Broadcasting With Side Information

Size: px
Start display at page:

Download "Broadcasting With Side Information"

Transcription

1 Department of Electrical and Computer Engineering Texas A&M Noga Alon, Avinatan Hasidim, Eyal Lubetzky, Uri Stav, Amit Weinstein, FOCS2008

2 Outline I shall avoid rigorous math and terminologies and be more intuitive, but last part might be more technical I shall be presenting : (FOCS 2008) Index Coding with Side Information (FOCS 2006) Coding on demand by an informed source (ISCOD) for efficient broadcast of different supplemental data to caching clients (IEEE/ACM Transactions on Networking 2006) Dissertations E. Lubetzky and Thesis by Amit Weinstein (Students of Noga Alon) Work by Chaudhry and Sprintson

3 Index Coding A Server with a set of packets A set of Clients Each Client wants some set of packets from server: Wants set Each Client has some set of packets available: Has (Cached) set, may be overheard from previous transmission Opportunistic Listening The server can broadcast the packets or their combinations (encoding)

4 Index Coding A Server with a set of packets A set of Clients Each Client wants some set of packets from server: Wants set Each Client has some set of packets available: Has (Cached) set, may be overheard from previous transmission Opportunistic Listening The server can broadcast the packets or their combinations (encoding)

5 Index Coding A Server with a set of packets A set of Clients Each Client wants some set of packets from server: Wants set Each Client has some set of packets available: Has (Cached) set, may be overheard from previous transmission Opportunistic Listening The server can broadcast the packets or their combinations (encoding)

6 Index Coding A Server with a set of packets A set of Clients Each Client wants some set of packets from server: Wants set Each Client has some set of packets available: Has (Cached) set, may be overheard from previous transmission Opportunistic Listening The server can broadcast the packets or their combinations (encoding)

7 Index Coding A Server with a set of packets A set of Clients Each Client wants some set of packets from server: Wants set Each Client has some set of packets available: Has (Cached) set, may be overheard from previous transmission Opportunistic Listening The server can broadcast the packets or their combinations (encoding)

8 Index Coding (cont.) Objective To satisfy the demands of all clients with the minimum possible number of transmissions from server by taking advantage of the Has sets NP-Hard to solve and approximate; measure of hardness?

9 Index Coding (cont.) Objective To satisfy the demands of all clients with the minimum possible number of transmissions from server by taking advantage of the Has sets NP-Hard to solve and approximate; measure of hardness?

10 Index Coding (cont.) Objective To satisfy the demands of all clients with the minimum possible number of transmissions from server by taking advantage of the Has sets NP-Hard to solve and approximate; measure of hardness?

11 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay

12 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay

13 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay

14 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay

15 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay

16 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay

17 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay

18 Motivation: Content Distribution Network Number of Transmissions Without Index Coding 3 With Index Coding 1 Server needs to transmit only one packet A + B + C Advantages: Load balancing, efficient use of resources, lesser delay

19 Application: A Broadcast Network Number of Transmissions Without Index Coding = 4 With Index Coding = 2, i.e, Server needs to transmit only two packets p 1 + p 2 + p 3 and p 1 + p 4 Advantages: Power saving i.e, longer battery life, bandwidth saving, lesser latency at overall system level

20 Application: A Broadcast Network Number of Transmissions Without Index Coding = 4 With Index Coding = 2, i.e, Server needs to transmit only two packets p 1 + p 2 + p 3 and p 1 + p 4 Advantages: Power saving i.e, longer battery life, bandwidth saving, lesser latency at overall system level

21 Application: A Broadcast Network Number of Transmissions Without Index Coding = 4 With Index Coding = 2, i.e, Server needs to transmit only two packets p 1 + p 2 + p 3 and p 1 + p 4 Advantages: Power saving i.e, longer battery life, bandwidth saving, lesser latency at overall system level

22 Previous Work The simpler model of Index Coding was first suggested by [Birk and Kol (98)]. Given as a part of homework assignment ISCOD (Informed Source Coding) In this model each packet consists of only one bit Optimal linear schemes were characterized by [Bar-Yossef, Birk, Jayram and Kol (06)]. It was shown that linear encoding schemes are sometimes far from optimal [Lubetzky and Stav (07)]. Relationship to Network Coding What happens when packet size is not a bit? Some exact and heuristic approaches to solve Index Coding [Chaudhry and Spnitson]. Can we give some rates bounds?

23 Previous Work The simpler model of Index Coding was first suggested by [Birk and Kol (98)]. Given as a part of homework assignment ISCOD (Informed Source Coding) In this model each packet consists of only one bit Optimal linear schemes were characterized by [Bar-Yossef, Birk, Jayram and Kol (06)]. It was shown that linear encoding schemes are sometimes far from optimal [Lubetzky and Stav (07)]. Relationship to Network Coding What happens when packet size is not a bit? Some exact and heuristic approaches to solve Index Coding [Chaudhry and Spnitson]. Can we give some rates bounds?

24 Previous Work The simpler model of Index Coding was first suggested by [Birk and Kol (98)]. Given as a part of homework assignment ISCOD (Informed Source Coding) In this model each packet consists of only one bit Optimal linear schemes were characterized by [Bar-Yossef, Birk, Jayram and Kol (06)]. It was shown that linear encoding schemes are sometimes far from optimal [Lubetzky and Stav (07)]. Relationship to Network Coding What happens when packet size is not a bit? Some exact and heuristic approaches to solve Index Coding [Chaudhry and Spnitson]. Can we give some rates bounds?

25 Previous Work The simpler model of Index Coding was first suggested by [Birk and Kol (98)]. Given as a part of homework assignment ISCOD (Informed Source Coding) In this model each packet consists of only one bit Optimal linear schemes were characterized by [Bar-Yossef, Birk, Jayram and Kol (06)]. It was shown that linear encoding schemes are sometimes far from optimal [Lubetzky and Stav (07)]. Relationship to Network Coding What happens when packet size is not a bit? Some exact and heuristic approaches to solve Index Coding [Chaudhry and Spnitson]. Can we give some rates bounds?

26 Previous Work The simpler model of Index Coding was first suggested by [Birk and Kol (98)]. Given as a part of homework assignment ISCOD (Informed Source Coding) In this model each packet consists of only one bit Optimal linear schemes were characterized by [Bar-Yossef, Birk, Jayram and Kol (06)]. It was shown that linear encoding schemes are sometimes far from optimal [Lubetzky and Stav (07)]. Relationship to Network Coding What happens when packet size is not a bit? Some exact and heuristic approaches to solve Index Coding [Chaudhry and Spnitson]. Can we give some rates bounds?

