Single-Source/Sink Network Error Correction Is as Hard as Multiple-Unicast

Size: px
Start display at page:

Download "Single-Source/Sink Network Error Correction Is as Hard as Multiple-Unicast"

Transcription

1 Snge-Source/Snk Network Error Correcton Is as Hard as Mutpe-Uncast Wentao Huang and Tracey Ho Department of Eectrca Engneerng Caforna Insttute of Technoogy Pasadena, CA Mchae Langberg Department of Eectrca Engneerng Unversty at Buffao, SUNY Buffao, NY Joerg Kewer Department of ECE New Jersey Insttute of Technoogy Newark, NJ Abstract We study the probem of communcatng over a snge-source snge-termna network n the presence of an adversary that may jam a snge nk of the network. If any one of the edges can be jammed, the capacty of such networks s we understood and foows drecty from the connecton between the mnmum cut and maxmum fow n snge-source sngetermna networks. In ths work we consder networks n whch some edges cannot be jammed, and show that determnng the network communcaton capacty s at east as hard as sovng the mutpe-uncast network codng probem for the error-free case. The atter probem s a ong standng open probem. I. INTRODUCTION The probem of network error correcton concerns reabe transmsson of nformaton n a network wth pont-to-pont noseess channes, n the presence of an adversary. The adversary contros a set A of channes n the network and may corrupt the nformaton transmtted on these channes n an arbtrary way. A network error correcton code, frst ntroduced by Ca and Yeung [1], [2], s a network code that can correct adversara errors njected nto the network from a set of channes A, for a A A, where A s a prescrbed coecton of subsets of channes that characterzes the strength of the adversary. For snge-source mutcast, under the smpfyng assumpton that a channes have unt capacty and A s the coecton of a subsets contanng Z channes, [1], [2] show that the cut-set bound s tght and characterzes the network error correcton capacty, whch can be acheved by a near code. Under smar settngs a varety of works, e.g., [3], [4], [5], [6], [7], [8] have proposed dfferent effcent capactyachevng codes and strateges. However, under sghty more genera settngs such that channe capactes are non-unform or A has a more genera structure, much ess s known about the network error correcton capacty and achevabe strateges. Km et a. [9] study a mode n whch channe capactes are arbtrary and show that capacty upper bounds based on cut-set approaches are generay not tght. [9] aso constructs exampes where near codes are nsuffcent to acheve capacty. Kosut et a. [10] study a mode n whch the adversary contros network nodes nstead of channes, whch s a speca case of network error correcton for non-unform A n the sense that A may ncude subsets of dfferent szes. In ths case [10] constructs an exampe that near codes are nadequate to acheve capacty. Achevabe strateges under ths node adversary mode are aso studed n [11], [12], [13], whereas determnng the capacty regon remans an open probem. As opposed to the we studed and we understood settng of [1], [2], the subtety of fndng and achevng the network error correcton capacty n the more genera settngs above motvates us to examne the fundamenta compexty of the genera network error correcton probem. In ths paper, we show that sovng the snge-uncast network error correcton probem wth genera A s as hard as sovng the mutpe-uncast network codng probem wth no error). Specfcay, we convert any unt rate k-uncast network codng probem nto a correspondng network error correcton probem wth a snge source, a snge snk, and a snge adversara channe chosen from a subset of channes, such that the unt rate k-uncast s feasbe wth zero error f and ony f the zero-error network error correcton capacty s k. Under the vanshng error mode, we show a smar but sghty weaker resut. Specfcay, n ths case f the unt rate k-uncast s feasbe, then a network error correcton rate of k s feasbe. Conversey, f a network error correcton rate of k s feasbe, then the unt rate k-uncast s asymptotcay feasbe. Our resuts add to the portfoos of probems that are connected to mutpe-uncast network codng, whch s a ong standng open probem not presenty known to be n P, NP or undecdabe [14], [15], [16], [17]. Prevousy, equvaence resuts have been estabshed, e.g., between mutpe-uncast network codng and mutpe-mutcast network codng [18], [19], ndex codng [20], [21], secure network codng [22], [23] and two-uncast network codng [24]. The remander of the paper s structured as foows. In Secton II, we present the modes and defntons of mutpeuncast network codng and snge-source snge-snk network error correcton. In Secton III and IV, we prove the reducton from mutpe-uncast to network error correcton for the zero error mode and vanshng error mode, respectvey. Fnay, we concude the paper n Secton V. II. MODELS A. Mutpe-uncast Network Codng We mode the network to be a drected graph G = V, E), where the set of vertces V represents network nodes and the

2 set of edges E represents network channes. Each edge e E has a capacty c e, whch s the maxmum number of bts 1 that can be transmtted on e n one transmsson. An nstance I = G, S, T, B) of the mutpe-uncast network codng probem, ncudes a network G, a set of source nodes S V, a set of termna nodes T V and an S by T requrement matrx B. The, j)-th entry of B equas 1 f termna j requres the nformaton from source and equas 0 otherwse. We assume that B s a permutaton matrx and so each source s pared wth a snge termna. Let st) be the source that s requred by termna t. Denote [n] {1,.., n }, then each source s S s assocated wth a message, whch s a rate R s random varabe M s unformy dstrbuted over [2 nrs ]. The messages for dfferent sources are ndependent. A network code of ength n s defned as a set of encodng functons φ e for every e E and a set of decodng functons φ t for each t T. For each e = u, v), the encodng functon φ e s a functon takng as nput the random varabes assocated wth ncomng edges of node u and the random varabe M u f u S, and maps to vaues n [2 nce ]. For each t T, the decodng functon φ t maps a random varabes assocated wth the ncomng edges of t, to a message ˆM st) wth vaues n [2 nr st) ]. A network code {φ e, φ t } e E,t T s sad to satsfy a termna t under transmsson m s, s S) f ˆMst) = m st) when M s, s S) = m s, s S). A network code s sad to satsfy the mutpe-uncast network codng probem I wth error probabty ɛ f the probabty that a t T are smutaneousy satsfed s at east 1 ɛ. The probabty s taken over the jont dstrbuton on random varabes M s, s S). Namey, the network code satsfes I wth error probabty ɛ f Pr M s,s S) { } t s satsfed under M s, s S) 1 ɛ t T For an nstance I of the mutpe-uncast network codng probem, rate R s sad to be feasbe f R s = R, s S, and for any ɛ > 0, there exsts a network code wth suffcenty arge ength that satsfes I wth error probabty at most ɛ. Rate R s sad to be feasbe wth zero error f R s = R, s S and there exsts a network code that satsfes I wth zero error probabty. Rate R s sad to be asymptotcay feasbe f for any δ > 0, rate 1 δ)r s feasbe. The capacty of I refers to the supremum over a rates R that are asymptotcay feasbe and the zero-error capacty of I refers to the supremum over a rates R that are feasbe wth zero error. The gven mode assumes a sources transmt nformaton at equa rate. There s no oss of generaty n ths assumpton as a varyng rate source s can be modeed by severa equa rate sources coocated at s. 1 For convenence we assume that the network channes transmt bnary symbos. Our resuts can be naturay extended to the genera q-ary case. 1) B. Snge-Source Snge-Snk Network Error Correcton An nstance I c = G, s, t, A) of the snge-source sngetermna network error correcton probem ncudes a network G, a source node s V, a termna node t V and a coecton of subsets of channes A 2 E susceptbe to errors. In ths probem the channes are not aways reabe and an error s sad to occur n a channe f the output of the channe s dfferent from the nput. More precsey, the output of a channe e s the nput sgna superposed by an error sgna r e, and we say there s an error on channe e f r e 0. For a subset A A of channes, an A-error s sad to occur f an error occurs n every channe n A. For an nstance I c of the sngesource snge-termna network error correcton probem, a network code {φ e, φ t, } e E,t T s sad to satsfy a termna t under transmsson m s f ˆMs = m s when M s = m s, gven the occurrence of any error pattern r = r e, e E) that resuts n an A-error, for a A A. A network code s sad to satsfy probem I c wth error probabty ɛ f the probabty that t s satsfed s at east 1 ɛ. The probabty s taken over the dstrbuton on the source message M s. For an nstance I c of the snge-source snge-termna network error correcton probem, rate R s sad to be feasbe f R s = R and for any ɛ > 0, there exsts a network code wth suffcenty arge ength that satsfes I c wth error probabty at most ɛ. Rate R s sad to be feasbe wth zero error f R s = R and there exsts a network code that satsfes I c wth zero error probabty. Rate R s sad to be asymptotcay feasbe f for any δ > 0, rate 1 δ)r s feasbe. The capacty of I c refers to the supremum over a rates R that are asymptotcay feasbe and the zero-error capacty of I c refers to the supremum over a rates R that are feasbe wth zero error. Throughout the paper we denote by R A the set of a possbe error patterns r that resut n A-errors, where A A. III. REDUCTION FROM MULTIPLE-UNICAST TO NETWORK ERROR CORRECTION: ZERO ERROR CASE In ths secton we reduce the mutpe-uncast network codng probem wth no error) to the snge-source sngetermna network error correcton probem wth at most a snge adversara channe. We start wth the zero-error case. Theorem 1. Gven any mutpe-uncast network codng probem I wth source-destnaton pars {s, t ), = 1,..., k}, a correspondng snge-source snge-snk network error correcton probem I c = G, s, t, A) n whch A ncudes sets wth at most one edge can be constructed as specfed n Fgure 1, such that the zero-error capacty of I c s k f and ony f unt rate s feasbe wth zero error n I. Proof: The zero-error capacty of I c s upper bounded by k, because t s the mn-cut from s to t. We show that the feasbty of a zero-error rate k n I c mpes the feasbty of unt zero-error rate n I. Suppose a zero-error rate k s acheved n I c by a network code wth ength n, and denote the source message by M, then M s unformy dstrbuted over [2 nk ]. For any edge e E,

