The Capacity of a Network
|
|
- Angel Tyler
- 5 years ago
- Views:
Transcription
1 The Capacity of a Network April Rasala Lehman MIT Collaborators: Nick Harvey and Robert Kleinberg MIT
2 What is the Capacity of a Network? Source a Source b c d e Sink f Sink
3 What is the Capacity of a Network? Source Source a 1/2 c 1/2 b 1/2 1/2 e 1/2 d 1/2 f Sink Sink
4 What is the Capacity of a Network? Source bit x Source bit y a x x c y x y b y e Sink wants y d f Sink wants x
5 Information Fluid We understand fluid flows fairly well, but... Information can be copied and encoded. There is as yet no unified theory of network information flow. But there can be no doubt that a complete theory of communication networks would have wide implications for the theory of communication and computation. - Cover & Thomas, Elements of Information Theory. Little known about the capacity of information networks!
6 Theme: Blend Information Theory and Combinatorics Information theory: deep understanding of complex communication problems over structurally simple networks. Little understanding of arbitrary network structures Combinatorial techniques: deep understanding of simple (fluid) flows through structurally complex networks. But information can flow in different ways. Use ideas from both fields to understand capacity of information networks.
7 Combinatorial Background Ford-Fulkerson 62: Max-flow min-cut theorem. Hu 63: Two-commodity max-flow min-cut theorem. Okamura-Seymour 81: Gap between min-cut and max multicommodity flow. Leighton-Rao 99: Approximate max-flow min-cut theorem. Gap between sparsest cut and max-flow is O(log n). Expander example in which this gap is achieved.
8 Information Theory Background Shannon 48, Fujishige 78: Entropy is submodular, nonnonnegative, non-decreasing set function. Ahlswede et al Multicast capacity depends on a mincut condition. Jaggi et al Algorithm achieving capacity for multicast. Song, Yeung and Cai 03 - Outer (upper) bound on capacity for DAGS. Li and Li 04 - Conjecture: in undirected networks, max information flow = max multicommodity flow. Jain et al. graphs Verified conjecture for interesting class of
9 This Talk: Outer Bounds on Capacity Model for information flow in general graphs. Consider natural cut-based outer bound on capacity. Show bound is not tight. Develop useful information theoretic techniques. Improve bound using information theoretic techniques. Derive information inequalities from graph structure. Combine these using facts about entropy. Yields best known outer bound for general graphs. Special Case: use outer bound to verify Li and Li conjecture on same class of graphs as Jain et al. 05.
10 The Network Coding Problem S b T r S r T b Given: Graph G. c(u, v) for each edge (u, v). k-commodities: Set of sources. Set of sinks. Demand d i.
11 The Network Coding Problem S b T r S r T b Given: Graph G. c(u, v) = 1. k-commodities: Single source. Single sink. d i = 1.
12 Network Coding Solution A solution is a sequence of rules: S b M b M b M r M r S r Each rule specifies information transmitted on some edge. T r M b M r M b M r M r M b T b Source edge S i transmits M i. A non-source edge (u, v) transmits a function of information previously sent to u. Sink edge T i transmits M i. Allow multiple transmissions across each internal edge.
13 Rate of a Solution Messages, M i s, selected independently at random. Sequence of symbols transmitted on each edge is a R.V. Rate r solution, H(S i ) r for all commodities and Edges don t exceed capacity. - Directed graph: H(e) c(e). - Undirected graph: H( e ) + H( e ) c(e).
14 This Talk: Outer Bounds on Capacity Model for information flow in general graphs. Consider natural cut-based outer bound on capacity. Show bound is not tight. Develop useful information theoretic techniques. Improve bound using information theoretic techniques. Derive information inequalities from graph structure. Combine these using facts about entropy. Yields best known outer bound for general graphs. Special Case: use outer bound to verify Li and Li conjecture on same class of graphs as Jain et al. 05.
15 Sparsity Sparsity of a cut is: capacity of edges in cut # commodities with no remaining source-sink path Sparsity of a graph is minimum sparsity over all cuts. There exist directed graphs in which the maximum rate > sparsity. Sparsity = 1/2 Rate = 1
16 Meagerness A set of commodities P is separated by a cut if there is no remaining path from a source of any commodity in P to a sink of any commodity in P. The meagerness of a graph is the minimum over all sets of commodities P and cuts that separate P of capacity of edges in cut The maximum rate meagerness in directed graphs. P Meagerness = 1 Rate = 1
17 Sometimes Max Rate < Meagerness The meagerness is 1. This flow solution has rate 2/3. Best possible?
18 Sometimes Max Rate < Meagerness The meagerness is 1. This flow solution has rate 2/3. Best possible?
19 Sometimes Max Rate < Meagerness The meagerness is 1. This flow solution has rate 2/3. Best possible?
20 Better Bounds Through Entropy Show max rate 2/3 for previous example. Obtain strictly better bounds on rate through entropy arguments. Implies meagerness is a loose upper bound on rate. Motivates stronger outer bound based on structural conditions and characteristics of information.