27 Previous Work The simpler model of Index Coding was first suggested by [Birk and Kol (98)]. Given as a part of homework assignment ISCOD (Informed Source Coding) In this model each packet consists of only one bit Optimal linear schemes were characterized by [Bar-Yossef, Birk, Jayram and Kol (06)]. It was shown that linear encoding schemes are sometimes far from optimal [Lubetzky and Stav (07)]. Relationship to Network Coding What happens when packet size is not a bit? Some exact and heuristic approaches to solve Index Coding [Chaudhry and Spnitson]. Can we give some rates bounds?

28 Matrix Fits a Graph Let G be a directed graph on n vertices without self-loops. A 0-1 matrix A = (a ij ) fits G if for all i and j: a ii = 1, a ij = 0 whenever (i, j) is not an edge of G Means: A I is the adjacency matrix of an edge subgraph of G, where I denotes the identity matrix Figure: Ref:

29 Matrix Fits a Graph Let G be a directed graph on n vertices without self-loops. A 0-1 matrix A = (a ij ) fits G if for all i and j: a ii = 1, a ij = 0 whenever (i, j) is not an edge of G Means: A I is the adjacency matrix of an edge subgraph of G, where I denotes the identity matrix Figure: Ref:

30 minrk 2 (G) Let rk 2 ( ) denote the 2-rank of a 0-1 matrix(its rank over the field GF(2)), then: minrk 2 (G) = min{rk 2 (A) : A fits G} Figure: Ref:

31 minrk 2 (G) (contd.) Theorem Computing minrk 2 (G) is NP-Complete [Peeters] Can also be reduced to SAT [Chaudhry et al] Optimal Length of a linear Index Code (No. of packets to be transmitted)=minrk 2 (G) CliqueNumber(G) ShannonCapacity(G) minrk 2 (G) ChromaticNumber(G)

32 minrk 2 (G) (contd.) Theorem Computing minrk 2 (G) is NP-Complete [Peeters] Can also be reduced to SAT [Chaudhry et al] Optimal Length of a linear Index Code (No. of packets to be transmitted)=minrk 2 (G) CliqueNumber(G) ShannonCapacity(G) minrk 2 (G) ChromaticNumber(G)

33 minrk 2 (G) (contd.) Theorem Computing minrk 2 (G) is NP-Complete [Peeters] Can also be reduced to SAT [Chaudhry et al] Optimal Length of a linear Index Code (No. of packets to be transmitted)=minrk 2 (G) CliqueNumber(G) ShannonCapacity(G) minrk 2 (G) ChromaticNumber(G)

34 minrk 2 (G) Intuition (contd.) All clients that correspond to nodes in a clique can be satisfied by one transmission, which includes a linear combination of all packets in their wants sets Minimize the number of transmissions by finding the least number of cliques that cover whole graph, clique partition problem

35 minrk 2 (G) Intuition (contd.) All clients that correspond to nodes in a clique can be satisfied by one transmission, which includes a linear combination of all packets in their wants sets Minimize the number of transmissions by finding the least number of cliques that cover whole graph, clique partition problem

36 minrk 2 (G) Intuition (contd.) All clients that correspond to nodes in a clique can be satisfied by one transmission, which includes a linear combination of all packets in their wants sets Minimize the number of transmissions by finding the least number of cliques that cover whole graph, clique partition problem

37 Formal Model (Broadcasting with Side Information) A sender holds a word x = x 1, x 2 x n, each block xi consists of t bits There are m receivers Each receiver R i wants a specific block x f (i) and has prior side information consisting of some other blocks x j The goal: To construct an efficient encoding scheme such that each receiver can decode the block it wants

38 Figure: Ref: broadcasting slides.pdf?a At least 2 blocks (packets are needed). Why? x 1 x 2 and x 3 x 4 x 5

39 Figure: Ref: broadcasting slides.pdf?a At least 2 blocks (packets are needed). Why? x 1 x 2 and x 3 x 4 x 5

40 Presentation as Directed Hypergraph H = (V, E) Vertices: V = [n] = {1, 2,, n} Edges: For each receiver R j there is a directed edge (f (j), N(j)) E, where N(j) is the set of indices of all blocks known to R j Performance metric: Define β t (H) as the minimal number of bits required when the block length is t

41 Presentation as Directed Hypergraph H = (V, E) Vertices: V = [n] = {1, 2,, n} Edges: For each receiver R j there is a directed edge (f (j), N(j)) E, where N(j) is the set of indices of all blocks known to R j Performance metric: Define β t (H) as the minimal number of bits required when the block length is t

42 Presentation as Directed Hypergraph H = (V, E) Vertices: V = [n] = {1, 2,, n} Edges: For each receiver R j there is a directed edge (f (j), N(j)) E, where N(j) is the set of indices of all blocks known to R j Performance metric: Define β t (H) as the minimal number of bits required when the block length is t

43 Presentation as Directed Hypergraph H = (V, E) Vertices: V = [n] = {1, 2,, n} Edges: For each receiver R j there is a directed edge (f (j), N(j)) E, where N(j) is the set of indices of all blocks known to R j Performance metric: Define β t (H) as the minimal number of bits required when the block length is t

44 Example of Hypergrpah Figure: broadcasting slides.pdf?a β t (H) 2t β t (H) 2t by transmitting x 1 x 2 and x 3 x 4 x 5

45 Example of Hypergrpah Figure: broadcasting slides.pdf?a β t (H) 2t β t (H) 2t by transmitting x 1 x 2 and x 3 x 4 x 5

46 Example of Hypergrpah Figure: broadcasting slides.pdf?a β t (H) 2t β t (H) 2t by transmitting x 1 x 2 and x 3 x 4 x 5

47 Example of Hypergrpah Figure: broadcasting slides.pdf?a β t (H) 2t β t (H) 2t by transmitting x 1 x 2 and x 3 x 4 x 5

48 Example of Hypergrpah Figure: broadcasting slides.pdf?a β t (H) 2t β t (H) 2t by transmitting x 1 x 2 and x 3 x 4 x 5

49 Definition of β(h) Define β(h) = lim t β t t In words, β is the average asymptotic number of encoding bits needed per bit in each block In the example, β t (H) = 2t, hence β(h) = 2

