M, = 1,...,k. Note that the sgnals on edges x, y and z form a repetton code and node B, by performng majorty decodng, can correct any sngle error to obtan M. Hence the scheme ensures that b (M) = M under all possble error patterns, and so rate k s achevable wth zero error n I c. H (M X (ue,v e )) (a) = H (X (vs,v e ) X (ue,v e )) + H (M X (vs,v e ), X (ue,v e )) H (X (vs,v e ) X (ue,v e ), M) H (X (vs,v e ) X (ue,v e )) H (X (vs,v e ) X (ue,v e ), M) (b) = H (X (vs,v e ) X (ue,v e )) (c) = H (X (vt,v e ), X (ue,v e ), X (vs,v e )) H (X (ue,v e )) H (X (vt,v e ) X (ue,v e ), X (vs,v e )) (d) H (X (vt,v e ), X (ue,v e ), X (vs,v e )) n c e (e) = H (M, K V, X (vt,v e ), X (ue,v e ), X (vs,v e )) H (M, K V X (vt,v e ), X (ue,v e ), X (vs,v e )) n c e H (M, K V ) H (M, K V X (vt,v e ), X (ue,v e ), X (vs,v e )) n ( f ) nr nɛ H (M, K V X (vt,v e ), X (ue,v e ), X (vs,v e )) (g) nr nɛ nδ H (M) n(ɛ + δ ) (12) c e