21 Sg Informational Dominance Sb Sr V informationally dominates U if the information transmitted on edges in V is sufficient to determine the information transmitted on edges in U. F G If V informationally dominates U, H(V ) = H(U, V ). Tr Tb Tg Ex: {S g, F } informationally dominates T r. H(S g, F ) = H(S g, T r, F ). Ex: {S r, G} informationally dominates T g. H(S r, G) = H(S r, T g, G).
22 Sg Informational Dominance Sb Sr V informationally dominates U if the information transmitted on edges in V is sufficient to determine the information transmitted on edges in U. F G If V informationally dominates U, H(V ) = H(U, V ). Tr Tb Tg Ex: {S g, F } informationally dominates T r. H(S g, F ) = H(S g, T r, F ). Ex: {S r, G} informationally dominates T g. H(S r, G) = H(S r, T g, G).
23 Proof: Max Rate = 2/3
24 H(S g, F) = H(S g, T r, F) =
25 + = + H(S g, F) + H(S r, G) = H(S g, T r, F) + H(T g, S r, G)
26 + = +
27 + = + sources = sinks
28 + = + > + submodularity: H(A) + H(B) H(A B) + H(A B)
29 + = + > + informational dominance
30 + = + > + sources = sinks
31 + = + > + = 2(H(S g ) + H(S r )) + H(S b )
32 Max Rate = 2/3 + 2(H(S g ) + H(S r )) + H(S b )
33 Max Rate = 2/ (H(S g ) + H(S r )) + H(S b )
34 Max Rate = 2/ (H(S g ) + H(S r )) + H(S b )
35 Max Rate = 2/ (H(S g ) + H(S r )) + H(S b ) H(S g ) H(S r )
36 Max Rate = 2/3 + H(S g ) + H(S r ) + H(S b )
37 Max Rate = 2/3 2 + H(S g ) + H(S r ) + H(S b )
38 Max Rate = 2/ r
39 Generalize Proof Ideas Combine facts about entropy (e.g. submodularity) with constraints based on the structure of the graph. Generalize these ideas get a set of linear constraints on a network coding solution. Results in a large linear program whose optimal value is best known upper bound on capacity.
40 Constraints on Network Coding Solution Information Theoretic: Entropy is a submodular, nonnegative and nondecreasing set function. Independence of sources: H(S A, S B ) = H(S A ) + H(S B ). Rate of sources: H(S A ) r. sources = sinks: H(S A, U) = H(T A, U) for all U. Structural: Edge capacity: H(e) c(e). Informational dominance: Information transmitted on edges in A sufficient to compute information transmitted on edges in B: H(A) = H(A B) c(a) H(A B).
41 Constraints on Network Coding Solution Information Theoretic: Entropy is a submodular, nonnegative and nondecreasing set function. Independence of sources: H(S A, S B ) = H(S A ) + H(S B ). Rate of sources: H(S A ) r. sources = sinks: H(S A, U) = H(T A, U) for all U. Structural: Edge capacity: H(e) c(e). Informational dominance: Information transmitted on edges in A sufficient to compute information transmitted on edges in B: H(A) = H(A B) c(a) H(A B).
42 Informational Dominance Is A dominates B? decidable? Yes. We give a polynomial-time algorithm. Based on structural characterization of informational dominance. Examples of structural conditions implying informational dominance. In-edges to a set of nodes V informationally dominates all edges adjacent to V. A set of edges A informationally dominates S(i) and T (i) if S(i) and T (i) are in different weakly connected components of G \ A. These rules sufficient to prove interesting theorems.
43 This Talk: Outer Bounds on Capacity Model for information flow in general graphs. Consider natural cut-based outer bound on capacity. Show bound is not tight. Develop useful information theoretic techniques. Improve bound using information theoretic techniques. Derive information inequalities from graph structure. Combine these using facts about entropy. Yields best known outer bound for general graphs. Special Case: use outer bound to verify Li and Li conjecture on same class of graphs as Jain et al. 05.
44 Li and Li Conjecture Conjecture 1 In an undirected graphs: max network coding rate = max multicommodity flow rate Interesting cases when max flow < sparsity. Sparsity is an upper bound on rate for undirected graphs. Conjecture trivially true if multicommodity flow = sparsity. Use capacity constraints to verify for an infinite class of interesting graphs. Demonstrate proof for a small example.
45 Okamura-Seymour Example Undirected graph. 4-commodities. Demand 1 for all commodities. Capacity 1 for all edges. Sparsity 1. Max multicommodity flow = 3/4. Prove max network coding rate = 3/4.