50 Definition of β(h) Define β(h) = lim t β t t In words, β is the average asymptotic number of encoding bits needed per bit in each block In the example, β t (H) = 2t, hence β(h) = 2

51 Definition of β(h) Define β(h) = lim t β t t In words, β is the average asymptotic number of encoding bits needed per bit in each block In the example, β t (H) = 2t, hence β(h) = 2

52 Definition of β t Layers A related parameter β t = β 1 (t.h), where t.h is the disjoint union of t copies of H In words, β t is the minimum number of bits required if the network topology is repeated t times Similarly, define: β (H) = lim t β t t = inf t β t t

53 Definition of β t Layers A related parameter β t = β 1 (t.h), where t.h is the disjoint union of t copies of H In words, β t is the minimum number of bits required if the network topology is repeated t times Similarly, define: β (H) = lim t β t t = inf t β t t

54 Definition of β t Layers A related parameter β t = β 1 (t.h), where t.h is the disjoint union of t copies of H In words, β t is the minimum number of bits required if the network topology is repeated t times Similarly, define: β (H) = lim t β t t = inf t β t t

55 Results β(h) β (H) β 1 (H) β β 1 (t.h) (H) = lim t = n log 2 γ(h) t, where γ(h) is the maximal cardinality of the input strings which are non-confusable.

56 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x, y are adjacent iff for some e = (i, j) E, x i y i and x j = y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers

57 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x, y are adjacent iff for some e = (i, j) E, x i y i and x j = y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers

58 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x, y are adjacent iff for some e = (i, j) E, x i y i and x j = y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers

59 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x, y are adjacent iff for some e = (i, j) E, x i y i and x j = y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers

60 Proof Sketch Zero- Error Information Theory-vs- Information Theory (ECE 646) Confusion Graph Figure: Ref:

61 Proof Sketch Zero- Error Information Theory-vs- Information Theory (ECE 646) Confusion Graph Figure: Ref:

62 Proof Sketch (contd.) Shannon Capacity of a Graph Figure: minrk.pdf

63 Proof Sketch (contd.) Powers of the Graph Figure: minrk.pdf

64 Proof Sketch (contd.) Powers of the Graph Figure: minrk.pdf

65 Results β(h) β (H) β 1 (H) β β 1 (t.h) (H) = lim t = n log 2 γ(h) t, where γ(h) is the maximal cardinality of the input strings which non-confusable.

66 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x,y are adjacent iff for some e = (i, j) E, x i y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers

67 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x,y are adjacent iff for some e = (i, j) E, x i y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers

68 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x,y are adjacent iff for some e = (i, j) E, x i y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers

69 Proof Idea Definition: The confusion graph confusion(h) of a directed hypergraph H = ([n], E) describing a broadcast network is the undirected graph on {0, 1} n, where x,y are adjacent iff for some e = (i, j) E, x i y j j J Here each block is of length 1, the vertices are all possible input words, and two are adjacent iff they are confusable. Theorem 1 can be restated as follows: β (H) = lim t β 1 (t.h) t = n log 2 α(confusion(h)) The proof relies on the connection between the fractional chromatic number of confusion(h), and the chromatic number of confusion(h) s OR graph powers

70 OR Graph Product: The OR Graph Product of G 1 an G 2, denoted by G 1 G 2, is the graph on the vertex set V (G 1 ) V (G 2 ), where (u, v) and (u, v ) are adjacent iff either uu E(G 1 ) or vv E(G 2 ) (or both). Let G k denote the k fold OR Product of a graph G.

71 Let H 1 and H 2 denote directed hypergraphs (as before) on the vertex-sets [m] and [n] respectively, and consider an encoding scheme for their disjoint union, H 1 + H 2. As there are no edges between H 1 and H 2, such a coding scheme cannot encode two input-words x, y 0, 1 m+n by the same codeword iff this forms an ambiguity either with respect to H 1 or with respect to H 2, (or both). Hence: For any pair H 1, H 2 of directed hypergraph, the graphs confusion(h 1 + H 2 ) and confusion(h 1 ) confusion(h 1 ) are isomorphic Then lim k (χ(g k )) 1/k = χ f (G) Then skipping many steps... Finally lim k (χ(g k )) 1/k = 2 n α(confusion(h)) = 2n γ

72 Let H 1 and H 2 denote directed hypergraphs (as before) on the vertex-sets [m] and [n] respectively, and consider an encoding scheme for their disjoint union, H 1 + H 2. As there are no edges between H 1 and H 2, such a coding scheme cannot encode two input-words x, y 0, 1 m+n by the same codeword iff this forms an ambiguity either with respect to H 1 or with respect to H 2, (or both). Hence: For any pair H 1, H 2 of directed hypergraph, the graphs confusion(h 1 + H 2 ) and confusion(h 1 ) confusion(h 1 ) are isomorphic Then lim k (χ(g k )) 1/k = χ f (G) Then skipping many steps... Finally lim k (χ(g k )) 1/k = 2 n α(confusion(h)) = 2n γ

73 Conclusion Index Coding and its applications Effective Rates

74 Questions

Index coding with side information

Index coding with side information Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated

More information

Non-linear index coding outperforming the linear optimum

Non-linear index coding outperforming the linear optimum Non-linear index coding outperforming the linear optimum Eyal Lubetzky Uri Stav Abstract The following source coding problem was introduced by Birk and Kol: a sender holds a word x {0, 1} n, and wishes

More information

arxiv: v1 [cs.it] 19 Jun 2008

arxiv: v1 [cs.it] 19 Jun 2008 Broadcasting with side information Noga Alon Avinatan Hasidim Eyal Lubetzky Uri Stav Amit Weinstein arxiv:0806.3246v1 [cs.it] 19 Jun 2008 Abstract A sender holds a word x consisting of n blocks x i, each

More information

Index Coding. Trivandrum School on Communication, Coding and Networking Prasad Krishnan

Index Coding. Trivandrum School on Communication, Coding and Networking Prasad Krishnan Index Coding Trivandrum School on Communication, Coding and Networking 2017 Prasad Krishnan Signal Processing and Communications Research Centre, International Institute of Information Technology, Hyderabad

More information

Optimal Index Codes with Near-Extreme Rates

Optimal Index Codes with Near-Extreme Rates 0 IEEE International Symposium on Information Theory Proceedings Optimal Index Codes with Near-Extreme Rates Son Hoang Dau Division of Mathematical Sciences School of Phys. and Math. Sciences Nanyang Technological

