Broadcasting With Side Information
|
|
- Kristopher Cross
- 6 years ago
- Views:
Transcription
1 Department of Electrical and Computer Engineering Texas A&M Noga Alon, Avinatan Hasidim, Eyal Lubetzky, Uri Stav, Amit Weinstein, FOCS2008
2 Outline I shall avoid rigorous math and terminologies and be more intuitive, but last part might be more technical I shall be presenting : (FOCS 2008) Index Coding with Side Information (FOCS 2006) Coding on demand by an informed source (ISCOD) for efficient broadcast of different supplemental data to caching clients (IEEE/ACM Transactions on Networking 2006) Dissertations E. Lubetzky and Thesis by Amit Weinstein (Students of Noga Alon) Work by Chaudhry and Sprintson
3 Index Coding A Server with a set of packets A set of Clients Each Client wants some set of packets from server: Wants set Each Client has some set of packets available: Has (Cached) set, may be overheard from previous transmission Opportunistic Listening The server can broadcast the packets or their combinations (encoding)
4 Index Coding A Server with a set of packets A set of Clients Each Client wants some set of packets from server: Wants set Each Client has some set of packets available: Has (Cached) set, may be overheard from previous transmission Opportunistic Listening The server can broadcast the packets or their combinations (encoding)
5 Index Coding A Server with a set of packets A set of Clients Each Client wants some set of packets from server: Wants set Each Client has some set of packets available: Has (Cached) set, may be overheard from previous transmission Opportunistic Listening The server can broadcast the packets or their combinations (encoding)
6 Index Coding A Server with a set of packets A set of Clients Each Client wants some set of packets from server: Wants set Each Client has some set of packets available: Has (Cached) set, may be overheard from previous transmission Opportunistic Listening The server can broadcast the packets or their combinations (encoding)
7 Index Coding A Server with a set of packets A set of Clients Each Client wants some set of packets from server: Wants set Each Client has some set of packets available: Has (Cached) set, may be overheard from previous transmission Opportunistic Listening The server can broadcast the packets or their combinations (encoding)
8 Index Coding (cont.) Objective To satisfy the demands of all clients with the minimum possible number of transmissions from server by taking advantage of the Has sets NP-Hard to solve and approximate; measure of hardness?
9 Index Coding (cont.) Objective To satisfy the demands of all clients with the minimum possible number of transmissions from server by taking advantage of the Has sets NP-Hard to solve and approximate; measure of hardness?
10 Index Coding (cont.) Objective To satisfy the demands of all clients with the minimum possible number of transmissions from server by taking advantage of the Has sets NP-Hard to solve and approximate; measure of hardness?
11 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay
12 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay
13 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay
14 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay
15 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay
16 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay
17 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay
18 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay
19 Application: A Broadcast Network Number of Transmissions Without Index Coding = 4 With Index Coding = 2, i.e, Server needs to transmit only two packets p 1 + p 2 + p 3 and p 1 + p 4 Advantages: Power saving i.e, longer battery life, bandwidth saving, lesser latency at overall system level
20 Application: A Broadcast Network Number of Transmissions Without Index Coding = 4 With Index Coding = 2, i.e, Server needs to transmit only two packets p 1 + p 2 + p 3 and p 1 + p 4 Advantages: Power saving i.e, longer battery life, bandwidth saving, lesser latency at overall system level
21 Application: A Broadcast Network Number of Transmissions Without Index Coding = 4 With Index Coding = 2, i.e, Server needs to transmit only two packets p 1 + p 2 + p 3 and p 1 + p 4 Advantages: Power saving i.e, longer battery life, bandwidth saving, lesser latency at overall system level
22 Previous Work The simpler model of Index Coding was first suggested by [Birk and Kol (98)]. Given as a part of homework assignment ISCOD (Informed Source Coding) In this model each packet consists of only one bit Optimal linear schemes were characterized by [Bar-Yossef, Birk, Jayram and Kol (06)]. It was shown that linear encoding schemes are sometimes far from optimal [Lubetzky and Stav (07)]. Relationship to Network Coding What happens when packet size is not a bit? Some exact and heuristic approaches to solve Index Coding [Chaudhry and Spnitson]. Can we give some rates bounds?
23 Previous Work The simpler model of Index Coding was first suggested by [Birk and Kol (98)]. Given as a part of homework assignment ISCOD (Informed Source Coding) In this model each packet consists of only one bit Optimal linear schemes were characterized by [Bar-Yossef, Birk, Jayram and Kol (06)]. It was shown that linear encoding schemes are sometimes far from optimal [Lubetzky and Stav (07)]. Relationship to Network Coding What happens when packet size is not a bit? Some exact and heuristic approaches to solve Index Coding [Chaudhry and Spnitson]. Can we give some rates bounds?
24 Previous Work The simpler model of Index Coding was first suggested by [Birk and Kol (98)]. Given as a part of homework assignment ISCOD (Informed Source Coding) In this model each packet consists of only one bit Optimal linear schemes were characterized by [Bar-Yossef, Birk, Jayram and Kol (06)]. It was shown that linear encoding schemes are sometimes far from optimal [Lubetzky and Stav (07)]. Relationship to Network Coding What happens when packet size is not a bit? Some exact and heuristic approaches to solve Index Coding [Chaudhry and Spnitson]. Can we give some rates bounds?
