Long MDS Codes for Optimal Repair Bandwidth
|
|
- Eustace Chapman
- 5 years ago
- Views:
Transcription
1 Long MDS Codes for Optmal Repar Bandwdth Zhyng Wang, Itzhak Tamo, and Jehoshua Bruck Electrcal Engneerng Department, Calforna Insttute of Technology, Pasadena, CA 91125, USA Electrcal and Computer Engneerng, Ben-Guron Unversty of the Negev, Beer Sheva 84105, Israel {zhyng, tamo, Abstract MDS codes are erasure-correctng codes that can correct the maxmum number of erasures gven the number of redundancy or party symbols If an MDS code has r partes and no more than r erasures occur, then by transmttng all the remanng data n the code one can recover the orgnal nformaton However, t was shown that n order to recover a sngle symbol erasure, only a fracton of 1/r of the nformaton needs to be transmtted Ths fracton s called the repar bandwdth (fracton) Explct code constructons were gven n prevous works If we vew each symbol n the code as a vector or a column, then the code forms a 2D array and such codes are especally wdely used n storage systems In ths paper, we ask the followng queston: gven the length of the column l, can we construct hgh-rate MDS array codes wth optmal repar bandwdth of 1/r, whose code length s as long as possble? In ths paper, we gve code constructons such that the code length s (r + 1) log r l I INTRODUCTION MDS (maxmum dstance separable) codes are optmal error-correctng codes n the sense that they have the largest mnmum dstance gven the number of party symbols If each symbol s a vector or a column, we call such a code an MDS array code (eg [2], [7], [11], [22], [23]) In (dstrbuted) storage systems, each column s usually stored n a dfferent dsk, and MDS array codes are wdely used to protect data aganst erasures due to ther error correcton ablty and low computatonal complexty In ths paper, we call each symbol a column or a node, and the column length, or the vector sze of a symbol, s denoted by l If an MDS code has r partes, then t can correct up to r erasures of entre columns In ths paper, we not only would lke to recover any e erasures, e r, but also care about the effcency n recovery: what s the fracton of the remanng data transmtted n order to correct e erasures? We call ths fracton the repar bandwdth (fracton) For example, f e = r erasures happen, t s obvous that we have to transmt all of the remanng nformaton, therefore, the fracton s 1 For e = 1 erasure t was shown n [8] (whch also formulated the repar problem) that ths fracton s actually lowered bounded by 1/r If e r symbols are erased and we repar them exactly as they were, ths fracton s lower bounded by e/r [17] If ths bound s acheved for some code, we say t has optmal repar Snce the repar of nformaton s much more crucal than redundancy, and we study manly hgh-rate codes, we wll focus on the optmal repar of nformaton or systematc nodes Moreover, snce sngle erasure s the most common scenaro n practce, we assume e = 1 For example, n Fgure 1, we show an MDS code wth 4 systematc nodes, r = 2 party nodes, and column length l = 2 One can check that ths code can correct any two erasures, therefore t s an MDS code In order to repar any systematc node, only 1/r = 1/2 fracton of the remanng nformaton s transmtted Thus ths code has optmal repar In [12] [14], [20], [21] codes achevng the repar bandwdth lower bound were studed where the number of systematc nodes s less than the number of party nodes (low code rate) For arbtrary code rate, [6], [15] proved that the lower bound s asymptotcally achevable when the column length l goes to nfnty And [3] [5], [9], [10], [16], [17], [19] studed codes wth more systematc nodes than party nodes (hgh code rate) and fnte l, and acheved the lower bound of the repar bandwdth If we are nterested n the code length, e, the number of systematc nodes gven l, low-rate codes have a lnear code length l + 1 [13], [14]; on the other hand, hghrate constructons are relatvely short For example, suppose that we have 2 party nodes, then the number of systematc nodes s only log l n all of the constructons, except for [5] t s 2 log l In [18] t s shown that an upper bound for the code length s k 1 + l( l l/2 ), but the tghtness of ths bound s not known It s obvous that there s a bg gap between ths upper bound and the constructed codes The man contrbuton of ths paper s to construct codes wth 2 party nodes and 3 log l systematc nodes The code uses a fnte feld of sze log l Moreover, we wll gve a general constructon of hgh-rate codes wth (r + 1) log r l systematc nodes for arbtrary number of partes r It turns out that ths constructon s a combnaton of the code n [5] and also [3], [10], [16] The rest of the paper s organzed as follows: n Secton II we wll formally ntroduce the repar bandwdth and the code length problem In Secton III codes wth 2 party nodes are constructed, and we show that the code length s 3 log l Generalzed code constructons for arbtrary number of partes are gven n Secton IV and fnally we conclude n Secton V II PROBLEM SETTINGS An (n, k, l) MDS array code s an (n k)-erasurecorrectng code such that each symbol s a column of length l The number of systematc symbols s k and the number of party symbols s r = n k We call each symbol a column or a node, and k the code length We assume that the code s systematc, hence the frst k nodes of the code
2 N1 N2 N3 N4 P1 P2 a b c d a + b + c + d 2a + w + 2b + 3c + d w x y z w + x + y + z 3w + b + 3x + 2y + z Fgure 1 (n=6,k=4,l=2) MDS code over fnte feld F 4 generated by prmtve polynomal x 2 + x + 1 Here 2 s a prmtve element of the feld The frst 4 nodes are systematc and the last 2 are partes To repar N1 transmt the frst row from every remanng node To repar N2 transmt the second row To repar N3 transmt the sum of both rows And to repar N4 transmt the sum of the frst row and 2 tmes the second row from nodes N1, N2, N3, P1, and the sum of the frst row and 3 tmes the second row from node P2 are nformaton or systematc nodes, and the last r nodes are party or redundancy nodes Suppose the columns of the code are C 1, C 2,, C n, each beng a column vector n F l, for some fnte feld F We assume that for party node k +, nformaton node j, the codng matrx s A,j of sze l l, [r], j [k] And the party columns are computed as C k+ = k A,j C j, j=1 for all [r] For example, n Fgure 1, the codng matrces are A 1,j = I for all j [k] and A 2,j, j = 1, 2, 3, 4 are ( ) ( ) ( ) ( ) ,,, Here the fnte feld s F 4 generated by x 2 + x + 1 In our constructons, we requre that A 1,j = I for all j [k] Hence the frst party s the row sum of the nformaton array Even though ths assumpton s not necessarly true for an arbtrary lnear MDS array code, t can be shown that any lnear code can be equvalently transformed nto one wth such codng matrces [18] Suppose a code has optmal repar for any systematc node, [k], meanng only a fracton of 1/r data s transmtted n order to repar t When a systematc node s erased, we are gong to use sze l/r l matrces S,j, j =, j [n], to repar the node: From a survvng node j, we are gong to compute and transmt S,j C j, whch s only 1/r of the nformaton n ths node Notatons: In order to smplfy the notatons, we wrte S,j and S,k+t A t,j both as matrces of sze l/r l and the subspaces of ther row spans Optmal repar of a systematc node s equvalent to the followng subspace property: There exst matrces S,j, j =, j [n], all wth sze l/r l, such that for all j =, j [k], t [r], S,j = S,k+t A t,j, (1) where the equalty s defned on the row spans nstead of the matrces And r S,k+t A t, = F l (2) t=1 Here the sum of two subspaces A, B of F l s defned as A + B = {a + b : a A, b B} Obvously, the dmenson of each subspace S,k+t A t, s no more than l/r, and the sum of r such subspaces has dmenson no more than l Ths means these subspaces ntersect only on the zero vector Therefore, the sum s actually the drect sum of vector spaces Moreover, we know that each S,k+t has full rank l/r We clam that (1) (2) are necessary and suffcent condtons for optmal repar The sketch of the proof s as follows: suppose the code has optmal repar bandwdth, then we need to transmt l/r elements from each survvng column Suppose we transmt S,j C j from a systematc node j =, j [k], and S,k+t C k+t = k z=1 S,k+tA t,z C z from a party node k + t [k + 1, k + r] Our goal s to recover C and cancel out all C j, j =, j [k] In order to cancel out C j, (1) must be satsfed In order to solve C, all equatons related to C must have full rank l, so (2) s satsfed One the other hand, f (1) (2) are satsfed, one can transmt S,j C j from each node j, j =, j [n] and optmally repar the node Smlar nterference algnment technque was frst ntroduced n [6], [15] for the repar problem Also, [13] was the frst to formally prove smlar condtons It s shown n [18] that we can further smplfy our repar strategy of node and assume S,j = S, for all j =, j [n] by equvalent transformaton of the codng matrces (probably wth an excepton of the strategy of one node) Then the subspace property becomes for any j =, j [k], t [r], S = S A t,j (3) Agan the equalty means equalty of row spans And the sum of subspaces satsfes r S A t, = F l (4) t=1 Notce that f (3) s satsfed, we can say that S s an nvarant subspace of A t,j (multpled on the left) for all party nodes k + t and all nformaton nodes j = If A t,j s dagonalzable and has l lnearly ndependent left egenvectors, an nvarant subspace has a set of bass whch are all egenvectors of A t,j As a result, our goal s to fnd matrces A t,j and ther nvarant subspaces And by usng suffcently large fnte feld and varyng the egenvalues of the codng matrces, we are able to ensure that the codes are MDS Therefore, we wll frst focus on fndng egenvectors of the codng matrces and then dscuss about the egenvalues For example, n Fgure 1, the matrces S, = 1, 2, 3 are (1, 0), (0, 1), (1, 1) One can check that the subspace property (3)(4) s satsfed for [3] For nstance, snce S 3 = (1, 1) s an egenvector for A t,j, t = 1, 2, j = 1, 2, 4, we have S 3 = S 3 A t,j And t s easy to check that S 3 S 3 A 2,3 = span(1, 1) span(3, 2) = F 2 For the node N4, the matrces S 4,j s are not equal In fact S 4,j = (1, 2) for j = 1, 2, 3, 5 and S 4,6 = (1, 3)
3 III CODE CONSTRUCTIONS WITH 2 PARITIES In ths secton, we are gong to construct codes wth column length l = 2 m, k = 3m systematc nodes, and r = 2 party nodes Here m s some nteger As we showed n the prevous secton, we can assume the codng matrces are ( ) I I, (5) A 1 A k where A 1, = I and A 2, = A correspond to party 1 and 2 respectvely Now we only need to fnd codng matrces A s, and subspaces S s For now we only care about egenvectors of A, not ts egenvalues because egenvectors determne the repar bandwdth Later we wll show that usng a large enough fnte feld, we can choose the egenvalues such that the code s ndeed MDS In the followng constructon, for any [k], A has two dfferent egenvalues λ,0, λ,1, each correspondng to l/2 = 2 m 1 egenvectors Denote these egenvectors as for egenvalue λ,0, and V,0 = V,1 = v,1 v,2 v,l/2 v,l/2+1 v,l/2+2 v,l for egenvalue λ,1 Therefore, A can be computed as ( ) ( ) 1 V,0 λ,0 I ( ) l A = 2 2 l V,0 V,1 λ,1 I l2 2 l V,1 By abuse of notatons, we also use V,0, V,1 to represent the egenspace correspondng to λ,0, λ,1, respectvely Namely, V,0 = span{v,1,, v,l/2 } and V,1 = span{v,l/2+1,, v,l } When a systematc node s erased, [k], we are gong to use S to rebuld t The subspace property becomes S = S A j, j =, j [k], (6) S + S A = F l (7) In the followng constructon, e a, a [0, l 1], are some bass of F l, for example, one can thnk of them as the standard bass The subscrpt a s represented by ts bnary expanson, a = (a 1, a 2,, a m ) For example, f l = 16, m = 4, a = 5, then e 5 = e (0,1,0,1) and a 1 = a 3 = 0, a 2 = a 4 = 1 In order to construct the code, we frst defne 3 sets of vectors for [m]: P,0 = {e a : a = 0}, P,1 = {e a : a = 1}, Q = {e a + e b : a + b = 1, a j = b j, j = } For example, f m = 2, = 1, then P 1,0 = {e (0,0), e (0,1) } = {e 0, e 1 }, P 1,1 = {e (1,0), e (1,1) } = {e 2, e 3 }, and Q 1 = {e (0,0) + e (1,0), e (0,1) + e (1,1) } = {e 0 + e 2, e 1 + e 3 } Notaton: The subscrpt for sets P,u, Q and a (the -th dgt of vector a) s wrtten modulo m For example, f [tm + 1, (t + 1)m] for some nteger t, then P,u := P tm,u Constructon 1 The (n = 3m + 2, k = 3m, l = 2 m ) code has codng matrces A, [k], each wth two dstnct egenvalues, and egenvectors V,0, V,1 When node s erased, we are gong to use S to rebuld We construct the code as follows: 1) For [m], V,0 = span(q ), V,1 = span(p,1 ), S = span(p,0 ) 2) For [m + 1, 2m], V,0 = span(p,0 ), V,1 = span(q ), S = span(p,1 ) 3) For [2m + 1, 3m], V,0 = span(p,0 ), V,1 = span(p,1 ), S = span(q ) Example 1 Deletng the node N4, Fgure 1 s a code usng Constructon 1 and l = 2 Another example of l = 4 s shown n Fgure 2 One can check (6) holds For nstance, S 1 = span{e 0, e 1 } = span{e 0 + e 1, e 1 } s an nvarant subspace of A 2 So S 1 = S 1 A 2 If the two egenvalues of A are dstnct, t s easy to show that S S A = F 4, [6] The above example shows that for m = 1, 2, the constructed code has optmal repar It s true n general, as the followng theorem suggests Theorem 2 Constructon 1 s a code wth optmal repar bandwdth 1/2 for rebuldng any systematc node Proof: By symmetry of the frst two cases n the constructon, we are only gong to show that the rebuldng of node, [m] [2m + 1, 3m] s optmal Namely, the subspace property (6)(7) s satsfed Recall that S A j = S s equvalent to S beng an nvarant subspace of A j Case 1: [m] When j [tm + 1, (t + 1)m], j tm =, t {0, 1}, defne B = {e a : a j = 1 t, a = 0} {e a + e b : a j + b j = 1, a = b = 0, a z = b z, z =, j} Then t s easy to see that S = span(p,0 ) = span(b) Moreover, each vector n set B s an egenvector of A j, therefore S s an nvarant subspace of A j When j m =, S = V j,0 = span(p,0 ), so S s an egenspace of A j When j [2m + 1, 3m], we can see that every vector n P,0 s a vector n V j,0 = span(p j,0 ) or n V j,1 = span(p j,1 ), hence t s an egenvector of A j When j =, consder a vector e a P,0, then a = 0 And e a = (e a + e b ) e b where b = 1, b j = a j for all j = Here both e a + e b and e b are egenvectors of A e a A = (e a + e b )A e b A = λ,0 (e a + e b ) λ,1 e b = (λ,0 λ,1 )e b + λ,0 e a Because λ,0 = λ,1, we get span{e a A, e a } = span(e a, e b ) Hence S A + S = span{e a, e b : a = 0, b = 1, a j = b j, j = } = F l
