THE SHANNON CAPACITY OF A GRAPH
|
|
- Laureen Richardson
- 5 years ago
- Views:
Transcription
1 THE SHANNON CAPACITY OF A GRAPH JESPER M. MØLLER. Mathematics of communication An alphabet with k non-confusable letters can produce k r non-confusable words in r letters. Suppose now that we have letters B, P, T, D, and V. We may sometimes not be able to distinguish between B and P or B and V. We make a graph where confusable letters are connected by an edge: P T B D How can we best use these letters for error-free communication? We could use just B and T because no confusion is possible between these two letters, and just ignore the other letters. This would give us an error-free alphabet of letters. However, is this the most optimal use considering that we do not use three of the letters at all? Another possibility is to form words of two letters. The five -letter words (B, V ), (V, T ), (D, B), (T, D), (P, P ) can not be mixed up. If we receive (B, D) we can detect the error as (B, D) is not on the list. We can not correct the error because (B, D) could be a misinterpretation of both (B, V ) and (V, T ). These five -letter words work just as well as an error-free alphabet with k = letters. This is an improvement over the -letters B and T. V (B, P ) (V, P ) (D, P ) (B, T ) (V, T ) (D, T ) (P, D) (B, D) (V, D) (D, D) (P, V ) (B, V ) (V, V ) (P, B) (B, B) (V, B) Date: November,.
2 JESPER M. MØLLER Maybe we could improve the efficiency further by using 3-letter words? We now distill the ingredients of this real world problem into a problem in graph theory-. Graphs Definition (Finite graph). A graph G consists of a finite set V (G) and a set E(G) of -subsets of V (G). An element of V (G) is vertex of G. An element of E(G) is an edge of G. The adjacency matrix of G is the symmetric square matrix A G : V (G) V (G) {, } with A G (u, v) = if {u, v} E(G) and A G (u, v) = otherwise. The distance matrix of G is the symmetric square matrix D G : V (G) V (G) [, ] where D G (u, v) is minimum number of edges in a walk between u and v; in particular D G (u, u) =, and, by convention, D G (u, v) = inf = if u and v are not connected by edges. This distance function makes V (G) a finite metric space (with a metric that may take value ). The adjacency and distance matrices for the cyclic graph C on vertices are A C = D C = 3. Stability numbers and the Shannon capacity Definition (Stable set). A set A V (G) of vertices is stable if every edge of G contains at most one vertex from A. Definition 3 (Covering set). A set B V (G) of vertices is covering if every edge of G contains at least one vertex from B. Definition 4 (Stability number and covering number). Let G be a graph. The stability number of G is and the covering number of G is α(g) = max{ A A V (G) stable} β(g) = max{ B B V (G) covering} These numbers are complementary in the sense that α(g) + β(g) = V (G) (Gallai 99). Computation of α(g) is N P-hard. 6 7 α(g) = 4, β(g) =
3 THE SHANNON CAPACITY OF A GRAPH 3 α(c ) =, β(c ) = Definition (Strong product). The strong product of G and H is the graph G H with vertex set V (G) V (H). The vertices, (u, v ) and (u, v ) in V (G) V (H), are adjacent if and only if u and u are adjacent in G and v and v are adjacent in H. (Here, we take adjacent to mean identical or in the same edge.) As to stability numbers we clearly have that α(g H) α(g)α(h) since the product of a stable set of G with one of H is stable in G H. The strong product is denoted by the symbol because = The vertices adjacent to (, 3) in the strong product C C of the cyclic graph C with itself are (, 4) (, 4) (3, 4) (, 3) (, 3) (3, 3) (, ) (, ) (3, ) and the strong product C C is the graph on the torus 4 3 α(c C ) = 3 with the top and bottom horizontal edges and the left and right vertical edges identified. Definition 6 (Shannon capacity (Shannon 96)). [4] The Shannon capacity of a graph G is k Θ(G) = lim α(g k ) k 4