25 Previous Work The simpler model of Index Coding was first suggested by [Birk and Kol (98)]. Given as a part of homework assignment ISCOD (Informed Source Coding) In this model each packet consists of only one bit Optimal linear schemes were characterized by [Bar-Yossef, Birk, Jayram and Kol (06)]. It was shown that linear encoding schemes are sometimes far from optimal [Lubetzky and Stav (07)]. Relationship to Network Coding What happens when packet size is not a bit? Some exact and heuristic approaches to solve Index Coding [Chaudhry and Spnitson]. Can we give some rates bounds?
26 Previous Work The simpler model of Index Coding was first suggested by [Birk and Kol (98)]. Given as a part of homework assignment ISCOD (Informed Source Coding) In this model each packet consists of only one bit Optimal linear schemes were characterized by [Bar-Yossef, Birk, Jayram and Kol (06)]. It was shown that linear encoding schemes are sometimes far from optimal [Lubetzky and Stav (07)]. Relationship to Network Coding What happens when packet size is not a bit? Some exact and heuristic approaches to solve Index Coding [Chaudhry and Spnitson]. Can we give some rates bounds?
27 Previous Work The simpler model of Index Coding was first suggested by [Birk and Kol (98)]. Given as a part of homework assignment ISCOD (Informed Source Coding) In this model each packet consists of only one bit Optimal linear schemes were characterized by [Bar-Yossef, Birk, Jayram and Kol (06)]. It was shown that linear encoding schemes are sometimes far from optimal [Lubetzky and Stav (07)]. Relationship to Network Coding What happens when packet size is not a bit? Some exact and heuristic approaches to solve Index Coding [Chaudhry and Spnitson]. Can we give some rates bounds?
28 Matrix Fits a Graph Let G be a directed graph on n vertices without self-loops. A 0-1 matrix A = (a ij ) fits G if for all i and j: a ii = 1, a ij = 0 whenever (i, j) is not an edge of G Means: A I is the adjacency matrix of an edge subgraph of G, where I denotes the identity matrix Figure: Ref:
29 Matrix Fits a Graph Let G be a directed graph on n vertices without self-loops. A 0-1 matrix A = (a ij ) fits G if for all i and j: a ii = 1, a ij = 0 whenever (i, j) is not an edge of G Means: A I is the adjacency matrix of an edge subgraph of G, where I denotes the identity matrix Figure: Ref:
30 minrk 2 (G) Let rk 2 ( ) denote the 2-rank of a 0-1 matrix(its rank over the field GF(2)), then: minrk 2 (G) = min{rk 2 (A) : A fits G} Figure: Ref:
31 minrk 2 (G) (contd.) Theorem Computing minrk 2 (G) is NP-Complete [Peeters] Can also be reduced to SAT [Chaudhry et al] Optimal Length of a linear Index Code (No. of packets to be transmitted)=minrk 2 (G) CliqueNumber(G) ShannonCapacity(G) minrk 2 (G) ChromaticNumber(G)
32 minrk 2 (G) (contd.) Theorem Computing minrk 2 (G) is NP-Complete [Peeters] Can also be reduced to SAT [Chaudhry et al] Optimal Length of a linear Index Code (No. of packets to be transmitted)=minrk 2 (G) CliqueNumber(G) ShannonCapacity(G) minrk 2 (G) ChromaticNumber(G)
33 minrk 2 (G) (contd.) Theorem Computing minrk 2 (G) is NP-Complete [Peeters] Can also be reduced to SAT [Chaudhry et al] Optimal Length of a linear Index Code (No. of packets to be transmitted)=minrk 2 (G) CliqueNumber(G) ShannonCapacity(G) minrk 2 (G) ChromaticNumber(G)
34 minrk 2 (G) Intuition (contd.) All clients that correspond to nodes in a clique can be satisfied by one transmission, which includes a linear combination of all packets in their wants sets Minimize the number of transmissions by finding the least number of cliques that cover whole graph, clique partition problem
35 minrk 2 (G) Intuition (contd.) All clients that correspond to nodes in a clique can be satisfied by one transmission, which includes a linear combination of all packets in their wants sets Minimize the number of transmissions by finding the least number of cliques that cover whole graph, clique partition problem
36 minrk 2 (G) Intuition (contd.) All clients that correspond to nodes in a clique can be satisfied by one transmission, which includes a linear combination of all packets in their wants sets Minimize the number of transmissions by finding the least number of cliques that cover whole graph, clique partition problem
37 Formal Model (Broadcasting with Side Information) A sender holds a word x = x 1, x 2 x n, each block xi consists of t bits There are m receivers Each receiver R i wants a specific block x f (i) and has prior side information consisting of some other blocks x j The goal: To construct an efficient encoding scheme such that each receiver can decode the block it wants
38 Figure: Ref: broadcasting slides.pdf?a At least 2 blocks (packets are needed). Why? x 1 x 2 and x 3 x 4 x 5
39 Figure: Ref: broadcasting slides.pdf?a At least 2 blocks (packets are needed). Why? x 1 x 2 and x 3 x 4 x 5
40 Presentation as Directed Hypergraph H = (V, E) Vertices: V = [n] = {1, 2,, n} Edges: For each receiver R j there is a directed edge (f (j), N(j)) E, where N(j) is the set of indices of all blocks known to R j Performance metric: Define β t (H) as the minimal number of bits required when the block length is t
