Refined Coding Bounds for Network Error Correction
|
|
- Chastity Delphia Stafford
- 5 years ago
- Views:
Transcription
1 Refned Codng Bounds for Network Error Correcton Shenghao Yang Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong Raymond W. Yeung Department of Informaton Engneerng The Chnese Unversty of Hong Kong Shatn, N.T., Hong Kong Abstract Wth respect to a gven set of local encodng kernels defnng a lnear network code, refned versons of the Hammng bound, the Sngleton bound the Glbert-Varshamov bound for network error correcton are proved by the weght propertes of network codes. Ths refned Sngleton bound s also proved to be tght for lnear message sets. Index Terms Network error correcton codng, network Hammng weght, Sngleton bound, Glbert-Varshamov bound. I. INTRODUCTION The network error correcton problem studed n [1] [5] s to extend classcal error correcton codng theory to a general network settng. The concept of network error correcton codng was frst ntroduced by Ca Yeung [1] [3]. They generalzed the Hammng bound, the Sngleton bound the Glbert-Varshamov bound n classcal error correcton codng to network codng. Zhang [4] ntroduced the mnmum rank for lnear network codes, whch plays a role smlar to that of the mnmum dstance n decodng classcal error-correctng codes. Recently, network generalzatons of the Hammng weght, the Hammng dstance, the mnmum dstance of network codes have been obtaned by Yang Yeung [5]. In terms of the mnmum dstance, the capablty of a network code for error correcton, error detecton, erasure correcton can be fully characterzed. The relaton between network codng maxmum dstance separaton (MDS codes n classcal algebrac codng has been clarfed n [6]. In ths paper, we present stronger versons of the Hammng bound, the Sngleton bound the Glbert-Varshamov bound for network error correcton compared wth those bounds obtaned n [1] [3]. Our proofs of these bounds are based on the weght propertes of network codes [5]. An algorthm that constructs a lnear network codes achevng a refned Sngleton bound from a classcal lnear block code has recently been presented n [9]. In ths paper, we present a dfferent constructve proof to the tghtness of the Sngleton bound wth respect to a gven sets of global encodng kernels defnng a lnear network code. Ths paper s organzed as follows. Secton II formulates the network error correcton problem. Secton III revews the weght propertes of network codes. The codng bounds are proved n Secton IV. In the last secton we summarze our work. II. PROBLEM FORMULATION We study network transmsson n a drected acyclc communcaton network represented by G = (V, E, where V s the set of nodes E s the set of edges n the network. We assume an order on the edge set E whch s consstent wth the assocated partal order of the drected acyclc network G. An edge from node a to node b, say edge e, represents a communcaton channel from node a to node b. We call node a (node b the tal (head of edge e, denoted by tal(e (head(e. In(a = {e E : head(e = a} Out(a = {e E : tal(e = a} be the sets of nput edges output edges of node a, respectvely. There can be multple edges between a par of nodes, each edge can transmt one symbol n a fnte feld F. A multcast on G transmts nformaton from a source node s to a set of snk nodes T. n s = Out(s. The source node s modulates the nformaton to be multcast nto a row vector x F ns called the message vector. The set of all message vectors, a subset of F n s, s called the message set denoted by C. The source node s transmts the message vector by mappng ts n s components onto the edges n Out(s. Defne an n s E matrx A = [A,j ] as { 1 ej s the th edge n Out(s, A,j = (1 0 otherwse. By applyng the order on E to Out(s, the n s non-zero columns of A form an dentty matrx. An error vector z s an E -dmensonal row vector wth each component representng the error on the correspondng edge. An error pattern s a subset of E. An error vector s sad to match an error pattern f all the errors occur on the edges n the error pattern. The set of all error vectors that match error pattern ρ s denoted by ρ. ρ z be the error pattern correspondng to the non-zero components of an error vector z. For network G, a lnear network error-correctng code, or a lnear network code for brevty, s specfed by a set of local encodng kernels {k e,e : e, e E} the message set C. The local encodng kernel k e,e can be non-zero only f e In(tal(e. Defne the E E one-step transton matrx
2 K = [K,j ] for network G as K,j = k e,e j. ( For an acyclc network, K N = 0 for some postve nteger N. Defne the transfer matrx of the network by F = (I K 1 [7], so that the symbols transmtted on the edges are gven by the components of (xa + zf. For a snk node t T, wrte n t = In(t, defne an E n t matrx B t = [B,j ] for snk node t as Defnton : For any snk node t, the network Hammng dstance between two receved vectors y 1 y s defned by Dt rec (y 1, y = Wt rec (y 1 y ; (8 the network Hammng dstance between two message vectors x 1 x s defned by D msg t (x 1, x = W msg t (x 1 x. (9 B,j = { 1 e s the jth edge n In(t, 0 otherwse. (3 Defnton 3: The uncast mnmum dstance of a network code wth message set C for snk node t s defned by Agan by applyng the order on E to In(t, the n t nonzero rows of B t form an dentty matrx. The recepton at a snk node t s gven by y t = (xa + zf B t, = xf s,t + zf t, (4 where F s,t = AF B t s the submatrx of F gven by the ntersecton of the n s rows correspondng to the edges n Out(s the n t columns correspondng to the edges n In(t, F t = F B t s the submatrx of F formed by the columns of F correspondng to the nput edges of snk node t. F s,t F t are the transfer matrces of message transmsson error transmsson, respectvely, for snk node t. Denote the rank of F s,t by m t. Euaton (4 s the formulaton of the multcast network error correcton problem gven n [4]. The classcal error correcton problem s a specal case n whch both of F s,t F t reduce to dentty matrces. The message transmsson capacty of the network code, n the absence of errors, s measured by the rank of the transfer matrx F s,t. Denote the maxmum flow between source node s snk node t by maxflow(s,t. Evdently, for any lnear network code on G, the rank of F s,t s upper bounded by maxflow(s,t [6]. When the network s error-free, the error correcton problem s reduced to the usual network codng problem, for whch the sze of the message set C s bounded by mn maxflow(s,t [8]. III. PREVIOUS RESULTS A. Weght Propertes of Network Codes For any t T, let Υ t (y = {z F E : zf t = y} for a receved vector y Im(F t = {z F t : z F E }. Defnton 1: For any snk node t, the network Hammng weghts of a receved vector y, of an error vector z, of a message vector x are defned by respectvely. W rec t (y = mn z Υ t (y w H(z, (5 Wt err (z = Wt rec (zf t, (6 W msg t (x = Wt rec (xf s,t, (7 d mn,t = mn{d msg t (x, x : x, x C, x x }. (10 Theorem 1 ( [5]: For a snk node t, the followng fve propertes of a network code are euvalent: 1 The code can correct any error vector z wth w H (z d/; The code can correct any error vector z wth Wt err (z d/; 3 The code can detect any error vector z wth 0 < w H (z d; 4 The code can detect any error vector z wth 0 < Wt err (z d; 5 The code has d mn,t d + 1; where d s a nonnegatve nteger. B. Codng Bounds d mn = mn d mn,t, (11 n = mn maxflow(s, t. (1 In terms of the noton of mnmum dstance, the Hammng bound the Sngleton bound for network codes obtaned n [] can be restated as C where r = d mn 1, =0 n ( n, (13 C n dmn+1. (14 The tghtness of (14 has been proved n [3]. IV. REFINED CODING BOUNDS In ths secton, we employ the tools of network Hammng weght to prove refned versons of the codng bounds n [1] [3]. The proofs presented here are consderably smpler more transparent.