More information

On Secure Index Coding with Side Information

On Secure Index Coding with Side Information On Secure Index Coding with Side Information Son Hoang Dau Division of Mathematical Sciences School of Phys. and Math. Sciences Nanyang Technological University 21 Nanyang Link, Singapore 637371 Email:

More information

Linear Index Codes are Optimal Up To Five Nodes

Linear Index Codes are Optimal Up To Five Nodes Linear Index Codes are Optimal Up To Five Nodes Lawrence Ong The University of Newcastle, Australia March 05 BIRS Workshop: Between Shannon and Hamming: Network Information Theory and Combinatorics Unicast

More information

Source Coding and Function Computation: Optimal Rate in Zero-Error and Vanishing Zero-Error Regime

Source Coding and Function Computation: Optimal Rate in Zero-Error and Vanishing Zero-Error Regime Source Coding and Function Computation: Optimal Rate in Zero-Error and Vanishing Zero-Error Regime Solmaz Torabi Dept. of Electrical and Computer Engineering Drexel University st669@drexel.edu Advisor:

More information

Index Coding via Random Coding

Index Coding via Random Coding 204 Iran Workshop on Communication and Information Theory (IWCIT) Index Coding via Random Coding Fatemeh Arbabjolfaei,BerndBandemer,Young-HanKim Department of Electrical and Computer Engineering University

More information

ON INDEX CODING WITH SIDE INFORMATION

ON INDEX CODING WITH SIDE INFORMATION ON INDEX CODING WITH SIDE INFORMATION DAU SON HOANG SCHOOL OF PHYSICAL & MATHEMATICAL SCIENCES 2012 ON INDEX CODING WITH SIDE INFORMATION DAU SON HOANG School of Physical & Mathematical Sciences A thesis

More information

Optimal Scalar Linear Index Codes for Symmetric and Neighboring Side-information Problems

Optimal Scalar Linear Index Codes for Symmetric and Neighboring Side-information Problems Optimal Scalar Linear Index Codes for Symmetric and Neighboring Side-information Problems Mahesh Babu Vaddi and B Sundar Rajan Department of Electrical Communication Engineering, Indian Institute of Science,

More information

On the Index Coding Problem and its Relation to Network Coding and Matroid Theory

On the Index Coding Problem and its Relation to Network Coding and Matroid Theory 1 On the Index Coding Problem and its Relation to Network Coding and Matroid Theory Salim Y. El Rouayheb, Alex Sprintson, and Costas N. Georghiades Department of Electrical and Computer Engineering Texas

More information

Index Coding With Erroneous Side Information

Index Coding With Erroneous Side Information Index Coding With Erroneous Side Information Jae-Won Kim and Jong-Seon No, Fellow, IEEE 1 Abstract arxiv:1703.09361v1 [cs.it] 28 Mar 2017 In this paper, new index coding problems are studied, where each

More information

arxiv: v2 [cs.it] 13 Jul 2011

arxiv: v2 [cs.it] 13 Jul 2011 Index coding via linear programming Anna Blasiak Robert Kleinberg Eyal Lubetzky arxiv:1004.1379v2 [cs.it] 13 Jul 2011 Abstract Index Coding has received considerable attention recently motivated in part

More information

Local Graph Coloring and Index Coding

Local Graph Coloring and Index Coding 1 Local Graph Coloring and Index Coding Karthikeyan Shanmugam, Alexandros G. Dimakis and Michael Langberg Department of Electrical and Computer Engineering University of Texas at Austin Austin, TX 78712-1684

More information

Optimal Index Codes via a Duality between Index Coding and Network Coding

Optimal Index Codes via a Duality between Index Coding and Network Coding Optimal Index Codes via a Duality between Index Coding and Network Coding Ashok Choudhary, Vamsi Krishna Gummadi, Prasad Krishnan Signal Processing and Communications Research Centre, International Institute

More information

Index Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago

Index Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago Index Coding Algorithms for Constructing Network Codes Salim El Rouayheb Illinois Institute of Technology, Chicago Matlab Code with GUI for Constructing Linear Network Codes Matlab outputs network code

More information

On the Hardness of Approximating the Network Coding Capacity

On the Hardness of Approximating the Network Coding Capacity On the Hardness of Approximating the Network Coding Capacity Michael Langberg, Member, IEEE, and Alex Sprintson, Member, IEEE. 1 Abstract This work addresses the computational complexity of achieving the

More information

On linear index coding from graph homomorphism perspective

On linear index coding from graph homomorphism perspective On linear index coding from graph homomorphism perspective Javad B. Ebrahimi, Mahdi Jafari Siavoshani Institute of Network Coding, Chinese University of Hong Kong, Hong Kong Computer Engineering Department,

More information

LATTICES AND CODES ISHAY HAVIV TEL AVIV UNIVERSITY THE RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES THE BLAVATNIK SCHOOL OF COMPUTER SCIENCE

LATTICES AND CODES ISHAY HAVIV TEL AVIV UNIVERSITY THE RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES THE BLAVATNIK SCHOOL OF COMPUTER SCIENCE TEL AVIV UNIVERSITY THE RAYMOND AND BEVERLY SACKLER FACULTY OF EXACT SCIENCES THE BLAVATNIK SCHOOL OF COMPUTER SCIENCE LATTICES AND CODES THESIS SUBMITTED FOR THE DEGREE OF DOCTOR OF PHILOSOPHY BY ISHAY

More information

Error Correcting Index Codes and Matroids

Error Correcting Index Codes and Matroids Error Correcting Index Codes and Matroids Anoop Thomas and B Sundar Rajan Dept of ECE, IISc, Bangalore 5612, India, Email: {anoopt,bsrajan}@eceiiscernetin arxiv:15156v1 [csit 21 Jan 215 Abstract The connection

More information

Simplified Composite Coding for Index Coding

Simplified Composite Coding for Index Coding Simplified Composite Coding for Index Coding Yucheng Liu, Parastoo Sadeghi Research School of Engineering Australian National University {yucheng.liu, parastoo.sadeghi}@anu.edu.au Fatemeh Arbabjolfaei,