46 = informational dominance
47 + = + informational dominance
48 + + = + + informational dominance
49 + + = + + sources = sinks
50 + + = submodularity
51 + + = submodularity
52 + + = informational dominance
53 + + = informational dominance
54 + + = H(S) + 2(H(S) + H(S) + H(S)) independence of sources
55 + + H(S) + 2(H(S) + H(S) + H(S))
56 + + + H(S) + 2(H(S) + H(S) + H(S)) Submodularity
57 H(S) + 2(H(S) + H(S) + H(S)) Submodularity
58 H(S) + 2(H(S) + H(S) + H(S)) Submodularity
59 H(S) H(S) + 2(H(S) + H(S) + H(S))
60 H(S) + + H(S) H(S) + 2(H(S) + H(S) + H(S))
61 H(S) + + H(S) + + H(S) + H(S) + 2(H(S) + H(S) + H(S))
62 + + H(S) + H(S) + H(S) + H(S)
63 + + H(S) + H(S) + H(S) + H(S) + H(S) + H(S) + H(S) + H(S)
64 + + H(S) + H(S) + H(S) + H(S) + + H(S) + H(S) + H(S) + H(S) 6 c(e) 2( H(S) + H(S) + H(S) + H(S) )
65 + + H(S) + H(S) + H(S) + H(S) + + H(S) + H(S) + H(S) + H(S) 6 8 r
66 General Theorem Theorem 2 Maximum network coding rate equals maximum multicommodity flow rate for graph which: are undirected and bipartite, have capacity 1 for all edges, have demand 1 for all commodities, and distance 2 between source and sink for all commodities. Corollary 3 First gap between sparsity and capacity of an information network.
67 Summary First outer bound on capacity for general graphs. Combined constraints based on graph structure with characteristics of entropy. Identified importance of informational dominance. Polynomial-time algorithm for informational dominance. Verified Li and Li conjecture for an infinite class of graphs. Demonstrated a gap between sparsity and capacity of information networks.
68 Open Questions Do we need non-shannon type information inequalities to get a tight upper bound on capacity? Is the Li and Li conjecture true for all undirected graphs? Is there a Ω(log n) between sparsity and capacity for 3- regular expanders? How do we use the full capacity of a network?
Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions
Beyond the Butterfly A Graph-Theoretic Characterization of the Feasibility of Network Coding with Two Simple Unicast Sessions Chih-Chun Wang Center for Wireless Systems and Applications (CWSA) School of
More informationNew algorithms for Disjoint Paths and Routing Problems
New algorithms for Disjoint Paths and Routing Problems Chandra Chekuri Dept. of Computer Science Univ. of Illinois (UIUC) Menger s Theorem Theorem: The maximum number of s-t edgedisjoint paths in a graph
More informationA tool oriented approach to network capacity. Ralf Koetter Michelle Effros Muriel Medard
A tool oriented approach to network capacity Ralf Koetter Michelle Effros Muriel Medard ralf.koetter@tum.de effros@caltech.edu medard@mit.edu The main theorem of NC [Ahlswede, Cai, Li Young, 2001] Links
More informationTopic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007
CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Balanced Cut, Sparsest Cut, and Metric Embeddings Date: 3/21/2007 In the last lecture, we described an O(log k log D)-approximation
More informationCode Construction for Two-Source Interference Networks
Code Construction for Two-Source Interference Networks Elona Erez and Meir Feder Dept. of Electrical Engineering-Systems, Tel Aviv University, Tel Aviv, 69978, Israel, E-mail:{elona, meir}@eng.tau.ac.il
More informationTheory of Network Communication
Theory of Network Communication Dr. Christian Scheideler Johns Hopkins Uniersity, Sept. 9 2002 Introduction The goal of this lecture is to gie an introduction to the state of the art in the theory of network
More informationAlphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach
ALPHABET SIZE REDUCTION FOR SECURE NETWORK CODING: A GRAPH THEORETIC APPROACH 1 Alphabet Size Reduction for Secure Network Coding: A Graph Theoretic Approach Xuan Guang, Member, IEEE, and Raymond W. Yeung,
More informationconp = { L L NP } (1) This problem is essentially the same as SAT because a formula is not satisfiable if and only if its negation is a tautology.
1 conp and good characterizations In these lecture notes we discuss a complexity class called conp and its relationship to P and NP. This discussion will lead to an interesting notion of good characterizations
More informationThe Capacity Region for Multi-source Multi-sink Network Coding
The Capacity Region for Multi-source Multi-sink Network Coding Xijin Yan Dept. of Electrical Eng. - Systems University of Southern California Los Angeles, CA, U.S.A. xyan@usc.edu Raymond W. Yeung Dept.