3 A. Hammng Bound Sngleton Bound Theorem (Hammng bound Sngleton bound: A network code wth rank(f s,t = m t, message set C, uncast mnmum dstance d mn,t > 0 for any snk node t satsfes the 1 Hammng bound: C t =0 m t where r t = d mn,t 1, the Sngleton bound: C m t d mn,t +1, (15 (16 for all snk node t. Proof: Fx a snk node t. Fnd m t lnearly ndependent rows of F s,t let ρ t be the set of edges n Out(s that corresponds to these m t lnearly ndependent rows. Note that ρ t Out(s E, so that ρ t s an error pattern. Defne the set C t = {x F n s : x A ρ t, x F s,t = xf s,t for some x C}, (17 where the matrx A s defned as (1. Defne a mappng φ t : C C t (18 by φ t (x = x f x F s,t = xf s,t. Snce the rows of F s,t ndexed by ρ t form a bass for the row space of F s,t, φ t s well-defned. The mappng φ t s onto by the defnton of C t. The mappng φ t s also one-to-one because otherwse there exsts x C t such that x F s,t = x 1 F s,t = x F s,t for dstnct x 1, x C, a contradcton to the assumpton that d mn,t > 0. Thus the mappng φ t s a one-to-one onto mappng, whch mples that C t = C. Z t = {z ρ t : w H (z r t }. (19 By Theorem 1, the network code wth C beng the message set can correct all the errors n Z t at snk node t. Snce snk node t has the same recepton for the transmsson of ether x C or φ t (x C t for the same error vector, the network code wth C t beng the message set can also correct all the errors n Z t at snk node t. Consder the problem of fndng a subset of ρ t as an errorcorrectng code that can correct all the errors n Z t. Ths problem s euvalent to the problem n classcal algebrac codng of fndng a block code wth codeword length m t that can correct r t errors. The vectors n the set C t = {xa : x C t} must form such a code, otherwse the network code wth C t beng the message set cannot possbly correct all the error vectors n Z t at snk node t. Applyng the Hammng bound the Sngleton bound for classcal error-correctng codes to C t, we have C t t =0 mt, (0 C t mt dmn,t+1. (1 The proof s completed by notng that C = C t = C t. The Hammng bound the Sngleton bound n Theorem are more refned than those n [1], [] because as we wll show, they mply (13 (14 but not vce versa. The Hammng bound n Theorem mples C t =0 =0 mt mt maxflow(s,t =0 ( maxflow(s,t ( (3 (4 for all snk nodes t, where (3 follows from r r t (4 follows from m t maxflow(s, t the neualty proved n the Appendx. By the same neualty, upon mnmzng over all snk nodes t T, we obtan (13. To verfy that the condton for the neualty n the Appendx apples n the above, by consderng the Sngleton bound n (16, we obtan or for all t T. Then 1 C (5 mt dmn,t+1 (6 d mn,t 1 m t (7 r = d mn 1 (8 d mn,t 1 (9 d mn,t 1 (30 m t (31 for all t T. For the Sngleton bound n Theorem, we frst note that t s maxmzed when m t = maxflow(s, t for all t T. Ths can be acheved by a lnear broadcast whose exstence was proved n [10], [6]. To show that the Sngleton bound n Theorem mples (14, consder C m t d mn,t +1 m t d mn +1 maxflow(s,t d mn+1 (3 (33 (34 for all snk nodes t. Then (14 s obtaned upon mnmzng over all t T. B. Glbert Bound Varshamov Bound t (x, d = {x F ns For x = 0, we can wrte t (0, d = {x F ns : D msg t (x, x d}. (35 : W msg t (x d}. (36
4 Then t s readly seen that t (0, d s closed under scalar multplcaton,.e., α t (0, d = {αx : x t (0, d} = t (0, d, (37 where α F α 0. For two subsets V 1, V F ns, ther sum s the set defned by V 1 + V = {v 1 + v : v 1 V 1, v V }. (38 For v F ns V F ns, we also wrte {v} + V as v + V. Theorem 3 (Glbert bound: Gven a set of local encodng kernels, let C max be the maxmum possble sze of the message set such that the network code has uncast mnmum dstance greater than or eual to d t > 0 for each snk node t. Then, where C max ns (0, (39 (0 = t (0, d t 1. (40 Proof: C be the message set wth the maxmum possble sze. Then for any x F n s, there exsts a codeword c C a snk node t such that D msg t (x, c d t 1, (41 snce otherwse we could add x to the message set whle keepng the mnmum dstance larger than or eual to d t for each snk node t, whch s a contradcton on the maxmalty of C. (c = t (c, d t 1. (4 Hence, the whole space F n s s contaned n the unon of (c over all messages c C,.e., F n s c C (c. (43 Snce (c = c + (0, we have (c = (0. So we deduce that ns C (0, that s C ns (0. (44 Theorem 4 (Varshamov bound: Gven a set of local encodng kernels, let ω max be the maxmum possble dmenson of the lnear message set such that the network code has uncast mnmum dstance larger than or eual to d t > 0 for each snk node t. Then, ω max n s log (0, (45 where (0 s defned n (40. Proof: C be the lnear message set wth the maxmum possble dmenson. We clam