41 Presentation as Directed Hypergraph H = (V, E) Vertices: V = [n] = {1, 2,, n} Edges: For each receiver R j there is a directed edge (f (j), N(j)) E, where N(j) is the set of indices of all blocks known to R j Performance metric: Define β t (H) as the minimal number of bits required when the block length is t
42 Presentation as Directed Hypergraph H = (V, E) Vertices: V = [n] = {1, 2,, n} Edges: For each receiver R j there is a directed edge (f (j), N(j)) E, where N(j) is the set of indices of all blocks known to R j Performance metric: Define β t (H) as the minimal number of bits required when the block length is t
43 Presentation as Directed Hypergraph H = (V, E) Vertices: V = [n] = {1, 2,, n} Edges: For each receiver R j there is a directed edge (f (j), N(j)) E, where N(j) is the set of indices of all blocks known to R j Performance metric: Define β t (H) as the minimal number of bits required when the block length is t
44 Example of Hypergrpah Figure: broadcasting slides.pdf?a β t (H) 2t β t (H) 2t by transmitting x 1 x 2 and x 3 x 4 x 5
45 Example of Hypergrpah Figure: broadcasting slides.pdf?a β t (H) 2t β t (H) 2t by transmitting x 1 x 2 and x 3 x 4 x 5
46 Example of Hypergrpah Figure: broadcasting slides.pdf?a β t (H) 2t β t (H) 2t by transmitting x 1 x 2 and x 3 x 4 x 5
47 Example of Hypergrpah Figure: broadcasting slides.pdf?a β t (H) 2t β t (H) 2t by transmitting x 1 x 2 and x 3 x 4 x 5
48 Example of Hypergrpah Figure: broadcasting slides.pdf?a β t (H) 2t β t (H) 2t by transmitting x 1 x 2 and x 3 x 4 x 5
49 Definition of β(h) Define β(h) = lim t β t t In words, β is the average asymptotic number of encoding bits needed per bit in each block In the example, β t (H) = 2t, hence β(h) = 2
50 Definition of β(h) Define β(h) = lim t β t t In words, β is the average asymptotic number of encoding bits needed per bit in each block In the example, β t (H) = 2t, hence β(h) = 2
51 Definition of β(h) Define β(h) = lim t β t t In words, β is the average asymptotic number of encoding bits needed per bit in each block In the example, β t (H) = 2t, hence β(h) = 2
52 Definition of β t Layers A related parameter β t = β 1 (t.h), where t.h is the disjoint union of t copies of H In words, β t is the minimum number of bits required if the network topology is repeated t times Similarly, define: β (H) = lim t β t t = inf t β t t
53 Definition of β t Layers A related parameter β t = β 1 (t.h), where t.h is the disjoint union of t copies of H In words, β t is the minimum number of bits required if the network topology is repeated t times Similarly, define: β (H) = lim t β t t = inf t β t t
54 Definition of β t Layers A related parameter β t = β 1 (t.h), where t.h is the disjoint union of t copies of H In words, β t is the minimum number of bits required if the network topology is repeated t times Similarly, define: β (H) = lim t β t t = inf t β t t
55 Results β(h) β (H) β 1 (H) β β 1 (t.h) (H) = lim t = n log 2 γ(h) t, where γ(h) is the maximal cardinality of the input strings which are non-confusable.
56 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x, y are adjacent iff for some e = (i, j) E, x i y i and x j = y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers
57 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x, y are adjacent iff for some e = (i, j) E, x i y i and x j = y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers
58 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x, y are adjacent iff for some e = (i, j) E, x i y i and x j = y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers
59 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x, y are adjacent iff for some e = (i, j) E, x i y i and x j = y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers
60 Proof Sketch Zero- Error Information Theory-vs- Information Theory (ECE 646) Confusion Graph Figure: Ref:
61 Proof Sketch Zero- Error Information Theory-vs- Information Theory (ECE 646) Confusion Graph Figure: Ref:
62 Proof Sketch (contd.) Shannon Capacity of a Graph Figure: minrk.pdf
63 Proof Sketch (contd.) Powers of the Graph Figure: minrk.pdf
64 Proof Sketch (contd.) Powers of the Graph Figure: minrk.pdf
65 Results β(h) β (H) β 1 (H) β β 1 (t.h) (H) = lim t = n log 2 γ(h) t, where γ(h) is the maximal cardinality of the input strings which non-confusable.
66 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x,y are adjacent iff for some e = (i, j) E, x i y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers
67 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x,y are adjacent iff for some e = (i, j) E, x i y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers
68 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x,y are adjacent iff for some e = (i, j) E, x i y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers
69 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x,y are adjacent iff for some e = (i, j) E, x i y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers
70 OR Graph Product: The OR Graph Product of G 1 an G 2, denoted by G 1 G 2, is the graph on the vertex set V (G 1 ) V (G 2 ), where (u, v) and (u, v ) are adjacent iff either uu E(G 1 ) or vv E(G 2 ) (or both). Let G k denote the k fold OR Product of a graph G.