More informationAlgorithms and Theory of Computation. Lecture 11: Network Flow
Algorithms and Theory of Computation Lecture 11: Network Flow Xiaohui Bei MAS 714 September 18, 2018 Nanyang Technological University MAS 714 September 18, 2018 1 / 26 Flow Network A flow network is a
More information- Well-characterized problems, min-max relations, approximate certificates. - LP problems in the standard form, primal and dual linear programs
LP-Duality ( Approximation Algorithms by V. Vazirani, Chapter 12) - Well-characterized problems, min-max relations, approximate certificates - LP problems in the standard form, primal and dual linear programs
More information2014 IEEE International Symposium on Information Theory. Two-unicast is hard. David N.C. Tse
Two-unicast is hard Sudeep Kamath ECE Department, University of California, San Diego, CA, USA sukamath@ucsd.edu David N.C. Tse EECS Department, University of California, Berkeley, CA, USA dtse@eecs.berkeley.edu
More informationGeneralized Network Sharing Outer Bound and the Two-Unicast Problem
Generalized Network Sharing Outer Bound and the Two-Unicast Problem Sudeep U. Kamath, David N. C. Tse and Venkat Anantharam Wireless Foundations, Dept of EECS, University of California at Berkeley, Berkeley,
More informationDeterministic Network Coding by Matrix Completion. Nicholas James Alexander Harvey Bachelor of Mathematics, University of Waterloo, 2000
Deterministic Network Coding by Matrix Completion by Nicholas James Alexander Harvey Bachelor of Mathematics, University of Waterloo, 2000 Submitted to the Department of Electrical Engineering and Computer
More informationAnalyzing Large Communication Networks
Analyzing Large Communication Networks Shirin Jalali joint work with Michelle Effros and Tracey Ho Dec. 2015 1 The gap Fundamental questions: i. What is the best achievable performance? ii. How to communicate
More informationFlow-Cut Gaps for Integer and Fractional Multiflows
Flow-Cut Gaps for Integer and Fractional Multiflows Chandra Chekuri F. Bruce Shepherd Christophe Weibel September 6, 2012 Abstract Consider a routing problem instance consisting of a demand graph H = (V,
More informationLecturer: Shuchi Chawla Topic: Inapproximability Date: 4/27/2007
CS880: Approximations Algorithms Scribe: Tom Watson Lecturer: Shuchi Chawla Topic: Inapproximability Date: 4/27/2007 So far in this course, we have been proving upper bounds on the approximation factors
More informationIndex Coding Algorithms for Constructing Network Codes. Salim El Rouayheb. Illinois Institute of Technology, Chicago
Index Coding Algorithms for Constructing Network Codes Salim El Rouayheb Illinois Institute of Technology, Chicago Matlab Code with GUI for Constructing Linear Network Codes Matlab outputs network code
More informationEntropy Vectors and Network Information Theory
Entropy Vectors and Network Information Theory Sormeh Shadbakht and Babak Hassibi Department of Electrical Engineering Caltech Lee Center Workshop May 25, 2007 1 Sormeh Shadbakht and Babak Hassibi Entropy
More informationLecture: Flow-based Methods for Partitioning Graphs (1 of 2)
Stat260/CS294: Spectral Graph Methods Lecture 10-02/24/2015 Lecture: Flow-based Methods for Partitioning Graphs (1 of 2) Lecturer: Michael Mahoney Scribe: Michael Mahoney Warning: these notes are still
More informationDesign of linear Boolean network codes for combination networks
Louisiana State University LSU Digital Commons LSU Master's Theses Graduate School 2006 Design of linear Boolean network codes for combination networks Shoupei Li Louisiana State University and Agricultural
More informationQuasi-linear Network Coding
Quasi-linear Network Coding Moshe Schwartz Electrical and Computer Engineering Ben-Gurion University of the Negev Beer Sheva 8410501, Israel schwartz@ee.bgu.ac.il Abstract We present a heuristic for designing
More informationApproximation Algorithms and Hardness of Integral Concurrent Flow
Approximation Algorithms and Hardness of Integral Concurrent Flow Parinya Chalermsook Julia Chuzhoy Alina Ene Shi Li May 16, 2012 Abstract We study an integral counterpart of the classical Maximum Concurrent
More informationCS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs. Instructor: Shaddin Dughmi
CS675: Convex and Combinatorial Optimization Fall 2014 Combinatorial Problems as Linear Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source Shortest
More informationRealization of set functions as cut functions of graphs and hypergraphs
Discrete Mathematics 226 (2001) 199 210 www.elsevier.com/locate/disc Realization of set functions as cut functions of graphs and hypergraphs Satoru Fujishige a;, Sachin B. Patkar b a Division of Systems