More information

Index Coding & Caching in Wireless Networks. Salim El Rouayheb. ECE IIT, Chicago

Index Coding & Caching in Wireless Networks. Salim El Rouayheb. ECE IIT, Chicago Index Coding & Caching in Wireless Networks Salim El Rouayheb ECE IIT, Chicago Big Data vs. Wireless Exabytes per month [Cisco] Meanwhile, Storage is Getting Cheaper Storage cost per GB (USD) http://www.mkomo.com/cost-per-gigabyte-update

More information

arxiv: v2 [cs.it] 23 Aug 2018

arxiv: v2 [cs.it] 23 Aug 2018 Storage Capacity as an Information-Theoretic Vertex Cover and the Index Coding Rate Arya Mazumdar Andrew McGregor Sofya Vorotnikova arxiv:1706.09197v2 [cs.it] 23 Aug 2018 Abstract Motivated by applications

More information

Lexicographic Products and the Power of Non-Linear Network Coding

Lexicographic Products and the Power of Non-Linear Network Coding Lexicographic Products and the Power of Non-Linear Network Coding Anna Blasiak Dept. of Computer Science Cornell University. ablasiak@cs.cornell.edu Robert Kleinberg Dept. of Computer Science Cornell University.

More information

A GRAPH-THEORETIC APPROACH TO NETWORK CODING

A GRAPH-THEORETIC APPROACH TO NETWORK CODING A GRAPH-THEORETIC APPROACH TO NETWORK CODING A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor of

More information

On the Relation Between the Index Coding and the Network Coding Problems

On the Relation Between the Index Coding and the Network Coding Problems On the Relation Between the Index Coding and the Network Coding Problems Salim El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University,

More information

Shannon s noisy-channel theorem

Shannon s noisy-channel theorem Shannon s noisy-channel theorem Information theory Amon Elders Korteweg de Vries Institute for Mathematics University of Amsterdam. Tuesday, 26th of Januari Amon Elders (Korteweg de Vries Institute for

More information

The Minrank of Random Graphs

The Minrank of Random Graphs The Minrank of Random Graphs Alexander Golovnev Oded Regev Omri Weinstein Abstract The minrank of a directed graph G is the minimum rank of a matrix M that can be obtained from the adjacency matrix of

More information

Testing Equality in Communication Graphs

Testing Equality in Communication Graphs Electronic Colloquium on Computational Complexity, Report No. 86 (2016) Testing Equality in Communication Graphs Noga Alon Klim Efremenko Benny Sudakov Abstract Let G = (V, E) be a connected undirected

More information

Lecture 18: More NP-Complete Problems

Lecture 18: More NP-Complete Problems 6.045 Lecture 18: More NP-Complete Problems 1 The Clique Problem a d f c b e g Given a graph G and positive k, does G contain a complete subgraph on k nodes? CLIQUE = { (G,k) G is an undirected graph with

More information

Variable Elimination (VE) Barak Sternberg

Variable Elimination (VE) Barak Sternberg Variable Elimination (VE) Barak Sternberg Basic Ideas in VE Example 1: Let G be a Chain Bayesian Graph: X 1 X 2 X n 1 X n How would one compute P X n = k? Using the CPDs: P X 2 = x = x Val X1 P X 1 = x

More information

Bounds on Shannon Capacity and Ramsey Numbers from Product of Graphs

Bounds on Shannon Capacity and Ramsey Numbers from Product of Graphs Bounds on Shannon Capacity and Ramsey Numbers from Product of Graphs Xiaodong Xu Guangxi Academy of Sciences Nanning, Guangxi 530007, China xxdmaths@sina.com and Stanis law P. Radziszowski Department of

More information

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler

Complexity Theory VU , SS The Polynomial Hierarchy. Reinhard Pichler Complexity Theory Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität Wien 15 May, 2018 Reinhard

More information

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181.

Outline. Complexity Theory EXACT TSP. The Class DP. Definition. Problem EXACT TSP. Complexity of EXACT TSP. Proposition VU 181. Complexity Theory Complexity Theory Outline Complexity Theory VU 181.142, SS 2018 6. The Polynomial Hierarchy Reinhard Pichler Institut für Informationssysteme Arbeitsbereich DBAI Technische Universität

More information

CS168: The Modern Algorithmic Toolbox Lectures #11 and #12: Spectral Graph Theory

CS168: The Modern Algorithmic Toolbox Lectures #11 and #12: Spectral Graph Theory CS168: The Modern Algorithmic Toolbox Lectures #11 and #12: Spectral Graph Theory Tim Roughgarden & Gregory Valiant May 2, 2016 Spectral graph theory is the powerful and beautiful theory that arises from

More information

Lecture 5: Probabilistic tools and Applications II

Lecture 5: Probabilistic tools and Applications II T-79.7003: Graphs and Networks Fall 2013 Lecture 5: Probabilistic tools and Applications II Lecturer: Charalampos E. Tsourakakis Oct. 11, 2013 5.1 Overview In the first part of today s lecture we will

More information

An Equivalence between Network Coding and Index Coding

An Equivalence between Network Coding and Index Coding An Equivalence between Network Coding and Index Coding Michelle Effros, Fellow, IEEE, Salim El Rouayheb, Member, IEEE, Michael Langberg, Member, IEEE 1 Abstract We show that the network coding and index

More information

A Polynomial-Time Algorithm for Pliable Index Coding

A Polynomial-Time Algorithm for Pliable Index Coding 1 A Polynomial-Time Algorithm for Pliable Index Coding Linqi Song and Christina Fragouli arxiv:1610.06845v [cs.it] 9 Aug 017 Abstract In pliable index coding, we consider a server with m messages and n

More information

INDEX coding has attracted significant attention in various

INDEX coding has attracted significant attention in various IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 63, NO. 12, DECEMBER 2017 7687 Index Coding With Erroneous Side Information Jae-Won Kim and Jong-Seon No, Fellow, IEEE Abstract In this paper, new index coding

More information

Entropy and Network Coding Based Communications

Entropy and Network Coding Based Communications Graph-theoretical Constructions for Graph 1 Entropy and Network Coding Based Communications arxiv:1010.2619v2 [cs.it] 18 Apr 2011 Maximilien Gadouleau, Member, IEEE and Søren Riis, Member, IEEE Abstract

More information

The large deviation principle for the Erdős-Rényi random graph

The large deviation principle for the Erdős-Rényi random graph The large deviation principle for the Erdős-Rényi random graph (Courant Institute, NYU) joint work with S. R. S. Varadhan Main objective: how to count graphs with a given property Only consider finite

More information

Lecture 1 : Probabilistic Method

Lecture 1 : Probabilistic Method IITM-CS6845: Theory Jan 04, 01 Lecturer: N.S.Narayanaswamy Lecture 1 : Probabilistic Method Scribe: R.Krithika The probabilistic method is a technique to deal with combinatorial problems by introducing

More information

JOHN THICKSTUN. p x. n sup Ipp y n x np x nq. By the memoryless and stationary conditions respectively, this reduces to just 1 yi x i.