11 4506 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE We show that the zero-error achevablty of rate k n I c mples the zero-error achevablty of unt zero-error rate n I. Suppose rate k s acheved wth zero-error n I c by a network code wth length n, and denote the source message by M, whch s unformly dstrbuted over [2 nk ]. Recall from Secton II-C that, r = (r e ) e E s the tuple of addtve error sgnals called an error pattern, and R B the set of all possble error patterns,.e., R B = {r : non-zero entres n r correspond to B-errors, B B}. For any edge e E, we denote by e(m, r) :[2 nk ] R B [2 n ] the sgnal receved on edge e when the source message equals m and the error pattern r occurs n the network. Let b(m, r) = (b 1 (m, r),...,b k (m, r)), then because the edges b 1,...,b k form a cut-set from s to t, b(m, r) must be njectve wth respect to m due to the zero error decodablty constrant. Formally, for two dfferent messages m 1 = m 2, t follows from the zero error decodablty constrant that b(m 1, r 1 ) = b(m 2, r 2 ), r 1, r 2 R B. Note that the codoman of b s [2 n ] k, whch has the same sze as the set of messages [2 nk ]. Therefore denote by b(m) = b(m, 0), then b(m) s a bjectve functon. Ths mples that b(m, r) = b(m), r R B, because otherwse f there exst m 1, r 1 such that b(m 1, r 1 ) = b(m 1 ), then there s a m 2 = m 1 such that b(m 1, r 1 ) = b(m 2 ), volatng the decodablty requrement. Smlarly, let a(m, r) = (a 1 (m, r),...,a k (m, r)) and a(m) = a(m, 0),thena(m) s a bjectve functon and a(m, r) = a(m), r R B. For any e E, denote e(m) = e(m, 0). We make the followng clam: Clam: For = 1,...,k and any two messages m 1, m 2 [2 nk ] such that a (m 1 ) = a (m 2 ), t follows that x (m 1 ) = x (m 2 ), y (m 1 ) = y (m 2 ) and z (m 1 ) = z (m 2 ). To prove the clam, suppose for contradcton that there exst m 1, m 2 such that a (m 1 ) = a (m 2 ) and that the clam s not true,.e., x (m 1 ) = x (m 2 ) or y (m 1 ) = y (m 2 ) or z (m 1 ) = z (m 2 ). Frst consder the case that x (m 1 ) = x (m 2 ). Because of the one-to-one correspondence between m and a, there exsts a message m 3 = m 1 and such that a(m 3 ) = (a 1 (m 1 ),...,a 1 (m 1 ), a (m 2 ), a +1 (m 1 ),...,a k (m 1 )). Then x (m 1 ) = x (m 3 ) because by constructon x (m 3 ) = x (m 2 ), and by hypothess x (m 1 ) = x (m 2 ). Consder the followng two scenaros. In the frst scenaro, m 1 s transmtted, and an error turns y (m 1 ) nto y (m 3 ); n the second scenaro, m 3 s transmtted, and an error turns z (m 3 ) nto z (m 1 ). Then the cut-set sgnals a 1,...,a 1, x, y, z, a +1,...,a k are exactly the same n both scenaros, and so t s mpossble for t to dstngush m 1 from m 3, a contradcton to the zero error decodablty constrant. Therefore x (m 1 ) = x (m 2 ). Wth a smlar argument t follows that y (m 1 ) = y (m 2 ) and z (m 1 ) = z (m 2 ), and the clam s proved. The clam above suggests that (the sgnals on) x, y and z, as functons of (the sgnals on) a, are njectve. They are also surjectve functons because the doman and codoman are both [2 n ]. Hence there are one-to-one correspondences between a, x, y and z. Next we show that for any two messages m 1, m 2, f b (m 1 ) = b (m 2 ), then z (m 1) = z (m 2). Suppose for contradcton that there exsts m 1 = m 2 such that b (m 1 ) = b (m 2 ) and z (m 1) = z (m 2). Thenfm 1 s transmtted and an error r 1 turns x (m 1 ) nto x (m 2 ), the node B wll receve the same sgnals as n the case that m 2 s transmtted and an error r 2 turns y (m 2 ) nto y (m 1 ). Therefore b (m 1, r 1 ) = b (m 2, r 2 ). But, as shown above, because b (m 1, r 1 ) = b (m 1 ) and b (m 2, r 2 ) = b (m 2 ), t follows that b (m 1 ) = b (m 2 ), a contradcton. Ths clam suggests that f z (m 1) = z (m 2) then b (m 1 ) = b (m 2 ) and therefore b s a functon of z.ths functon s surjectve because b takes all 2 n possble values. Then snce the doman and the codoman are both [2 n ], b must be a bjectve functon of z. Wth the same argument t follows that b s also a bjectve functon of x. Hence z s a bjecton of a, a s a bjecton of x, x s a bjecton of b,andb s a bjecton of z. Therefore for all 1 k, z s a bjecton of z, and therefore unt rate s achevable wth zero error n I. B. Achevablty Allowng Vanshng Error In ths subsecton we show that Constructon 3 gves a reducton from multple-uncast network codng to uncast network error correcton not only n terms of zero-error achevablty, but also n terms of achevablty that allows vanshng error. Recall from Secton II that we say a rate s achevable f there exsts a code achevng the rate wth a vanshng error probablty. Theorem 4: Gven any multple-uncast network codng problem I wth source-destnaton pars {(s, t ), = 1,...,k}, a correspondng uncast network error correcton problem I c = (G, s, t, B) n whch B ncludes sets wth at most a sngle edge can be constructed accordng to Constructon 3, such that unt rate s achevable n I f and only f rate k s achevable n I c. We frst prove the forward drecton of the theorem, whch s smple and s smlar to the proof of the zero-error case. Proof: [Proof ( part of Theorem 4)] We show that f unt rate s achevable n I, thenratek s achevable n I c.agan we use the constructve scheme n Fgure 5. In I c, the source lets M = (M 1,...,M k ),wherethem s are..d. unformly dstrbuted over [2 n ].InN, we smulate the network code for I that acheves unt rate. Outsde N, let the network code be a (M) = x (M) = y (M) = z (M) = M, = 1,...,k. Consder the M s as the source messages of the smulated I, and denote by ˆM, = 1,...,k the outputs of the decoders of I. Letz (M) = ˆM, = 1,...,k, and let node B, = 1,...,k performs majorty decodng. The termnal t wll not decode an error as long as the multple-uncast nstance I does not commt an error,.e., ˆM = M. The error probablty of I s neglgble, whch mples the achevablty of rate k n I c. In the remander of ths subsecton we prove the other drecton of Theorem 4,.e., that the achevablty of rate k n I c mples the achevablty of unt rate n I. The man dea of the proof s as follows. In I the network wll smulate the gven network code for I c, and by dong so the termnal t wll obtan the sgnal on z n I c. The man task therefore s to estmate the sgnal on z, whch

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability Connectng Multple-uncast and Network Error Correcton: Reducton and Unachevablty Wentao Huang Calforna Insttute of Technology Mchael Langberg Unversty at Buffalo, SUNY Joerg Klewer New Jersey Insttute of