More informationOn Secret Sharing Schemes, Matroids and Polymatroids
On Secret Sharing Schemes, Matroids and Polymatroids Jaume Martí-Farré, Carles Padró Dep. de Matemàtica Aplicada 4, Universitat Politècnica de Catalunya, Barcelona, Spain {jaumem,cpadro}@ma4.upc.edu June
More information. CS711008Z Algorithm Design and Analysis. Lecture 10. Algorithm design technique: Network flow and its applications 1. Dongbo Bu
CS711008Z Algorithm Design and Analysis Lecture 10 Algorithm design technique: Network flow and its applications 1 Dongbo Bu Institute of Computing Technology Chinese Academy of Sciences, Beijing, China
More informationNetwork Coding for Computing
Networ Coding for Computing Rathinaumar Appuswamy, Massimo Franceschetti, Nihil Karamchandani, and Kenneth Zeger Abstract The following networ computation problem is considered A set of source nodes in
More informationAn introduction to basic information theory. Hampus Wessman
An introduction to basic information theory Hampus Wessman Abstract We give a short and simple introduction to basic information theory, by stripping away all the non-essentials. Theoretical bounds on
More informationCharacterising Probability Distributions via Entropies
1 Characterising Probability Distributions via Entropies Satyajit Thakor, Terence Chan and Alex Grant Indian Institute of Technology Mandi University of South Australia Myriota Pty Ltd arxiv:1602.03618v2
More informationDeterministic Network Coding by Matrix Completion
Deterministic Network Coding by Matrix Completion Nicholas J. A. Harvey David R. Karger Kazuo Murota Abstract We present a new deterministic algorithm to construct network codes for multicast problems,
More informationCS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III. Instructor: Shaddin Dughmi
CS599: Convex and Combinatorial Optimization Fall 2013 Lecture 17: Combinatorial Problems as Linear Programs III Instructor: Shaddin Dughmi Announcements Today: Spanning Trees and Flows Flexibility awarded
More informationarxiv:quant-ph/ v1 3 Nov 2006
Quantum Network Coding for General Graphs arxiv:quant-ph/06039v 3 Nov 006 Kazuo Iwama Harumichi Nishimura Rudy Raymond 3 Shigeru Yamashita 4 School of Informatics, Kyoto University iwama@kuis.kyoto-u.ac.jp
More informationCSCI 2570 Introduction to Nanocomputing
CSCI 2570 Introduction to Nanocomputing Information Theory John E Savage What is Information Theory Introduced by Claude Shannon. See Wikipedia Two foci: a) data compression and b) reliable communication
More informationA GRAPH-THEORETIC APPROACH TO NETWORK CODING
A GRAPH-THEORETIC APPROACH TO NETWORK CODING A Dissertation Presented to the Faculty of the Graduate School of Cornell University in Partial Fulfillment of the Requirements for the Degree of Doctor of
More informationGRAPH PARTITIONING USING SINGLE COMMODITY FLOWS [KRV 06] 1. Preliminaries
GRAPH PARTITIONING USING SINGLE COMMODITY FLOWS [KRV 06] notes by Petar MAYMOUNKOV Theme The algorithmic problem of finding a sparsest cut is related to the combinatorial problem of building expander graphs
More informationNetwork Flows. CTU FEE Department of control engineering. March 28, 2017
Network Flows Zdeněk Hanzálek, Přemysl Šůcha hanzalek@fel.cvut.cz CTU FEE Department of control engineering March 28, 2017 Z. Hanzálek (CTU FEE) Network Flows March 28, 2017 1 / 44 Table of contents 1
More informationOn Network Coding Capacity - Matroidal Networks and Network Capacity Regions. Anthony Eli Kim
On Network Coding Capacity - Matroidal Networks and Network Capacity Regions by Anthony Eli Kim S.B., Electrical Engineering and Computer Science (2009), and S.B., Mathematics (2009) Massachusetts Institute
More informationNetwork Coding on Directed Acyclic Graphs
Network Coding on Directed Acyclic Graphs John MacLaren Walsh, Ph.D. Multiterminal Information Theory, Spring Quarter, 0 Reference These notes are directly derived from Chapter of R. W. Yeung s Information
More informationMA015: Graph Algorithms
MA015 3. Minimum cuts 1 MA015: Graph Algorithms 3. Minimum cuts (in undirected graphs) Jan Obdržálek obdrzalek@fi.muni.cz Faculty of Informatics, Masaryk University, Brno All pairs flows/cuts MA015 3.
More informationCutting Plane Methods II
6.859/5.083 Integer Programming and Combinatorial Optimization Fall 2009 Cutting Plane Methods II Gomory-Chvátal cuts Reminder P = {x R n : Ax b} with A Z m n, b Z m. For λ [0, ) m such that λ A Z n, (λ
More informationNode-capacitated ring routing
Egerváry Research Group on Combinatorial Optimization Technical reports TR-2001-09. Published by the Egrerváry Research Group, Pázmány P. sétány 1/C, H 1117, Budapest, Hungary. Web site: www.cs.elte.hu/egres.