4 N1 N2 N3 N4 N5 N6 1st egenspace e 0 + e 2 e 0 + e 1 e 0 e 0 e 0 e 0 of A e 1 + e 3 e 2 + e 3 e 1 e 2 e 1 e 2 2nd egenspace e 2 e 1 e 0 + e 2 e 0 + e 1 e 2 e 1 of A e 3 e 3 e 1 + e 3 e 2 + e 3 e 3 e 3 e 0 e 0 e 2 e 1 e 0 + e 2 e 0 + e 1 S e 1 e 2 e 3 e 3 e 1 + e 3 e 2 + e 3 Fgure 2 (n=8,k=6,l=4) code The frst party node s assumed to be the row sum, and the second party s computed usng codng matrces A In order to rebuld node, S s multpled to each survvng node The frst 2m = 4 nodes have optmal access, and the last m = 2 nodes have optmal update Case 2: [2m + 1, 3m] When j = m or j = 2m, S = span(q ) s an egenspace of A j When j [tm + 1, (t + 1)m], and j = tm for t {0, 1}, defne D = {e a + e b : a j = b j = 1 t, a + b = 1, a z = b z, z =, j} {e a + e b + e c + e d : a j = b j = 0, c j = d j = 1, a + b = 1, c + d = 1, a z = b z = c z = d z, z =, j} We can see that S = span(q ) = span(d) and every vector n D s an egenvector of A j When j [2m + 1, 3m], j = We can see that Q = {e a + e b : a j = b j = 0, a + b = 1, a z = b z, z =, j} {e a + e b : a j = b j = 1, a + b = 1, a z = b z, z =, j} Apparently, every vector n Q s a sum of two vectors n P j,0 or two vectors n P j,1 So S = span(q ) s an nvarant subspace of A j When j =, consder any e a + e b Q, where a = 1, b = 0, a z = b z, z = We have (e a + e b )A = λ,1 e a + λ,0 e b Because λ,0 = λ,1, we get span{(e a + e b )A, e a + e b } = span{e a, e b } Thus S A + S = span{e a, e b : a = 1, b = 0, a z = b z, z = } = F l It should be noted that f we shorten the code and keep only the frst 2m systematc nodes n the code, then t s actually equvalent to the code n [5] The reparng of the frst 2m nodes does not requre computaton wthn each remanng node, snce only standard bases are multpled to the survvng columns (eg Fgure 2) We call such repar optmal access It s shown n [18] that f a code has optmal access, then the code has no more than 2m nodes On the other hand, the shortened code wth the last m systematc nodes n the above constructon s equvalent to that of [3], [10], [16] Snce the codng matrces A, [2m + 1, 3m] are all dagonal, every nformaton entry s ncluded n only r + 1 entres n the code We say such a code has optmal update In [18] t s proven that an optmal-update code wth dagonal codng matrces has no more than m nodes Therefore, our code s a combnaton of the longest optmal-access code and the longest optmalupdate code, whch provdes tradeoff among access, update, and the code length The shortenng technque was also used n [13] n order to get optmal-repar code wth dfferent code rates In addton, f we try to extend an optmal-access code C wth length 2m to a code D wth length k, so that C s a shortened code of D, then the followng theorem shows that k = 3m s largest code length Therefore, our constructon s longest n the sense of extendng C Theorem 3 Any extended code of an optmal-access code of length 2m wll have no more than 3m systematc nodes Proof: Let C be an optmal-access code of length 2m Let D be an extended code of C By equvalently transformng the codng matrces (see [18]), we can always assume the codng matrces of the partes n D are ( ) I I I I A 1 A 2m A 2m+1 A k Here the frst 2m column blocks corresponds to the codng matrces of C Frst consder the code C, that s, the frst 2m nodes If C has optmal access, then S s the span of l/2 standard bass, for [2m] Snce there are 2m systematc nodes, on average each e z appears 2m 2 l 1 l = m tmes, for z [0, l 1] We clam that each e z appears exactly m tmes Otherwse, there exsts one e z that appears n {S : I}, for some I > m, I [2m] So I S 1 However, by [18] we know when I > m, I S = 0 So every e z, z [0, l 1], must appear n m of the S s, say e z S, J, J = m, J [2m] Agan by [18] when J = m, we have J S = 1, so J S = e z So these m subspaces ntersect only on e z Now consder the extended code D Snce every S, J, s an nvarant subspace of A j, j [2m + 1, k] by the subspace property, we know ther ntersecton, e z s also an nvarant subspace of A j In other words, e z s an egenvector of A j Ths result s true for all z [0, l 1] Hence, we know the standard bass are all the egenvectors of A j, j [2m + 1, k] Equvalently, A j are all dagonal So the last k 2m nodes n D are optmal update By [18], there are only m nodes that are all optmal update So k 3m Next let us dscuss about the fnte feld sze of the code In order to make the code MDS, t s equvalent that we should be able to recover from any two column erasures In other words, any 1 1 or 2 2 submatrces of the matrx (5) should be nvertble Therefore, all egenvalues λ,s should be nonzero, [k], s {0, 1} Moreover, the followng matrx should be nvertble for all = j: [ ] I I A A j Or equvalently, A A j should be nvertble
5 Let us frst look at an example Suppose m = 2, = 1, j = 2 (see Fgure 2), then A 1 A 2 s λ 1,0 λ 2,0 λ 2,1 λ 2,0 λ 1,0 λ 1,1 0 0 λ 1,0 λ 2,1 0 λ 1,0 λ 1,1 0 0 λ 1,1 λ 2,0 λ 2,1 λ 2, λ 1,1 λ 2,1 (8) We can smply compute the determnant by expandng along the frst column and the last row The remanng 2 2 submatrx n the mddle s dagonal: [ ] λ1,0 λ 2,1 0 (9) 0 λ 1,1 λ 2,0 Hence, the determnant det(a 1 A 2 ) s (λ 1,0 λ 2,0 )(λ 1,0 λ 2,1 )(λ 1,1 λ 2,0 )(λ 1,1 λ 2,1 ) For another example, let m = 2, = 1, j = 3, then A 1 A 3 s λ 1,0 λ 3,0 0 λ 1,0 λ 1,1 0 0 λ 1,0 λ 3,0 0 λ 1,0 λ 1,1 λ 3,0 λ 3,1 0 λ 1,1 λ 3,1 0 0 λ 3,0 λ 3,1 0 λ 1,1 λ 3,1 (10) Snce we can permutate rows and columns of a matrx and not change ts rank, the above matrx can be changed nto: λ 1,0 λ 3,0 λ 1,0 λ 1,1 0 0 λ 3,0 λ 3,1 λ 1,1 λ 3, λ 1,0 λ 3,0 λ 1,0 λ 1,1 0 0 λ 3,0 λ 3,1 λ 1,1 λ 3,1 And ts determnant s det(a 1 A 3 ) = (λ 1,0 λ 3,1 ) 2 (λ 3,0 λ 1,1 ) 2 (11) Now let us dscuss n general the fnte feld sze of the code Constructon 2 Let the elements of the code be over F q, wth q 2m + 1 Let c be a prmtve element n F q and wrte < >:= mod m Assgn the egenvalues of the codng matrces to be { c λ,s = <>+sm, [2m] c <>+(1 s)m (12), [2m + 1, 3m] If we have an extra systematc column wth A 3m+1 = I (see column N4 n Fgure 1), we can use a feld of sze 2m + 2 and smply modfy the above constructon by { c λ,s = <>+sm+1, [2m] c <>+(1 s)m+1, [2m + 1, 3m] For example, when m = 1, the coeffcents n Fgure 1 are assgned usng the above formula, where the feld sze s 4 and c = 2 For another example, f m = 2, we can use fnte feld F 5 and c = 2, then assgn the egenvalues to be (λ 1,0,, λ 6,0 ) = (1, 2, 1, 2, 4, 3), (λ 1,1,, λ 6,1 ) = (4, 3, 4, 3, 1, 2) Theorem 4 The above constructon guarantees that the constructed code s MDS and has optmal repar bandwdth The fnte feld sze s q 2m + 1 Proof: We clam that f we check any two ndces = j [3m], then the followng condtons are necessary and suffcent for A A j to be nvertble Assume r, s {0, 1} 1) λ,s = λ j,r, for any = j mod m 2) λ,s = λ j,1 s, for [m], j = + m 3) λ,s = λ j,s, for [2m], j [2m + 1, 3m], = j mod m If we have an extra systematc column wth A 3m+1 = I, then A I s nvertble ff 4) λ,s = 1 By the proof of Theorem 2 we already know that optmal repar bandwdth s