3 Fg. 1: In the snge-source snge-termna network error correcton probem I c, the source s wants to communcate wth the termna t. N s a genera network wth pont-topont noseess channes. A edges outsde N.e., edges for whch at east one of ts end-pont does not beong to N ) have unt capacty. There s at most one error n ths network, and ths error can occur at any edge except {a, b, 1 k}. Namey, A ncudes a sngeton sets of a snge edge n the network except {a } and {b }, = 1,..., k. Note that there are k branches n tota but ony the frst and the k-th branches are drawn expcty. The mutpe-uncast network codng probem I s defned on the network N, where the k source-destnaton pars are s, t ), = 1,..., k, and a channes are error-free. we denote by em, r) : [2 nk ] R A [2 n ] the sgna receved on edge e when the source message equas m and the error pattern r occurs n the network. When the context s cear, we may denote em, r) smpy by e. Let bm, r) = b 1 m, r),..., b k m, r)), then because the edges b 1,..., b k form a cut-set from s to t, bm, r) must be njectve wth respect to m due to the zero error decodabty constrant. Formay, for two dfferent messages m 1 m 2, t foows from the zero error decodabty constrant that bm 1, r 1 ) bm 2, r 2 ), r 1, r 2 R A. Note that the codoman of b s [2 n ] k, whch has the same sze as the set of messages [2 nk ]. Therefore denote by bm) bm, 0), then bm) s a bjectve functon and bm, r) = bm), r R A. Smary am, r) = a 1 m, r),..., a k m, r)) s aso a bjectve functon of the message, regardess of the error patterns. For any e E, denote em) em, 0). For = 1,..., k, we cam that for any two messages m 1, m 2 [2 nk ] such that a m 1 ) a m 2 ), t foows that x m 1 ) x m 2 ), y m 1 ) y m 2 ) and z m 1 ) z m 2 ). Suppose for contradcton that there exst m 1, m 2 such that a m 1 ) a m 2 ) and such that the cam s not true,.e., x m 1 ) = x m 2 ) or y m 1 ) = y m 2 ) or z m 1 ) = z m 2 ). Frst consder the case that x m 1 ) = x m 2 ). Because of the one-to-one correspondence between m and a, there exsts a message m 3 m 1, m 2 and such that am 3 ) = a 1 m 1 ),..., a 1 m 1 ), a m 2 ), a +1 m 1 ),..., a k m 1 )). Then x m 1 ) = x m 3 ) because by hypothess x m 1 ) = x m 2 ). Consder the foowng two scenaros. In the frst scenaro, m 1 s transmtted, and an error turns y m 1 ) nto y m 3 ); n the second scenaro, m 3 s transmtted, and an error turns z m 3 ) nto z m 1 ). Then the cut-set sgnas a 1,..., a 1, x, y, z, a +1,..., a k are exacty the same n both scenaros, and so t s mpossbe for t to dstngush m 1 from m 3, a contradcton to the zero error decodabty constrant. Therefore x m 1 ) x m 2 ). Wth a smar argument t foows that y m 1 ) y m 2 ) and z m 1 ) z m 2 ), and the cam s proved. The cam above suggests that x, y and z, as functons of a, are njectve. They are aso surjectve functons because the doman and codoman are both [2 n ]. Hence there are oneto-one correspondences between a, x, y and z. Next we show that for any two messages m 1, m 2, f b m 1 ) b m 2 ), then z m 1) z m 2). Suppose for contradcton that there exsts m 1 m 2 such that b m 1 ) b m 2 ) and z m 1) = z m 2). Then f m 1 s transmtted and an error r 1 turns x m 1 ) nto x m 2 ), the node B w receve the same sgnas as n the case that m 2 s transmtted and an error r 2 turns y m 2 ) nto y m 1 ). Therefore b m 1, r 1 ) = b m 2, r 2 ). But, as shown above, because b m 1, r 1 ) = b m 1 ) and b m 2, r 2 ) = b m 2 ), t foows that b m 1 ) = b m 2 ), a contradcton. Ths suggests that f z m 1) = z m 2) then b m 1 ) = b m 2 ) and therefore b s a functon of z. The functon s surjectve because b takes a 2 n possbe vaues. Then snce the doman and the codoman are both [2 n ], t foows that b must be a bjectve functon of z. Wth the same argument t foows that b s aso a bjectve functon of x. Hence z s a bjecton of a, a s a bjecton of x, x s a bjecton of b, and b s a bjecton of z. Therefore for a 1 k, z s a bjecton of z, and therefore unt rate s feasbe wth zero error n I. Conversey, we show that the feasbty of the unt zero-error rate n I mpes the achevabty of a zero-error rate of k n I c. A constructve scheme s shown n Fgure 2. In I c, the source ets M = M 1,..., M k ), where the M s are..d. unformy dstrbuted over [2 n ]. Let the network code be a M) = x M) = y M) = z M) = z M) = M, = 1,..., k, and et node B, = 1,..., k, perform majorty decodng. It s straghtforward to see that the scheme ensures that b M) = M under a error patterns n R A. Therefore rate k s feasbe wth zero error n I c. Ths rate acheves capacty snce t s equa to the mn-cut from s to t. IV. REDUCTION FROM MULTIPLE-UNICAST TO NETWORK ERROR CORRECTION: VANISHING ERROR CASE In ths secton we show that a smar but sghty weaker resut hods under the vanshng error mode.