4 4 JESPER M. MØLLER This limit does exist and it is equal to sup k k α(g k ). The sequence k k α(g k ) is not monotone in general. For C this sequence begins with,,.... Θ(G) α(g) because α(g k ) α(g) k for all k. Computation of the Shannon capacity hard is difficult. The complexity class is unknown. Shannon himself computed the Shannon capacity for all graphs with at most 4 vertices. It took more than years before the capacity of the cyclic graph C was determined. Theorem 7 (Lovász 979). [3, ] Θ(C ) = The capacity of the cyclic graph C 7 on 7 vertices is unknown. 4. The magnitude of a graph The magnitude of a graph G is a power series k= M k(g)q k with integral coefficients M k (G) defined from the metric D G on the vertex set. Let Z[[q]] be the ring of power series in the variabel q with integral coefficients. Let q D G : V (G) V (G) Z[[q]] be symmetric square matrix over Z[[q]] whose (u, v)-entry is q D G (u, v) = q D G(u,v) (with the convention that q = ). Definition 8 (Weighting and magnitude of a graph). [] A weighting for G is a vector ω G : V (G) Z[[q]] such that q D G ω G =. The magnitude of G is the total weight v V (G) ω G(v) Z[[q]] of G. Example 9. For the cyclic graph C on five vertices q q ( + q + q q ) q C = q q q q q q, ω ( + q + q ) C = ( + q + q ) q q ( + q + q q ) ( + q + q ) and the magnitude M(C ) = +q+q = q + q + q 3 q 4 q +. Equivalently, the weighting of G is the function ω G such that u V (G): q DG(u,v) ω G (v) = u V (G) and the magnitude of G is the sum (q D G ) (u, v) u,v V (G) of all entries of the inverse to the matrix q D G. The adjugate matrix adj(q D G ): V (G) V (G) Z[q] takes (u, v) to the determinant of the matrix obtained from q D G by deleting row v and column u multiplied by a sign. Since (q D G )adj(q D G ) is the determinant times the identity matrix we see that u,v V (G) adj(qd G )(u, v) det(q D G ) is a rational function in q. In the special case where the row sums s(q) = v V (G) qd G(u,v) are independent of u, the weighting is constant ω G (v) = /s(q), and the magnitude of G is v V (G) ω G (v) = V (G) s(q)
5 THE SHANNON CAPACITY OF A GRAPH This happens for the cyclic graph C, for the Petersen graph P, and for the complete graph K n on n vertices. We conclude that these graphs have magnitudes M(C ) = + q + q = q q + q 3 q 4 q + 6q 6 + M(P ) = + 3q + 6q = 3q + 3q + 9q 3 4q 4 + 8q + 7q 6 + n M(K n ) = ( n)q = n( + ( n)q + ( n) q + ( n) 3 q 3 + ( n) 4 q 4 ) Definition (Graph product). The graph product of G and H is the graph G H with vertex set V (G) V (H). The vertices, (u, v ) and (u, v ) in V (G) V (H), are adjacent if and only if u = u and v and v are adjacent in H or v = v and u, u are adjacent in G. It is known that M(G H) = M(G)M(H), M (G) = V (G), and M (G) = E(G). But still M(G) remains a mystery. What does magnitude M(G) tell about the graph G? References. Willem Haemers, On some problems of Lovász concerning the Shannon capacity of a graph, IEEE Trans. Inform. Theory (979), no., 3 3. MR 37 (8g:944). Tom Leinster, The magnitude of metric spaces, Doc. Math. 8 (3), MR László Lovász, On the Shannon capacity of a graph, IEEE Trans. Inform. Theory (979), no., 7. MR 496 (8g:9) 4. Claude E. Shannon, The zero error capacity of a noisy channel, Institute of Radio Engineers, Transactions on Information Theory, IT- (96), no. September, 8 9. MR 893 (9,63b) Institut for Matematiske Fag, Universitetsparken, DK København address: moller@math.ku.dk URL: htpp://
1 The independent set problem
ORF 523 Lecture 11 Spring 2016, Princeton University Instructor: A.A. Ahmadi Scribe: G. Hall Tuesday, March 29, 2016 When in doubt on the accuracy of these notes, please cross chec with the instructor
More informationJOHN THICKSTUN. p x. n sup Ipp y n x np x nq. By the memoryless and stationary conditions respectively, this reduces to just 1 yi x i.