71 Let H 1 and H 2 denote directed hypergraphs (as before) on the vertex-sets [m] and [n] respectively, and consider an encoding scheme for their disjoint union, H 1 + H 2. As there are no edges between H 1 and H 2, such a coding scheme cannot encode two input-words x, y 0, 1 m+n by the same codeword iff this forms an ambiguity either with respect to H 1 or with respect to H 2, (or both). Hence: For any pair H 1, H 2 of directed hypergraph, the graphs confusion(h 1 + H 2 ) and confusion(h 1 ) confusion(h 1 ) are isomorphic Then lim k (χ(g k )) 1/k = χ f (G) Then skipping many steps... Finally lim k (χ(g k )) 1/k = 2 n α(confusion(h)) = 2n γ
72 Let H 1 and H 2 denote directed hypergraphs (as before) on the vertex-sets [m] and [n] respectively, and consider an encoding scheme for their disjoint union, H 1 + H 2. As there are no edges between H 1 and H 2, such a coding scheme cannot encode two input-words x, y 0, 1 m+n by the same codeword iff this forms an ambiguity either with respect to H 1 or with respect to H 2, (or both). Hence: For any pair H 1, H 2 of directed hypergraph, the graphs confusion(h 1 + H 2 ) and confusion(h 1 ) confusion(h 1 ) are isomorphic Then lim k (χ(g k )) 1/k = χ f (G) Then skipping many steps... Finally lim k (χ(g k )) 1/k = 2 n α(confusion(h)) = 2n γ
73 Conclusion Index Coding and its applications Effective Rates
74 Questions
Index coding with side information
Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated
More informationNon-linear index coding outperforming the linear optimum
Non-linear index coding outperforming the linear optimum Eyal Lubetzky Uri Stav Abstract The following source coding problem was introduced by Birk and Kol: a sender holds a word x {0, 1} n, and wishes
More informationarxiv: v1 [cs.it] 19 Jun 2008
Broadcasting with side information Noga Alon Avinatan Hasidim Eyal Lubetzky Uri Stav Amit Weinstein arxiv:0806.3246v1 [cs.it] 19 Jun 2008 Abstract A sender holds a word x consisting of n blocks x i, each
More informationIndex Coding. Trivandrum School on Communication, Coding and Networking Prasad Krishnan
Index Coding Trivandrum School on Communication, Coding and Networking 2017 Prasad Krishnan Signal Processing and Communications Research Centre, International Institute of Information Technology, Hyderabad
More informationOptimal Index Codes with Near-Extreme Rates
0 IEEE International Symposium on Information Theory Proceedings Optimal Index Codes with Near-Extreme Rates Son Hoang Dau Division of Mathematical Sciences School of Phys. and Math. Sciences Nanyang Technological
More informationOn Secure Index Coding with Side Information
On Secure Index Coding with Side Information Son Hoang Dau Division of Mathematical Sciences School of Phys. and Math. Sciences Nanyang Technological University 21 Nanyang Link, Singapore 637371 Email:
More informationLinear Index Codes are Optimal Up To Five Nodes
Linear Index Codes are Optimal Up To Five Nodes Lawrence Ong The University of Newcastle, Australia March 05 BIRS Workshop: Between Shannon and Hamming: Network Information Theory and Combinatorics Unicast
More informationSource Coding and Function Computation: Optimal Rate in Zero-Error and Vanishing Zero-Error Regime
Source Coding and Function Computation: Optimal Rate in Zero-Error and Vanishing Zero-Error Regime Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University st669@drexel.edu Advisor:
More informationIndex Coding via Random Coding
204 Iran Workshop on Communication and Information Theory (IWCIT) Index Coding via Random Coding Fatemeh Arbabjolfaei,BerndBandemer,Young-HanKim Department of Electrical and Computer Engineering University
More informationON INDEX CODING WITH SIDE INFORMATION
ON INDEX CODING WITH SIDE INFORMATION DAU SON HOANG SCHOOL OF PHYSICAL & MATHEMATICAL SCIENCES 2012 ON INDEX CODING WITH SIDE INFORMATION DAU SON HOANG School of Physical & Mathematical Sciences A thesis
More informationOptimal Scalar Linear Index Codes for Symmetric and Neighboring Side-information Problems
Optimal Scalar Linear Index Codes for Symmetric and Neighboring Side-information Problems Mahesh Babu Vaddi and B Sundar Rajan Department of Electrical Communication Engineering, Indian Institute of Science,
More informationOn the Index Coding Problem and its Relation to Network Coding and Matroid Theory
1 On the Index Coding Problem and its Relation to Network Coding and Matroid Theory Salim Y. El Rouayheb, Alex Sprintson, and Costas N. Georghiades Department of Electrical and Computer Engineering Texas
More informationIndex Coding With Erroneous Side Information
Index Coding With Erroneous Side Information Jae-Won Kim and Jong-Seon No, Fellow, IEEE 1 Abstract arxiv:1703.09361v1 [cs.it] 28 Mar 2017 In this paper, new index coding problems are studied, where each
More informationarxiv: v2 [cs.it] 13 Jul 2011
Index coding via linear programming Anna Blasiak Robert Kleinberg Eyal Lubetzky arxiv:1004.1379v2 [cs.it] 13 Jul 2011 Abstract Index Coding has received considerable attention recently motivated in part
More informationLocal Graph Coloring and Index Coding