JOHN THICKSTUN. p x. n sup Ipp y n x np x nq. By the memoryless and stationary conditions respectively, this reduces to just 1 yi x i. ESTIMATING THE SHANNON CAPACITY OF A GRAPH JOHN THICKSTUN. channels and graphs Consider a stationary, memoryless channel that maps elements of discrete alphabets X to Y according to a distribution p y

More information

A Novel Index Coding Scheme and its Application to Coded Caching

A Novel Index Coding Scheme and its Application to Coded Caching A ovel Index Coding Scheme and its Application to Coded Caching ai Wan Laboratoire des Signaux et Systèmes L2S CentraleSupèlec-CRS-Universitè Paris-Sud 91192 Gif-sur-Yvette, France Email: kai.wan@u-psud.fr

More information

A Separator Theorem for Graphs with an Excluded Minor and its Applications

A Separator Theorem for Graphs with an Excluded Minor and its Applications A Separator Theorem for Graphs with an Excluded Minor and its Applications Noga Alon IBM Almaden Research Center, San Jose, CA 95120,USA and Sackler Faculty of Exact Sciences, Tel Aviv University, Tel

More information

Preliminaries and Complexity Theory

Preliminaries and Complexity Theory Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra

More information

MATH 829: Introduction to Data Mining and Analysis Graphical Models I

MATH 829: Introduction to Data Mining and Analysis Graphical Models I MATH 829: Introduction to Data Mining and Analysis Graphical Models I Dominique Guillot Departments of Mathematical Sciences University of Delaware May 2, 2016 1/12 Independence and conditional independence:

More information

C-Perfect K-Uniform Hypergraphs

C-Perfect K-Uniform Hypergraphs C-Perfect K-Uniform Hypergraphs Changiz Eslahchi and Arash Rafiey Department of Mathematics Shahid Beheshty University Tehran, Iran ch-eslahchi@cc.sbu.ac.ir rafiey-ar@ipm.ir Abstract In this paper we define

More information

Multi-coloring and Mycielski s construction

Multi-coloring and Mycielski s construction Multi-coloring and Mycielski s construction Tim Meagher Fall 2010 Abstract We consider a number of related results taken from two papers one by W. Lin [1], and the other D. C. Fisher[2]. These articles

More information

Independencies. Undirected Graphical Models 2: Independencies. Independencies (Markov networks) Independencies (Bayesian Networks)

Independencies. Undirected Graphical Models 2: Independencies. Independencies (Markov networks) Independencies (Bayesian Networks) (Bayesian Networks) Undirected Graphical Models 2: Use d-separation to read off independencies in a Bayesian network Takes a bit of effort! 1 2 (Markov networks) Use separation to determine independencies

More information

Graph coloring, perfect graphs

Graph coloring, perfect graphs Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive

More information

Hypergraph Capacity with Applications to Matrix Multiplication

Hypergraph Capacity with Applications to Matrix Multiplication Claremont Colleges Scholarship @ Claremont HMC Senior Theses HMC Student Scholarship 2013 Hypergraph Capacity with Applications to Matrix Multiplication John Lee Thompson Peebles Jr. Harvey Mudd College

More information

Decomposing oriented graphs into transitive tournaments

Decomposing oriented graphs into transitive tournaments Decomposing oriented graphs into transitive tournaments Raphael Yuster Department of Mathematics University of Haifa Haifa 39105, Israel Abstract For an oriented graph G with n vertices, let f(g) denote

More information

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.

More information

Cooperative Multi-Sender Index Coding

Cooperative Multi-Sender Index Coding Cooperative Multi-Sender Index Coding 1 Min Li Lawrence Ong and Sarah J. Johnson Abstract arxiv:1701.03877v3 [cs.it] 6 Feb 2017 In this paper we establish new capacity bounds for the multi-sender unicast

More information

Bulletin of the Iranian Mathematical Society

Bulletin of the Iranian Mathematical Society ISSN: 117-6X (Print) ISSN: 1735-8515 (Online) Bulletin of the Iranian Mathematical Society Vol. 4 (14), No. 6, pp. 1491 154. Title: The locating chromatic number of the join of graphs Author(s): A. Behtoei

More information

Robust Network Codes for Unicast Connections: A Case Study

Robust Network Codes for Unicast Connections: A Case Study Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,

More information

ON THE NP-COMPLETENESS OF SOME GRAPH CLUSTER MEASURES

ON THE NP-COMPLETENESS OF SOME GRAPH CLUSTER MEASURES ON THE NP-COMPLETENESS OF SOME GRAPH CLUSTER MEASURES JIŘÍ ŠÍMA AND SATU ELISA SCHAEFFER Academy of Sciences of the Czech Republic Helsinki University of Technology, Finland elisa.schaeffer@tkk.fi SOFSEM

More information

Homomorphism Bounded Classes of Graphs

Homomorphism Bounded Classes of Graphs Homomorphism Bounded Classes of Graphs Timothy Marshall a Reza Nasraser b Jaroslav Nešetřil a Email: nesetril@kam.ms.mff.cuni.cz a: Department of Applied Mathematics and Institute for Theoretical Computer

More information

Acyclic and Oriented Chromatic Numbers of Graphs

Acyclic and Oriented Chromatic Numbers of Graphs Acyclic and Oriented Chromatic Numbers of Graphs A. V. Kostochka Novosibirsk State University 630090, Novosibirsk, Russia X. Zhu Dept. of Applied Mathematics National Sun Yat-Sen University Kaohsiung,

More information

Recursive generation of partitionable graphs

Recursive generation of partitionable graphs Recursive generation of partitionable graphs E. Boros V. Gurvich S. Hougardy May 29, 2002 Abstract Results of Lovász (1972) and Padberg (1974) imply that partitionable graphs contain all the potential