that F ns (0 + C. (46 If the clam s true, then ns = (0 + C (47 (0 C (48 = (0 ω max, (49 provng (45. The clam s proved by contradcton. g F ns \ ( (0 + C, (50 C = C + g. Then C s a subspace wth dmenson ω max +1. If C (0 {0}, then there exsts a non-zero vector c + αg (0, (51 where c C α F. Here, α 0, otherwse we have c = 0 because C (0 = {0}. Snce t (0, d t 1 s closed under scalar multplcaton for all t T, see from (40 that the same holds for (0. Thus from (51, g (0 α 1 c (5 (0 + C, (53 whch s a contradcton to (50. Therefore, C (0 = {0},.e., C s a message set such that the network code has uncast mnmum dstance larger than or eual to d t, whch s a contradcton on the maxmalty of C. The proof s completed. C. Tghtness of the Sngleton Bound Theorem 5: Gven a set of local encodng kernels over a fnte feld wth sze where s suffcently large, for every 0 ω mn m t, (54 there exsts a message set C wth C = ω such that d mn,t = + 1 (55 for all snk nodes t. Proof: we start wth any gven set of local encodng kernels whch defnes a lnear network code. Ths determnes m t for all snk nodes t. Fx an ω whch satsfes (54. We wll then construct an ω-dmensonal lnear message set whch together wth the gven lnear network code consttute a lnear network error-correctng code that satsfy (55 for all t. Note that (54 (55 mply d mn,t 1. (56 We now construct the message set C. g 1,, g ω F n s be a seuence of vectors obtaned as follows. For each, 1 ω, choose g such that g / t (0, + g 1,, g 1, (57 t (0, g 1,, g = {0}, (58
5 for each snk node t. If such g 1,, g ω exst, then C = g 1,, g ω s the desred message set snce (58 holdng for = ω means d mn,t + 1 for any snk node t. We frst prove that g satsfyng (57 exsts f the feld sze s suffcently large. Observe that t (0, + g 1,, g 1 t (0, 1 (59 ( E mt ω n s m t 1 (60 ( E = ns ω+ 1. (61 Thus, when consderng all the snk nodes, we have at most ( E n s ω+ 1 (6 vectors that cannot be chosen as g. If > ( E, (63 then there exsts a vector that can be chosen as g for = 1,, ω. Fx g 1,, g ω that satsfy (57. We proof by nducton that (58 holds for these g any snk node t. If (58 does not hold for = 1, then there exsts a non-zero vector αg 1 t (0,, where α F. Snce t (0, s closed under scalar multplcaton α 0, we have g 1 t (0,, a contradcton to (57 holdng for g 1. Assume (58 holds for k 1. If (58 does not hold for = k, then there exsts a non-zero vector k α g t (0,, (64 =1 where α F. If α k = 0, k 1 α g t (0,, (65 =1 a contradcton to the assumpton that (58 holds for = k 1. Thus α k 0. Agan, by t (0, beng closed under scalar multplcaton, we have k 1 g k t (0, α 1 k α g (66 =1 t (0, + g 1,, g k 1, (67 a contradcton to g k satsfyng (57. The proof s completed. The neualty m ( m =0 APPENDIX PROOF OF AN INEQUALITY < m+1 r =0 for r m/ can be establshed by consderng m ( m =0 = < =0 m+1 (m +1 m+1 m+1 =0 (68 (69, (70 where (70 holds because (m +1 m+1 > 1 gven that r m/. REFERENCES [1] N. Ca R. W. Yeung, Network codng error correcton, n Proc. IEEE ITW 0, 00. [] R. W. Yeung N. Ca, Network error correcton, part I: basc concepts upper bounds, Communcatons n Informaton Systems, vol. 6, no. 1, pp , 006. [3] N. Ca R. W. Yeung, Network error correcton, part II: lower bounds, Communcatons n Informaton Systems, vol. 6, no. 1, pp , 006. [4] Z. Zhang, Network error correcton codng n packetzed networks, n Proc. IEEE ITW 06, Oct [5] S. Yang R. W. Yeung, Characterzatons of network error correcton/detecton erasure correcton, n Proc. NetCod 07, Jan [6] R. W. Yeung, S.-Y. R. L, N. Ca, Z. Zhang, Network codng theory, Foundaton Trends n Communcatons Informaton Theory, vol., no. 4 5, pp , 005. [7] R. Koetter M. Medard, An algebrac approach to network codng, IEEE/ACM Trans. Networkng, vol. 11, no. 5, pp , Oct [8] R. Ahlswede, N. Ca, S.-Y. R. L, R. W. Yeung, Network nformaton flow, IEEE Trans. Inform. Theory, vol. 46, no. 4, pp , July 000. [9] S. Yang, C. K. Nga, R. W. Yeung, Constructon of lnear network codes that acheve a refned Sngleton bound, submtted to ISIT 07. [10] S.-Y. R. L, R. W. Yeung, N. Ca, Lnear network codng, IEEE Trans. Inform. Theory, vol. 49, no., pp , Feb [11] S. Jagg, P. Sers, P. A. Chou, M. Effros, S. Egner, K. Jan, L. Tolhuzen, Polynomal tme algorthms for multcast network code constructon, IEEE Trans. Inform. Theory, vol. 51, no. 6, pp , June 005. V. CONCLUDING REMARKS Refned versons of the Hammng bound, the Sngleton bound the Glbert-Varshamov bound for network error correcton n [1] [3] are obtaned. Ths refned Sngleton bound s also shown to be tght for lnear message sets. By employng the tools of network Hammng weght, the proofs presented here are consderably smpler more transparent.