More information6.046 Recitation 11 Handout
6.046 Recitation 11 Handout May 2, 2008 1 Max Flow as a Linear Program As a reminder, a linear program is a problem that can be written as that of fulfilling an objective function and a set of constraints
More informationECE Information theory Final (Fall 2008)
ECE 776 - Information theory Final (Fall 2008) Q.1. (1 point) Consider the following bursty transmission scheme for a Gaussian channel with noise power N and average power constraint P (i.e., 1/n X n i=1
More informationarxiv:quant-ph/ v5 3 Dec 2009
Quantum network communication the butterfly and beyond Debbie Leung (1), Jonathan Oppenheim (2) and Andreas Winter (3) (1) Institute for Quantum Computing, University of Waterloo, Waterloo, Canada (2)
More informationUNIVERSITY OF CALIFORNIA, SAN DIEGO. Network coding for function computation
UNIVERSITY OF CALIFORNIA, SAN DIEGO Network coding for function computation A dissertation submitted in partial satisfaction of the requirements for the degree Doctor of Philosophy in Electrical Engineering
More informationLower Bounds on the Graphical Complexity of Finite-Length LDPC Codes
Lower Bounds on the Graphical Complexity of Finite-Length LDPC Codes Igal Sason Department of Electrical Engineering Technion - Israel Institute of Technology Haifa 32000, Israel 2009 IEEE International
More informationMulticommodity flows over time: Efficient algorithms and complexity
Theoretical Computer Science 379 (27) 387 44 www.elsevier.com/locate/tcs Multicommodity flows over time: Efficient algorithms and complexity Alex Hall a, Steffen Hippler b, Martin Skutella c, a Institut
More informationLecture 21 November 11, 2014
CS 224: Advanced Algorithms Fall 2-14 Prof. Jelani Nelson Lecture 21 November 11, 2014 Scribe: Nithin Tumma 1 Overview In the previous lecture we finished covering the multiplicative weights method and
More informationdirected weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time
Network Flow 1 The Maximum-Flow Problem directed weighted graphs as flow networks the Ford-Fulkerson algorithm termination and running time 2 Maximum Flows and Minimum Cuts flows and cuts max flow equals
More informationInformation-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation
Information-Theoretic Lower Bounds on the Storage Cost of Shared Memory Emulation Viveck R. Cadambe EE Department, Pennsylvania State University, University Park, PA, USA viveck@engr.psu.edu Nancy Lynch
More informationLower Bounds for External Memory Integer Sorting via Network Coding
Lower Bounds for External Memory Integer Sorting via Network Coding Alireza Farhadi University of Maryland College Park, MD MohammadTaghi Hajiaghayi University of Maryland College Park, MD Elaine Shi Cornell
More informationEE229B - Final Project. Capacity-Approaching Low-Density Parity-Check Codes
EE229B - Final Project Capacity-Approaching Low-Density Parity-Check Codes Pierre Garrigues EECS department, UC Berkeley garrigue@eecs.berkeley.edu May 13, 2005 Abstract The class of low-density parity-check
More informationCMSC 451: Max-Flow Extensions
CMSC 51: Max-Flow Extensions Slides By: Carl Kingsford Department of Computer Science University of Maryland, College Park Based on Section 7.7 of Algorithm Design by Kleinberg & Tardos. Circulations with
More informationFRACTIONAL PACKING OF T-JOINS. 1. Introduction
FRACTIONAL PACKING OF T-JOINS FRANCISCO BARAHONA Abstract Given a graph with nonnegative capacities on its edges, it is well known that the capacity of a minimum T -cut is equal to the value of a maximum
More informationOn a Cut-Matching Game for the Sparsest Cut Problem
On a Cut-Matching Game for the Sparsest Cut Problem Rohit Khandekar Subhash A. Khot Lorenzo Orecchia Nisheeth K. Vishnoi Electrical Engineering and Computer Sciences University of California at Berkeley
More informationMaximum Flow. Jie Wang. University of Massachusetts Lowell Department of Computer Science. J. Wang (UMass Lowell) Maximum Flow 1 / 27
Maximum Flow Jie Wang University of Massachusetts Lowell Department of Computer Science J. Wang (UMass Lowell) Maximum Flow 1 / 27 Flow Networks A flow network is a weighted digraph G = (V, E), where the
More informationHardness of Embedding Metric Spaces of Equal Size
Hardness of Embedding Metric Spaces of Equal Size Subhash Khot and Rishi Saket Georgia Institute of Technology {khot,saket}@cc.gatech.edu Abstract. We study the problem embedding an n-point metric space
More informationLinear Codes, Target Function Classes, and Network Computing Capacity
Linear Codes, Target Function Classes, and Network Computing Capacity Rathinakumar Appuswamy, Massimo Franceschetti, Nikhil Karamchandani, and Kenneth Zeger IEEE Transactions on Information Theory Submitted:
More informationGraph coloring, perfect graphs
Lecture 5 (05.04.2013) Graph coloring, perfect graphs Scribe: Tomasz Kociumaka Lecturer: Marcin Pilipczuk 1 Introduction to graph coloring Definition 1. Let G be a simple undirected graph and k a positive
More informationNetwork Capacity under Traffic Symmetry: Wireline and Wireless Networks
Network Capacity under Traffic Symmetry: Wireline and Wireless Networks Sudeep Kamath, Sreeram Kannan, Pramod Viswanath ECE Department, University of California, San Diego, sudeep@eecs.berkeley.edu EECS
More informationCapacitated Network Design on Undirected Graphs