ESTIMATING THE SHANNON CAPACITY OF A GRAPH JOHN THICKSTUN. channels and graphs Consider a stationary, memoryless channel that maps elements of discrete alphabets X to Y according to a distribution p y
More informationChapter 3. Some Applications. 3.1 The Cone of Positive Semidefinite Matrices
Chapter 3 Some Applications Having developed the basic theory of cone programming, it is time to apply it to our actual subject, namely that of semidefinite programming. Indeed, any semidefinite program
More informationBounds on Shannon Capacity and Ramsey Numbers from Product of Graphs
Bounds on Shannon Capacity and Ramsey Numbers from Product of Graphs Xiaodong Xu Guangxi Academy of Sciences Nanning, Guangxi 530007, China xxdmaths@sina.com and Stanis law P. Radziszowski Department of
More informationThe Lovász ϑ-function in Quantum Mechanics
The Lovász ϑ-function in Quantum Mechanics Zero-error Quantum Information and Noncontextuality Simone Severini UCL Oxford Jan 2013 Simone Severini (UCL) Lovász ϑ-function in Quantum Mechanics Oxford Jan
More informationSome remarks on the Shannon capacity of odd cycles Bruno Codenotti Ivan Gerace y Giovanni Resta z Abstract We tackle the problem of estimating the Sha
Some remarks on the Shannon capacity of odd cycles Bruno Codenotti Ivan Gerace y Giovanni Resta z Abstract We tackle the problem of estimating the Shannon capacity of cycles of odd length. We present some
More informationFour new upper bounds for the stability number of a graph
Four new upper bounds for the stability number of a graph Miklós Ujvári Abstract. In 1979, L. Lovász defined the theta number, a spectral/semidefinite upper bound on the stability number of a graph, which
More informationThe maximum edge biclique problem is NP-complete
The maximum edge biclique problem is NP-complete René Peeters Department of Econometrics and Operations Research Tilburg University The Netherlands April 5, 005 File No. DA5734 Running head: Maximum edge
More informationGet acquainted with the computer program, The Quadratic Transformer. When you're satisfied that you understand how it works, try the tasks below.
Weaving a Parabola Web with the Quadratic Transformer In this activity, you explore how the graph of a quadratic function and its symbolic expression relate to each other. You start with a set of four
More informationIndex coding with side information
Index coding with side information Ehsan Ebrahimi Targhi University of Tartu Abstract. The Index Coding problem has attracted a considerable amount of attention in the recent years. The problem is motivated
More informationApplications of the Inverse Theta Number in Stable Set Problems
Acta Cybernetica 21 (2014) 481 494. Applications of the Inverse Theta Number in Stable Set Problems Miklós Ujvári Abstract In the paper we introduce a semidefinite upper bound on the square of the stability
More information1 Definition of the Riemann integral
MAT337H1, Introduction to Real Analysis: notes on Riemann integration 1 Definition of the Riemann integral Definition 1.1. Let [a, b] R be a closed interval. A partition P of [a, b] is a finite set of
More informationRigidity of Graphs and Frameworks
Rigidity of Graphs and Frameworks Rigid Frameworks The Rigidity Matrix and the Rigidity Matroid Infinitesimally Rigid Frameworks Rigid Graphs Rigidity in R d, d = 1,2 Global Rigidity in R d, d = 1,2 1
More informationMatrices: 2.1 Operations with Matrices
Goals In this chapter and section we study matrix operations: Define matrix addition Define multiplication of matrix by a scalar, to be called scalar multiplication. Define multiplication of two matrices,
More informationA taste of perfect graphs
A taste of perfect graphs Remark Determining the chromatic number of a graph is a hard problem, in general, and it is even hard to get good lower bounds on χ(g). An obvious lower bound we have seen before
More informationReducing graph coloring to stable set without symmetry
Reducing graph coloring to stable set without symmetry Denis Cornaz (with V. Jost, with P. Meurdesoif) LAMSADE, Paris-Dauphine SPOC 11 Cornaz (with Jost and Meurdesoif) Coloring without symmetry SPOC 11
More informationMath 4377/6308 Advanced Linear Algebra
1.4 Linear Combinations Math 4377/6308 Advanced Linear Algebra 1.4 Linear Combinations & Systems of Linear Equations Jiwen He Department of Mathematics, University of Houston jiwenhe@math.uh.edu math.uh.edu/
More informationNon-linear index coding outperforming the linear optimum
Non-linear index coding outperforming the linear optimum Eyal Lubetzky Uri Stav Abstract The following source coding problem was introduced by Birk and Kol: a sender holds a word x {0, 1} n, and wishes
More informationarxiv: v1 [cs.it] 7 Apr 2015
New Lower Bounds for the Shannon Capacity of Odd Cycles arxiv:1504.01472v1 [cs.it] 7 Apr 2015 K. Ashik Mathew and Patric R. J. Östergård April 8, 2015 Abstract The Shannon capacity of a graph G is defined
More informationSection 1.1: Patterns in Division
Section 1.1: Patterns in Division Dividing by 2 All even numbers are divisible by 2. E.g., all numbers ending in 0,2,4,6 or 8. Dividing by 4 1. Are the last two digits in your number divisible by 4? 2.