8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS
SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 493 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces you have studed thus far n the text are real vector spaces because the scalars
More informationAPPENDIX A Some Linear Algebra
APPENDIX A Some Lnear Algebra The collecton of m, n matrces A.1 Matrces a 1,1,..., a 1,n A = a m,1,..., a m,n wth real elements a,j s denoted by R m,n. If n = 1 then A s called a column vector. Smlarly,
More information2.3 Nilpotent endomorphisms
s a block dagonal matrx, wth A Mat dm U (C) In fact, we can assume that B = B 1 B k, wth B an ordered bass of U, and that A = [f U ] B, where f U : U U s the restrcton of f to U 40 23 Nlpotent endomorphsms
More informationn α j x j = 0 j=1 has a nontrivial solution. Here A is the n k matrix whose jth column is the vector for all t j=0
MODULE 2 Topcs: Lnear ndependence, bass and dmenson We have seen that f n a set of vectors one vector s a lnear combnaton of the remanng vectors n the set then the span of the set s unchanged f that vector
More informationThe Fundamental Theorem of Distributed Storage Systems Revisited
The Fundamental Theorem of Dstrbuted Storage Systems Revsted Png Hu Department of Electronc Engneerng Cty Unversty of Hong Kong Emal: png.hu@my.ctyu.edu.h Kenneth W. Shum Insttute of Networ Codng the Chnese
More informationMaximizing the number of nonnegative subsets
Maxmzng the number of nonnegatve subsets Noga Alon Hao Huang December 1, 213 Abstract Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what s the maxmum
More informationLectures - Week 4 Matrix norms, Conditioning, Vector Spaces, Linear Independence, Spanning sets and Basis, Null space and Range of a Matrix
Lectures - Week 4 Matrx norms, Condtonng, Vector Spaces, Lnear Independence, Spannng sets and Bass, Null space and Range of a Matrx Matrx Norms Now we turn to assocatng a number to each matrx. We could
More informationLecture 5 Decoding Binary BCH Codes
Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture
More informationLecture 3: Shannon s Theorem
CSE 533: Error-Correctng Codes (Autumn 006 Lecture 3: Shannon s Theorem October 9, 006 Lecturer: Venkatesan Guruswam Scrbe: Wdad Machmouch 1 Communcaton Model The communcaton model we are usng conssts
More informationProblem Set 9 Solutions
Desgn and Analyss of Algorthms May 4, 2015 Massachusetts Insttute of Technology 6.046J/18.410J Profs. Erk Demane, Srn Devadas, and Nancy Lynch Problem Set 9 Solutons Problem Set 9 Solutons Ths problem
More informationFINITELY-GENERATED MODULES OVER A PRINCIPAL IDEAL DOMAIN
FINITELY-GENERTED MODULES OVER PRINCIPL IDEL DOMIN EMMNUEL KOWLSKI Throughout ths note, s a prncpal deal doman. We recall the classfcaton theorem: Theorem 1. Let M be a fntely-generated -module. (1) There
More informationConnecting Multiple-unicast and Network Error Correction: Reduction and Unachievability
Connectng Multple-uncast and Network Error Correcton: Reducton and Unachevablty Wentao Huang Calforna Insttute of Technology Mchael Langberg Unversty at Buffalo, SUNY Joerg Klewer New Jersey Insttute of
More information5 The Rational Canonical Form
5 The Ratonal Canoncal Form Here p s a monc rreducble factor of the mnmum polynomal m T and s not necessarly of degree one Let F p denote the feld constructed earler n the course, consstng of all matrces
More informationFirst day August 1, Problems and Solutions
FOURTH INTERNATIONAL COMPETITION FOR UNIVERSITY STUDENTS IN MATHEMATICS July 30 August 4, 997, Plovdv, BULGARIA Frst day August, 997 Problems and Solutons Problem. Let {ε n } n= be a sequence of postve
More informationVolume 18 Figure 1. Notation 1. Notation 2. Observation 1. Remark 1. Remark 2. Remark 3. Remark 4. Remark 5. Remark 6. Theorem A [2]. Theorem B [2].
Bulletn of Mathematcal Scences and Applcatons Submtted: 016-04-07 ISSN: 78-9634, Vol. 18, pp 1-10 Revsed: 016-09-08 do:10.1805/www.scpress.com/bmsa.18.1 Accepted: 016-10-13 017 ScPress Ltd., Swtzerland
More informationLinear, affine, and convex sets and hulls In the sequel, unless otherwise specified, X will denote a real vector space.
Lnear, affne, and convex sets and hulls In the sequel, unless otherwse specfed, X wll denote a real vector space. Lnes and segments. Gven two ponts x, y X, we defne xy = {x + t(y x) : t R} = {(1 t)x +
More informationThe Order Relation and Trace Inequalities for. Hermitian Operators
Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence
More informationSubset Topological Spaces and Kakutani s Theorem
MOD Natural Neutrosophc Subset Topologcal Spaces and Kakutan s Theorem W. B. Vasantha Kandasamy lanthenral K Florentn Smarandache 1 Copyrght 1 by EuropaNova ASBL and the Authors Ths book can be ordered
More informationAffine transformations and convexity
Affne transformatons and convexty The purpose of ths document s to prove some basc propertes of affne transformatons nvolvng convex sets. Here are a few onlne references for background nformaton: http://math.ucr.edu/
More informationTHE CHINESE REMAINDER THEOREM. We should thank the Chinese for their wonderful remainder theorem. Glenn Stevens
THE CHINESE REMAINDER THEOREM KEITH CONRAD We should thank the Chnese for ther wonderful remander theorem. Glenn Stevens 1. Introducton The Chnese remander theorem says we can unquely solve any par of
More information9 Characteristic classes
THEODORE VORONOV DIFFERENTIAL GEOMETRY. Sprng 2009 [under constructon] 9 Characterstc classes 9.1 The frst Chern class of a lne bundle Consder a complex vector bundle E B of rank p. We shall construct
More informationISSN: ISO 9001:2008 Certified International Journal of Engineering and Innovative Technology (IJEIT) Volume 3, Issue 1, July 2013
ISSN: 2277-375 Constructon of Trend Free Run Orders for Orthogonal rrays Usng Codes bstract: Sometmes when the expermental runs are carred out n a tme order sequence, the response can depend on the run
More informationNP-Completeness : Proofs
NP-Completeness : Proofs Proof Methods A method to show a decson problem Π NP-complete s as follows. (1) Show Π NP. (2) Choose an NP-complete problem Π. (3) Show Π Π. A method to show an optmzaton problem
More informationprinceton univ. F 17 cos 521: Advanced Algorithm Design Lecture 7: LP Duality Lecturer: Matt Weinberg
prnceton unv. F 17 cos 521: Advanced Algorthm Desgn Lecture 7: LP Dualty Lecturer: Matt Wenberg Scrbe: LP Dualty s an extremely useful tool for analyzng structural propertes of lnear programs. Whle there
More informationMore metrics on cartesian products
More metrcs on cartesan products If (X, d ) are metrc spaces for 1 n, then n Secton II4 of the lecture notes we defned three metrcs on X whose underlyng topologes are the product topology The purpose of
More informationThe Multiple Classical Linear Regression Model (CLRM): Specification and Assumptions. 1. Introduction
ECONOMICS 5* -- NOTE (Summary) ECON 5* -- NOTE The Multple Classcal Lnear Regresson Model (CLRM): Specfcaton and Assumptons. Introducton CLRM stands for the Classcal Lnear Regresson Model. The CLRM s also
More informationMin Cut, Fast Cut, Polynomial Identities
Randomzed Algorthms, Summer 016 Mn Cut, Fast Cut, Polynomal Identtes Instructor: Thomas Kesselhem and Kurt Mehlhorn 1 Mn Cuts n Graphs Lecture (5 pages) Throughout ths secton, G = (V, E) s a mult-graph.