1 Local Graph Coloring and Index Coding Karthikeyan Shanmugam, Alexandros G. Dimakis and Michael Langberg Department of Electrical and Computer Engineering University of Texas at Austin Austin, TX 78712-1684
More informationOptimal Index Codes via a Duality between Index Coding and Network Coding
Optimal Index Codes via a Duality between Index Coding and Network Coding Ashok Choudhary, Vamsi Krishna Gummadi, Prasad Krishnan Signal Processing and Communications Research Centre, International Institute
More informationIndex Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago
Index Coding Algorithms for Constructing Network Codes Salim El Rouayheb Illinois Institute of Technology, Chicago Matlab Code with GUI for Constructing Linear Network Codes Matlab outputs network code
More informationOn the Hardness of Approximating the Network Coding Capacity
On the Hardness of Approximating the Network Coding Capacity Michael Langberg, Member, IEEE, and Alex Sprintson, Member, IEEE. 1 Abstract This work addresses the computational complexity of achieving the
More informationOn linear index coding from graph homomorphism perspective
On linear index coding from graph homomorphism perspective Javad B. Ebrahimi, Mahdi Jafari Siavoshani Institute of Network Coding, Chinese University of Hong Kong, Hong Kong Computer Engineering Department,
More informationLATTICES AND CODES ISHAY HAVIV TEL AVIV UNIVERSITY THE RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES THE BLAVATNIK SCHOOL OF COMPUTER SCIENCE
TEL AVIV UNIVERSITY THE RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES THE BLAVATNIK SCHOOL OF COMPUTER SCIENCE LATTICES AND CODES THESIS SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY BY ISHAY
More informationError Correcting Index Codes and Matroids
Error Correcting Index Codes and Matroids Anoop Thomas and B Sundar Rajan Dept of ECE, IISc, Bangalore 5612, India, Email: {anoopt,bsrajan}@eceiiscernetin arxiv:15156v1 [csit 21 Jan 215 Abstract The connection
More informationSimplified Composite Coding for Index Coding
Simplified Composite Coding for Index Coding Yucheng Liu, Parastoo Sadeghi Research School of Engineering Australian National University {yucheng.liu, parastoo.sadeghi}@anu.edu.au Fatemeh Arbabjolfaei,
More informationIndex Coding & Caching in Wireless Networks. Salim El Rouayheb. ECE IIT, Chicago
Index Coding & Caching in Wireless Networks Salim El Rouayheb ECE IIT, Chicago Big Data vs. Wireless Exabytes per month [Cisco] Meanwhile, Storage is Getting Cheaper Storage cost per GB (USD) http://www.mkomo.com/cost-per-gigabyte-update
More informationarxiv: v2 [cs.it] 23 Aug 2018
Storage Capacity as an Information-Theoretic Vertex Cover and the Index Coding Rate Arya Mazumdar Andrew McGregor Sofya Vorotnikova arxiv:1706.09197v2 [cs.it] 23 Aug 2018 Abstract Motivated by applications
More informationLexicographic Products and the Power of Non-Linear Network Coding
Lexicographic Products and the Power of Non-Linear Network Coding Anna Blasiak Dept. of Computer Science Cornell University. ablasiak@cs.cornell.edu Robert Kleinberg Dept. of Computer Science Cornell University.
More informationA GRAPH-THEORETIC APPROACH TO NETWORK CODING
A GRAPH-THEORETIC APPROACH TO NETWORK CODING A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor of
More informationOn the Relation Between the Index Coding and the Network Coding Problems
On the Relation Between the Index Coding and the Network Coding Problems Salim El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University,
More informationShannon s noisy-channel theorem
Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for
More informationThe Minrank of Random Graphs
The Minrank of Random Graphs Alexander Golovnev Oded Regev Omri Weinstein Abstract The minrank of a directed graph G is the minimum rank of a matrix M that can be obtained from the adjacency matrix of
More informationTesting Equality in Communication Graphs
Electronic Colloquium on Computational Complexity, Report No. 86 (2016) Testing Equality in Communication Graphs Noga Alon Klim Efremenko Benny Sudakov Abstract Let G = (V, E) be a connected undirected
More informationLecture 18: More NP-Complete Problems
6.045 Lecture 18: More NP-Complete Problems 1 The Clique Problem a d f c b e g Given a graph G and positive k, does G contain a complete subgraph on k nodes? CLIQUE = { (G,k) G is an undirected graph with
More informationVariable Elimination (VE) Barak Sternberg
Variable Elimination (VE) Barak Sternberg Basic Ideas in VE Example 1: Let G be a Chain Bayesian Graph: X 1 X 2 X n 1 X n How would one compute P X n = k? Using the CPDs: P X 2 = x = x Val X1 P X 1 = x
More informationBounds on Shannon Capacity and Ramsey Numbers from Product of Graphs
Bounds on Shannon Capacity and Ramsey Numbers from Product of Graphs Xiaodong Xu Guangxi Academy of Sciences Nanning, Guangxi 530007, China xxdmaths@sina.com and Stanis law P. Radziszowski Department of
More informationComplexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler
Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard
More informationOutline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.
Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität
More informationCS168: The Modern Algorithmic Toolbox Lectures #11 and #12: Spectral Graph Theory
CS168: The Modern Algorithmic Toolbox Lectures #11 and #12: Spectral Graph Theory Tim Roughgarden & Gregory Valiant May 2, 2016 Spectral graph theory is the powerful and beautiful theory that arises from
More informationLecture 5: Probabilistic tools and Applications II
T-79.7003: Graphs and Networks Fall 2013 Lecture 5: Probabilistic tools and Applications II Lecturer: Charalampos E. Tsourakakis Oct. 11, 2013 5.1 Overview In the first part of today s lecture we will
More informationAn Equivalence between Network Coding and Index Coding
An Equivalence between Network Coding and Index Coding Michelle Effros, Fellow, IEEE, Salim El Rouayheb, Member, IEEE, Michael Langberg, Member, IEEE 1 Abstract We show that the network coding and index
More informationA Polynomial-Time Algorithm for Pliable Index Coding
1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n
More informationINDEX coding has attracted significant attention in various
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 63, NO. 12, DECEMBER 2017 7687 Index Coding With Erroneous Side Information Jae-Won Kim and Jong-Seon No, Fellow, IEEE Abstract In this paper, new index coding
More informationEntropy and Network Coding Based Communications
Graph-theoretical Constructions for Graph 1 Entropy and Network Coding Based Communications arxiv:1010.2619v2 [cs.it] 18 Apr 2011 Maximilien Gadouleau, Member, IEEE and Søren Riis, Member, IEEE Abstract
More informationThe large deviation principle for the Erdős-Rényi random graph
The large deviation principle for the Erdős-Rényi random graph (Courant Institute, NYU) joint work with S. R. S. Varadhan Main objective: how to count graphs with a given property Only consider finite
More informationLecture 1 : Probabilistic Method
IITM-CS6845: Theory Jan 04, 01 Lecturer: N.S.Narayanaswamy Lecture 1 : Probabilistic Method Scribe: R.Krithika The probabilistic method is a technique to deal with combinatorial problems by introducing
More informationJOHN THICKSTUN. p x. n sup Ipp y n x np x nq. By the memoryless and stationary conditions respectively, this reduces to just 1 yi x i.
ESTIMATING THE SHANNON CAPACITY OF A GRAPH JOHN THICKSTUN. channels and graphs Consider a stationary, memoryless channel that maps elements of discrete alphabets X to Y according to a distribution p y
More informationA Novel Index Coding Scheme and its Application to Coded Caching
A ovel Index Coding Scheme and its Application to Coded Caching ai Wan Laboratoire des Signaux et Systèmes L2S CentraleSupèlec-CRS-Universitè Paris-Sud 91192 Gif-sur-Yvette, France Email: kai.wan@u-psud.fr
More informationA Separator Theorem for Graphs with an Excluded Minor and its Applications
A Separator Theorem for Graphs with an Excluded Minor and its Applications Noga Alon IBM Almaden Research Center, San Jose, CA 95120,USA and Sackler Faculty of Exact Sciences, Tel Aviv University, Tel
More informationPreliminaries and Complexity Theory
Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra
More informationMATH 829: Introduction to Data Mining and Analysis Graphical Models I
MATH 829: Introduction to Data Mining and Analysis Graphical Models I Dominique Guillot Departments of Mathematical Sciences University of Delaware May 2, 2016 1/12 Independence and conditional independence:
More informationC-Perfect K-Uniform Hypergraphs
C-Perfect K-Uniform Hypergraphs Changiz Eslahchi and Arash Rafiey Department of Mathematics Shahid Beheshty University Tehran, Iran ch-eslahchi@cc.sbu.ac.ir rafiey-ar@ipm.ir Abstract In this paper we define
More informationMulti-coloring and Mycielski s construction
Multi-coloring and Mycielski s construction Tim Meagher Fall 2010 Abstract We consider a number of related results taken from two papers one by W. Lin [1], and the other D. C. Fisher[2]. These articles
More informationIndependencies. Undirected Graphical Models 2: Independencies. Independencies (Markov networks) Independencies (Bayesian Networks)
(Bayesian Networks) Undirected Graphical Models 2: Use d-separation to read off independencies in a Bayesian network Takes a bit of effort! 1 2 (Markov networks) Use separation to determine independencies
More informationGraph coloring, perfect graphs
Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive
More informationHypergraph Capacity with Applications to Matrix Multiplication
Claremont Colleges Scholarship @ Claremont HMC Senior Theses HMC Student Scholarship 2013 Hypergraph Capacity with Applications to Matrix Multiplication John Lee Thompson Peebles Jr. Harvey Mudd College
More informationDecomposing oriented graphs into transitive tournaments
Decomposing oriented graphs into transitive tournaments Raphael Yuster Department of Mathematics University of Haifa Haifa 39105, Israel Abstract For an oriented graph G with n vertices, let f(g) denote
More informationCS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding
CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.