4 between z and z and fnay we show that ths mpes the asymptotc feasbty of unt rate n I. Fg. 2: A scheme to acheve zero-error rate k n I c gven that unt rate s feasbe wth zero error n I. M = M 1,..., M k ) and node B performs majorty decodng. Theorem 2. Gven any mutpe-uncast network codng probem I wth source-destnaton pars {s, t ), = 1,..., k}, a correspondng snge-source snge-snk network error correcton probem I c = G, s, t, A) n whch A ncudes sets wth at most a snge edge can be constructed as specfed n Fgure 1, such that f unt rate s feasbe n I then rate k s feasbe n I c. Conversey, f rate k s feasbe n I c then unt rate s asymptotcay feasbe n I. We frst gve a smpe emma. Lemma 1. Let X, Y, Z be three arbtrary random varabes. Then Proof: IX; Z) IX; Y ) + IY ; Z) HY ). IX; Z) = HZ) HZ X) HZ) HZ, Y X) = HZ) HY X) HZ Y, X) HZ) HY X) HZ Y ) = HY ) HY X) + HZ) HZ Y ) HY ) = IX; Y ) + IY ; Z) HY ) In the foowng we prove Theorem 2. We frst show the feasbty of rate k n I c mpes the asymptotc feasbty of unt rate n I. We w take the foowng path. In I c, we appy the network code that acheves rate k wth message unformy dstrbuted over a seected subset of [2 nk ]. Then we show that for = 1,..., k, ths nduces a arge mutua nformaton between random varabes a and b, between b and z, and between z and a. Hence t mpes a arge mutua nformaton Step 1: Seect a subset of messages. Suppose n I c a rate of k s acheved by a network code wth ength n and wth a probabty of error ɛ. Let M be the source message unformy dstrbuted over M = [2 kn ] and et ˆM be the output of the decoder at the termna. Partton M nto good and bad messages M g + M b n the way that m M g f the network code satsfes t under transmsson m,.e., the termna decodes successfuy ˆM = m when M = m for a r R A. Therefore f m M b then there exsts r R A such that ˆM m f M = m and r occurs,.e., r resuts n a decodng error. By the hypothess on the probabty of error t foows that M b 2 kn ɛ. For = 1,..., k, et x m, r) : M R A [2 n ] be the sgna receved from channe x when m s transmtted by the source and the error pattern r happens. Let x m) = x m, 0), xm, r) = x 1 m, r),..., x k m, r)) and xm) = x 1 m),..., x k m)). We defne functons a, b, y, z, z, a, b, y, z, z n a smar way. Lemma 2. There exsts M M g such that for any m 1, m 2 M, m 1 m 2, t foows that am 1 ) am 2 ), bm 1 ) bm 2 ) and z m 1 ) z m 2 ), and such that M 2 kn 1 ɛ ), where ɛ = 4ɛ. Proof: As a and b are cut-set sgnas, for any m 1, m 2 M g, m 1 m 2, t foows that am 1 ) am 2 ) and bm 1 ) bm 2 ). Settng B g = {bm) : m M g }, t hods that B g 1 ɛ)2 kn, and settng B b = [2 n ] k \B g, t hods that B b 2 kn ɛ. For any m M g, t s sad to be a poor message f there exsts another m M g such that z m) = z m ). Consder an arbtrary poor message m 1. By defnton there exsts m 2 M g, m 2 m 1, such that z m 1 ) = z m 2 ). Snce bm 1 ) bm 2 ), there exsts j such that b j m 1 ) b j m 2 ). Let r 1 be the error pattern that changes the sgna on x j to x j m 2 ), and et r 2 be the error pattern that changes the sgna on y j to y j m 1 ). Then f m 1 s sent and r 1 happens, node B j w receve the same nputs as n the stuaton that m 2 s sent and r 2 happens. Therefore b j m 1, r 1 ) = b j m 2, r 2 ) and t foows that ether b j m 1, r 1 ) b j m 1 ) or b j m 2, r 2 ) b j m 2 ). In the former case, the tupe of sgnas b 1 m 1, r 1 ),..., b j m 1, r 1 ),..., b k m 1, r 1 )) = b 1 m 1 ),..., b j m 1, r 1 ),..., b k m 1 )) w be decoded by the termna to message m 1 because by hypothess m 1 M g, whch s decodabe under any error r R A ). It s therefore an eement of B b as t does not equa bm 1 ). Smary, n the atter case, b 1 m 2, r 2 ),..., b j m 2, r 2 ),..., b k m 2, r 2 )) = b 1 m 2 ),..., b j m 2, r 2 ),..., b k m 2 )) w be decoded by the termna to message m 2 and s an eement of B b. For ẑ [2 n ] k, et Mẑ ) be the set of messages {m M g : z m) = ẑ }. Then f Mẑ ) > 1, by the argument above, there are at east Mẑ ) 2 Mẑ ) 3 eements of B b, such that each of them w be decoded by the termna to some message

5 m Mẑ ). Let M poor be the set of a poor messages, then M poor = Mẑ ) 3 B b 3ɛ 2 kn. ẑ : Mẑ ) >1 Let M = M g \M poor, then M = M g M poor 1 ɛ )2 kn, where ɛ = 4ɛ. Ths proves the asserton. Let A = {am) m M } and A = [2 n ] k \A, then A = M 1 ɛ )2 kn snce by Lemma 2, am 1 ) am 2 ) for m 1, m 2 M, m 1 m 2. Therefore A 2 kn ɛ. Smary et B = {bm) m M } and B = [2 n ] k \B, then B 2 kn ɛ. For = 1,..., k, et A = {a m) m M }, then A 1 ɛ )2 kn mpes that A 1 ɛ )2 n. For â A, et Mâ ) = {m M : a m) = â } and defne Nâ ) = Mâ ). Furthermore defne A, = {â A Nâ ) 1 ɛ )2 k 1)n }. We show that the sze of A, s arge. Consder any â A \A,, then by defnton {a 1,..., a k ) A : a = â } < 1 ɛ )2 k 1)n. And because {a 1,..., a k ) [2 n ] k : a = â } = 2 k 1)n, there are at east ɛ 2 k 1)n eements of A such that ther -th entry equas to â. Therefore A \A, ɛ 2 k 1)n A 2 kn ɛ, and A \A, 2n /. So A, A 2n / 1 ɛ 1/)2 n. Defne B, B,, Z and Z, smary, then t foows from the same argument that B,, Z, 1 ɛ 1/)2 n. Step 2: Connect a and b. Let M be the random varabe that s unformy dstrbuted over M. In the foowng we show that f M s the source message then Ia ; b )/n 1 as ɛ 0, = 1,..., k. We start by ower boundng the entropy Hb ). Consder any ˆb B,, then Pr{b = ˆb } = Nˆb ) M 1 ɛ )2 k 1)n 2 kn = 1 ɛ 2 n 2) Pr{b = ˆb } = Nˆb ) M 2k 1)n 1 ɛ )2 kn = 1 2 n 1 ɛ ) Therefore, Hb ) = ˆb B ˆb B, Pr{ˆb } ogpr{ˆb }) Pr{ˆb } ogpr{ˆb }) 3) a) B, 1 ) ɛ 1 2 n og 2 n 1 ɛ ) 1 ɛ 1 ) 2 n 1 ɛ 2 n og2 n 1 ɛ )) = 1 ɛ 1 ) 1 ɛ )n + og1 ɛ )) 4) where a) s due to 2) and 3). Smary t foows that, Ha ) 1 ɛ 1 ) 1 ɛ )n + og1 ɛ )) 5) Hz ) 1 ɛ 1 ) 1 ɛ )n + og1 ɛ )), 6) In the next step we upper bound Hb a ). Reca that Mâ ) = {m M : a m) = â }, we frst prove a usefu emma. Lemma 3. Suppose {b m) : m Mâ )} = {ˆb 1) L),..., ˆb }, then there exst L 1)Nâ ) dstnct eements of B such that each of them w be decoded by the termna to some message m Mâ ). Proof: Consder arbtrary â A, by hypothess there exst L messages m 1,..., m L Mâ ) such that b m j ) = ˆbj), j = 1,..., L. For j = 1,..., L, et r j be the error pattern that changes the sgna on z to be z m j). Then f an arbtrary message m 0 Mâ ) s transmtted by the source and r j happens, the node B w receve the same nputs as n the stuaton that m j s sent and no error happens. Therefore j) b m 0, r j ) = ˆb, and so bm 0, r j ) takes L dstnct vaues for j = 1,.., L. Snce m 0 M s decodabe under any error pattern r R A, t foows that bm 0, r j ) w be decoded by the termna to m 0 for a j = 1,..., L. Among these L vaues,.e., {bm 0, r j ), j = 1,..., L}, ony one s equa to bm 0 ), and the remanng L 1 of them are eements of B. Sum over a m 0 Mâ ) and the asserton s proved. Partton A, nto A,L=1 +A,L>1, such that every eement of A,L=1 has a correspondng L = 1 as defned n Lemma 3. Then t foows from Lemma 3 that: and so A,L>1 1 ɛ ) 2 k 1)n B 2 kn ɛ A,L>1 ɛ 2 n 1 ɛ. 7) We are ready to upper bound Hb a ). Hb a ) = Pr{â } Pr{ˆb â } og Pr{ˆb â } where I 1 = I 2 = I 3 = â A ˆb B I 1 + I 2 + I 3, 8) â A \A, â A,L>1 â A,L=1 Pr{â } ˆb B Pr{â } ˆb B Pr{â } ˆb B We now bound I 1, I 2 and I 3 respectvey. I 1 Pr{â } og 2 n = n â A \A, â A \A, Pr{â } n M â A, Nâ ) M Pr{ˆb â } og Pr{ˆb â } Pr{ˆb â } og Pr{ˆb â } Pr{ˆb â } og Pr{ˆb â }