More informationSASD Curriculum Map Content Area: MATH Course: Math 7
The Number System September Apply and extend previous understandings of operations to add, subtract, multiply and divide rational numbers. Solve real world and mathematical problems involving the four
More informationPre-Calculus I. For example, the system. x y 2 z. may be represented by the augmented matrix
Pre-Calculus I 8.1 Matrix Solutions to Linear Systems A matrix is a rectangular array of elements. o An array is a systematic arrangement of numbers or symbols in rows and columns. Matrices (the plural
More informationAnd for polynomials with coefficients in F 2 = Z/2 Euclidean algorithm for gcd s Concept of equality mod M(x) Extended Euclid for inverses mod M(x)
Outline Recall: For integers Euclidean algorithm for finding gcd s Extended Euclid for finding multiplicative inverses Extended Euclid for computing Sun-Ze Test for primitive roots And for polynomials
More informationMath 1314 Week #14 Notes
Math 3 Week # Notes Section 5.: A system of equations consists of two or more equations. A solution to a system of equations is a point that satisfies all the equations in the system. In this chapter,
More informationProof: The coding of T (x) is the left shift of the coding of x. φ(t x) n = L if T n+1 (x) L
Lecture 24: Defn: Topological conjugacy: Given Z + d (resp, Zd ), actions T, S a topological conjugacy from T to S is a homeomorphism φ : M N s.t. φ T = S φ i.e., φ T n = S n φ for all n Z + d (resp, Zd
More informationCombinatorial optimization problems
Combinatorial optimization problems Heuristic Algorithms Giovanni Righini University of Milan Department of Computer Science (Crema) Optimization In general an optimization problem can be formulated as:
More informationThe Continuing Miracle of Information Storage Technology Paul H. Siegel Director, CMRR University of California, San Diego
The Continuing Miracle of Information Storage Technology Paul H. Siegel Director, CMRR University of California, San Diego 10/15/01 1 Outline The Shannon Statue A Miraculous Technology Information Theory
More informationGray Codes and Overlap Cycles for Restricted Weight Words
Gray Codes and Overlap Cycles for Restricted Weight Words Victoria Horan Air Force Research Laboratory Information Directorate Glenn Hurlbert School of Mathematical and Statistical Sciences Arizona State
More informationMath "Matrix Approach to Solving Systems" Bibiana Lopez. November Crafton Hills College. (CHC) 6.3 November / 25
Math 102 6.3 "Matrix Approach to Solving Systems" Bibiana Lopez Crafton Hills College November 2010 (CHC) 6.3 November 2010 1 / 25 Objectives: * Define a matrix and determine its order. * Write the augmented
More informationChapter 6 Orthogonal representations II: Minimal dimension
Chapter 6 Orthogonal representations II: Minimal dimension Nachdiplomvorlesung by László Lovász ETH Zürich, Spring 2014 1 Minimum dimension Perhaps the most natural way to be economic in constructing an
More informationMATH Examination for the Module MATH-3152 (May 2009) Coding Theory. Time allowed: 2 hours. S = q
MATH-315201 This question paper consists of 6 printed pages, each of which is identified by the reference MATH-3152 Only approved basic scientific calculators may be used. c UNIVERSITY OF LEEDS Examination
More information1. Which one of the following points is a singular point of. f(x) = (x 1) 2/3? f(x) = 3x 3 4x 2 5x + 6? (C)
Math 1120 Calculus Test 3 November 4, 1 Name In the first 10 problems, each part counts 5 points (total 50 points) and the final three problems count 20 points each Multiple choice section Circle the correct
More informationWeaknesses of Margulis and Ramanujan Margulis Low-Density Parity-Check Codes
Electronic Notes in Theoretical Computer Science 74 (2003) URL: http://www.elsevier.nl/locate/entcs/volume74.html 8 pages Weaknesses of Margulis and Ramanujan Margulis Low-Density Parity-Check Codes David
More informationMa/CS 6a Class 28: Latin Squares
Ma/CS 6a Class 28: Latin Squares By Adam Sheffer Latin Squares A Latin square is an n n array filled with n different symbols, each occurring exactly once in each row and exactly once in each column. 1
More informationACO Comprehensive Exam March 17 and 18, Computability, Complexity and Algorithms
1. Computability, Complexity and Algorithms (a) Let G(V, E) be an undirected unweighted graph. Let C V be a vertex cover of G. Argue that V \ C is an independent set of G. (b) Minimum cardinality vertex
More informationNonnegative Matrices I
Nonnegative Matrices I Daisuke Oyama Topics in Economic Theory September 26, 2017 References J. L. Stuart, Digraphs and Matrices, in Handbook of Linear Algebra, Chapter 29, 2006. R. A. Brualdi and H. J.