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

On Network Coding of Independent and Dependent Sources in Line Networks

On Network Coding of Independent and Dependent Sources in Line Networks On Network Codng of Independent and Dependent Sources n Lne Networks Mayank Baksh, Mchelle Effros, WeHsn Gu, Ralf Koetter Department of Electrcal Engneerng Department of Electrcal Engneerng Calforna Insttute

More information

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix

Lectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

Refined Coding Bounds for Network Error Correction

Refined Coding Bounds for Network Error Correction Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem. Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Assortment Optimization under MNL

Assortment Optimization under MNL Assortment Optmzaton under MNL Haotan Song Aprl 30, 2017 1 Introducton The assortment optmzaton problem ams to fnd the revenue-maxmzng assortment of products to offer when the prces of products are fxed.

More information

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011

Stanford University CS359G: Graph Partitioning and Expanders Handout 4 Luca Trevisan January 13, 2011 Stanford Unversty CS359G: Graph Parttonng and Expanders Handout 4 Luca Trevsan January 3, 0 Lecture 4 In whch we prove the dffcult drecton of Cheeger s nequalty. As n the past lectures, consder an undrected

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017

U.C. Berkeley CS294: Beyond Worst-Case Analysis Luca Trevisan September 5, 2017 U.C. Berkeley CS94: Beyond Worst-Case Analyss Handout 4s Luca Trevsan September 5, 07 Summary of Lecture 4 In whch we ntroduce semdefnte programmng and apply t to Max Cut. Semdefnte Programmng Recall that

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results.

For now, let us focus on a specific model of neurons. These are simplified from reality but can achieve remarkable results. Neural Networks : Dervaton compled by Alvn Wan from Professor Jtendra Malk s lecture Ths type of computaton s called deep learnng and s the most popular method for many problems, such as computer vson

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016

CS : Algorithms and Uncertainty Lecture 17 Date: October 26, 2016 CS 29-128: Algorthms and Uncertanty Lecture 17 Date: October 26, 2016 Instructor: Nkhl Bansal Scrbe: Mchael Denns 1 Introducton In ths lecture we wll be lookng nto the secretary problem, and an nterestng

More information

MATH 5707 HOMEWORK 4 SOLUTIONS 2. 2 i 2p i E(X i ) + E(Xi 2 ) ä i=1. i=1

MATH 5707 HOMEWORK 4 SOLUTIONS 2. 2 i 2p i E(X i ) + E(Xi 2 ) ä i=1. i=1 MATH 5707 HOMEWORK 4 SOLUTIONS CİHAN BAHRAN 1. Let v 1,..., v n R m, all lengths v are not larger than 1. Let p 1,..., p n [0, 1] be arbtrary and set w = p 1 v 1 + + p n v n. Then there exst ε 1,..., ε

More information

Approximately achieving Gaussian relay network capacity with lattice codes

Approximately achieving Gaussian relay network capacity with lattice codes Approxmately achevng Gaussan relay network capacty wth lattce codes Ayfer Özgür EFL, Lausanne, Swtzerland ayfer.ozgur@epfl.ch Suhas Dggav UCLA, USA and EFL, Swtzerland suhas@ee.ucla.edu Abstract Recently,

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016

U.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016 U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and

More information

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

Lossy Compression. Compromise accuracy of reconstruction for increased compression.

Lossy Compression. Compromise accuracy of reconstruction for increased compression. Lossy Compresson Compromse accuracy of reconstructon for ncreased compresson. The reconstructon s usually vsbly ndstngushable from the orgnal mage. Typcally, one can get up to 0:1 compresson wth almost

More information

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X

3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number

More information

Lecture 4: November 17, Part 1 Single Buffer Management

Lecture 4: November 17, Part 1 Single Buffer Management Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input

More information

= z 20 z n. (k 20) + 4 z k = 4

= z 20 z n. (k 20) + 4 z k = 4 Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg

princeton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there

More information

Lecture Space-Bounded Derandomization

Lecture Space-Bounded Derandomization Notes on Complexty Theory Last updated: October, 2008 Jonathan Katz Lecture Space-Bounded Derandomzaton 1 Space-Bounded Derandomzaton We now dscuss derandomzaton of space-bounded algorthms. Here non-trval