6 n 1 A, 1 ) ɛ )2 k 1)n M n 1 1 1/ ɛ )2 n 1 ɛ )2 k 1)n ) 2 kn < 1/ + ɛ )n. 9) I 2 = n â A,L>1 â A,L>1 Pr{â } og 2 n Pr{â } n A,L>1 2 k 1)n 2 kn 1 ɛ ) b) ɛ 1 ɛ )1 ɛ n, 10) ) where b) foows from 7). Fnay, by defnton f â A,L=1, then there s a unque ˆb B such that for a messages m Mâ), t foows that b m) = ˆb. Therefore I 3 = 0. Substtutng 10) and 9) nto 8) we have ) 1 Hb a ) < + ɛ ɛ n + 1 ɛ )1 ɛ ) n. Together wth 4), t foows Ia ; b ) > 1 ɛ 1 ) 1 ɛ )n + og1 ɛ )) ) 1 + ɛ ɛ n 1 ɛ )1 ɛ n. 11) ) Step 3: Connect z and b. Next we show that Ib ; z )/n 1, as ɛ 0, n, for = 1,..., k, by upper boundng Hz b ). We frst make some usefu observatons. Lemma 4. Let Mẑ ) = {m M : z m) = ẑ }, then for any m 1, m 2 Mẑ ) such that b m 1 ) b m 2 ), there exsts an eement of B that w be decoded by the termna to ether m 1 or m 2. Proof: Consder any m 1, m 2 Mẑ ) such that b m 1 ) b m 2 ). Let r 1 be the error pattern that changes the sgna on x to be x m 2 ), and et r 2 be the error pattern that changes the sgna on y to be y m 1 ). Then f m 1 s transmtted by the source and r 1 happens, the node B w receve the same nputs as n the stuaton that m 2 s transmtted and r 2 happens. Therefore b m 1, r 1 ) = b m 2, r 2 ), and so ether b m 1, r 1 ) b m 1 ) or b m 2, r 2 ) b m 2 ) because by hypothess b m 1 ) b m 2 ). Consder the frst case that b m 1, r 1 ) b m 1 ), then the tupe of sgnas b 1 m 1, r 1 ),..., b k m 1, r 1 )) = b 1 m 1 ),..., b m 1, r 1 ),..., b k m 1 )) w be decoded by the termna to message m 1 because by hypothess m 1 M whch s decodabe under any error pattern r R A. Therefore t s an eement of B snce t does not equas bm 1 ). Smary n the atter case, b 1 m 2, r 2 ) b 1 m 2 ), then b 2 m 2, r 2 ),..., b k m 2, r 2 )) = b 2 m 2 ),..., b m 2, r 2 ),..., b k m 2 )) s an eement of B and w be decoded by the termna to m 2. Therefore n ether case we fnd an eement of B that w be decoded to ether m 1 or m 2. Lemma 5. Let Mẑ, ˆb ) = {m M : z m) = ẑ, b m) = ˆb }, ˆb,ẑ = arg maxˆb B Mẑ, ˆb ) and Nẑ ) = Mẑ ), 1 then there are at east 2 Nẑ ) Mẑ, ˆb,ẑ ) ) dstnct eements of B that w be decoded by the termna to some messages n Mẑ ). Proof: Let W := Mẑ ), and we descrbe an teratve procedure as foow. Pck arbtrary m 1, m 2 W such that b m 1 ) b m 2 ), and then deete them from W and repeat unt there does not exst such m 1, m 2. By Lemma 4, each par of eements deeted from W w generate a dstnct eement of B, whch w be decoded by the termna to ether m 1 or m 2. After the teratve procedure termnates, t foows that W Mẑ, ˆb,ẑ ), because otherwse there must exst m 1, m 2 W such that b m 1 ) b m 2 ). Therefore at east Nẑ ) Mẑ, ˆb,ẑ ) eements are deeted and the emma s proved. Z We are now ready to upper bound Hz b ). Reca that = {z m) : m M }. We have, Hb z ) = where and ẑ Z Pr{ẑ } ˆb B Pr{ˆb ẑ } og Pr{ˆb ẑ } = I 4 + I 5, 12) I 4 = < ẑ Z ẑ Z Pr{ẑ } Pr{ˆb,ẑ ẑ } og Pr{ˆb,ẑ ẑ } Pr{ẑ } 1 13) I 5 = Pr{ẑ } Pr{ˆb ẑ } og Pr{ˆb ẑ } ẑ Z ˆb ˆb,ẑ Pr{ẑ } Pr{ˆb ẑ } og 2 kn ˆb ˆb,ẑ ẑ Z = kn ẑ Z = kn ẑ Z kn 2 kn 1 ɛ ) c) kn 2 B 2 kn 1 ɛ ) = kn 2 ɛ 2 kn 2 kn 1 ɛ ) ˆb ˆb,ẑ Pr{ẑ, ˆb } Nẑ ) Mẑ, ˆb,ẑ ) ẑ Z M Nẑ ) Mẑ, ˆb,ẑ ) ) = 2kɛ n, 14) 1 ɛ

7 where c) foows from Lemma 5. Substtutng 13) and 14) to 12) we have Hb z ) 1 + 2kɛ n. 15) 1 ɛ Step 4: Connect a and z. Fnay we dscuss the connecton between a and z. We may assume that z = a wthout oss of generaty n the foowng sense. For every network code that acheves rate k wth error probabty ɛ n I c, we can modfy t sghty to obtan a new code such that z = a, and such that the code on a other edges and at the termna are the same as the orgna code. Ths modfcaton s feasbe because the encodng functon z of the orgna code s a functon of a, and so f we et z = a, then the node s, = 1,.., k, aways has enough nformaton to reproduce the orgna network code. Snce from the perspectve of the termna, the modfed code s the same as the orgna code, t aso acheves rate k wth error probabty ɛ n I c. Hence, Ia ; z ) = Ha ). 16) Step 5: Connect z and z. By 11), 15), 16) and Lemma 1, we have Iz ; z ) Ia ; z ) + Ia ; b ) + Ib ; z ) Ha ) Hb ) = Ia ; b ) + Ib ; z ) Hb ) = Ia ; b ) Hb z ) > 1 ɛ 1 ) 1 ɛ )n + og1 ɛ )) ) 1 + ɛ ɛ n 1 ɛ )1 ɛ ) n 1 2kɛ n. 17) 1 ɛ Reca that 17) s obtaned under the assumpton that the source message s unformy dstrbuted over M, and hence a s unformy dstrbuted over A. Therefore the random varabes {a 1 M ),..., a k M )} are not ndependent. Now we consder the case that a s unformy dstrbuted over [2 n ] k and the network code s the same as before. Specfcay, the decodng functon and the encodng functons at a edges except a 1,..., a k are the same as the network code that acheves rate k wth error probabty ɛ n I c. We are nterested n the mutua nformaton between z and z under ths settng where the random varabes {a 1,..., a k } are ndependent. Let a [2 n ] k denote that the dstrbuton of a s unform over [2 n ] k, I a [2n ] kz ; z ) = Note that Pr a [2 n ] k {a A }I a [2n ] kz ; z a A ) + Pr a [2 n ] k {a A }I a [2 n ] kz ; z a A ). 18) I a [2n ] kz ; z a A ) = I a A z ; z ) = Iz ; z ), 19) whch s exacty the resut we computed n 17). And Pr {a A } = A /2 kn 1 ɛ ). 20) a [2 n ] k Therefore by 19) and 20), I a [2 n ] kz ; z ) 1 ɛ )Iz ; z ). Then by 17), for any ɛ 1 > 0, by frst choosng a suffcenty arge and then a suffcenty sma ɛ and a suffcenty arge n, t foows that I a [2n ] kz ; z )/n > 1 ɛ 1, = 1,..., k. Hence unt rate s asymptotcay feasbe n I by the channe codng theorem [25]. Ths competes the proof of the frst part of the theorem.. Conversey, we show that f unt rate s feasbe n I, then rate k s feasbe n I c. Agan we use the constructve scheme n Fgure 2. In I c, the source ets M = M 1,..., M k ), where the M s are..d. unformy dstrbuted over [2 n ]. Let the network code be a M) = x M) = y M) = z M) = z M) = M, = 1,..., k, and et node B, = 1,..., k performs majorty decodng. The termna t w not decode an error as ong as the mutpe-uncast nstance I does not commt an error. Ths happens wth probabty at east 1 ɛ, whch mpes the feasbty of rate k n I c. V. CONCLUSION We summarze the resuts of ths paper n Fg. 3 whch expresses the possbe connectons between the feasbty of a genera mutpe-uncast network codng nstance I and ts reduced snge-uncast network error correcton nstance I c. Our resuts present an equvaence between mutpe-uncast and network error correcton under zero-error communcaton. Namey, determnng the feasbty of zero-error unt rate n I s equvaent to determnng the feasbty of zero-error rate k n I c. Ths s expressed n Fg. 3 by the fact that the two states n the frst row are connected by a snge sod edge and there are no other edges connected to these two states. For the vanshng error mode, however, the mpcaton of our resuts are more nvoved. In our reducton there s a sght sackness, whch gves rse to the two dashed nes n Fg. 3. For exampe, consder the case that unt rate s feasbe but not wth zero error) n I. Then t foows that rate k s feasbe but not wth zero error) n I c. Ths fact s expressed by the soe sod ne eavng the state that unt rate s feasbe but not wth zero error) n I. However, f rate k s feasbe but not wth zero error) n I c, then there are potentay two possbtes: a) that unt rate s feasbe but not wth zero error) n I; and b) that unt rate s asymptotcay feasbe but not exacty feasbe) n I. Opton a) s represented by a sod ne, as ndeed we have observed nstance I wth a correspondng I c that fts ths settng. Opton b) s represented by a dashed ne, as on one the one hand t has not been rued out by our anayss, but on the other hand we are not aware of how to construct nstances I wth a correspondng I c that ft ths settng. A n a, under the vanshng error mode, the two dashed nes n Fg. 3 do not aow us to drecty determne the feasbty of I based on the feasbty of I c. Nevertheess, we may consder the foowng probem on I whch can be