More informationModule 3 LOSSY IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module 3 LOSSY IMAGE COMPRESSION SYSTEMS Verson ECE IIT, Kharagpur Lesson 6 Theory of Quantzaton Verson ECE IIT, Kharagpur Instructonal Objectves At the end of ths lesson, the students should be able to:
More information} s ) was constructed [7]. C 0 with length n 0 and minimum distance d 0 over F q.
Ffty-Ffth Annual Allerton Conference Allerton House, UIUC, Illnos, USA October 3-6, 17 Mult-Erasure Locally Recoverable Codes Over Small Felds Pengfe Huang, Etan Yaakob, and Paul H Segel Electrcal and
More informationarxiv: v1 [math.co] 1 Mar 2014
Unon-ntersectng set systems Gyula O.H. Katona and Dánel T. Nagy March 4, 014 arxv:1403.0088v1 [math.co] 1 Mar 014 Abstract Three ntersecton theorems are proved. Frst, we determne the sze of the largest
More informationLecture 4: November 17, Part 1 Single Buffer Management
Lecturer: Ad Rosén Algorthms for the anagement of Networs Fall 2003-2004 Lecture 4: November 7, 2003 Scrbe: Guy Grebla Part Sngle Buffer anagement In the prevous lecture we taled about the Combned Input
More informationSmarandache-Zero Divisors in Group Rings
Smarandache-Zero Dvsors n Group Rngs W.B. Vasantha and Moon K. Chetry Department of Mathematcs I.I.T Madras, Chenna The study of zero-dvsors n group rngs had become nterestng problem snce 1940 wth the
More informationSelf-complementing permutations of k-uniform hypergraphs
Dscrete Mathematcs Theoretcal Computer Scence DMTCS vol. 11:1, 2009, 117 124 Self-complementng permutatons of k-unform hypergraphs Artur Szymańsk A. Paweł Wojda Faculty of Appled Mathematcs, AGH Unversty
More informationRandom Walks on Digraphs
Random Walks on Dgraphs J. J. P. Veerman October 23, 27 Introducton Let V = {, n} be a vertex set and S a non-negatve row-stochastc matrx (.e. rows sum to ). V and S defne a dgraph G = G(V, S) and a drected
More informationn ). This is tight for all admissible values of t, k and n. k t + + n t
MAXIMIZING THE NUMBER OF NONNEGATIVE SUBSETS NOGA ALON, HAROUT AYDINIAN, AND HAO HUANG Abstract. Gven a set of n real numbers, f the sum of elements of every subset of sze larger than k s negatve, what
More informationChapter 5. Solution of System of Linear Equations. Module No. 6. Solution of Inconsistent and Ill Conditioned Systems
Numercal Analyss by Dr. Anta Pal Assstant Professor Department of Mathematcs Natonal Insttute of Technology Durgapur Durgapur-713209 emal: anta.bue@gmal.com 1 . Chapter 5 Soluton of System of Lnear Equatons
More informationLong MDS Codes for Optimal Repair Bandwidth
Long MDS Codes for Optmal Repar Bandwdth Zhyng Wang, Itzhak Tamo, and Jehoshua Bruck Electrcal Engneerng Department, Calforna Insttute of Technology, Pasadena, CA 91125, USA Electrcal and Computer Engneerng,
More informationError Probability for M Signals
Chapter 3 rror Probablty for M Sgnals In ths chapter we dscuss the error probablty n decdng whch of M sgnals was transmtted over an arbtrary channel. We assume the sgnals are represented by a set of orthonormal
More informationDIFFERENTIAL FORMS BRIAN OSSERMAN
DIFFERENTIAL FORMS BRIAN OSSERMAN Dfferentals are an mportant topc n algebrac geometry, allowng the use of some classcal geometrc arguments n the context of varetes over any feld. We wll use them to defne
More informationMEM 255 Introduction to Control Systems Review: Basics of Linear Algebra
MEM 255 Introducton to Control Systems Revew: Bascs of Lnear Algebra Harry G. Kwatny Department of Mechancal Engneerng & Mechancs Drexel Unversty Outlne Vectors Matrces MATLAB Advanced Topcs Vectors A
More informationLinear Algebra and its Applications
Lnear Algebra and ts Applcatons 4 (00) 5 56 Contents lsts avalable at ScenceDrect Lnear Algebra and ts Applcatons journal homepage: wwwelsevercom/locate/laa Notes on Hlbert and Cauchy matrces Mroslav Fedler
More informationCocyclic Butson Hadamard matrices and Codes over Z n via the Trace Map
Contemporary Mathematcs Cocyclc Butson Hadamard matrces and Codes over Z n va the Trace Map N. Pnnawala and A. Rao Abstract. Over the past couple of years trace maps over Galos felds and Galos rngs have
More informationCollege of Computer & Information Science Fall 2009 Northeastern University 20 October 2009
College of Computer & Informaton Scence Fall 2009 Northeastern Unversty 20 October 2009 CS7880: Algorthmc Power Tools Scrbe: Jan Wen and Laura Poplawsk Lecture Outlne: Prmal-dual schema Network Desgn:
More informationComposite Hypotheses testing
Composte ypotheses testng In many hypothess testng problems there are many possble dstrbutons that can occur under each of the hypotheses. The output of the source s a set of parameters (ponts n a parameter