More information

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2]. Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland

More information

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006) ECE 534: Elements of Informaton Theory Solutons to Mdterm Eam (Sprng 6) Problem [ pts.] A dscrete memoryless source has an alphabet of three letters,, =,, 3, wth probabltes.4,.4, and., respectvely. (a)

More information

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications

MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.265/15.070J Fall 2013 Lecture 12 10/21/2013. Martingale Concentration Inequalities and Applications MASSACHUSETTS INSTITUTE OF TECHNOLOGY 6.65/15.070J Fall 013 Lecture 1 10/1/013 Martngale Concentraton Inequaltes and Applcatons Content. 1. Exponental concentraton for martngales wth bounded ncrements.

More information

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 15 Scribe: Jieming Mao April 1, 2013

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 15 Scribe: Jieming Mao April 1, 2013 COS 511: heoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 15 Scrbe: Jemng Mao Aprl 1, 013 1 Bref revew 1.1 Learnng wth expert advce Last tme, we started to talk about learnng wth expert advce.

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

Errors for Linear Systems

Errors for Linear Systems Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch

More information

Feature Selection: Part 1

Feature Selection: Part 1 CSE 546: Machne Learnng Lecture 5 Feature Selecton: Part 1 Instructor: Sham Kakade 1 Regresson n the hgh dmensonal settng How do we learn when the number of features d s greater than the sample sze n?

More information

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or Sgnal Compresson Sgnal Compresson Entropy Codng Entropy codng s also known as zero-error codng, data compresson or lossless compresson. Entropy codng s wdely used n vrtually all popular nternatonal multmeda

More information

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U)

ANSWERS. Problem 1. and the moment generating function (mgf) by. defined for any real t. Use this to show that E( U) var( U) Econ 413 Exam 13 H ANSWERS Settet er nndelt 9 deloppgaver, A,B,C, som alle anbefales å telle lkt for å gøre det ltt lettere å stå. Svar er gtt . Unfortunately, there s a prntng error n the hnt of

More information

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness.

20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness. 20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The frst dea s connectedness. Essentally, we want to say that a space cannot be decomposed

More information

Complete subgraphs in multipartite graphs

Complete subgraphs in multipartite graphs Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G

More information

Stanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7

Stanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7 Stanford Unversty CS54: Computatonal Complexty Notes 7 Luca Trevsan January 9, 014 Notes for Lecture 7 1 Approxmate Countng wt an N oracle We complete te proof of te followng result: Teorem 1 For every

More information

18.1 Introduction and Recap

18.1 Introduction and Recap CS787: Advanced Algorthms Scrbe: Pryananda Shenoy and Shjn Kong Lecturer: Shuch Chawla Topc: Streamng Algorthmscontnued) Date: 0/26/2007 We contnue talng about streamng algorthms n ths lecture, ncludng

More information

Chapter 8 Indicator Variables

Chapter 8 Indicator Variables Chapter 8 Indcator Varables In general, e explanatory varables n any regresson analyss are assumed to be quanttatve n nature. For example, e varables lke temperature, dstance, age etc. are quanttatve n

More information

Vapnik-Chervonenkis theory

Vapnik-Chervonenkis theory Vapnk-Chervonenks theory Rs Kondor June 13, 2008 For the purposes of ths lecture, we restrct ourselves to the bnary supervsed batch learnng settng. We assume that we have an nput space X, and an unknown

More information

Distribution of subgraphs of random regular graphs

Distribution of subgraphs of random regular graphs Dstrbuton of subgraphs of random regular graphs Zhcheng Gao Faculty of Busness Admnstraton Unversty of Macau Macau Chna zcgao@umac.mo N. C. Wormald Department of Combnatorcs and Optmzaton Unversty of Waterloo

More information

Lecture 4. Instructor: Haipeng Luo

Lecture 4. Instructor: Haipeng Luo Lecture 4 Instructor: Hapeng Luo In the followng lectures, we focus on the expert problem and study more adaptve algorthms. Although Hedge s proven to be worst-case optmal, one may wonder how well t would

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

Estimation: Part 2. Chapter GREG estimation

Estimation: Part 2. Chapter GREG estimation Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information