Capacitated Network Design on Undirected Graphs Deeparnab Chakrabarty, Ravishankar Krishnaswamy, Shi Li, and Srivatsan Narayanan Abstract. In this paper, we study the approximability of the capacitated
More informationAn Ins t Ins an t t an Primer
An Instant Primer Links from Course Web Page Network Coding: An Instant Primer Fragouli, Boudec, and Widmer. Network Coding an Introduction Koetter and Medard On Randomized Network Coding Ho, Medard, Shi,
More informationOn the dominant of the s-t-cut polytope: Vertices, facets, and adjacency
Math. Program., Ser. B DOI 10.1007/s10107-010-0373-7 FULL LENGTH PAPER On the dominant of the s-t-cut polytope: Vertices, facets, and adjacency Martin Skutella Alexia Weber Received: 15 August 2008 / Accepted:
More informationLower Bounds for Multiplication via Network Coding
Lower Bounds for Multiplication via Network Coding Peyman Afshani Casper Freksen Lior Kamma Kasper Green Larsen Abstract Multiplication is one of the most fundamental computational problems, yet its true
More informationSymmetries in the Entropy Space
Symmetries in the Entropy Space Jayant Apte, Qi Chen, John MacLaren Walsh Abstract This paper investigates when Shannon-type inequalities completely characterize the part of the closure of the entropy
More informationGraph independent field size bounds on failure protecting network codes
Egerváry Research Group on Combinatorial Optimization Technical reports TR-25-. Published by the Egerváry Research Group, Pázmány P. sétány /C, H 7, Budapest, Hungary. Web site: www.cs.elte.hu/egres. ISSN
More information1 The independent set problem
ORF 523 Lecture 11 Spring 2016, Princeton University Instructor: A.A. Ahmadi Scribe: G. Hall Tuesday, March 29, 2016 When in doubt on the accuracy of these notes, please cross chec with the instructor
More information1 Computational Problems
Stanford University CS254: Computational Complexity Handout 2 Luca Trevisan March 31, 2010 Last revised 4/29/2010 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation
More informationRobust Network Codes for Unicast Connections: A Case Study
Robust Network Codes for Unicast Connections: A Case Study Salim Y. El Rouayheb, Alex Sprintson, and Costas Georghiades Department of Electrical and Computer Engineering Texas A&M University College Station,
More informationA Complexity Theory for Parallel Computation
A Complexity Theory for Parallel Computation The questions: What is the computing power of reasonable parallel computation models? Is it possible to make technology independent statements? Is it possible
More informationA Relation Between Weight Enumerating Function and Number of Full Rank Sub-matrices
A Relation Between Weight Enumerating Function and Number of Full Ran Sub-matrices Mahesh Babu Vaddi and B Sundar Rajan Department of Electrical Communication Engineering, Indian Institute of Science,
More informationNotes for Lecture Notes 2
Stanford University CS254: Computational Complexity Notes 2 Luca Trevisan January 11, 2012 Notes for Lecture Notes 2 In this lecture we define NP, we state the P versus NP problem, we prove that its formulation
More informationCS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs. Instructor: Shaddin Dughmi
CS675: Convex and Combinatorial Optimization Fall 2016 Combinatorial Problems as Linear and Convex Programs Instructor: Shaddin Dughmi Outline 1 Introduction 2 Shortest Path 3 Algorithms for Single-Source
More informationPreliminaries. Graphs. E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)}
Preliminaries Graphs G = (V, E), V : set of vertices E : set of edges (arcs) (Undirected) Graph : (i, j) = (j, i) (edges) 1 2 3 5 4 V = {1, 2, 3, 4, 5}, E = {(1, 3), (3, 2), (2, 4)} 1 Directed Graph (Digraph)
More informationMathematics for Decision Making: An Introduction. Lecture 13
Mathematics for Decision Making: An Introduction Lecture 13 Matthias Köppe UC Davis, Mathematics February 17, 2009 13 1 Reminder: Flows in networks General structure: Flows in networks In general, consider
More informationApproximating Multicut and the Demand Graph
Approximating Multicut and the Demand Graph Chandra Chekuri Vivek Madan November 2, 2016 Abstract In the minimum Multicut problem, the input is an edgeweighted supply graph G (V, E) and a demand graph
More informationBBM402-Lecture 20: LP Duality
BBM402-Lecture 20: LP Duality Lecturer: Lale Özkahya Resources for the presentation: https://courses.engr.illinois.edu/cs473/fa2016/lectures.html An easy LP? which is compact form for max cx subject to
More informationGraphs and Network Flows IE411. Lecture 12. Dr. Ted Ralphs
Graphs and Network Flows IE411 Lecture 12 Dr. Ted Ralphs IE411 Lecture 12 1 References for Today s Lecture Required reading Sections 21.1 21.2 References AMO Chapter 6 CLRS Sections 26.1 26.2 IE411 Lecture
More informationNew Hardness Results for Undirected Edge Disjoint Paths
New Hardness Results for Undirected Edge Disjoint Paths Julia Chuzhoy Sanjeev Khanna July 2005 Abstract In the edge-disjoint paths (EDP) problem, we are given a graph G and a set of source-sink pairs in
More informationLow Complexity Encoding for Network Codes
Low Complexity Encoding for Network Codes Sidharth Jaggi 1 Laboratory of Information and Decision Sciences Massachusetts Institute of Technology Cambridge, MA 02139, USA Email: jaggi@mit.edu Yuval Cassuto
More informationClimbing an Infinite Ladder