equvalent to 5) λ,0 = λ,1 It can be easly checked that the above condtons are satsfed by Constructon 2 Here we only prove condton 1 for, j [m] and condton 2 The rest cases all follow smlar deas Wthout loss of generalty we can assume {e } s standard bass, because the bass wll not change the value of det(a A j ) When, j [m], V,0 = Q, V,1 = P,1, and V j,0 = Q j, V j,1 = P,1 So V,1, V j,1 share the same egenvectors B = {e a : a = a j = 1} If we vew each element n B as an nteger n [0, 2 m 1] (each vector n B s the bnary representaton of an nteger), we can say A, A j both have only one nonzero element n each row n B On the other hand, columns of V 1, V 1 j correspond to the rght egenvectors of A, A j, respectvely And t s easy to show that they share the rght egenvectors C = {e T a : a = a j = 0}, where the superscrpt T means transpose Hence, A, A j both have only one nonzero element n each column n C To compute the determnant of A A j, we can expand along rows B and columns C The remanng submatrx wll be dagonal snce we already elmnated all the non-dagonal elements Then t s easy to verfy condton 1 See (8)(9) for an example When [m], j = + m, V,0 = Q, V,1 = P,1 and V j,0 = P,0, V j,1 = Q Therefore both A, A j have nonzero elements at the dagonal locatons Also A has nonzero elements at row P,0 and column P,1 Smlarly A j has nonzero elements at row P,1 and column P,0 Let a = (0,, 0, 1, 0,, 0) be a bnary vector of length m and the only 1 s at locaton And let us vew e 0, e a as the correspondng ntegers 0, 2 m Then we can see that rows {e 0, e a } and columns {e 0, e a } have only four nonzero elements We can permutate the rows/columns of a matrx and not change ts rank Therefore move these two rows/columns to rows/columns 0, 1, and we get a block dagonal matrx Followng the same procedure, we wll get block dagonal matrx, where each block s of sze 2 2 And the determnant s smple to compute See (10)(11) for an example We can see that the feld sze q s about 2/3 of the number of systematc nodes and s not a constant Also the code has
6 parameters (n = 3m + 2, k = 3m, l = 2 m ) On the other hand, the (n = m + 3, k = m + 1, l = 2 m ) code n [17] has constant feld of sze q = 3 So the proposed code has longer k but longer (actual) column length l log q as well Nonetheless, t may be possble to alter the structure of A s a bt (for example, do not requre A to be dagonalzable) and obtan a constant feld sze And ths wll be one of our future work drectons IV CODES WITH ARBITRARY NUMBER OF PARITIES In ths secton, we wll gve constructons of codes wth arbtrary number of party nodes Our code wll have l = r m rows, k = (r + 1)m systematc nodes, and r party nodes, for any r 2, m 1 Suppose A s, s the codng matrx for party node k + s and nformaton node From Secton II, we assume A 1, = I for all In our constructon, we are gong to add the followng assumptons Every A s, has r dstnct egenvalues, each correspondng to l/r = r m 1 lnearly ndependent egenvectors, for s [2, r] Moreover, gven an nformaton node [k], all matrces A s,, s [2, r], share the same egenspaces V,0, V,1,, V, If these egenspaces correspond to egenvalues λ,0, λ,1,, λ, for A 2,, then we assume they correspond to egenvalues λ s 1,0, λs 1,1,, λs 1, for A s, By abuse of notatons, V,u represents both the egenspace and the l/r l matrx contanng l/r ndependent egenvectors Under these assumptons, t s easy to see that f we wrte A s, as V,0 V, 1 λ s 1,0 I λ s 1, I V,0 V,, where the dentty matrces are of sze r l r l, then A s, = A2, s 1, for all s [r] Hence, we are gong to wrte A = A 2,, thus A s, = A s 1, and our constructon wll only focus on the matrx A As a result, the subspace property becomes S = S A j, j =, j [k] (13) S + S A + S A S A = F l (14) Note that such choce of egenvalues s not the unque way to construct the matrces, but t guarantees that the code has optmal repar bandwdth Also, when the fnte feld sze s large enough, we can fnd approprate values of λ,u s such that the code s MDS At last, snce each V,u has dmenson l/r and corresponds to l/r ndependent egenvectors, we know that any vector n the subspace V,u s an egenvector of A Let {e 0, e 1,, e r m 1} be the standard bass of F l And we are gong to use the r-ary expanson to represent the ndex of a base An ndex a [0, r m 1] s wrtten as a = (a 1, a 2,, a m ), where a s ts -th dgt For example, when r = 3, m = 4, we have e 5 = e (0,0,1,2) Defne for [k], u [0, r 1] the followng sets of vectors: P,u = {e a : a = u}, Q = { e a : a j [0, r 1], j = } a =0 P,0 P,1 P,2 Q e 0 e 3 e 6 e 0 + e 3 + e 6 1 e 1 e 4 e 7 e 1 + e 4 + e 7 e 2 e 5 e 8 e 2 + e 5 + e 8 e 0 e 1 e 2 e 0 + e 1 + e 2 2 e 3 e 4 e 5 e 3 + e 4 + e 5 e 6 e 7 e 8 e 6 + e 7 + e 8 Fgure 3 Sets of vectors used to construct a code wth r = 3 partes and column length l = 3 2 = 9 So P,u s the set of bases whose ndex s u n the -th dgt The sum n Q s over all e a such that the j-th dgt of a s some fxed value for all j =, and the -th dgt vares n [0, r 1] In other words, a vector n Q s the summaton of the correspondng bases n P,u, u For example, when r = 3, m = 2, P 1,0 = {e (0,0), e (0,1), e (0,2) } = {e 0, e 1, e 2 }, P 1,1 = {e 3, e 4, e 5 }, P 1,2 = {e 6, e 7, e 8 }, and Q 1 = {e 0 + e 3 + e 6, e 1 + e 4 + e 7, e 2 + e 5 + e 8 } Notatons: If a = (a 1, a 2,, a m ) s an r-ary vector, denote by a (u) = (a 1,, a 1, u, a +1,, a m ) the vector that s the same as a except dgt, u [0, r 1] In the followng, all of the subscrpt for sets P,u, Q and for dgt a are computed modulo m For example, f [tm + 1, (t + 1)m] for some nteger t, then Q := Q tm Constructon 3 The (n = (r + 1)m + r, k = (r + 1)m, l = r m ) code s constructed as follows For nformaton node [tm + 1, (t + 1)m], t [0, r 1], the u-th egenspace (u [0, r 1]) of codng matrx A and the rebuldng subspace S are defned as V,u = span(p,u ), u = t, V,t = span(q ), S = span(p,t ) For nformaton node [rm + 1, (r + 1)m], the egenspaces and rebuldng subspaces are V,u = span(p,u ), u [0, r 1] S = span(q ) Example 5 Fgure 3 llustrated the subspaces P,u, Q for r = 3 partes and column length l = 9 Fgure 4 s a code constructed from these subspaces and has 8 systematc nodes One can see that f a node s erased, one can transmt only a subspace of dmenson 3 to rebuld, whch corresponds to only 1/3 repar bandwdth fracton The three codng matrces for systematc node are I, A, A 2, for [8] The followng theorem shows that the code ndeed has optmal repar bandwdth 1/r Theorem 6 Constructon 3 has optmal repar bandwdth 1/r when rebuldng one systematc node Proof: By symmetry of the constructon, we are only gong to show that the subspace property (13)(14) s satsfed for [1, m] [rm + 1, (r + 1)m] Also S A j = S mples that S has a bass that are all egenvectors of A j