Randomness and Computation

Randomness and Computation Randomness and Computaton or, Randomzed Algorthms Mary Cryan School of Informatcs Unversty of Ednburgh RC 208/9) Lecture 0 slde Balls n Bns m balls, n bns, and balls thrown unformly at random nto bns usually

More information

Fundamental loop-current method using virtual voltage sources technique for special cases

Fundamental loop-current method using virtual voltage sources technique for special cases Fundamental loop-current method usng vrtual voltage sources technque for specal cases George E. Chatzaraks, 1 Marna D. Tortorel 1 and Anastasos D. Tzolas 1 Electrcal and Electroncs Engneerng Departments,

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

Anti-van der Waerden numbers of 3-term arithmetic progressions.

Anti-van der Waerden numbers of 3-term arithmetic progressions. Ant-van der Waerden numbers of 3-term arthmetc progressons. Zhanar Berkkyzy, Alex Schulte, and Mchael Young Aprl 24, 2016 Abstract The ant-van der Waerden number, denoted by aw([n], k), s the smallest

More information

Bayesian predictive Configural Frequency Analysis

Bayesian predictive Configural Frequency Analysis Psychologcal Test and Assessment Modelng, Volume 54, 2012 (3), 285-292 Bayesan predctve Confgural Frequency Analyss Eduardo Gutérrez-Peña 1 Abstract Confgural Frequency Analyss s a method for cell-wse

More information

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS

BOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Composite Hypotheses testing

Composite Hypotheses testing Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter

More information

HMMT February 2016 February 20, 2016

HMMT February 2016 February 20, 2016 HMMT February 016 February 0, 016 Combnatorcs 1. For postve ntegers n, let S n be the set of ntegers x such that n dstnct lnes, no three concurrent, can dvde a plane nto x regons (for example, S = {3,

More information

11 Tail Inequalities Markov s Inequality. Lecture 11: Tail Inequalities [Fa 13]

11 Tail Inequalities Markov s Inequality. Lecture 11: Tail Inequalities [Fa 13] Algorthms Lecture 11: Tal Inequaltes [Fa 13] If you hold a cat by the tal you learn thngs you cannot learn any other way. Mark Twan 11 Tal Inequaltes The smple recursve structure of skp lsts made t relatvely

More information

Single-Source/Sink Network Error Correction Is as Hard as Multiple-Unicast

Single-Source/Sink Network Error Correction Is as Hard as Multiple-Unicast Snge-Source/Snk Network Error Correcton Is as Hard as Mutpe-Uncast Wentao Huang and Tracey Ho Department of Eectrca Engneerng Caforna Insttute of Technoogy Pasadena, CA {whuang,tho}@catech.edu Mchae Langberg

More information

Generalized Linear Methods

Generalized Linear Methods Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set

More information

Online Appendix. t=1 (p t w)q t. Then the first order condition shows that

Online Appendix. t=1 (p t w)q t. Then the first order condition shows that Artcle forthcomng to ; manuscrpt no (Please, provde the manuscrpt number!) 1 Onlne Appendx Appendx E: Proofs Proof of Proposton 1 Frst we derve the equlbrum when the manufacturer does not vertcally ntegrate

More information

REAL ANALYSIS I HOMEWORK 1

REAL ANALYSIS I HOMEWORK 1 REAL ANALYSIS I HOMEWORK CİHAN BAHRAN The questons are from Tao s text. Exercse 0.0.. If (x α ) α A s a collecton of numbers x α [0, + ] such that x α

More information

Perfect Competition and the Nash Bargaining Solution

Perfect Competition and the Nash Bargaining Solution Perfect Competton and the Nash Barganng Soluton Renhard John Department of Economcs Unversty of Bonn Adenauerallee 24-42 53113 Bonn, Germany emal: rohn@un-bonn.de May 2005 Abstract For a lnear exchange

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

CS286r Assign One. Answer Key

CS286r Assign One. Answer Key CS286r Assgn One Answer Key 1 Game theory 1.1 1.1.1 Let off-equlbrum strateges also be that people contnue to play n Nash equlbrum. Devatng from any Nash equlbrum s a weakly domnated strategy. That s,

More information

Week 2. This week, we covered operations on sets and cardinality.