8 Fg. 3: Equvaence between mutpe-uncast and network error correcton under the constructon of Fg. 1. In our reducton, gven an nstance I of the mutpe-uncast network codng probem, we construct an nstance I c of the snge-uncast network error correcton probem. Ths fgure expresses our current understandng of the reaton between achevabty n I and I c. A sod ne between two states means that there exst nstances of I and I c wth the correspondng achevabty. If there s no ne between two states, there do not exst nstances of I and I c wth the correspondng achevabty. A dashed ne between two states means that whether there s a sod ne between the two states or not s st an open probem. soved by the study of I c usng our resuts: Gven an nstance I, partay determne between the three possbe settngs n the foowng manner: f unt rate s feasbe but not wth zero error) n I, answer yes; f unt rate s not asymptotcay feasbe n I, answer no; f unt rate s asymptotcay feasbe but not exacty feasbe n I, then any answer s consdered correct. By our resuts, answerng yes f and ony f rate k s feasbe but not wth zero error) n I c soves the probem above. Whether the parta dstncton probem above on I s a dffcut one compared to the standard feasbty of mutpeuncast network codng) s yet to be estabshed. Fnay we note that our reducton and anayss n the paper consder the case that the connectons between source destnaton pars n I have unt rate. Our reducton can be adapted to connectons wth dfferent rates. ACKNOWLEDGEMENT Ths work has been supported n part by NSF grant CCF , CCF , CCF , and CCF REFERENCES [1] R. W. Yeung and N. Ca, Network Error Correcton, I: Basc Concepts and Upper Bounds, Communcatons n Informaton & Systems, vo. 6, no. 1, pp , [2], Network Error Correcton, II: Lower Bounds, Communcatons n Informaton & Systems, vo. 6, no. 1, pp , [3] R. Koetter and F. R. Kschschang, Codng for Errors and Erasures n Random Network Codng, IEEE Transactons on Informaton Theory, vo. 54, no. 8, pp , [4] S. Jagg, M. Langberg, S. Katt, T. Ho, D. Katab, M. Medard, and M. Effros, Resent Network Codng n the Presence of Byzantne Adversares, IEEE Transactons on Informaton Theory, vo. 54, no. 6, pp , [5] D. Sva, F. R. Kschschang, and R. Kotter, A Rank-Metrc Approach to Error Contro n Random Network Codng, IEEE Transactons on Informaton Theory, vo. 54, no. 9, pp , [6] Z. Zhang, Lnear network error correcton codes n packet networks, IEEE Transactons on Informaton Theory, vo. 54, no. 1, pp , Jan [7] L. Nutman and M. Langberg, Adversara Modes and Resent Schemes for Network Codng, n IEEE Internatona Symposum on Informaton Theory, 2008, pp [8] W. Huang, T. Ho, H. Yao, and S. Jagg, Rateess resent network codng aganst byzantne adversares, n IEEE INFOCOM mn conference. IEEE, 2013, pp [9] S. Km, T. Ho, M. Effros, and A. S. Avestmehr, Network Error Correcton Wth Unequa Lnk Capactes, IEEE Transactons on Informaton Theory, vo. 57, no. 2, pp , Feb [10] O. Kosut, L. Tong, and D. Tse, Nonnear Network Codng s Necessary to Combat Genera Byzantne Attacks, n Aerton Conference on Communcaton, Contro, and Computng, 2009, pp [11] D. Wang, D. Sva, and F. R. Kschschang, Robust Network Codng n the Presence of Untrusted Nodes, IEEE Transactons on Informaton Theory, vo. 56, no. 9, pp , [12] O. Kosut, L. Tong, and D. N. C. Tse, Poytope codes aganst adversares n networks, n IEEE Internatona Symposum on Informaton Theory, 2010, pp [13] P. H. Che, M. Chen, T. Ho, S. Jagg, and M. Langberg, Routng for Securty n Networks wth Adversara Nodes, n IEEE NetCod, 2013, pp [14] A. R. Lehman, Network Codng, Ph.D. dssertaton, Massachusetts Insttute of Technoogy, [15] M. Langberg and M. Medard, On the mutpe uncast network codng conjecture, n Aerton Conference on Communcaton, Contro, and Computng, 2009, pp [16] R. Dougherty, C. Freng, and K. Zeger, Insuffcency of Lnear Codng n Network Informaton Fow, IEEE Transactons on Informaton Theory, vo. 51, no. 8, pp , [17], Networks, Matrods, and Non-Shannon Informaton Inequates, IEEE Transactons on Informaton Theory, vo. 53, no. 6, pp , [18] R. Dougherty and K. Zeger, Nonreversbty and Equvaent Constructons of Mutpe-Uncast Networks, IEEE Transactons on Informaton Theory, vo. 52, no. 11, pp , [19] M. F. Wong, M. Langberg, and M. Effros, On a capacty equvaence between mutpe mutcast and mutpe uncast, n Aerton Conference on Communcaton, Contro, and Computng, 2013, pp [20] S. E Rouayheb, A. Sprntson, and C. Georghades, On the Index Codng Probem and Its Reaton to Network Codng and Matrod Theory, IEEE Transactons on Informaton Theory, vo. 56, no. 7, pp , [21] M. Effros, S. E Rouayheb, and M. Langberg, An Equvaence between Network Codng and Index Codng, n IEEE Internatona Symposum on Informaton Theory, 2013, pp [22] T. Chan and A. Grant, Msson mpossbe: Computng the network codng capacty regon, n IEEE Internatona Symposum on Informaton Theory, Jan. 2008, pp [23] W. Huang, T. Ho, M. Langberg, and J. Kewer, On secure network codng wth unform wretap sets, n IEEE NetCod, 2013, pp [24] S. Kamath, D. N. C. Tse, and C.-C. Wang, Two-uncast s hard, n 2014 IEEE Internatona Symposum on Informaton Theory ISIT), 2014, pp [25] T. M. Cover and J. A. Thomas, Eements of Informaton Theory, 2nd ed. John Wey & Sons, Ju

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability

Connecting Multiple-unicast and Network Error Correction: Reduction and Unachievability Connectng Multple-uncast and Network Error Correcton: Reducton and Unachevablty Wentao Huang Calforna Insttute of Technology Mchael Langberg Unversty at Buffalo, SUNY Joerg Klewer New Jersey Insttute of

More information

IN THE paradigm of network coding, a set of source nodes

IN THE paradigm of network coding, a set of source nodes 4496 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 64, NO. 6, JUNE 2018 Sngle-Uncast Secure Network Codng and Network Error Correcton are as Hard as Multple-Uncast Network Codng Wentao Huang, Tracey Ho,

More information

Interference Alignment and Degrees of Freedom Region of Cellular Sigma Channel

Interference Alignment and Degrees of Freedom Region of Cellular Sigma Channel 2011 IEEE Internatona Symposum on Informaton Theory Proceedngs Interference Agnment and Degrees of Freedom Regon of Ceuar Sgma Channe Huaru Yn 1 Le Ke 2 Zhengdao Wang 2 1 WINLAB Dept of EEIS Unv. of Sc.

More information

Refined Coding Bounds for Network Error Correction

Refined Coding Bounds for Network Error Correction Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department

More information

Cyclic Codes BCH Codes

Cyclic Codes BCH Codes Cycc Codes BCH Codes Gaos Feds GF m A Gaos fed of m eements can be obtaned usng the symbos 0,, á, and the eements beng 0,, á, á, á 3 m,... so that fed F* s cosed under mutpcaton wth m eements. The operator

More information

MARKOV CHAIN AND HIDDEN MARKOV MODEL

MARKOV CHAIN AND HIDDEN MARKOV MODEL MARKOV CHAIN AND HIDDEN MARKOV MODEL JIAN ZHANG JIANZHAN@STAT.PURDUE.EDU Markov chan and hdden Markov mode are probaby the smpest modes whch can be used to mode sequenta data,.e. data sampes whch are not

More information

Lecture 3: Shannon s Theorem

Lecture 3: Shannon s Theorem CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts

More information

L-Edge Chromatic Number Of A Graph

L-Edge Chromatic Number Of A Graph IJISET - Internatona Journa of Innovatve Scence Engneerng & Technoogy Vo. 3 Issue 3 March 06. ISSN 348 7968 L-Edge Chromatc Number Of A Graph Dr.R.B.Gnana Joth Assocate Professor of Mathematcs V.V.Vannaperuma