More information

The Algorithmic Aspects of the Regularity Lemma

The Algorithmic Aspects of the Regularity Lemma The Algorithmic Aspects of the Regularity Lemma N. Alon R. A. Duke H. Lefmann V. Rödl R. Yuster Abstract The Regularity Lemma of Szemerédi is a result that asserts that every graph can be partitioned in

More information

Probabilistic Proofs of Existence of Rare Events. Noga Alon

Probabilistic Proofs of Existence of Rare Events. Noga Alon Probabilistic Proofs of Existence of Rare Events Noga Alon Department of Mathematics Sackler Faculty of Exact Sciences Tel Aviv University Ramat-Aviv, Tel Aviv 69978 ISRAEL 1. The Local Lemma In a typical

More information

CLIQUES IN THE UNION OF GRAPHS

CLIQUES IN THE UNION OF GRAPHS CLIQUES IN THE UNION OF GRAPHS RON AHARONI, ELI BERGER, MARIA CHUDNOVSKY, AND JUBA ZIANI Abstract. Let B and R be two simple graphs with vertex set V, and let G(B, R) be the simple graph with vertex set

More information

Applications of the Inverse Theta Number in Stable Set Problems

Applications of the Inverse Theta Number in Stable Set Problems Acta Cybernetica 21 (2014) 481 494. Applications of the Inverse Theta Number in Stable Set Problems Miklós Ujvári Abstract In the paper we introduce a semidefinite upper bound on the square of the stability

More information

Learning from Sensor Data: Set II. Behnaam Aazhang J.S. Abercombie Professor Electrical and Computer Engineering Rice University

Learning from Sensor Data: Set II. Behnaam Aazhang J.S. Abercombie Professor Electrical and Computer Engineering Rice University Learning from Sensor Data: Set II Behnaam Aazhang J.S. Abercombie Professor Electrical and Computer Engineering Rice University 1 6. Data Representation The approach for learning from data Probabilistic

More information

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}

Preliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)

More information

Claw-Free Graphs With Strongly Perfect Complements. Fractional and Integral Version.

Claw-Free Graphs With Strongly Perfect Complements. Fractional and Integral Version. Claw-Free Graphs With Strongly Perfect Complements. Fractional and Integral Version. Part II. Nontrivial strip-structures Maria Chudnovsky Department of Industrial Engineering and Operations Research Columbia

More information

Near-domination in graphs

Near-domination in graphs Near-domination in graphs Bruce Reed Researcher, Projet COATI, INRIA and Laboratoire I3S, CNRS France, and Visiting Researcher, IMPA, Brazil Alex Scott Mathematical Institute, University of Oxford, Oxford

More information

Geometric Steiner Trees

Geometric Steiner Trees Geometric Steiner Trees From the book: Optimal Interconnection Trees in the Plane By Marcus Brazil and Martin Zachariasen Part 3: Computational Complexity and the Steiner Tree Problem Marcus Brazil 2015

More information

Ma/CS 6b Class 25: Error Correcting Codes 2

Ma/CS 6b Class 25: Error Correcting Codes 2 Ma/CS 6b Class 25: Error Correcting Codes 2 By Adam Sheffer Recall: Codes V n the set of binary sequences of length n. For example, V 3 = 000,001,010,011,100,101,110,111. Codes of length n are subsets

More information

The Alon-Saks-Seymour and Rank-Coloring Conjectures

The Alon-Saks-Seymour and Rank-Coloring Conjectures The Alon-Saks-Seymour and Rank-Coloring Conjectures Michael Tait Department of Mathematical Sciences University of Delaware Newark, DE 19716 tait@math.udel.edu April 20, 2011 Preliminaries A graph is a

More information

INDUCED CYCLES AND CHROMATIC NUMBER

INDUCED CYCLES AND CHROMATIC NUMBER INDUCED CYCLES AND CHROMATIC NUMBER A.D. SCOTT DEPARTMENT OF MATHEMATICS UNIVERSITY COLLEGE, GOWER STREET, LONDON WC1E 6BT Abstract. We prove that, for any pair of integers k, l 1, there exists an integer

More information

Chapter 3: Proving NP-completeness Results

Chapter 3: Proving NP-completeness Results Chapter 3: Proving NP-completeness Results Six Basic NP-Complete Problems Some Techniques for Proving NP-Completeness Some Suggested Exercises 1.1 Six Basic NP-Complete Problems 3-SATISFIABILITY (3SAT)

More information

Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel

Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Wang, ISIT 2011 p. 1/15 Common Information of Random Linear Network Coding Over A 1-Hop Broadcast Packet Erasure Channel Chih-Chun Wang, Jaemin Han Center of Wireless Systems and Applications (CWSA) School

More information

Graph Minors Theory. Bahman Ghandchi. Institute for Advanced Studies in Basic Sciences (IASBS) SBU weekly Combinatorics Seminars November 5, 2011

Graph Minors Theory. Bahman Ghandchi. Institute for Advanced Studies in Basic Sciences (IASBS) SBU weekly Combinatorics Seminars November 5, 2011 Graph Minors Theory Bahman Ghandchi Institute for Advanced Studies in Basic Sciences (IASBS) SBU weekly Combinatorics Seminars November 5, 2011 Institute for Advanced Studies in asic Sciences Gava Zang,

More information

Topics in Approximation Algorithms Solution for Homework 3

Topics in Approximation Algorithms Solution for Homework 3 Topics in Approximation Algorithms Solution for Homework 3 Problem 1 We show that any solution {U t } can be modified to satisfy U τ L τ as follows. Suppose U τ L τ, so there is a vertex v U τ but v L

More information

COMPLEMENTARY graph entropy was introduced

COMPLEMENTARY graph entropy was introduced IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 6, JUNE 2009 2537 On Complementary Graph Entropy Ertem Tuncel, Member, IEEE, Jayanth Nayak, Prashant Koulgi, Student Member, IEEE, Kenneth Rose, Fellow,

More information

Error Detection and Correction: Hamming Code; Reed-Muller Code

Error Detection and Correction: Hamming Code; Reed-Muller Code Error Detection and Correction: Hamming Code; Reed-Muller Code Greg Plaxton Theory in Programming Practice, Spring 2005 Department of Computer Science University of Texas at Austin Hamming Code: Motivation

More information

Combinatorial Aspects of. Error Correction and Property Testing

Combinatorial Aspects of. Error Correction and Property Testing The Raymond and Beverly Sackler Faculty of Exact Sciences Blavatnik School of Computer Science Combinatorial Aspects of Error Correction and Property Testing Thesis submitted for the degree Doctor of Philosophy