Week 2. This week, we covered operations on sets and cardinality. Week 2 Ths week, we covered operatons on sets and cardnalty. Defnton 0.1 (Correspondence). A correspondence between two sets A and B s a set S contaned n A B = {(a, b) a A, b B}. A correspondence from

More information

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling

Real-Time Systems. Multiprocessor scheduling. Multiprocessor scheduling. Multiprocessor scheduling Real-Tme Systems Multprocessor schedulng Specfcaton Implementaton Verfcaton Multprocessor schedulng -- -- Global schedulng How are tasks assgned to processors? Statc assgnment The processor(s) used for

More information

PHYS 705: Classical Mechanics. Calculus of Variations II

PHYS 705: Classical Mechanics. Calculus of Variations II 1 PHYS 705: Classcal Mechancs Calculus of Varatons II 2 Calculus of Varatons: Generalzaton (no constrant yet) Suppose now that F depends on several dependent varables : We need to fnd such that has a statonary

More information

Lecture 12: Discrete Laplacian

Lecture 12: Discrete Laplacian Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly

More information

Pulse Coded Modulation

Pulse Coded Modulation Pulse Coded Modulaton PCM (Pulse Coded Modulaton) s a voce codng technque defned by the ITU-T G.711 standard and t s used n dgtal telephony to encode the voce sgnal. The frst step n the analog to dgtal

More information

The Two-User Gaussian Fading Broadcast Channel

The Two-User Gaussian Fading Broadcast Channel The Two-User Gaussan Fadng Broadcast Channel Amn Jafaran Lab of Informatcs, Networks & Communcatons LINC Department of Electrcal & Computer Engneerng Unversty of Texas at Austn Austn, TX 787, USA Emal:

More information

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,

Example: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41, The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

Chapter 11: Simple Linear Regression and Correlation

Chapter 11: Simple Linear Regression and Correlation Chapter 11: Smple Lnear Regresson and Correlaton 11-1 Emprcal Models 11-2 Smple Lnear Regresson 11-3 Propertes of the Least Squares Estmators 11-4 Hypothess Test n Smple Lnear Regresson 11-4.1 Use of t-tests

More information

Difference Equations

Difference Equations Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1

More information

Lecture 3. Ax x i a i. i i

Lecture 3. Ax x i a i. i i 18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest

More information

State Amplification and State Masking for the Binary Energy Harvesting Channel

State Amplification and State Masking for the Binary Energy Harvesting Channel State Amplfcaton and State Maskng for the Bnary Energy Harvestng Channel Kaya Tutuncuoglu, Omur Ozel 2, Ayln Yener, and Sennur Ulukus 2 Department of Electrcal Engneerng, The Pennsylvana State Unversty,

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

A note on almost sure behavior of randomly weighted sums of φ-mixing random variables with φ-mixing weights

A note on almost sure behavior of randomly weighted sums of φ-mixing random variables with φ-mixing weights ACTA ET COMMENTATIONES UNIVERSITATIS TARTUENSIS DE MATHEMATICA Volume 7, Number 2, December 203 Avalable onlne at http://acutm.math.ut.ee A note on almost sure behavor of randomly weghted sums of φ-mxng

More information

Secret Communication using Artificial Noise

Secret Communication using Artificial Noise Secret Communcaton usng Artfcal Nose Roht Neg, Satashu Goel C Department, Carnege Mellon Unversty, PA 151, USA {neg,satashug}@ece.cmu.edu Abstract The problem of secret communcaton between two nodes over

More information

E Tail Inequalities. E.1 Markov s Inequality. Non-Lecture E: Tail Inequalities

E Tail Inequalities. E.1 Markov s Inequality. Non-Lecture E: Tail Inequalities Algorthms Non-Lecture E: Tal Inequaltes If you hold a cat by the tal you learn thngs you cannot learn any other way. Mar Twan E Tal Inequaltes The smple recursve structure of sp lsts made t relatvely easy

More information

(1 ) (1 ) 0 (1 ) (1 ) 0

(1 ) (1 ) 0 (1 ) (1 ) 0 Appendx A Appendx A contans proofs for resubmsson "Contractng Informaton Securty n the Presence of Double oral Hazard" Proof of Lemma 1: Assume that, to the contrary, BS efforts are achevable under a blateral

More information