More informationStrongly Regular Graphs, part 1
Spectral Graph Theory Lecture 23 Strongly Regular Graphs, part 1 Daniel A. Spielman November 18, 2009 23.1 Introduction In this and the next lecture, I will discuss strongly regular graphs. Strongly regular
More informationThe Fractional Chromatic Number and the Hall Ratio. Johnathan B. Barnett
The Fractional Chromatic Number and the Hall Ratio by Johnathan B. Barnett A dissertation submitted to the Graduate Faculty of Auburn University in partial fulfillment of the requirements for the Degree
More informationThe Laplace Expansion Theorem: Computing the Determinants and Inverses of Matrices
The Laplace Expansion Theorem: Computing the Determinants and Inverses of Matrices David Eberly, Geometric Tools, Redmond WA 98052 https://www.geometrictools.com/ This work is licensed under the Creative
More informationFinite Math - J-term Section Systems of Linear Equations in Two Variables Example 1. Solve the system
Finite Math - J-term 07 Lecture Notes - //07 Homework Section 4. - 9, 0, 5, 6, 9, 0,, 4, 6, 0, 50, 5, 54, 55, 56, 6, 65 Section 4. - Systems of Linear Equations in Two Variables Example. Solve the system
More informationarxiv: v2 [math.co] 6 Oct 2016
ON THE CRITICAL GROUP OF THE MISSING MOORE GRAPH. arxiv:1509.00327v2 [math.co] 6 Oct 2016 JOSHUA E. DUCEY Abstract. We consider the critical group of a hypothetical Moore graph of diameter 2 and valency
More informationSpectral Graph Theory and You: Matrix Tree Theorem and Centrality Metrics
Spectral Graph Theory and You: and Centrality Metrics Jonathan Gootenberg March 11, 2013 1 / 19 Outline of Topics 1 Motivation Basics of Spectral Graph Theory Understanding the characteristic polynomial
More informationSection 0. Sets and Relations
0. Sets and Relations 1 Section 0. Sets and Relations NOTE. Mathematics is the study of ideas, not of numbers!!! The idea from modern algebra which is the focus of most of this class is that of a group
More informationPermutation decoding for the binary codes from triangular graphs
Permutation decoding for the binary codes from triangular graphs J. D. Key J. Moori B. G. Rodrigues August 6, 2003 Abstract By finding explicit PD-sets we show that permutation decoding can be used for
More informationA variant on the graph parameters of Colin de Verdière: Implications to the minimum rank of graphs
A variant on the graph parameters of Colin de Verdière: Implications to the minimum rank of graphs Leslie Hogben, Iowa State University, USA Francesco Barioli, University of Tennessee-Chattanooga, USA
More informationAlgebra & Trig. I. For example, the system. x y 2 z. may be represented by the augmented matrix
Algebra & Trig. I 8.1 Matrix Solutions to Linear Systems A matrix is a rectangular array of elements. o An array is a systematic arrangement of numbers or symbols in rows and columns. Matrices (the plural
More informationDelsarte s linear programming bound
15-859 Coding Theory, Fall 14 December 5, 2014 Introduction For all n, q, and d, Delsarte s linear program establishes a series of linear constraints that every code in F n q with distance d must satisfy.
More informationCodes and Xor graph products
Codes and Xor graph products Noga Alon Eyal Lubetzky November 0, 005 Abstract What is the maximum possible number, f 3 (n), of vectors of length n over {0, 1, } such that the Hamming distance between every
More informationMath Models of OR: Some Definitions
Math Models of OR: Some Definitions John E. Mitchell Department of Mathematical Sciences RPI, Troy, NY 12180 USA September 2018 Mitchell Some Definitions 1 / 20 Active constraints Outline 1 Active constraints
More informationStrongly regular graphs constructed from groups
Strongly regular graphs constructed from groups Dean Crnković Department of Mathematics University of Rijeka Croatia Symmetry vs Regularity Pilsen, Czech Republic, July 2018 This work has been fully supported
More informationBipartite graphs with at most six non-zero eigenvalues
Also available at http://amc-journal.eu ISSN 1855-3966 (printed edn.), ISSN 1855-3974 (electronic edn.) ARS MATHEMATICA CONTEMPORANEA 11 (016) 315 35 Bipartite graphs with at most six non-zero eigenvalues
More informationProduct distance matrix of a tree with matrix weights
Product distance matrix of a tree with matrix weights R B Bapat Stat-Math Unit Indian Statistical Institute, Delhi 7-SJSS Marg, New Delhi 110 016, India email: rbb@isidacin Sivaramakrishnan Sivasubramanian
More informationAn Introduction to Spectral Graph Theory
An Introduction to Spectral Graph Theory Mackenzie Wheeler Supervisor: Dr. Gary MacGillivray University of Victoria WheelerM@uvic.ca Outline Outline 1. How many walks are there from vertices v i to v j
More informationOptimization in Information Theory
Optimization in Information Theory Dawei Shen November 11, 2005 Abstract This tutorial introduces the application of optimization techniques in information theory. We revisit channel capacity problem from
More informationMustapha Ç. Pinar 1. Communicated by Jean Abadie
RAIRO Operations Research RAIRO Oper. Res. 37 (2003) 17-27 DOI: 10.1051/ro:2003012 A DERIVATION OF LOVÁSZ THETA VIA AUGMENTED LAGRANGE DUALITY Mustapha Ç. Pinar 1 Communicated by Jean Abadie Abstract.