7 V,0 Q 1 Q 2 P 1,0 P 2,0 P 1,0 P 2,0 P 1,0 P 2,0 V,1 P 1,1 P 2,1 Q 1 Q 2 P 1,1 P 2,1 P 1,1 P 2,1 V,2 P 1,2 P 2,2 P 1,2 P 2,2 Q 1 Q 2 P 1,2 P 2,2 S P 1,0 P 2,0 P 1,1 P 2,1 P 1,2 P 2,2 Q 1 Q 2 Fgure 4 An (n = 11, k = 8, l = 9) code Sets P,u and Q are lsted n Fgure 3 V,u s the u-th egenspace of the codng matrx A S s the subspace used to rebuld systematc node Case 1: [1, m] Before we begn to explore the dfferent cases, let us defne the followng sets of vectors B u = {e a : a = 0, a j = u}, u [0, r 1], C t = { e a : a = 0, a z [0, r 1], z =, j} a j =0 In the defnton of C t, the sum s over all e a such that the -th dgt of a s 0, the the z-th dgt s some fxed value, z =, j, and the j-th dgt vares n [0, r 1] Then one can see that B u P j,u, C t Q j j [tm + 1, (t + 1)m], for some t [0, r 1] and j tm = Then the egenspaces of A j are V j,u = span(p j,u ), u = t, and V j,t = span(q j ) Then t s clear that S = span(p,0 ) = span({b u : u = t} C t ) Also every vector of B u, u = t and C t s an egenvector of A j j [rm + 1, (r + 1)m], j rm = The egenspaces of A j are V j,u = span(p j,u ), u [0, r 1] And S = span(p,0 ) = span{b u : u [0, r 1]} and every vector n B u, u s an egenvector of A j j tm =, t [1, r] Then the frst egenspace of A j s V j,0 = span(p,0 ) = S j = In ths case we want to check (14) n the subspace property Suppose the dstnct egenvalues of A are λ 0, λ 1,, λ Then the egenvalues for A s wll be λ0 s, λs 1,, λs, for s [0, r 1] Notce that S = span(p,0 ) = span{e a (0) : a Zr m } and e a (0) As = ( = λ s 0 u=0 u=0 = λ s 0 e a (0) + e a (u) e a (1) e a ())A e a (u) λ s 1 e a (1) λ s e a () u=1 (λ s 0 λs u)e a (u) Wrtng the equatons for all s [0, r 1] n a matrx, we get wth M = e a (0) e a (0) A e a (0)A 2 e a (0) A = M e a (0) e a(1) e a (), λ 0 λ 0 λ 1 λ 0 λ λ 2 0 λ 2 0 λ2 1 λ 2 0 λ2 λ 0 λ 0 λ 1 λ 0 λ After a sequence of elementary column operatons, M becomes the followng Vandermonde matrx λ 0 λ 1 λ M = λ 2 0 λ 2 1 λ 2 λ 0 λ 1 λ Snce λ s are dstnct, we know M and hence M s non-sngular Therefore, span{e a (0), e a (0) A,, e a (0) A } = span{e a (0), e a (1),, e a ()} Snce S contans e a (0) for all r-ary vector a, we know S + S A + + S A = F l Case 2: [rm, (r + 1)m] Agan, we frst defne some sets of vectors to help wth our arguments B u = { e a : a j = u, a z [0, r 1], z =, j} a =0 C t = { a =0 a j =0 e a : a z [0, r 1], z =, j} Here the sum n B u has fxed values of a j = u and a z, z =, j, and the -th dgt vares n [0, r 1] The sum n C t has fxed values of a z, z =, j, and the -th and j-th dgt both vary n [0, r 1] Then one can check that B u span(p j,u ), C t span(q j ) j [tm + 1, (t + 1)m], t [0, r 1], and j tm = rm The egenspaces of A j are span(p j,u ), u = t and span(q j ) And S = span(q ) = span({b u : u = t} C u) We can see that every vector n B u, u = t and C t s an egenvector of A j j [rm + 1, (r + 1)m], j = The egenspaces of A j are P j,u, u [0, r 1] And S = span(q ) = span{b u : u [0, r 1]} We can see that every vector of B u s an egenvector of A j j tm = rm, t [0, r 1] Then the t-th egenspace of A j s span(q ), whch s equal to S
8 j = Take u=0 e a (u) S for arbtrary a, then e a (u) As = λ s ue a (u) u=0 u=0 Wrtten n a matrx form, we have e a (0) e a (0) A e a (0) A2 e a (0)A λ 0 λ 1 λ = λ 2 0 λ 2 1 λ 2 λ0 λ 1 λ e a (0) e a(1) e a () So smlar to Case 1, we know S + S A + S A spans the entre space F l Agan, ths constructon can be shortened to an optmalaccess code of length rm [5] and an optmal-update code of length m [3], [10], [16] The fnte feld sze of ths code can be bounded by the followng theorem In the followng, we do not assume that the egenvalue of A s, s the s-th power of A 2,, and A 1, s not necessarly dentty Hence, we only assume that A 1,,, A r, share the same egenspaces for all Theorem 7 A fnte feld of sze k r m suffces for the code to be MDS and optmal repar bandwdth Here k = (r + 1)m Proof: Let {λ (s),j } be the j-th egenvalue of A s,, [k], j [0, r 1], s [r] In order to show that the code s MDS, we need to check f all x x submatrces of the followng matrx are nvertble, for all x [1, r] A 1,1 A 1,2 A 1,k A 2,1 A 2,2 A 2,k A r,1 A r,2 A r,k Note that each A s, can be wrtten as V 1 Λ s, V for some dagonal matrx Λ s,, where the rows of V are egenvectors and the dagonal of Λ s, are egenvalues Snce A 1,,, A r, share the same egenvectors V, we can multply V 1 on the rght of the -th block column, and not change the rank of the above matrx: V1 1 Λ 1,1 V2 1 Λ 1,2 V 1 k Λ 1,k V1 1 Λ 2,1 V2 1 Λ 2,2 V 1 k Λ 2,k M = V1 1 Λ r,1 V2 1 Λ r,2 V 1 Λ r,k k Here all λ (s),j are unknowns n the fnte feld F q We are gong to show that f we wrte the determnants of each x x submatrx as a polynomal, and take the product of all these polynomals, then t s an nonzero polynomal Moreover, by Combnatoral Nullstellensatz [1] we can fnd assgnments of the unknowns over a large enough fnte feld, such that ths polynomal s not zero Then we are guaranteed to have all the x x submatrces nvertble In [1] t s proved that f the degree of a polynomal f(x 1,, x s ) s deg( f) = s =1 t, and the coeffcent of s =1 xt s nonzero, then a fnte feld of sze max {t } s suffcent for an assgnment c 1,, c s such that f(c 1,, c s ) = 0 By the symmetry of the λ (s),j, we consder only the degree of λ := λ (1) 1,0 We wll fnd ts maxmum degree n the polynomal of determnants Ths unknown varable only appears n the matrx Λ 1,1 = λ (1) 1,0 I λ (1) 1, I, where I s the dentty matrx of sze r m 1 r m 1 Let B = V1 1 Λ 1,1 Then we know that λ appears only n the frst r m 1 columns of B For the determnant of any x x submatrx of M, only the ones contanng B needs to be consdered, because we are only nterested n the degree of λ Therefore, there are ( k 1 x 1 )( x 1 ) submatrces of sze x x that has λ n ts determnant, and ts degree s r m 1 for each submatrx So the total degree of λ s r m 1 r ( )( ) k 1 r 1 x 1 x 1 x=1 Moreover, we know from the proof of Theorem 6 that optmal repar bandwdth s acheved for the frst systematc node ff the followng matrx s nvertble λ (1) 1,0 λ (1) 1, λ (r) 1,0 λ (r) 1, Hence, we need to multply ts determnant to our polynomal The total degree of λ s 1 + r m 1 r ( )( ) k 1 r 1 x 1 x 1 x=1 ( )( ) m 1 k 1 r 1 = 1 + r x=0 x x ( ) m 1 r 1 < 1 + r (k 1) x x x=0 = 1 + r m 1 k Hence the proof s completed We can see that n the above theorem, for hgh-rate codes the feld sze s expostonal n the number of systematc nodes
9 But we beleve that there s stll a large space to mprove ths bound V CONCLUSIONS In ths paper, we presented a famly of codes wth parameters (n = (r + 1)m + r, k = (r + 1)m, l = r m ) and they are so far the longest hgh-rate MDS code wth optmal repar The codes were constructed usng egenspaces of the codng matrces, such that they satsfy the subspace property Ths property gves more nsghts on the structure of the codes, and smplfes the proof of optmal repar If we requre that the code rate approaches 1, e, r beng a constant and m goes to nfnty, then the column length l s exponental n the code length k However, f we requre the code rate to be roughly a constant fracton, e, m beng a constant and r goes to nfnty, then l s polynomal n k Therefore, dependng on the applcaton, we can see a tradeoff between the code rate and the code length It s stll an open problem what s the longest optmal-repar code one can buld gven the column length l Also, the bound of the fnte feld sze used for the codes may not be tght enough Unlke the constructons n ths paper, the feld sze may be reduced when we assume that the codng matrces do not