More informationQuantum Network Code for Multiple-Unicast Network with Quantum Invertible Linear Operations
Quantum Network Code for Multple-Uncast Network wth Quantum Invertble Lnear Operatons Seunghoan Song Graduate School of Mathematcs, Nagoya Unversty, Nagoya, Japan m702a@mathnagoya-uacjp Masahto Hayash
More informationCHAPTER III Neural Networks as Associative Memory
CHAPTER III Neural Networs as Assocatve Memory Introducton One of the prmary functons of the bran s assocatve memory. We assocate the faces wth names, letters wth sounds, or we can recognze the people
More informationOn the Multicriteria Integer Network Flow Problem
BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 5, No 2 Sofa 2005 On the Multcrtera Integer Network Flow Problem Vassl Vasslev, Marana Nkolova, Maryana Vassleva Insttute of
More informationA CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS
Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs
More informationApplication of Nonbinary LDPC Codes for Communication over Fading Channels Using Higher Order Modulations
Applcaton of Nonbnary LDPC Codes for Communcaton over Fadng Channels Usng Hgher Order Modulatons Rong-Hu Peng and Rong-Rong Chen Department of Electrcal and Computer Engneerng Unversty of Utah Ths work
More informationSL n (F ) Equals its Own Derived Group
Internatonal Journal of Algebra, Vol. 2, 2008, no. 12, 585-594 SL n (F ) Equals ts Own Derved Group Jorge Macel BMCC-The Cty Unversty of New York, CUNY 199 Chambers street, New York, NY 10007, USA macel@cms.nyu.edu
More informationPRIMES 2015 reading project: Problem set #3
PRIMES 2015 readng project: Problem set #3 page 1 PRIMES 2015 readng project: Problem set #3 posted 31 May 2015, to be submtted around 15 June 2015 Darj Grnberg The purpose of ths problem set s to replace
More informationGraph Reconstruction by Permutations
Graph Reconstructon by Permutatons Perre Ille and Wllam Kocay* Insttut de Mathémathques de Lumny CNRS UMR 6206 163 avenue de Lumny, Case 907 13288 Marselle Cedex 9, France e-mal: lle@ml.unv-mrs.fr Computer
More informationThe Minimum Universal Cost Flow in an Infeasible Flow Network
Journal of Scences, Islamc Republc of Iran 17(2): 175-180 (2006) Unversty of Tehran, ISSN 1016-1104 http://jscencesutacr The Mnmum Unversal Cost Flow n an Infeasble Flow Network H Saleh Fathabad * M Bagheran
More informationDISCRIMINANTS AND RAMIFIED PRIMES. 1. Introduction A prime number p is said to be ramified in a number field K if the prime ideal factorization
DISCRIMINANTS AND RAMIFIED PRIMES KEITH CONRAD 1. Introducton A prme number p s sad to be ramfed n a number feld K f the prme deal factorzaton (1.1) (p) = po K = p e 1 1 peg g has some e greater than 1.
More informationYong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 )
Kangweon-Kyungk Math. Jour. 4 1996), No. 1, pp. 7 16 AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS Yong Joon Ryang Abstract. The optmzaton problems wth quadratc constrants often
More informationLecture 14 (03/27/18). Channels. Decoding. Preview of the Capacity Theorem.
Lecture 14 (03/27/18). Channels. Decodng. Prevew of the Capacty Theorem. A. Barg The concept of a communcaton channel n nformaton theory s an abstracton for transmttng dgtal (and analog) nformaton from
More informationErrors for Linear Systems
Errors for Lnear Systems When we solve a lnear system Ax b we often do not know A and b exactly, but have only approxmatons  and ˆb avalable. Then the best thng we can do s to solve ˆx ˆb exactly whch
More informationCoding over an Erasure Channel with a Large Alphabet Size
1 Codng over an Erasure Channel wth a Large Alphabet Sze Shervan Fashand, Shahab Oves Gharan and Amr K. Khandan ECE Dept., Unversty of Waterloo, Waterloo, O, Canada, 2L3G1 emal: sfashand,shahab,khandan}@cst.uwaterloo.ca
More informationCOS 521: Advanced Algorithms Game Theory and Linear Programming
COS 521: Advanced Algorthms Game Theory and Lnear Programmng Moses Charkar February 27, 2013 In these notes, we ntroduce some basc concepts n game theory and lnear programmng (LP). We show a connecton
More informationGenericity of Critical Types
Genercty of Crtcal Types Y-Chun Chen Alfredo D Tllo Eduardo Fangold Syang Xong September 2008 Abstract Ely and Pesk 2008 offers an nsghtful characterzaton of crtcal types: a type s crtcal f and only f
More information3.1 Expectation of Functions of Several Random Variables. )' be a k-dimensional discrete or continuous random vector, with joint PMF p (, E X E X1 E X
Statstcs 1: Probablty Theory II 37 3 EPECTATION OF SEVERAL RANDOM VARIABLES As n Probablty Theory I, the nterest n most stuatons les not on the actual dstrbuton of a random vector, but rather on a number
More information763622S ADVANCED QUANTUM MECHANICS Solution Set 1 Spring c n a n. c n 2 = 1.