More informationSpectral Generative Models for Graphs
Spectral Generative Models for Graphs David White and Richard C. Wilson Department of Computer Science University of York Heslington, York, UK wilson@cs.york.ac.uk Abstract Generative models are well known
More informationMath Studio College Algebra
Math 100 - Studio College Algebra Rekha Natarajan Kansas State University November 19, 2014 Systems of Equations Systems of Equations A system of equations consists of Systems of Equations A system of
More informationPreliminaries and Complexity Theory
Preliminaries and Complexity Theory Oleksandr Romanko CAS 746 - Advanced Topics in Combinatorial Optimization McMaster University, January 16, 2006 Introduction Book structure: 2 Part I Linear Algebra
More informationUsing Laplacian Eigenvalues and Eigenvectors in the Analysis of Frequency Assignment Problems
Using Laplacian Eigenvalues and Eigenvectors in the Analysis of Frequency Assignment Problems Jan van den Heuvel and Snežana Pejić Department of Mathematics London School of Economics Houghton Street,
More informationMath 9 Practice Final Exam #1
Class: Date: Math Practice Final Exam #1 Multiple Choice Identify the choice that best completes the statement or answers the question. 1. Determine the value of 0.64. a. 0.8 b. 0.08 0.4 d. 0.1 2. Which
More informationMATRIX DETERMINANTS. 1 Reminder Definition and components of a matrix
MATRIX DETERMINANTS Summary Uses... 1 1 Reminder Definition and components of a matrix... 1 2 The matrix determinant... 2 3 Calculation of the determinant for a matrix... 2 4 Exercise... 3 5 Definition
More informationLinear algebra and applications to graphs Part 1
Linear algebra and applications to graphs Part 1 Written up by Mikhail Belkin and Moon Duchin Instructor: Laszlo Babai June 17, 2001 1 Basic Linear Algebra Exercise 1.1 Let V and W be linear subspaces
More informationVECTORS [PARTS OF 1.3] 5-1
VECTORS [PARTS OF.3] 5- Vectors and the set R n A vector of dimension n is an ordered list of n numbers Example: v = [ ] 2 0 ; w = ; z = v is in R 3, w is in R 2 and z is in R? 0. 4 In R 3 the R stands
More informationIntroduction to algebraic codings Lecture Notes for MTH 416 Fall Ulrich Meierfrankenfeld
Introduction to algebraic codings Lecture Notes for MTH 416 Fall 2014 Ulrich Meierfrankenfeld December 9, 2014 2 Preface These are the Lecture Notes for the class MTH 416 in Fall 2014 at Michigan State
More informationRings, Paths, and Paley Graphs
Spectral Graph Theory Lecture 5 Rings, Paths, and Paley Graphs Daniel A. Spielman September 12, 2012 5.1 About these notes These notes are not necessarily an accurate representation of what happened in
More informationLexicographic products and the power of non-linear network coding
Lexicographic products and the power of non-linear network coding Anna Blasiak Robert Kleinberg Eyal Lubetzky Abstract We introduce a technique for establishing and amplifying gaps between parameters of
More informationMapping Class Groups MSRI, Fall 2007 Day 2, September 6
Mapping Class Groups MSRI, Fall 7 Day, September 6 Lectures by Lee Mosher Notes by Yael Algom Kfir December 4, 7 Last time: Theorem (Conjugacy classification in MCG(T. Each conjugacy class of elements
More information4-1 Matrices and Data
4-1 Matrices and Data Warm Up Lesson Presentation Lesson Quiz 2 The table shows the top scores for girls in barrel racing at the 2004 National High School Rodeo finals. The data can be presented in a table
More informationSemidefinite programs and combinatorial optimization
Semidefinite programs and combinatorial optimization Lecture notes by L. Lovász Microsoft Research Redmond, WA 98052 lovasz@microsoft.com http://www.research.microsoft.com/ lovasz Contents 1 Introduction
More informationConstructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach
Constructions of Nonbinary Quasi-Cyclic LDPC Codes: A Finite Field Approach Shu Lin, Shumei Song, Lan Lan, Lingqi Zeng and Ying Y Tai Department of Electrical & Computer Engineering University of California,
More informationDynamic Programming. Shuang Zhao. Microsoft Research Asia September 5, Dynamic Programming. Shuang Zhao. Outline. Introduction.