More information

Associative Memories

Associative Memories Assocatve Memores We consder now modes for unsupervsed earnng probems, caed auto-assocaton probems. Assocaton s the task of mappng patterns to patterns. In an assocatve memory the stmuus of an ncompete

More information

Problem Set 9 Solutions

Problem Set 9 Solutions Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem

More information

Calculation of time complexity (3%)

Calculation of time complexity (3%) Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add

More information

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:

More information

Achieving Optimal Throughput Utility and Low Delay with CSMA-like Algorithms: A Virtual Multi-Channel Approach

Achieving Optimal Throughput Utility and Low Delay with CSMA-like Algorithms: A Virtual Multi-Channel Approach Achevng Optma Throughput Utty and Low Deay wth SMA-ke Agorthms: A Vrtua Mut-hanne Approach Po-Ka Huang, Student Member, IEEE, and Xaojun Ln, Senor Member, IEEE Abstract SMA agorthms have recenty receved

More information

Research on Complex Networks Control Based on Fuzzy Integral Sliding Theory

Research on Complex Networks Control Based on Fuzzy Integral Sliding Theory Advanced Scence and Technoogy Letters Vo.83 (ISA 205), pp.60-65 http://dx.do.org/0.4257/ast.205.83.2 Research on Compex etworks Contro Based on Fuzzy Integra Sdng Theory Dongsheng Yang, Bngqng L, 2, He

More information

Appendix for An Efficient Ascending-Bid Auction for Multiple Objects: Comment For Online Publication

Appendix for An Efficient Ascending-Bid Auction for Multiple Objects: Comment For Online Publication Appendx for An Effcent Ascendng-Bd Aucton for Mutpe Objects: Comment For Onne Pubcaton Norak Okamoto The foowng counterexampe shows that sncere bddng by a bdders s not aways an ex post perfect equbrum

More information

Delay tomography for large scale networks

Delay tomography for large scale networks Deay tomography for arge scae networks MENG-FU SHIH ALFRED O. HERO III Communcatons and Sgna Processng Laboratory Eectrca Engneerng and Computer Scence Department Unversty of Mchgan, 30 Bea. Ave., Ann

More information

Nested case-control and case-cohort studies

Nested case-control and case-cohort studies Outne: Nested case-contro and case-cohort studes Ørnuf Borgan Department of Mathematcs Unversty of Oso NORBIS course Unversty of Oso 4-8 December 217 1 Radaton and breast cancer data Nested case contro

More information

ECE559VV Project Report

ECE559VV Project Report ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate

More information

ON AUTOMATIC CONTINUITY OF DERIVATIONS FOR BANACH ALGEBRAS WITH INVOLUTION

ON AUTOMATIC CONTINUITY OF DERIVATIONS FOR BANACH ALGEBRAS WITH INVOLUTION European Journa of Mathematcs and Computer Scence Vo. No. 1, 2017 ON AUTOMATC CONTNUTY OF DERVATONS FOR BANACH ALGEBRAS WTH NVOLUTON Mohamed BELAM & Youssef T DL MATC Laboratory Hassan Unversty MORO CCO

More information

On the Power Function of the Likelihood Ratio Test for MANOVA

On the Power Function of the Likelihood Ratio Test for MANOVA Journa of Mutvarate Anayss 8, 416 41 (00) do:10.1006/jmva.001.036 On the Power Functon of the Lkehood Rato Test for MANOVA Dua Kumar Bhaumk Unversty of South Aabama and Unversty of Inos at Chcago and Sanat

More information

Analysis of Non-binary Hybrid LDPC Codes

Analysis of Non-binary Hybrid LDPC Codes Anayss of Non-bnary Hybrd LDPC Codes Luce Sassate and Davd Decercq ETIS ENSEA/UCP/CNRS UMR-5 954 Cergy, FRANCE {sassate,decercq}@ensea.fr Abstract Ths paper s egbe for the student paper award. In ths paper,

More information

Achieving Optimal Throughput Utility and Low Delay with CSMA-like Algorithms: A Virtual Multi-Channel Approach

Achieving Optimal Throughput Utility and Low Delay with CSMA-like Algorithms: A Virtual Multi-Channel Approach IEEE/AM TRANSATIONS ON NETWORKING, VOL. X, NO. XX, XXXXXXX 20X Achevng Optma Throughput Utty and Low Deay wth SMA-ke Agorthms: A Vrtua Mut-hanne Approach Po-Ka Huang, Student Member, IEEE, and Xaojun Ln,

More information

Analysis of Bipartite Graph Codes on the Binary Erasure Channel

Analysis of Bipartite Graph Codes on the Binary Erasure Channel Anayss of Bpartte Graph Codes on the Bnary Erasure Channe Arya Mazumdar Department of ECE Unversty of Maryand, Coege Par ema: arya@umdedu Abstract We derve densty evouton equatons for codes on bpartte

More information

Neural network-based athletics performance prediction optimization model applied research

Neural network-based athletics performance prediction optimization model applied research Avaabe onne www.jocpr.com Journa of Chemca and Pharmaceutca Research, 04, 6(6):8-5 Research Artce ISSN : 0975-784 CODEN(USA) : JCPRC5 Neura networ-based athetcs performance predcton optmzaton mode apped

More information

State Amplification and State Masking for the Binary Energy Harvesting Channel

State Amplification and State Masking for the Binary Energy Harvesting Channel State Amplfcaton and State Maskng for the Bnary Energy Harvestng Channel Kaya Tutuncuoglu, Omur Ozel 2, Ayln Yener, and Sennur Ulukus 2 Department of Electrcal Engneerng, The Pennsylvana State Unversty,

More information

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens

THE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of

More information

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.

Lecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem. Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from

More information

Edge Isoperimetric Inequalities

Edge Isoperimetric Inequalities November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary

More information

COXREG. Estimation (1)

COXREG. Estimation (1) COXREG Cox (972) frst suggested the modes n whch factors reated to fetme have a mutpcatve effect on the hazard functon. These modes are caed proportona hazards (PH) modes. Under the proportona hazards

More information

NP-Completeness : Proofs

NP-Completeness : Proofs NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem

More information

Optimum Selection Combining for M-QAM on Fading Channels

Optimum Selection Combining for M-QAM on Fading Channels Optmum Seecton Combnng for M-QAM on Fadng Channes M. Surendra Raju, Ramesh Annavajjaa and A. Chockangam Insca Semconductors Inda Pvt. Ltd, Bangaore-56000, Inda Department of ECE, Unversty of Caforna, San

More information

LOW-DENSITY Parity-Check (LDPC) codes have received

LOW-DENSITY Parity-Check (LDPC) codes have received IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 59, NO. 7, JULY 2011 1807 Successve Maxmzaton for Systematc Desgn of Unversay Capacty Approachng Rate-Compatbe Sequences of LDPC Code Ensembes over Bnary-Input

More information

Maximizing the number of nonnegative subsets

Maximizing the number of nonnegative subsets Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum

More information

Greyworld White Balancing with Low Computation Cost for On- Board Video Capturing

Greyworld White Balancing with Low Computation Cost for On- Board Video Capturing reyword Whte aancng wth Low Computaton Cost for On- oard Vdeo Capturng Peng Wu Yuxn Zoe) Lu Hewett-Packard Laboratores Hewett-Packard Co. Pao Ato CA 94304 USA Abstract Whte baancng s a process commony

More information

APPENDIX A Some Linear Algebra

APPENDIX A Some Linear Algebra APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,

More information

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0

n α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0 MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

Finding Dense Subgraphs in G(n, 1/2)

Finding Dense Subgraphs in G(n, 1/2) Fndng Dense Subgraphs n Gn, 1/ Atsh Das Sarma 1, Amt Deshpande, and Rav Kannan 1 Georga Insttute of Technology,atsh@cc.gatech.edu Mcrosoft Research-Bangalore,amtdesh,annan@mcrosoft.com Abstract. Fndng

More information

Lower Bounding Procedures for the Single Allocation Hub Location Problem

Lower Bounding Procedures for the Single Allocation Hub Location Problem Lower Boundng Procedures for the Snge Aocaton Hub Locaton Probem Borzou Rostam 1,2 Chrstoph Buchhem 1,4 Fautät für Mathemat, TU Dortmund, Germany J. Faban Meer 1,3 Uwe Causen 1 Insttute of Transport Logstcs,

More information

Affine transformations and convexity

Affine transformations and convexity Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/

More information

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP

FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class

More information

Xin Li Department of Information Systems, College of Business, City University of Hong Kong, Hong Kong, CHINA

Xin Li Department of Information Systems, College of Business, City University of Hong Kong, Hong Kong, CHINA RESEARCH ARTICLE MOELING FIXE OS BETTING FOR FUTURE EVENT PREICTION Weyun Chen eartment of Educatona Informaton Technoogy, Facuty of Educaton, East Chna Norma Unversty, Shangha, CHINA {weyun.chen@qq.com}

More information

Note 2. Ling fong Li. 1 Klein Gordon Equation Probablity interpretation Solutions to Klein-Gordon Equation... 2

Note 2. Ling fong Li. 1 Klein Gordon Equation Probablity interpretation Solutions to Klein-Gordon Equation... 2 Note 2 Lng fong L Contents Ken Gordon Equaton. Probabty nterpretaton......................................2 Soutons to Ken-Gordon Equaton............................... 2 2 Drac Equaton 3 2. Probabty nterpretaton.....................................