have egenvalues or egenvectors (are not dagonalzable) These are our future work drectons [13] N B Shah, K V Rashm, P V Kumar, and K Ramchandran, Interference algnment n regeneratng codes for dstrbuted storage: necessty and code constructons, IEEE Trans on Informaton Theory, vol 56, no 4, pp , 2012 [14] C Suh and K Ramchandran, Exact-Repar MDS Code Constructon Usng Interference Algnment, IEEE Trans on Informaton Theory, vol 57, no 3, pp , 2011 [15] C Suh and K Ramchandran, On the exstence of optmal exact-repar MDS codes for dstrbuted storage, Tech Rep arxv: , 2010 [16] I Tamo, Z Wang, and J Bruck, MDS array codes wth optmal rebuldng, n ISIT, 2011 [17] I Tamo, Z Wang, and J Bruck, Zgzag codes: MDS array codes wth optmal rebuldng, Tech Rep arxv: , 2011 [18] I Tamo, Z Wang, and J Bruck, Access vs bandwdth n codes for storage, submtted to ISIT, 2012 Avalable at http : //paradsecaltechedu/etrhtml [19] Z Wang, I Tamo, and J Bruck, On codes for optmal rebuldng access, n Allerton Conference on Control, Computng, and Communcaton, Urbana-Champagn, IL, 2011 [20] Y Wu and A Dmaks, Reducng repar traffc for erasure codng-based storage va nterference algnment, n ISIT, 2009 [21] Y Wu, R Dmaks, and K Ramchandran, Determnstc regeneratng codes for dstrbuted storage, n Allerton Conference on Control, Computng, and Communcaton, Urbana-Champagn, IL, 2007 [22] L Xu, V Bohossan, J Bruck, and D Wagner, Low-densty MDS codes and factors of complete graphs, IEEE Trans on Informaton Theory, vol 45, no 6, pp , Sep 1999 [23] L Xu and J Bruck, X-code: MDS array codes wth optmal encodng, IEEE Trans on Informaton Theory, vol 45, no 1, pp , 1999 REFERENCES [1] N Alon, Combnatoral nullstellensatz, Combnatorcs Probablty and Computng, vol 8, no 1-2, pp 7 29, Jan 1999 [2] M Blaum, J Brady, J Bruck, and J Menon, EVENODD: an effcent scheme for toleratng double dsk falures n RAID archtectures, IEEE Trans on Computers, vol 44, no 2, pp , Feb 1995 [3] V R Cadambe, C Huang, and J L, Permutaton code: optmal exactrepar of a sngle faled node n MDS code based dstrbuted storage systems, n ISIT, 2011 [4] V R Cadambe, C Huang, S A Jafar, and J L, Optmal repar of MDS codes n dstrbuted storage va subspace nterference algnment, Tech Rep arxv: , 2011 [5] V R Cadambe, C Huang, J L, and S Mehrotra, Polynomal length MDS codes wth optmal repar n dstrbuted storage systems, n Proceedngs of 45th Aslomar Conference on Sgnals Systems and Computng, Nov 2011 [6] V R Cadambe, S A Jafar, and H Malek, Mnmum repar bandwdth for exact regeneraton n dstrbuted storage, n Wreless Network Codng Conference (WNC), Jun 2010 [7] P Corbett, B Englsh, A Goel, T Grcanac, S Kleman, J Leong, and S Sankar, Row-dagonal party for double dsk falure correcton, n Proc of the 3rd USENIX Symposum on Fle and Storage Technologes (FAST 04), 2004 [8] A Dmaks, P Godfrey, Y Wu, M Wanwrght, and K Ramchandran, Network codng for dstrbuted storage systems, IEEE Trans on Informaton Theory, vol 56, no 9, pp , 2010 [9] D S Papalopoulos, and AG Dmaks, Dstrbuted storage codes through Hadamard desgns, n ISIT, 2011 [10] D S Papalopoulos, AG Dmaks, and V R Cadambe, Repar Optmal Erasure Codes through Hadamard Desgns, n Allerton Conference on Control, Computng, and Communcaton, Urbana-Champagn, IL, 2011 [11] J S Plank, The RAID-6 lberaton codes, The Internatonal Journal of Hgh Performance Computng and Applcatons, vol 23, pp , Aug 2009 [12] K V Rashm, N B Shah, P V Kumar, and K Ramchandran, Explct Constructon of Optmal Exact Regeneratng Codes for Dstrbuted Storage, n Allerton Conference on Control, Computng, and Communcaton, Urbana-Champagn, IL, 2009
Exact-Regenerating Codes between MBR and MSR Points
Exact-Regeneratng Codes between BR SR Ponts arxv:1304.5357v1 [cs.dc] 19 Apr 2013 Abstract In ths paper we study dstrbuted storage systems wth exact repar. We gve a constructon for regeneratng codes between
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More information5 The Rational Canonical Form
5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces
More information2.3 Nilpotent endomorphisms
s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013
ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationNotes on Frequency Estimation in Data Streams
Notes on Frequency Estmaton n Data Streams In (one of) the data streamng model(s), the data s a sequence of arrvals a 1, a 2,..., a m of the form a j = (, v) where s the dentty of the tem and belongs to
More informationSalmon: Lectures on partial differential equations. Consider the general linear, second-order PDE in the form. ,x 2
Salmon: Lectures on partal dfferental equatons 5. Classfcaton of second-order equatons There are general methods for classfyng hgher-order partal dfferental equatons. One s very general (applyng even to
More information8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More information= = = (a) Use the MATLAB command rref to solve the system. (b) Let A be the coefficient matrix and B be the right-hand side of the system.
Chapter Matlab Exercses Chapter Matlab Exercses. Consder the lnear system of Example n Secton.. x x x y z y y z (a) Use the MATLAB command rref to solve the system. (b) Let A be the coeffcent matrx and
More information763622S ADVANCED QUANTUM MECHANICS Solution Set 1 Spring c n a n. c n 2 = 1.
7636S ADVANCED QUANTUM MECHANICS Soluton Set 1 Sprng 013 1 Warm-up Show that the egenvalues of a Hermtan operator  are real and that the egenkets correspondng to dfferent egenvalues are orthogonal (b)
More informationC/CS/Phy191 Problem Set 3 Solutions Out: Oct 1, 2008., where ( 00. ), so the overall state of the system is ) ( ( ( ( 00 ± 11 ), Φ ± = 1
C/CS/Phy9 Problem Set 3 Solutons Out: Oct, 8 Suppose you have two qubts n some arbtrary entangled state ψ You apply the teleportaton protocol to each of the qubts separately What s the resultng state obtaned
More informationRandom Walks on Digraphs
Random Walks on Dgraphs J. J. P. Veerman October 23, 27 Introducton Let V = {, n} be a vertex set and S a non-negatve row-stochastc matrx (.e. rows sum to ). V and S defne a dgraph G = G(V, S) and a drected
More informationNOTES ON SIMPLIFICATION OF MATRICES
NOTES ON SIMPLIFICATION OF MATRICES JONATHAN LUK These notes dscuss how to smplfy an (n n) matrx In partcular, we expand on some of the materal from the textbook (wth some repetton) Part of the exposton
More informationRefined Coding Bounds for Network Error Correction
Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong shyang5@e.cuhk.edu.hk Raymond W. Yeung Department
More informationModule 9. Lecture 6. Duality in Assignment Problems
Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept
More informationDifference Equations
Dfference Equatons c Jan Vrbk 1 Bascs Suppose a sequence of numbers, say a 0,a 1,a,a 3,... s defned by a certan general relatonshp between, say, three consecutve values of the sequence, e.g. a + +3a +1
More informationn α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0
MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector
More information} s ) was constructed [7]. C 0 with length n 0 and minimum distance d 0 over F q.