Microsoft Research Asia September 5, 2005 1 2 3 4 Section I What is? Definition is a technique for efficiently recurrence computing by storing partial results. In this slides, I will NOT use too many formal
More informationMATH 2210Q MIDTERM EXAM I PRACTICE PROBLEMS
MATH Q MIDTERM EXAM I PRACTICE PROBLEMS Date and place: Thursday, November, 8, in-class exam Section : : :5pm at MONT Section : 9: :5pm at MONT 5 Material: Sections,, 7 Lecture 9 8, Quiz, Worksheet 9 8,
More informationSimplification by Truth Table and without Truth Table
Engineering Mathematics 2013 SUBJECT NAME SUBJECT CODE MATERIAL NAME MATERIAL CODE REGULATION UPDATED ON : Discrete Mathematics : MA2265 : University Questions : SKMA1006 : R2008 : August 2013 Name of
More informationBOUNDS FOR LAPLACIAN SPECTRAL RADIUS OF THE COMPLETE BIPARTITE GRAPH
Volume 115 No. 9 017, 343-351 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu BOUNDS FOR LAPLACIAN SPECTRAL RADIUS OF THE COMPLETE BIPARTITE GRAPH
More informationFiedler s Theorems on Nodal Domains
Spectral Graph Theory Lecture 7 Fiedler s Theorems on Nodal Domains Daniel A Spielman September 9, 202 7 About these notes These notes are not necessarily an accurate representation of what happened in
More informationWords generated by cellular automata
Words generated by cellular automata Eric Rowland University of Waterloo (soon to be LaCIM) November 25, 2011 Eric Rowland (Waterloo) Words generated by cellular automata November 25, 2011 1 / 38 Outline
More informationSelected Topics in AGT Lecture 4 Introduction to Schur Rings
Selected Topics in AGT Lecture 4 Introduction to Schur Rings Mikhail Klin (BGU and UMB) September 14 18, 2015 M. Klin Selected topics in AGT September 2015 1 / 75 1 Schur rings as a particular case of
More informationConvexity/Concavity of Renyi Entropy and α-mutual Information
Convexity/Concavity of Renyi Entropy and -Mutual Information Siu-Wai Ho Institute for Telecommunications Research University of South Australia Adelaide, SA 5095, Australia Email: siuwai.ho@unisa.edu.au
More informationHomework for MATH 4603 (Advanced Calculus I) Fall Homework 13: Due on Tuesday 15 December. Homework 12: Due on Tuesday 8 December
Homework for MATH 4603 (Advanced Calculus I) Fall 2015 Homework 13: Due on Tuesday 15 December 49. Let D R, f : D R and S D. Let a S (acc S). Assume that f is differentiable at a. Let g := f S. Show that
More informationA tool oriented approach to network capacity. Ralf Koetter Michelle Effros Muriel Medard
A tool oriented approach to network capacity Ralf Koetter Michelle Effros Muriel Medard ralf.koetter@tum.de effros@caltech.edu medard@mit.edu The main theorem of NC [Ahlswede, Cai, Li Young, 2001] Links
More informationImproved bounds on book crossing numbers of complete bipartite graphs via semidefinite programming
Improved bounds on book crossing numbers of complete bipartite graphs via semidefinite programming Etienne de Klerk, Dima Pasechnik, and Gelasio Salazar NTU, Singapore, and Tilburg University, The Netherlands
More informationHypergraph Capacity with Applications to Matrix Multiplication
Claremont Colleges Scholarship @ Claremont HMC Senior Theses HMC Student Scholarship 2013 Hypergraph Capacity with Applications to Matrix Multiplication John Lee Thompson Peebles Jr. Harvey Mudd College
More informationDominating Configurations of Kings
Dominating Configurations of Kings Jolie Baumann July 11, 2006 Abstract In this paper, we are counting natural subsets of graphs subject to local restrictions, such as counting independent sets of vertices,
More informationMa/CS 6a Class 28: Latin Squares
Ma/CS 6a Class 28: Latin Squares By Adam Sheffer Latin Squares A Latin square is an n n array filled with n different symbols, each occurring exactly once in each row and exactly once in each column. 1
More informationUNIQUENESS OF HIGHLY REPRESENTATIVE SURFACE EMBEDDINGS
UNIQUENESS OF HIGHLY REPRESENTATIVE SURFACE EMBEDDINGS P. D. Seymour Bellcore 445 South St. Morristown, New Jersey 07960, USA and Robin Thomas 1 School of Mathematics Georgia Institute of Technology Atlanta,