Section 5.1 Section Summary Mathematical Induction Examples of Proof by Mathematical Induction Mistaken Proofs by Mathematical Induction Guidelines for Proofs by Mathematical Induction Climbing an Infinite
More informationU.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan August 30, Notes for Lecture 1
U.C. Berkeley CS278: Computational Complexity Handout N1 Professor Luca Trevisan August 30, 2004 Notes for Lecture 1 This course assumes CS170, or equivalent, as a prerequisite. We will assume that the
More informationCombinatorial Auctions Do Need Modest Interaction
Combinatorial Auctions Do Need Modest Interaction Sepehr Assadi University of Pennsylvania Motivation A fundamental question: How to determine efficient allocation of resources between individuals? Motivation
More informationNear-Optimal Hardness Results and Approximation Algorithms for Edge-Disjoint Paths and Related Problems
Near-Optimal Hardness Results and Approximation Algorithms for Edge-Disjoint Paths and Related Problems Venkatesan Guruswami Sanjeev Khanna Rajmohan Rajaraman Bruce Shepherd Mihalis Yannakakis Abstract
More informationAmobile satellite communication system, like Motorola s
I TRANSACTIONS ON INFORMATION THORY, VOL. 45, NO. 4, MAY 1999 1111 Distributed Source Coding for Satellite Communications Raymond W. Yeung, Senior Member, I, Zhen Zhang, Senior Member, I Abstract Inspired
More informationEdge-Disjoint Paths in Planar Graphs with Constant Congestion
Edge-Disjoint Paths in Planar Graphs with Constant Congestion Chandra Chekuri Sanjeev Khanna F. Bruce Shepherd November 8, 2006 Abstract We study the maximum edge-disjoint paths problem in undirected planar
More informationScheduling unit processing time arc shutdown jobs to maximize network flow over time: complexity results
Scheduling unit processing time arc shutdown jobs to maximize network flow over time: complexity results Natashia Boland Thomas Kalinowski Reena Kapoor Simranjit Kaur Abstract We study the problem of scheduling
More informationCapacity Region of the Permutation Channel
Capacity Region of the Permutation Channel John MacLaren Walsh and Steven Weber Abstract We discuss the capacity region of a degraded broadcast channel (DBC) formed from a channel that randomly permutes
More informationA necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees
A necessary and sufficient condition for the existence of a spanning tree with specified vertices having large degrees Yoshimi Egawa Department of Mathematical Information Science, Tokyo University of
More informationA well-quasi-order for tournaments
A well-quasi-order for tournaments Maria Chudnovsky 1 Columbia University, New York, NY 10027 Paul Seymour 2 Princeton University, Princeton, NJ 08544 June 12, 2009; revised April 19, 2011 1 Supported
More informationImproving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing
Improving the Linear Programming Technique in the Search for Lower Bounds in Secret Sharing Oriol Farràs 1, Tarik Kaced 2, Sebastià Martín 3, and Carles Padró 3 1 Universitat Rovira i Virgili, Tarragona,
More informationFlow Network. The following figure shows an example of a flow network:
Maximum Flow 1 Flow Network The following figure shows an example of a flow network: 16 V 1 12 V 3 20 s 10 4 9 7 t 13 4 V 2 V 4 14 A flow network G = (V,E) is a directed graph. Each edge (u, v) E has a
More informationQuadratic and Polynomial Inequalities in one variable have look like the example below.
Section 8 4: Polynomial Inequalities in One Variable Quadratic and Polynomial Inequalities in one variable have look like the example below. x 2 5x 6 0 (x 2) (x + 4) > 0 x 2 (x 3) > 0 (x 2) 2 (x + 4) 0
More informationAmulticast network is a directed multigraph containing a
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 50, NO. 10, OCTOBER 2004 2243 Linearity and Solvability in Multicast Networks Randall Dougherty, Christopher Freiling, and Kenneth Zeger, Fellow, IEEE Abstract
More informationLecture 15 (Oct 6): LP Duality
CMPUT 675: Approximation Algorithms Fall 2014 Lecturer: Zachary Friggstad Lecture 15 (Oct 6): LP Duality Scribe: Zachary Friggstad 15.1 Introduction by Example Given a linear program and a feasible solution
More informationKernelization by matroids: Odd Cycle Transversal
Lecture 8 (10.05.2013) Scribe: Tomasz Kociumaka Lecturer: Marek Cygan Kernelization by matroids: Odd Cycle Transversal 1 Introduction The main aim of this lecture is to give a polynomial kernel for the
More informationInformation Complexity and Applications. Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017
Information Complexity and Applications Mark Braverman Princeton University and IAS FoCM 17 July 17, 2017 Coding vs complexity: a tale of two theories Coding Goal: data transmission Different channels
More informationApproximability of Packing Disjoint Cycles
Approximability of Packing Disjoint Cycles Zachary Friggstad Mohammad R. Salavatipour Department of Computing Science University of Alberta Edmonton, Alberta T6G 2E8, Canada zacharyf,mreza@cs.ualberta.ca
More informationFlows and Cuts. 1 Concepts. CS 787: Advanced Algorithms. Instructor: Dieter van Melkebeek
CS 787: Advanced Algorithms Flows and Cuts Instructor: Dieter van Melkebeek This lecture covers the construction of optimal flows and cuts in networks, their relationship, and some applications. It paves
More information