More information

The Second Anti-Mathima on Game Theory

The Second Anti-Mathima on Game Theory The Second Ant-Mathma on Game Theory Ath. Kehagas December 1 2006 1 Introducton In ths note we wll examne the noton of game equlbrum for three types of games 1. 2-player 2-acton zero-sum games 2. 2-player

More information

The Fundamental Theorem of Distributed Storage Systems Revisited

The Fundamental Theorem of Distributed Storage Systems Revisited The Fundamental Theorem of Dstrbuted Storage Systems Revsted Png Hu Department of Electronc Engneerng Cty Unversty of Hong Kong Emal: png.hu@my.ctyu.edu.h Kenneth W. Shum Insttute of Networ Codng the Chnese

More information

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)

ECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006) ECE 534: Elements of Informaton Theory Solutons to Mdterm Eam (Sprng 6) Problem [ pts.] A dscrete memoryless source has an alphabet of three letters,, =,, 3, wth probabltes.4,.4, and., respectvely. (a)

More information

we have E Y x t ( ( xl)) 1 ( xl), e a in I( Λ ) are as follows:

we have E Y x t ( ( xl)) 1 ( xl), e a in I( Λ ) are as follows: APPENDICES Aendx : the roof of Equaton (6 For j m n we have Smary from Equaton ( note that j '( ( ( j E Y x t ( ( x ( x a V ( ( x a ( ( x ( x b V ( ( x b V x e d ( abx ( ( x e a a bx ( x xe b a bx By usng

More information

Lower bounds for the Crossing Number of the Cartesian Product of a Vertex-transitive Graph with a Cycle

Lower bounds for the Crossing Number of the Cartesian Product of a Vertex-transitive Graph with a Cycle Lower bounds for the Crossng Number of the Cartesan Product of a Vertex-transtve Graph wth a Cyce Junho Won MIT-PRIMES December 4, 013 Abstract. The mnmum number of crossngs for a drawngs of a gven graph

More information

More metrics on cartesian products

More metrics on cartesian products More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of

More information

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003

Tornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003 Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel

More information

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009

College of Computer & Information Science Fall 2009 Northeastern University 20 October 2009 College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:

More information

n-step cycle inequalities: facets for continuous n-mixing set and strong cuts for multi-module capacitated lot-sizing problem

n-step cycle inequalities: facets for continuous n-mixing set and strong cuts for multi-module capacitated lot-sizing problem n-step cyce nequates: facets for contnuous n-mxng set and strong cuts for mut-modue capactated ot-szng probem Mansh Bansa and Kavash Kanfar Department of Industra and Systems Engneerng, Texas A&M Unversty,

More information

Perron Vectors of an Irreducible Nonnegative Interval Matrix

Perron Vectors of an Irreducible Nonnegative Interval Matrix Perron Vectors of an Irreducble Nonnegatve Interval Matrx Jr Rohn August 4 2005 Abstract As s well known an rreducble nonnegatve matrx possesses a unquely determned Perron vector. As the man result of

More information

QUARTERLY OF APPLIED MATHEMATICS

QUARTERLY OF APPLIED MATHEMATICS QUARTERLY OF APPLIED MATHEMATICS Voume XLI October 983 Number 3 DIAKOPTICS OR TEARING-A MATHEMATICAL APPROACH* By P. W. AITCHISON Unversty of Mantoba Abstract. The method of dakoptcs or tearng was ntroduced

More information

Approximately achieving Gaussian relay network capacity with lattice codes

Approximately achieving Gaussian relay network capacity with lattice codes Approxmately achevng Gaussan relay network capacty wth lattce codes Ayfer Özgür EFL, Lausanne, Swtzerland ayfer.ozgur@epfl.ch Suhas Dggav UCLA, USA and EFL, Swtzerland suhas@ee.ucla.edu Abstract Recently,

More information

Polite Water-filling for Weighted Sum-rate Maximization in MIMO B-MAC Networks under. Multiple Linear Constraints

Polite Water-filling for Weighted Sum-rate Maximization in MIMO B-MAC Networks under. Multiple Linear Constraints 2011 IEEE Internatona Symposum on Informaton Theory Proceedngs Pote Water-fng for Weghted Sum-rate Maxmzaton n MIMO B-MAC Networks under Mutpe near Constrants An u 1, Youjan u 2, Vncent K. N. au 3, Hage

More information

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations

Application of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work

More information

2.3 Nilpotent endomorphisms

2.3 Nilpotent endomorphisms s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms

More information

Notes on Frequency Estimation in Data Streams

Notes on Frequency Estimation in Data Streams Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to

More information

THE METRIC DIMENSION OF AMALGAMATION OF CYCLES

THE METRIC DIMENSION OF AMALGAMATION OF CYCLES Far East Journa of Mathematca Scences (FJMS) Voume 4 Number 00 Pages 9- Ths paper s avaabe onne at http://pphm.com/ournas/fms.htm 00 Pushpa Pubshng House THE METRIC DIMENSION OF AMALGAMATION OF CYCLES

More information

EGR 544 Communication Theory

EGR 544 Communication Theory EGR 544 Communcaton Theory. Informaton Sources Z. Alyazcoglu Electrcal and Computer Engneerng Department Cal Poly Pomona Introducton Informaton Source x n Informaton sources Analog sources Dscrete sources

More information

Finding low error clusterings

Finding low error clusterings Fndng ow error custerngs Mara-Forna Bacan Mcrosoft Research, New Engand One Memora Drve, Cambrdge, MA mabacan@mcrosoft.com Mark Braverman Mcrosoft Research, New Engand One Memora Drve, Cambrdge, MA markbrav@mcrosoft.com

More information

Chapter 6. Rotations and Tensors

Chapter 6. Rotations and Tensors Vector Spaces n Physcs 8/6/5 Chapter 6. Rotatons and ensors here s a speca knd of near transformaton whch s used to transforms coordnates from one set of axes to another set of axes (wth the same orgn).

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

On Uplink-Downlink Sum-MSE Duality of Multi-hop MIMO Relay Channel

On Uplink-Downlink Sum-MSE Duality of Multi-hop MIMO Relay Channel On Upn-Downn Sum-MSE Duat of Mut-hop MIMO Rea Channe A Cagata Cr, Muhammad R. A. handaer, Yue Rong and Yngbo ua Department of Eectrca Engneerng, Unverst of Caforna Rversde, Rversde, CA, 95 Centre for Wreess

More information

REAL ANALYSIS I HOMEWORK 1

REAL ANALYSIS I HOMEWORK 1 REAL ANALYSIS I HOMEWORK CİHAN BAHRAN The questons are from Tao s text. Exercse 0.0.. If (x α ) α A s a collecton of numbers x α [0, + ] such that x α

More information

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud

Resource Allocation with a Budget Constraint for Computing Independent Tasks in the Cloud Resource Allocaton wth a Budget Constrant for Computng Independent Tasks n the Cloud Wemng Sh and Bo Hong School of Electrcal and Computer Engneerng Georga Insttute of Technology, USA 2nd IEEE Internatonal

More information

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or

Entropy Coding. A complete entropy codec, which is an encoder/decoder. pair, consists of the process of encoding or Sgnal Compresson Sgnal Compresson Entropy Codng Entropy codng s also known as zero-error codng, data compresson or lossless compresson. Entropy codng s wdely used n vrtually all popular nternatonal multmeda

More information

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].