Ffty-Ffth Annual Allerton Conference Allerton House, UIUC, Illnos, USA October 3-6, 17 Mult-Erasure Locally Recoverable Codes Over Small Felds Pengfe Huang, Etan Yaakob, and Paul H Segel Electrcal and
More informationU.C. Berkeley CS294: Spectral Methods and Expanders Handout 8 Luca Trevisan February 17, 2016
U.C. Berkeley CS94: Spectral Methods and Expanders Handout 8 Luca Trevsan February 7, 06 Lecture 8: Spectral Algorthms Wrap-up In whch we talk about even more generalzatons of Cheeger s nequaltes, and
More informationFormulas for the Determinant
page 224 224 CHAPTER 3 Determnants e t te t e 2t 38 A = e t 2te t e 2t e t te t 2e 2t 39 If 123 A = 345, 456 compute the matrx product A adj(a) What can you conclude about det(a)? For Problems 40 43, use
More informationFINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN
FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There
More informationComplete subgraphs in multipartite graphs
Complete subgraphs n multpartte graphs FLORIAN PFENDER Unverstät Rostock, Insttut für Mathematk D-18057 Rostock, Germany Floran.Pfender@un-rostock.de Abstract Turán s Theorem states that every graph G
More informationLecture 4: Universal Hash Functions/Streaming Cont d
CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected
More informationData Secrecy in Distributed Storage Systems under Exact Repair
Data Secrecy n Dstrbuted Storage Systems under Exact Repar Sreechakra Goparaju, Salm El Rouayheb, Robert Calderbank and H. Vncent Poor Abstract The problem of securng data aganst eavesdroppng n dstrbuted
More informationApplication of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations
Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work
More informationAffine transformations and convexity
Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/
More informationMaximizing the number of nonnegative subsets
Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More informationSingular Value Decomposition: Theory and Applications
Sngular Value Decomposton: Theory and Applcatons Danel Khashab Sprng 2015 Last Update: March 2, 2015 1 Introducton A = UDV where columns of U and V are orthonormal and matrx D s dagonal wth postve real
More informationLecture 5 Decoding Binary BCH Codes
Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture
More information1 Matrix representations of canonical matrices
1 Matrx representatons of canoncal matrces 2-d rotaton around the orgn: ( ) cos θ sn θ R 0 = sn θ cos θ 3-d rotaton around the x-axs: R x = 1 0 0 0 cos θ sn θ 0 sn θ cos θ 3-d rotaton around the y-axs:
More information9 Characteristic classes
THEODORE VORONOV DIFFERENTIAL GEOMETRY. Sprng 2009 [under constructon] 9 Characterstc classes 9.1 The frst Chern class of a lne bundle Consder a complex vector bundle E B of rank p. We shall construct
More informationInner Product. Euclidean Space. Orthonormal Basis. Orthogonal
Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,
More informationLecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.
Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from
More informationMEM 255 Introduction to Control Systems Review: Basics of Linear Algebra
MEM 255 Introducton to Control Systems Revew: Bascs of Lnear Algebra Harry G. Kwatny Department of Mechancal Engneerng & Mechancs Drexel Unversty Outlne Vectors Matrces MATLAB Advanced Topcs Vectors A
More informationLecture 2: Gram-Schmidt Vectors and the LLL Algorithm
NYU, Fall 2016 Lattces Mn Course Lecture 2: Gram-Schmdt Vectors and the LLL Algorthm Lecturer: Noah Stephens-Davdowtz 2.1 The Shortest Vector Problem In our last lecture, we consdered short solutons to
More informationOutline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique
Outlne and Readng Dynamc Programmng The General Technque ( 5.3.2) -1 Knapsac Problem ( 5.3.3) Matrx Chan-Product ( 5.3.1) Dynamc Programmng verson 1.4 1 Dynamc Programmng verson 1.4 2 Dynamc Programmng
More informationCOMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS
More informationThe Fundamental Theorem of Distributed Storage Systems Revisited
The Fundamental Theorem of Dstrbuted Storage Systems Revsted Png Hu Department of Electronc Engneerng Cty Unversty of Hong Kong Emal: png.hu@my.ctyu.edu.h Kenneth W. Shum Insttute of Networ Codng the Chnese
More informationarxiv: v1 [quant-ph] 6 Sep 2007
An Explct Constructon of Quantum Expanders Avraham Ben-Aroya Oded Schwartz Amnon Ta-Shma arxv:0709.0911v1 [quant-ph] 6 Sep 2007 Abstract Quantum expanders are a natural generalzaton of classcal expanders.
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More informationFoundations of Arithmetic
Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an
More informationLINEAR REGRESSION ANALYSIS. MODULE IX Lecture Multicollinearity
LINEAR REGRESSION ANALYSIS MODULE IX Lecture - 30 Multcollnearty Dr. Shalabh Department of Mathematcs and Statstcs Indan Insttute of Technology Kanpur 2 Remedes for multcollnearty Varous technques have
More informationMin Cut, Fast Cut, Polynomial Identities
Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.
More informationErrata to Invariant Theory with Applications January 28, 2017
Invarant Theory wth Applcatons Jan Drasma and Don Gjswjt http: //www.wn.tue.nl/~jdrasma/teachng/nvtheory0910/lecturenotes12.pdf verson of 7 December 2009 Errata and addenda by Darj Grnberg The followng
More informationMATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS
MATH 241B FUNCTIONAL ANALYSIS - NOTES EXAMPLES OF C ALGEBRAS These are nformal notes whch cover some of the materal whch s not n the course book. The man purpose s to gve a number of nontrval examples
More informationErrors for Linear Systems
Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch
More informationarxiv: v1 [math.co] 1 Mar 2014
Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest
More information= z 20 z n. (k 20) + 4 z k = 4
Problem Set #7 solutons 7.2.. (a Fnd the coeffcent of z k n (z + z 5 + z 6 + z 7 + 5, k 20. We use the known seres expanson ( n+l ( z l l z n below: (z + z 5 + z 6 + z 7 + 5 (z 5 ( + z + z 2 + z + 5 5
More informationEdge Isoperimetric Inequalities
November 7, 2005 Ross M. Rchardson Edge Isopermetrc Inequaltes 1 Four Questons Recall that n the last lecture we looked at the problem of sopermetrc nequaltes n the hypercube, Q n. Our noton of boundary
More informationFirst day August 1, Problems and Solutions
FOURTH INTERNATIONAL COMPETITION FOR UNIVERSITY STUDENTS IN MATHEMATICS July 30 August 4, 997, Plovdv, BULGARIA Frst day August, 997 Problems and Solutons Problem. Let {ε n } n= be a sequence of postve
More informationMATH Sensitivity of Eigenvalue Problems
MATH 537- Senstvty of Egenvalue Problems Prelmnares Let A be an n n matrx, and let λ be an egenvalue of A, correspondngly there are vectors x and y such that Ax = λx and y H A = λy H Then x s called A
More informationStructure and Drive Paul A. Jensen Copyright July 20, 2003
Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.
More informationLecture 10: May 6, 2013
TTIC/CMSC 31150 Mathematcal Toolkt Sprng 013 Madhur Tulsan Lecture 10: May 6, 013 Scrbe: Wenje Luo In today s lecture, we manly talked about random walk on graphs and ntroduce the concept of graph expander,
More informationThe optimal delay of the second test is therefore approximately 210 hours earlier than =2.
THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple
More informationLinear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space.
Lnear, affne, and convex sets and hulls In the sequel, unless otherwse specfed, X wll denote a real vector space. Lnes and segments. Gven two ponts x, y X, we defne xy = {x + t(y x) : t R} = {(1 t)x +
More informationRestricted Lie Algebras. Jared Warner
Restrcted Le Algebras Jared Warner 1. Defntons and Examples Defnton 1.1. Let k be a feld of characterstc p. A restrcted Le algebra (g, ( ) [p] ) s a Le algebra g over k and a map ( ) [p] : g g called
More informationGraph Reconstruction by Permutations
Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer
More informationThe L(2, 1)-Labeling on -Product of Graphs
Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh
More informationCommunication Complexity 16:198: February Lecture 4. x ij y ij
Communcaton Complexty 16:198:671 09 February 2010 Lecture 4 Lecturer: Troy Lee Scrbe: Rajat Mttal 1 Homework problem : Trbes We wll solve the thrd queston n the homework. The goal s to show that the nondetermnstc
More informationExample: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,
The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson
More informationSL n (F ) Equals its Own Derived Group
Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu
More informationThe Geometry of Logit and Probit
The Geometry of Logt and Probt Ths short note s meant as a supplement to Chapters and 3 of Spatal Models of Parlamentary Votng and the notaton and reference to fgures n the text below s to those two chapters.