More informationLectures 2 3 : Wigner s semicircle law
Fall 009 MATH 833 Random Matrices B. Való Lectures 3 : Wigner s semicircle law Notes prepared by: M. Koyama As we set up last wee, let M n = [X ij ] n i,j= be a symmetric n n matrix with Random entries
More informationZero-sum square matrices
Zero-sum square matrices Paul Balister Yair Caro Cecil Rousseau Raphael Yuster Abstract Let A be a matrix over the integers, and let p be a positive integer. A submatrix B of A is zero-sum mod p if the
More information6.2 Deeper Properties of Continuous Functions
6.2. DEEPER PROPERTIES OF CONTINUOUS FUNCTIONS 69 6.2 Deeper Properties of Continuous Functions 6.2. Intermediate Value Theorem and Consequences When one studies a function, one is usually interested in
More informationOn the inverse matrix of the Laplacian and all ones matrix
On the inverse matrix of the Laplacian and all ones matrix Sho Suda (Joint work with Michio Seto and Tetsuji Taniguchi) International Christian University JSPS Research Fellow PD November 21, 2012 Sho
More informationDiscrete Memoryless Channels with Memoryless Output Sequences
Discrete Memoryless Channels with Memoryless utput Sequences Marcelo S Pinho Department of Electronic Engineering Instituto Tecnologico de Aeronautica Sao Jose dos Campos, SP 12228-900, Brazil Email: mpinho@ieeeorg
More informationGraph coloring, perfect graphs
Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive
More informationStatistical Inference on Large Contingency Tables: Convergence, Testability, Stability. COMPSTAT 2010 Paris, August 23, 2010
Statistical Inference on Large Contingency Tables: Convergence, Testability, Stability Marianna Bolla Institute of Mathematics Budapest University of Technology and Economics marib@math.bme.hu COMPSTAT
More informationThe Channel Capacity of Constrained Codes: Theory and Applications
The Channel Capacity of Constrained Codes: Theory and Applications Xuerong Yong 1 The Problem and Motivation The primary purpose of coding theory channel capacity; Shannon capacity. Only when we transmit
More information(each row defines a probability distribution). Given n-strings x X n, y Y n we can use the absence of memory in the channel to compute
ENEE 739C: Advanced Topics in Signal Processing: Coding Theory Instructor: Alexander Barg Lecture 6 (draft; 9/6/03. Error exponents for Discrete Memoryless Channels http://www.enee.umd.edu/ abarg/enee739c/course.html
More informationLecture 16 Symbolic dynamics.
Lecture 16 Symbolic dynamics. 1 Symbolic dynamics. The full shift on two letters and the Baker s transformation. 2 Shifts of finite type. 3 Directed multigraphs. 4 The zeta function. 5 Topological entropy.
More informationGraph powers, Delsarte, Hoffman, Ramsey and Shannon
Graph powers, Delsarte, Hoffman, Ramsey and Shannon Noga Alon Eyal Lubetzy May 14, 2006 Abstract The -th p-power of a graph G is the graph on the vertex set V (G), where two -tuples are adjacent iff the
More informationOn the Construction and Decoding of Cyclic LDPC Codes
On the Construction and Decoding of Cyclic LDPC Codes Chao Chen Joint work with Prof. Baoming Bai from Xidian University April 30, 2014 Outline 1. Introduction 2. Construction based on Idempotents and
More informationIntroduction to Graph Theory
Introduction to Graph Theory George Voutsadakis 1 1 Mathematics and Computer Science Lake Superior State University LSSU Math 351 George Voutsadakis (LSSU) Introduction to Graph Theory August 2018 1 /
More informationLecture 4 Channel Coding
Capacity and the Weak Converse Lecture 4 Coding I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw October 15, 2014 1 / 16 I-Hsiang Wang NIT Lecture 4 Capacity
More informationChapter 4 Differentiation
Chapter 4 Differentiation 08 Section 4. The derivative of a function Practice Problems (a) (b) (c) 3 8 3 ( ) 4 3 5 4 ( ) 5 3 3 0 0 49 ( ) 50 Using a calculator, the values of the cube function, correct
More information