Volume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2]. Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland

More information

Journal of Multivariate Analysis

Journal of Multivariate Analysis Journa of Mutvarate Anayss 3 (04) 74 96 Contents sts avaabe at ScenceDrect Journa of Mutvarate Anayss journa homepage: www.esever.com/ocate/jmva Hgh-dmensona sparse MANOVA T. Tony Ca a, Yn Xa b, a Department

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Wreless Informaton Transmsson System Lab. Chapter 7 Channel Capacty and Codng Insttute of Communcatons Engneerng atonal Sun Yat-sen Unversty Contents 7. Channel models and channel capacty 7.. Channel models

More information

3. Stress-strain relationships of a composite layer

3. Stress-strain relationships of a composite layer OM PO I O U P U N I V I Y O F W N ompostes ourse 8-9 Unversty of wente ng. &ech... tress-stran reatonshps of a composte ayer - Laurent Warnet & emo Aerman.. tress-stran reatonshps of a composte ayer Introducton

More information

Boundary Value Problems. Lecture Objectives. Ch. 27

Boundary Value Problems. Lecture Objectives. Ch. 27 Boundar Vaue Probes Ch. 7 Lecture Obectves o understand the dfference between an nta vaue and boundar vaue ODE o be abe to understand when and how to app the shootng ethod and FD ethod. o understand what

More information

LECTURE 21 Mohr s Method for Calculation of General Displacements. 1 The Reciprocal Theorem

LECTURE 21 Mohr s Method for Calculation of General Displacements. 1 The Reciprocal Theorem V. DEMENKO MECHANICS OF MATERIALS 05 LECTURE Mohr s Method for Cacuaton of Genera Dspacements The Recproca Theorem The recproca theorem s one of the genera theorems of strength of materas. It foows drect

More information

Exact-Regenerating Codes between MBR and MSR Points

Exact-Regenerating Codes between MBR and MSR Points Exact-Regeneratng Codes between BR SR Ponts arxv:1304.5357v1 [cs.dc] 19 Apr 2013 Abstract In ths paper we study dstrbuted storage systems wth exact repar. We gve a constructon for regeneratng codes between

More information

On Network Coding of Independent and Dependent Sources in Line Networks

On Network Coding of Independent and Dependent Sources in Line Networks On Network Codng of Independent and Dependent Sources n Lne Networks Mayank Baksh, Mchelle Effros, WeHsn Gu, Ralf Koetter Department of Electrcal Engneerng Department of Electrcal Engneerng Calforna Insttute

More information

Chapter 7 Channel Capacity and Coding

Chapter 7 Channel Capacity and Coding Chapter 7 Channel Capacty and Codng Contents 7. Channel models and channel capacty 7.. Channel models Bnary symmetrc channel Dscrete memoryless channels Dscrete-nput, contnuous-output channel Waveform

More information

Counting Crosswords. April 19, 2006 Draft 2.5

Counting Crosswords. April 19, 2006 Draft 2.5 ountng rosswords avd J.. ackay Jeremy horpe pr 19, 2006 raft 2.5 bstract hannon s cacuaton of the number of crosswords assumed that the rows and coumns of crosswords contan typca strngs from the anguage.

More information

Error Probability for M Signals

Error Probability for M Signals Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal

More information

5 The Rational Canonical Form

5 The Rational Canonical Form 5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces

More information

Solutions to exam in SF1811 Optimization, Jan 14, 2015

Solutions to exam in SF1811 Optimization, Jan 14, 2015 Solutons to exam n SF8 Optmzaton, Jan 4, 25 3 3 O------O -4 \ / \ / The network: \/ where all lnks go from left to rght. /\ / \ / \ 6 O------O -5 2 4.(a) Let x = ( x 3, x 4, x 23, x 24 ) T, where the varable

More information

Key words. corner singularities, energy-corrected finite element methods, optimal convergence rates, pollution effect, re-entrant corners

Key words. corner singularities, energy-corrected finite element methods, optimal convergence rates, pollution effect, re-entrant corners NESTED NEWTON STRATEGIES FOR ENERGY-CORRECTED FINITE ELEMENT METHODS U. RÜDE1, C. WALUGA 2, AND B. WOHLMUTH 2 Abstract. Energy-corrected fnte eement methods provde an attractve technque to dea wth eptc

More information

Inthem-machine flow shop problem, a set of jobs, each

Inthem-machine flow shop problem, a set of jobs, each THE ASYMPTOTIC OPTIMALITY OF THE SPT RULE FOR THE FLOW SHOP MEAN COMPLETION TIME PROBLEM PHILIP KAMINSKY Industra Engneerng and Operatons Research, Unversty of Caforna, Bereey, Caforna 9470, amnsy@eor.bereey.edu

More information

= z 20 z n. (k 20) + 4 z k = 4

= z 20 z n. (k 20) + 4 z k = 4 Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5

More information

Subgradient Methods and Consensus Algorithms for Solving Convex Optimization Problems

Subgradient Methods and Consensus Algorithms for Solving Convex Optimization Problems Proceedngs of the 47th IEEE Conference on Decson and Contro Cancun, Mexco, Dec. 9-11, 2008 Subgradent Methods and Consensus Agorthms for Sovng Convex Optmzaton Probems Björn Johansson, Tamás Kevczy, Mae

More information

COS 521: Advanced Algorithms Game Theory and Linear Programming

COS 521: Advanced Algorithms Game Theory and Linear Programming COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton

More information

Example: Suppose we want to build a classifier that recognizes WebPages of graduate students.

Example: Suppose we want to build a classifier that recognizes WebPages of graduate students. Exampe: Suppose we want to bud a cassfer that recognzes WebPages of graduate students. How can we fnd tranng data? We can browse the web and coect a sampe of WebPages of graduate students of varous unverstes.

More information

arxiv: v1 [cs.gt] 28 Mar 2017

arxiv: v1 [cs.gt] 28 Mar 2017 A Dstrbuted Nash qubrum Seekng n Networked Graphca Games Farzad Saehsadaghan, and Lacra Pave arxv:7009765v csgt 8 Mar 07 Abstract Ths paper consders a dstrbuted gossp approach for fndng a Nash equbrum

More information

Quantum Network Code for Multiple-Unicast Network with Quantum Invertible Linear Operations

Quantum Network Code for Multiple-Unicast Network with Quantum Invertible Linear Operations Quantum Network Code for Multple-Uncast Network wth Quantum Invertble Lnear Operatons Seunghoan Song Graduate School of Mathematcs, Nagoya Unversty, Nagoya, Japan m702a@mathnagoya-uacjp Masahto Hayash

More information

A finite difference method for heat equation in the unbounded domain

A finite difference method for heat equation in the unbounded domain Internatona Conerence on Advanced ectronc Scence and Technoogy (AST 6) A nte derence method or heat equaton n the unbounded doman a Quan Zheng and Xn Zhao Coege o Scence North Chna nversty o Technoogy

More information

Modulo Magic Labeling in Digraphs

Modulo Magic Labeling in Digraphs Gen. Math. Notes, Vol. 7, No., August, 03, pp. 5- ISSN 9-784; Copyrght ICSRS Publcaton, 03 www.-csrs.org Avalable free onlne at http://www.geman.n Modulo Magc Labelng n Dgraphs L. Shobana and J. Baskar

More information

An algorithmic approach to construct crystallizations of 3-manifolds from presentations of fundamental groups

An algorithmic approach to construct crystallizations of 3-manifolds from presentations of fundamental groups Proc. Indan Acad. Sc. (Math. Sc.) Vo. 6, No., November 06, pp. 69 65. DOI 0.007/s0-06-00-7 An agorthmc approach to construct crystazatons of -manfods from presentatons of fundamenta groups BIPLAB BASAK

More information

Anti-van der Waerden numbers of 3-term arithmetic progressions.

Anti-van der Waerden numbers of 3-term arithmetic progressions. Ant-van der Waerden numbers of 3-term arthmetc progressons. Zhanar Berkkyzy, Alex Schulte, and Mchael Young Aprl 24, 2016 Abstract The ant-van der Waerden number, denoted by aw([n], k), s the smallest

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Predicting Model of Traffic Volume Based on Grey-Markov

Predicting Model of Traffic Volume Based on Grey-Markov Vo. No. Modern Apped Scence Predctng Mode of Traffc Voume Based on Grey-Marov Ynpeng Zhang Zhengzhou Muncpa Engneerng Desgn & Research Insttute Zhengzhou 5005 Chna Abstract Grey-marov forecastng mode of

More information

On Information Theoretic Games for Interference Networks

On Information Theoretic Games for Interference Networks On Informaton Theoretc Games for Interference Networks Suvarup Saha and Randall A. Berry Dept. of EECS Northwestern Unversty e-mal: suvarups@u.northwestern.edu rberry@eecs.northwestern.edu Abstract The

More information

Graph Reconstruction by Permutations

Graph Reconstruction by Permutations Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer

More information

On the Multicriteria Integer Network Flow Problem

On the Multicriteria Integer Network Flow Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of

More information

Min Cut, Fast Cut, Polynomial Identities

Min Cut, Fast Cut, Polynomial Identities Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.

More information

n ). This is tight for all admissible values of t, k and n. k t + + n t

n ). This is tight for all admissible values of t, k and n. k t + + n t MAXIMIZING THE NUMBER OF NONNEGATIVE SUBSETS NOGA ALON, HAROUT AYDINIAN, AND HAO HUANG Abstract. Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what

More information