More informationCooperative Multi-Sender Index Coding
Cooperative Multi-Sender Index Coding 1 Min Li Lawrence Ong and Sarah J. Johnson Abstract arxiv:1701.03877v3 [cs.it] 6 Feb 2017 In this paper we establish new capacity bounds for the multi-sender unicast
More informationBulletin of the Iranian Mathematical Society
ISSN: 117-6X (Print) ISSN: 1735-8515 (Online) Bulletin of the Iranian Mathematical Society Vol. 4 (14), No. 6, pp. 1491 154. Title: The locating chromatic number of the join of graphs Author(s): A. Behtoei
More informationRobust Network Codes for Unicast Connections: A Case Study
Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,
More informationON THE NP-COMPLETENESS OF SOME GRAPH CLUSTER MEASURES
ON THE NP-COMPLETENESS OF SOME GRAPH CLUSTER MEASURES JIŘÍ ŠÍMA AND SATU ELISA SCHAEFFER Academy of Sciences of the Czech Republic Helsinki University of Technology, Finland elisa.schaeffer@tkk.fi SOFSEM
More informationHomomorphism Bounded Classes of Graphs
Homomorphism Bounded Classes of Graphs Timothy Marshall a Reza Nasraser b Jaroslav Nešetřil a Email: nesetril@kam.ms.mff.cuni.cz a: Department of Applied Mathematics and Institute for Theoretical Computer
More informationAcyclic and Oriented Chromatic Numbers of Graphs
Acyclic and Oriented Chromatic Numbers of Graphs A. V. Kostochka Novosibirsk State University 630090, Novosibirsk, Russia X. Zhu Dept. of Applied Mathematics National Sun Yat-Sen University Kaohsiung,
More informationRecursive generation of partitionable graphs
Recursive generation of partitionable graphs E. Boros V. Gurvich S. Hougardy May 29, 2002 Abstract Results of Lovász (1972) and Padberg (1974) imply that partitionable graphs contain all the potential
More informationThe Algorithmic Aspects of the Regularity Lemma
The Algorithmic Aspects of the Regularity Lemma N. Alon R. A. Duke H. Lefmann V. Rödl R. Yuster Abstract The Regularity Lemma of Szemerédi is a result that asserts that every graph can be partitioned in
More informationProbabilistic Proofs of Existence of Rare Events. Noga Alon
Probabilistic Proofs of Existence of Rare Events Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Ramat-Aviv, Tel Aviv 69978 ISRAEL 1. The Local Lemma In a typical
More informationCLIQUES IN THE UNION OF GRAPHS
CLIQUES IN THE UNION OF GRAPHS RON AHARONI, ELI BERGER, MARIA CHUDNOVSKY, AND JUBA ZIANI Abstract. Let B and R be two simple graphs with vertex set V, and let G(B, R) be the simple graph with vertex set
More informationApplications of the Inverse Theta Number in Stable Set Problems
Acta Cybernetica 21 (2014) 481 494. Applications of the Inverse Theta Number in Stable Set Problems Miklós Ujvári Abstract In the paper we introduce a semidefinite upper bound on the square of the stability
More informationLearning from Sensor Data: Set II. Behnaam Aazhang J.S. Abercombie Professor Electrical and Computer Engineering Rice University
Learning from Sensor Data: Set II Behnaam Aazhang J.S. Abercombie Professor Electrical and Computer Engineering Rice University 1 6. Data Representation The approach for learning from data Probabilistic
More informationPreliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}
Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)
More informationClaw-Free Graphs With Strongly Perfect Complements. Fractional and Integral Version.
Claw-Free Graphs With Strongly Perfect Complements. Fractional and Integral Version. Part II. Nontrivial strip-structures Maria Chudnovsky Department of Industrial Engineering and Operations Research Columbia
More informationNear-domination in graphs
Near-domination in graphs Bruce Reed Researcher, Projet COATI, INRIA and Laboratoire I3S, CNRS France, and Visiting Researcher, IMPA, Brazil Alex Scott Mathematical Institute, University of Oxford, Oxford
More informationGeometric Steiner Trees
Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 3: Computational Complexity and the Steiner Tree Problem Marcus Brazil 2015
More informationMa/CS 6b Class 25: Error Correcting Codes 2
Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets
More informationThe Alon-Saks-Seymour and Rank-Coloring Conjectures
The Alon-Saks-Seymour and Rank-Coloring Conjectures Michael Tait Department of Mathematical Sciences University of Delaware Newark, DE 19716 tait@math.udel.edu April 20, 2011 Preliminaries A graph is a
More informationINDUCED CYCLES AND CHROMATIC NUMBER
INDUCED CYCLES AND CHROMATIC NUMBER A.D. SCOTT DEPARTMENT OF MATHEMATICS UNIVERSITY COLLEGE, GOWER STREET, LONDON WC1E 6BT Abstract. We prove that, for any pair of integers k, l 1, there exists an integer
More informationChapter 3: Proving NP-completeness Results
Chapter 3: Proving NP-completeness Results Six Basic NP-Complete Problems Some Techniques for Proving NP-Completeness Some Suggested Exercises 1.1 Six Basic NP-Complete Problems 3-SATISFIABILITY (3SAT)
More informationCommon Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel
Wang, ISIT 2011 p. 1/15 Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Chih-Chun Wang, Jaemin Han Center of Wireless Systems and Applications (CWSA) School
More informationGraph Minors Theory. Bahman Ghandchi. Institute for Advanced Studies in Basic Sciences (IASBS) SBU weekly Combinatorics Seminars November 5, 2011
Graph Minors Theory Bahman Ghandchi Institute for Advanced Studies in Basic Sciences (IASBS) SBU weekly Combinatorics Seminars November 5, 2011 Institute for Advanced Studies in asic Sciences Gava Zang,
More informationTopics in Approximation Algorithms Solution for Homework 3
Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L
More informationCOMPLEMENTARY graph entropy was introduced