7636S ADVANCED QUANTUM MECHANICS Soluton Set 1 Sprng 013 1 Warm-up Show that the egenvalues of a Hermtan operator  are real and that the egenkets correspondng to dfferent egenvalues are orthogonal (b)
More informationSpectral Graph Theory and its Applications September 16, Lecture 5
Spectral Graph Theory and ts Applcatons September 16, 2004 Lecturer: Danel A. Spelman Lecture 5 5.1 Introducton In ths lecture, we wll prove the followng theorem: Theorem 5.1.1. Let G be a planar graph
More informationBOUNDEDNESS OF THE RIESZ TRANSFORM WITH MATRIX A 2 WEIGHTS
BOUNDEDNESS OF THE IESZ TANSFOM WITH MATIX A WEIGHTS Introducton Let L = L ( n, be the functon space wth norm (ˆ f L = f(x C dx d < For a d d matrx valued functon W : wth W (x postve sem-defnte for all
More information12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA. 4. Tensor product
12 MATH 101A: ALGEBRA I, PART C: MULTILINEAR ALGEBRA Here s an outlne of what I dd: (1) categorcal defnton (2) constructon (3) lst of basc propertes (4) dstrbutve property (5) rght exactness (6) localzaton
More informationDynamic Programming. Preview. Dynamic Programming. Dynamic Programming. Dynamic Programming (Example: Fibonacci Sequence)
/24/27 Prevew Fbonacc Sequence Longest Common Subsequence Dynamc programmng s a method for solvng complex problems by breakng them down nto smpler sub-problems. It s applcable to problems exhbtng the propertes
More informationExample: (13320, 22140) =? Solution #1: The divisors of are 1, 2, 3, 4, 5, 6, 9, 10, 12, 15, 18, 20, 27, 30, 36, 41,
The greatest common dvsor of two ntegers a and b (not both zero) s the largest nteger whch s a common factor of both a and b. We denote ths number by gcd(a, b), or smply (a, b) when there s no confuson
More informationP.P. PROPERTIES OF GROUP RINGS. Libo Zan and Jianlong Chen
Internatonal Electronc Journal of Algebra Volume 3 2008 7-24 P.P. PROPERTIES OF GROUP RINGS Lbo Zan and Janlong Chen Receved: May 2007; Revsed: 24 October 2007 Communcated by John Clark Abstract. A rng
More informationOn Network Coding of Independent and Dependent Sources in Line Networks
On Network Codng of Independent and Dependent Sources n Lne Networks Mayank Baksh, Mchelle Effros, WeHsn Gu, Ralf Koetter Department of Electrcal Engneerng Department of Electrcal Engneerng Calforna Insttute
More informationThe Second Eigenvalue of Planar Graphs
Spectral Graph Theory Lecture 20 The Second Egenvalue of Planar Graphs Danel A. Spelman November 11, 2015 Dsclamer These notes are not necessarly an accurate representaton of what happened n class. The
More informationFACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP
C O L L O Q U I U M M A T H E M A T I C U M VOL. 80 1999 NO. 1 FACTORIZATION IN KRULL MONOIDS WITH INFINITE CLASS GROUP BY FLORIAN K A I N R A T H (GRAZ) Abstract. Let H be a Krull monod wth nfnte class
More informationMEM633 Lectures 7&8. Chapter 4. Descriptions of MIMO Systems 4-1 Direct Realizations. (i) x u. y x
MEM633 Lectures 7&8 Chapter 4 Descrptons of MIMO Systems 4- Drect ealzatons y() s s su() s y () s u () s ( s)( s) s y() s u (), s y() s u() s s s y() s u(), s y() s u() s ( s)( s) s () ( s ) y ( s) u (
More informationQuantum and Classical Information Theory with Disentropy
Quantum and Classcal Informaton Theory wth Dsentropy R V Ramos rubensramos@ufcbr Lab of Quantum Informaton Technology, Department of Telenformatc Engneerng Federal Unversty of Ceara - DETI/UFC, CP 6007
More informationGames of Threats. Elon Kohlberg Abraham Neyman. Working Paper
Games of Threats Elon Kohlberg Abraham Neyman Workng Paper 18-023 Games of Threats Elon Kohlberg Harvard Busness School Abraham Neyman The Hebrew Unversty of Jerusalem Workng Paper 18-023 Copyrght 2017
More informationGeneral viscosity iterative method for a sequence of quasi-nonexpansive mappings
Avalable onlne at www.tjnsa.com J. Nonlnear Sc. Appl. 9 (2016), 5672 5682 Research Artcle General vscosty teratve method for a sequence of quas-nonexpansve mappngs Cuje Zhang, Ynan Wang College of Scence,
More informationErasure List-Decodable Codes from Random and Algebraic Geometry Codes
Erasure Lst-Decodable Codes from Random and Algebrac Geometry Codes Yang Dng, Lngfe Jn and Chaopng Xng arxv:40.276v [cs.it] 3 Jan 204 Abstract Erasure lst decodng was ntroduced to correct a larger number
More informationReport on Image warping
Report on Image warpng Xuan Ne, Dec. 20, 2004 Ths document summarzed the algorthms of our mage warpng soluton for further study, and there s a detaled descrpton about the mplementaton of these algorthms.