More informationMDS Array Codes for Correcting a Single Criss-Cross Error
1068 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 MDS Array Codes for Correctng a Sngle Crss-Cross Error Maro Blaum, Fellow, IEEE, and Jehoshua Bruck, Senor Member, IEEE Abstract We
More information7. Products and matrix elements
7. Products and matrx elements 1 7. Products and matrx elements Based on the propertes of group representatons, a number of useful results can be derved. Consder a vector space V wth an nner product ψ
More informationExercises. 18 Algorithms
18 Algorthms Exercses 0.1. In each of the followng stuatons, ndcate whether f = O(g), or f = Ω(g), or both (n whch case f = Θ(g)). f(n) g(n) (a) n 100 n 200 (b) n 1/2 n 2/3 (c) 100n + log n n + (log n)
More informationApproximate Smallest Enclosing Balls
Chapter 5 Approxmate Smallest Enclosng Balls 5. Boundng Volumes A boundng volume for a set S R d s a superset of S wth a smple shape, for example a box, a ball, or an ellpsod. Fgure 5.: Boundng boxes Q(P
More informationEigenvalues of Random Graphs
Spectral Graph Theory Lecture 2 Egenvalues of Random Graphs Danel A. Spelman November 4, 202 2. Introducton In ths lecture, we consder a random graph on n vertces n whch each edge s chosen to be n the
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More informationSome Consequences. Example of Extended Euclidean Algorithm. The Fundamental Theorem of Arithmetic, II. Characterizing the GCD and LCM
Example of Extended Eucldean Algorthm Recall that gcd(84, 33) = gcd(33, 18) = gcd(18, 15) = gcd(15, 3) = gcd(3, 0) = 3 We work backwards to wrte 3 as a lnear combnaton of 84 and 33: 3 = 18 15 [Now 3 s
More informationECE559VV Project Report
ECE559VV Project Report (Supplementary Notes Loc Xuan Bu I. MAX SUM-RATE SCHEDULING: THE UPLINK CASE We have seen (n the presentaton that, for downlnk (broadcast channels, the strategy maxmzng the sum-rate
More informationSimultaneous Optimization of Berth Allocation, Quay Crane Assignment and Quay Crane Scheduling Problems in Container Terminals
Smultaneous Optmzaton of Berth Allocaton, Quay Crane Assgnment and Quay Crane Schedulng Problems n Contaner Termnals Necat Aras, Yavuz Türkoğulları, Z. Caner Taşkın, Kuban Altınel Abstract In ths work,
More informationGeneralized Linear Methods
Generalzed Lnear Methods 1 Introducton In the Ensemble Methods the general dea s that usng a combnaton of several weak learner one could make a better learner. More formally, assume that we have a set
More informationEstimation: Part 2. Chapter GREG estimation
Chapter 9 Estmaton: Part 2 9. GREG estmaton In Chapter 8, we have seen that the regresson estmator s an effcent estmator when there s a lnear relatonshp between y and x. In ths chapter, we generalzed the
More informationHongyi Miao, College of Science, Nanjing Forestry University, Nanjing ,China. (Received 20 June 2013, accepted 11 March 2014) I)ϕ (k)
ISSN 1749-3889 (prnt), 1749-3897 (onlne) Internatonal Journal of Nonlnear Scence Vol.17(2014) No.2,pp.188-192 Modfed Block Jacob-Davdson Method for Solvng Large Sparse Egenproblems Hongy Mao, College of
More informationLinear Algebra and its Applications
Lnear Algebra and ts Applcatons 4 (00) 5 56 Contents lsts avalable at ScenceDrect Lnear Algebra and ts Applcatons journal homepage: wwwelsevercom/locate/laa Notes on Hlbert and Cauchy matrces Mroslav Fedler
More informationGames of Threats. Elon Kohlberg Abraham Neyman. Working Paper
Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017
More informationCalculation of time complexity (3%)
Problem 1. (30%) Calculaton of tme complexty (3%) Gven n ctes, usng exhaust search to see every result takes O(n!). Calculaton of tme needed to solve the problem (2%) 40 ctes:40! dfferent tours 40 add
More informationLecture 3. Ax x i a i. i i
18.409 The Behavor of Algorthms n Practce 2/14/2 Lecturer: Dan Spelman Lecture 3 Scrbe: Arvnd Sankar 1 Largest sngular value In order to bound the condton number, we need an upper bound on the largest
More informationStanford University CS254: Computational Complexity Notes 7 Luca Trevisan January 29, Notes for Lecture 7
Stanford Unversty CS54: Computatonal Complexty Notes 7 Luca Trevsan January 9, 014 Notes for Lecture 7 1 Approxmate Countng wt an N oracle We complete te proof of te followng result: Teorem 1 For every
More informationLecture 20: Lift and Project, SDP Duality. Today we will study the Lift and Project method. Then we will prove the SDP duality theorem.
prnceton u. sp 02 cos 598B: algorthms and complexty Lecture 20: Lft and Project, SDP Dualty Lecturer: Sanjeev Arora Scrbe:Yury Makarychev Today we wll study the Lft and Project method. Then we wll prove
More informationSubset Topological Spaces and Kakutani s Theorem
MOD Natural Neutrosophc Subset Topologcal Spaces and Kakutan s Theorem W. B. Vasantha Kandasamy lanthenral K Florentn Smarandache 1 Copyrght 1 by EuropaNova ASBL and the Authors Ths book can be ordered
More informationFACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP
C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class
More informationEcon107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)
I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes
More informationCSci 6974 and ECSE 6966 Math. Tech. for Vision, Graphics and Robotics Lecture 21, April 17, 2006 Estimating A Plane Homography
CSc 6974 and ECSE 6966 Math. Tech. for Vson, Graphcs and Robotcs Lecture 21, Aprl 17, 2006 Estmatng A Plane Homography Overvew We contnue wth a dscusson of the major ssues, usng estmaton of plane projectve
More informationPRIMES 2015 reading project: Problem set #3
PRIMES 2015 readng project: Problem set #3 page 1 PRIMES 2015 readng project: Problem set #3 posted 31 May 2015, to be submtted around 15 June 2015 Darj Grnberg The purpose of ths problem set s to replace
More informationSolutions to exam in SF1811 Optimization, Jan 14, 2015
Solutons to exam n SF8 Optmzaton, Jan 4, 25 3 3 O------O -4 \ / \ / The network: \/ where all lnks go from left to rght. /\ / \ / \ 6 O------O -5 2 4.(a) Let x = ( x 3, x 4, x 23, x 24 ) T, where the varable
More informationSrednicki Chapter 34
Srednck Chapter 3 QFT Problems & Solutons A. George January 0, 203 Srednck 3.. Verfy that equaton 3.6 follows from equaton 3.. We take Λ = + δω: U + δω ψu + δω = + δωψ[ + δω] x Next we use equaton 3.3,
More informationMatrix Approximation via Sampling, Subspace Embedding. 1 Solving Linear Systems Using SVD
Matrx Approxmaton va Samplng, Subspace Embeddng Lecturer: Anup Rao Scrbe: Rashth Sharma, Peng Zhang 0/01/016 1 Solvng Lnear Systems Usng SVD Two applcatons of SVD have been covered so far. Today we loo
More informationSTAT 309: MATHEMATICAL COMPUTATIONS I FALL 2018 LECTURE 16
STAT 39: MATHEMATICAL COMPUTATIONS I FALL 218 LECTURE 16 1 why teratve methods f we have a lnear system Ax = b where A s very, very large but s ether sparse or structured (eg, banded, Toepltz, banded plus
More informationQuantum Mechanics for Scientists and Engineers. David Miller
Quantum Mechancs for Scentsts and Engneers Davd Mller Types of lnear operators Types of lnear operators Blnear expanson of operators Blnear expanson of lnear operators We know that we can expand functons
More informationGELFAND-TSETLIN BASIS FOR THE REPRESENTATIONS OF gl n
GELFAND-TSETLIN BASIS FOR THE REPRESENTATIONS OF gl n KANG LU FINITE DIMENSIONAL REPRESENTATIONS OF gl n Let e j,, j =,, n denote the standard bass of the general lnear Le algebra gl n over the feld of
More information2 More examples with details
Physcs 129b Lecture 3 Caltech, 01/15/19 2 More examples wth detals 2.3 The permutaton group n = 4 S 4 contans 4! = 24 elements. One s the dentty e. Sx of them are exchange of two objects (, j) ( to j and
More informationBallot Paths Avoiding Depth Zero Patterns
Ballot Paths Avodng Depth Zero Patterns Henrch Nederhausen and Shaun Sullvan Florda Atlantc Unversty, Boca Raton, Florda nederha@fauedu, ssull21@fauedu 1 Introducton In a paper by Sapounaks, Tasoulas,
More informationDISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization
DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.
More informationLecture 12: Discrete Laplacian
Lecture 12: Dscrete Laplacan Scrbe: Tanye Lu Our goal s to come up wth a dscrete verson of Laplacan operator for trangulated surfaces, so that we can use t n practce to solve related problems We are mostly
More information