More information

Cases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem

Cases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem Cases Where Finding the Minimum Entropy Coloring of a Characteristic Graph is a Polynomial Time Problem Soheil Feizi, Muriel Médard RLE at MIT Emails: {sfeizi,medard}@mit.edu Abstract In this paper, we

More information

XLVII SIMPÓSIO BRASILEIRO DE PESQUISA OPERACIONAL

XLVII SIMPÓSIO BRASILEIRO DE PESQUISA OPERACIONAL ON THE PACKING CHROMATIC NUMBER ON HAMMING GRAPHS AND GENERAL GRAPHS Graciela Nasini Facultad de Ciencias Exactas, Ingeniería y Agrimensura - Universidad Nacional de Rosario CONICET Pellegrini 250, (2000)

More information

Independent Transversals in r-partite Graphs

Independent Transversals in r-partite Graphs Independent Transversals in r-partite Graphs Raphael Yuster Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv University, Tel Aviv, Israel Abstract Let G(r, n) denote

More information

Hanna Furmańczyk EQUITABLE COLORING OF GRAPH PRODUCTS

Hanna Furmańczyk EQUITABLE COLORING OF GRAPH PRODUCTS Opuscula Mathematica Vol. 6 No. 006 Hanna Furmańczyk EQUITABLE COLORING OF GRAPH PRODUCTS Abstract. A graph is equitably k-colorable if its vertices can be partitioned into k independent sets in such a

More information

K 4 -free graphs with no odd holes

K 4 -free graphs with no odd holes K 4 -free graphs with no odd holes Maria Chudnovsky 1 Columbia University, New York NY 10027 Neil Robertson 2 Ohio State University, Columbus, Ohio 43210 Paul Seymour 3 Princeton University, Princeton

More information

Coding for Computing. ASPITRG, Drexel University. Jie Ren 2012/11/14

Coding for Computing. ASPITRG, Drexel University. Jie Ren 2012/11/14 Coding for Computing ASPITRG, Drexel University Jie Ren 2012/11/14 Outline Background and definitions Main Results Examples and Analysis Proofs Background and definitions Problem Setup Graph Entropy Conditional

More information

Bayesian & Markov Networks: A unified view

Bayesian & Markov Networks: A unified view School of omputer Science ayesian & Markov Networks: unified view Probabilistic Graphical Models (10-708) Lecture 3, Sep 19, 2007 Receptor Kinase Gene G Receptor X 1 X 2 Kinase Kinase E X 3 X 4 X 5 TF

More information

The typical structure of graphs without given excluded subgraphs + related results

The typical structure of graphs without given excluded subgraphs + related results The typical structure of graphs without given excluded subgraphs + related results Noga Alon József Balogh Béla Bollobás Jane Butterfield Robert Morris Dhruv Mubayi Wojciech Samotij Miklós Simonovits.

More information

CS154, Lecture 13: P vs NP

CS154, Lecture 13: P vs NP CS154, Lecture 13: P vs NP The EXTENDED Church-Turing Thesis Everyone s Intuitive Notion of Efficient Algorithms Polynomial-Time Turing Machines More generally: TM can simulate every reasonable model of

More information

Destroying non-complete regular components in graph partitions

Destroying non-complete regular components in graph partitions Destroying non-complete regular components in graph partitions Landon Rabern landon.rabern@gmail.com June 27, 2011 Abstract We prove that if G is a graph and r 1,..., r k Z 0 such that k i=1 r i (G) +

More information

Channel Coding: Zero-error case

Channel Coding: Zero-error case Channel Coding: Zero-error case Information & Communication Sander Bet & Ismani Nieuweboer February 05 Preface We would like to thank Christian Schaffner for guiding us in the right direction with our

More information

Notes on Graph Theory

Notes on Graph Theory Notes on Graph Theory Maris Ozols June 8, 2010 Contents 0.1 Berge s Lemma............................................ 2 0.2 König s Theorem........................................... 3 0.3 Hall s Theorem............................................

More information

Out-colourings of Digraphs

Out-colourings of Digraphs Out-colourings of Digraphs N. Alon J. Bang-Jensen S. Bessy July 13, 2017 Abstract We study vertex colourings of digraphs so that no out-neighbourhood is monochromatic and call such a colouring an out-colouring.

More information

COS597D: Information Theory in Computer Science October 5, Lecture 6

COS597D: Information Theory in Computer Science October 5, Lecture 6 COS597D: Information Theory in Computer Science October 5, 2011 Lecture 6 Lecturer: Mark Braverman Scribe: Yonatan Naamad 1 A lower bound for perfect hash families. In the previous lecture, we saw that

More information

Atkins, R., Rombach, P., & Skerman, F. (2016). Guessing numbers of odd cycles.

Atkins, R., Rombach, P., & Skerman, F. (2016). Guessing numbers of odd cycles. Atkins, R., Rombach, P., & Skerman, F. (206. Guessing numbers of odd cycles. Early version, also known as pre-print Link to publication record in Explore Bristol Research PDF-document University of Bristol

More information

Computability and Complexity Theory: An Introduction

Computability and Complexity Theory: An Introduction Computability and Complexity Theory: An Introduction meena@imsc.res.in http://www.imsc.res.in/ meena IMI-IISc, 20 July 2006 p. 1 Understanding Computation Kinds of questions we seek answers to: Is a given

More information

Independence in Function Graphs

Independence in Function Graphs Independence in Function Graphs Ralucca Gera 1, Craig E. Larson 2, Ryan Pepper 3, and Craig Rasmussen 1 1 Naval Postgraduate School, Department of Applied Mathematics, Monterey, CA 93943; rgera@nps.edu,

More information

On Orthogonal Double Covers of Complete Bipartite Graphs by Disjoint Unions of Graph-Paths

On Orthogonal Double Covers of Complete Bipartite Graphs by Disjoint Unions of Graph-Paths International Journal of Scientific and Innovative Mathematical Research (IJSIMR) Volume 2, Issue 3, March 2014, PP 281-288 ISSN 2347-307X (Print) & ISSN 2347-3142 (Online) www.arcjournals.org On Orthogonal

More information

Computational complexity theory

Computational complexity theory Computational complexity theory Introduction to computational complexity theory Complexity (computability) theory deals with two aspects: Algorithm s complexity. Problem s complexity. References S. Cook,

More information