More informationInner Product. Euclidean Space. Orthonormal Basis. Orthogonal
Inner Product Defnton 1 () A Eucldean space s a fnte-dmensonal vector space over the reals R, wth an nner product,. Defnton 2 (Inner Product) An nner product, on a real vector space X s a symmetrc, blnear,
More informationTornado and Luby Transform Codes. Ashish Khisti Presentation October 22, 2003
Tornado and Luby Transform Codes Ashsh Khst 6.454 Presentaton October 22, 2003 Background: Erasure Channel Elas[956] studed the Erasure Channel β x x β β x 2 m x 2 k? Capacty of Noseless Erasure Channel
More informationThe L(2, 1)-Labeling on -Product of Graphs
Annals of Pure and Appled Mathematcs Vol 0, No, 05, 9-39 ISSN: 79-087X (P, 79-0888(onlne Publshed on 7 Aprl 05 wwwresearchmathscorg Annals of The L(, -Labelng on -Product of Graphs P Pradhan and Kamesh
More informationRandić Energy and Randić Estrada Index of a Graph
EUROPEAN JOURNAL OF PURE AND APPLIED MATHEMATICS Vol. 5, No., 202, 88-96 ISSN 307-5543 www.ejpam.com SPECIAL ISSUE FOR THE INTERNATIONAL CONFERENCE ON APPLIED ANALYSIS AND ALGEBRA 29 JUNE -02JULY 20, ISTANBUL
More informationMixed-integer vertex covers on bipartite graphs
Mxed-nteger vertex covers on bpartte graphs Mchele Confort, Bert Gerards, Gacomo Zambell November, 2006 Abstract Let A be the edge-node ncdence matrx of a bpartte graph G = (U, V ; E), I be a subset the
More informationSolutions to the 71st William Lowell Putnam Mathematical Competition Saturday, December 4, 2010
Solutons to the 7st Wllam Lowell Putnam Mathematcal Competton Saturday, December 4, 2 Kran Kedlaya and Lenny Ng A The largest such k s n+ 2 n 2. For n even, ths value s acheved by the partton {,n},{2,n
More informationBasic Regular Expressions. Introduction. Introduction to Computability. Theory. Motivation. Lecture4: Regular Expressions
Introducton to Computablty Theory Lecture: egular Expressons Prof Amos Israel Motvaton If one wants to descrbe a regular language, La, she can use the a DFA, Dor an NFA N, such L ( D = La that that Ths
More informationApproximately achieving Gaussian relay network capacity with lattice codes
Approxmately achevng Gaussan relay network capacty wth lattce codes Ayfer Özgür EFL, Lausanne, Swtzerland ayfer.ozgur@epfl.ch Suhas Dggav UCLA, USA and EFL, Swtzerland suhas@ee.ucla.edu Abstract Recently,
More informationMDS Array Codes for Correcting a Single Criss-Cross Error
1068 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 46, NO. 3, MAY 2000 MDS Array Codes for Correctng a Sngle Crss-Cross Error Maro Blaum, Fellow, IEEE, and Jehoshua Bruck, Senor Member, IEEE Abstract We
More information20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The first idea is connectedness.
20. Mon, Oct. 13 What we have done so far corresponds roughly to Chapters 2 & 3 of Lee. Now we turn to Chapter 4. The frst dea s connectedness. Essentally, we want to say that a space cannot be decomposed
More informationECE 534: Elements of Information Theory. Solutions to Midterm Exam (Spring 2006)
ECE 534: Elements of Informaton Theory Solutons to Mdterm Eam (Sprng 6) Problem [ pts.] A dscrete memoryless source has an alphabet of three letters,, =,, 3, wth probabltes.4,.4, and., respectvely. (a)
More informationChapter 6. BCH Codes
Wreless Informaton Transmsson System Lab Chapter 6 BCH Codes Insttute of Communcatons Engneerng Natonal Sun Yat-sen Unversty Outlne Bnary Prmtve BCH Codes Decodng of the BCH Codes Implementaton of Galos
More informationLearning Theory: Lecture Notes
Learnng Theory: Lecture Notes Lecturer: Kamalka Chaudhur Scrbe: Qush Wang October 27, 2012 1 The Agnostc PAC Model Recall that one of the constrants of the PAC model s that the data dstrbuton has to be
More informationAn Introduction to Morita Theory
An Introducton to Morta Theory Matt Booth October 2015 Nov. 2017: made a few revsons. Thanks to Nng Shan for catchng a typo. My man reference for these notes was Chapter II of Bass s book Algebrac K-Theory
More informationOutline and Reading. Dynamic Programming. Dynamic Programming revealed. Computing Fibonacci. The General Dynamic Programming Technique
Outlne and Readng Dynamc Programmng The General Technque ( 5.3.2) -1 Knapsac Problem ( 5.3.3) Matrx Chan-Product ( 5.3.1) Dynamc Programmng verson 1.4 1 Dynamc Programmng verson 1.4 2 Dynamc Programmng
More informationExpected Value and Variance
MATH 38 Expected Value and Varance Dr. Neal, WKU We now shall dscuss how to fnd the average and standard devaton of a random varable X. Expected Value Defnton. The expected value (or average value, or
More informationOn quasiperfect numbers
Notes on Number Theory and Dscrete Mathematcs Prnt ISSN 1310 5132, Onlne ISSN 2367 8275 Vol. 23, 2017, No. 3, 73 78 On quasperfect numbers V. Sva Rama Prasad 1 and C. Suntha 2 1 Nalla Malla Reddy Engneerng
More informationThe lower and upper bounds on Perron root of nonnegative irreducible matrices
Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College
More informationDecoding of the Triple-Error-Correcting Binary Quadratic Residue Codes
Automatc Control and Informaton Scences, 04, Vol., No., 7- Avalable onlne at http://pubs.scepub.com/acs/// Scence and Educaton Publshng DOI:0.69/acs--- Decodng of the rple-error-correctng Bnary Quadratc
More informationLecture 4: Constant Time SVD Approximation
Spectral Algorthms and Representatons eb. 17, Mar. 3 and 8, 005 Lecture 4: Constant Tme SVD Approxmaton Lecturer: Santosh Vempala Scrbe: Jangzhuo Chen Ths topc conssts of three lectures 0/17, 03/03, 03/08),
More informationLinear Approximation with Regularization and Moving Least Squares
Lnear Approxmaton wth Regularzaton and Movng Least Squares Igor Grešovn May 007 Revson 4.6 (Revson : March 004). 5 4 3 0.5 3 3.5 4 Contents: Lnear Fttng...4. Weghted Least Squares n Functon Approxmaton...
More informationModule 2. Random Processes. Version 2 ECE IIT, Kharagpur
Module Random Processes Lesson 6 Functons of Random Varables After readng ths lesson, ou wll learn about cdf of functon of a random varable. Formula for determnng the pdf of a random varable. Let, X be
More informationSTEINHAUS PROPERTY IN BANACH LATTICES
DEPARTMENT OF MATHEMATICS TECHNICAL REPORT STEINHAUS PROPERTY IN BANACH LATTICES DAMIAN KUBIAK AND DAVID TIDWELL SPRING 2015 No. 2015-1 TENNESSEE TECHNOLOGICAL UNIVERSITY Cookevlle, TN 38505 STEINHAUS
More information