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 6, JUNE 2009 2537 On Complementary Graph Entropy Ertem Tuncel, Member, IEEE, Jayanth Nayak, Prashant Koulgi, Student Member, IEEE, Kenneth Rose, Fellow,
More informationError Detection and Correction: Hamming Code; Reed-Muller Code
Error Detection and Correction: Hamming Code; Reed-Muller Code Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Hamming Code: Motivation
More informationCombinatorial Aspects of. Error Correction and Property Testing
The Raymond and Beverly Sackler Faculty of Exact Sciences Blavatnik School of Computer Science Combinatorial Aspects of Error Correction and Property Testing Thesis submitted for the degree Doctor of Philosophy
More informationCases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem
Cases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem Soheil Feizi, Muriel Médard RLE at MIT Emails: {sfeizi,medard}@mit.edu Abstract In this paper, we
More informationXLVII SIMPÓSIO BRASILEIRO DE PESQUISA OPERACIONAL
ON THE PACKING CHROMATIC NUMBER ON HAMMING GRAPHS AND GENERAL GRAPHS Graciela Nasini Facultad de Ciencias Exactas, Ingeniería y Agrimensura - Universidad Nacional de Rosario CONICET Pellegrini 250, (2000)
More informationIndependent Transversals in r-partite Graphs
Independent Transversals in r-partite Graphs Raphael Yuster Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv University, Tel Aviv, Israel Abstract Let G(r, n) denote
More informationHanna Furmańczyk EQUITABLE COLORING OF GRAPH PRODUCTS
Opuscula Mathematica Vol. 6 No. 006 Hanna Furmańczyk EQUITABLE COLORING OF GRAPH PRODUCTS Abstract. A graph is equitably k-colorable if its vertices can be partitioned into k independent sets in such a
More informationK 4 -free graphs with no odd holes
K 4 -free graphs with no odd holes Maria Chudnovsky 1 Columbia University, New York NY 10027 Neil Robertson 2 Ohio State University, Columbus, Ohio 43210 Paul Seymour 3 Princeton University, Princeton
More informationCoding for Computing. ASPITRG, Drexel University. Jie Ren 2012/11/14
Coding for Computing ASPITRG, Drexel University Jie Ren 2012/11/14 Outline Background and definitions Main Results Examples and Analysis Proofs Background and definitions Problem Setup Graph Entropy Conditional
More informationBayesian & Markov Networks: A unified view
School of omputer Science ayesian & Markov Networks: unified view Probabilistic Graphical Models (10-708) Lecture 3, Sep 19, 2007 Receptor Kinase Gene G Receptor X 1 X 2 Kinase Kinase E X 3 X 4 X 5 TF
More informationThe typical structure of graphs without given excluded subgraphs + related results
The typical structure of graphs without given excluded subgraphs + related results Noga Alon József Balogh Béla Bollobás Jane Butterfield Robert Morris Dhruv Mubayi Wojciech Samotij Miklós Simonovits.
More informationCS154, Lecture 13: P vs NP
CS154, Lecture 13: P vs NP The EXTENDED Church-Turing Thesis Everyone s Intuitive Notion of Efficient Algorithms Polynomial-Time Turing Machines More generally: TM can simulate every reasonable model of
More informationDestroying non-complete regular components in graph partitions
Destroying non-complete regular components in graph partitions Landon Rabern landon.rabern@gmail.com June 27, 2011 Abstract We prove that if G is a graph and r 1,..., r k Z 0 such that k i=1 r i (G) +
More informationChannel Coding: Zero-error case
Channel Coding: Zero-error case Information & Communication Sander Bet & Ismani Nieuweboer February 05 Preface We would like to thank Christian Schaffner for guiding us in the right direction with our
More informationNotes on Graph Theory
Notes on Graph Theory Maris Ozols June 8, 2010 Contents 0.1 Berge s Lemma............................................ 2 0.2 König s Theorem........................................... 3 0.3 Hall s Theorem............................................
More informationOut-colourings of Digraphs
Out-colourings of Digraphs N. Alon J. Bang-Jensen S. Bessy July 13, 2017 Abstract We study vertex colourings of digraphs so that no out-neighbourhood is monochromatic and call such a colouring an out-colouring.
More informationCOS597D: Information Theory in Computer Science October 5, Lecture 6
COS597D: Information Theory in Computer Science October 5, 2011 Lecture 6 Lecturer: Mark Braverman Scribe: Yonatan Naamad 1 A lower bound for perfect hash families. In the previous lecture, we saw that
More informationAtkins, R., Rombach, P., & Skerman, F. (2016). Guessing numbers of odd cycles.
Atkins, R., Rombach, P., & Skerman, F. (206. Guessing numbers of odd cycles. Early version, also known as pre-print Link to publication record in Explore Bristol Research PDF-document University of Bristol
More informationComputability and Complexity Theory: An Introduction
Computability and Complexity Theory: An Introduction meena@imsc.res.in http://www.imsc.res.in/ meena IMI-IISc, 20 July 2006 p. 1 Understanding Computation Kinds of questions we seek answers to: Is a given
More informationIndependence in Function Graphs
Independence in Function Graphs Ralucca Gera 1, Craig E. Larson 2, Ryan Pepper 3, and Craig Rasmussen 1 1 Naval Postgraduate School, Department of Applied Mathematics, Monterey, CA 93943; rgera@nps.edu,
More informationOn Orthogonal Double Covers of Complete Bipartite Graphs by Disjoint Unions of Graph-Paths
International Journal of Scientific and Innovative Mathematical Research (IJSIMR) Volume 2, Issue 3, March 2014, PP 281-288 ISSN 2347-307X (Print) & ISSN 2347-3142 (Online) www.arcjournals.org On Orthogonal
More informationComputational complexity theory
Computational complexity theory Introduction to computational complexity theory Complexity (computability) theory deals with two aspects: Algorithm s complexity. Problem s complexity. References S. Cook,
More information