A network coding tutorial. Tracey Ho Center for the Mathematics of Information California Institute of Technology

Size: px
Start display at page:

Download "A network coding tutorial. Tracey Ho Center for the Mathematics of Information California Institute of Technology"

Transcription

1 A network coding tutorial Tracey Ho Center for the Mathematics of Information California Institute of Technology

2 Introduction Network Coding Generalization of traditional store & forward Information can be operated on in network, not just transported Powerful framework for considering theoretical and operational issues in networking...a fresh and sharp tool that has the potential to open up stagnant fundamental areas of research Dr. Ralf Koetter, the Network Coding Home Page 2

3 A multicast example b s b 2 b s b 2 t b b 2 u t u w w b b 2 b b 2 b b 2 x y z y z [ACLY00] 3

4 A multicast example b s b 2 b s b 2 t b b 2 u t u w w b b 2 b b 2 b 2 b x y z y z [ACLY00] 4

5 A multicast example b s b 2 b s b 2 t b b 2 u t b b 2 u w w b b 2 b b 2 b 2 b x y z y z [ACLY00] 5

6 A multicast example b s b 2 b s b 2 t b b 2 u t b b 2 u w w b b 2 b b + b 2 b 2 b 2 b x y z y b + b 2 b + b 2 z [ACLY00] 6

7 . Determining feasibility of a network connection problem non-multicast:? multicast: min-cut max-flow bound satisfied for each receiver [ACLY00] transfer matrix A(I F) Bβ T non-singular [KM0] for each receiver β is 7

8 Algebraic network coding [KM0] Multi-source multicast Information transmitted as vectors of n bits Coding in finite field F 2 n Data Stream n bits n bits. Element of F 2 n 8

9 Algebraic network coding [KM0] Y j Y k v source X i originating at v Y l = a i,l X i + f j,l Y j +f k,l Y k Y j Y k β receiver β output Z β,i = b βi,k Y j +b βi,k Y k Coefficients {a i,j, f l,j, b βi,l } give network-constrained transfer matrices (A, F, {B β }), a network code Matrix M β = A(I F) Bβ T sources to outputs [KM0]: gives transfer function from [X X 2...X r ] M β = [Z β, Z β,2...z β,r ] 9

10 Algebraic network coding [KM0] Y j Y k v source X i originating at v Y l = a i,l X i + f j,l Y j +f k,l Y k Y j Y k β receiver β output Z β,i = b βi,k Y j +b βi,k Y k Coefficients {a i,j, f l,j, b βi,l } give network-constrained transfer matrices (A, F, {B β }), a network code Matrix M β = A(I F) Bβ T sources to outputs [KM0]: gives transfer function from [X X 2...X r ] M β = [Z β, Z β,2...z β,r ] 0

11 Algebraic network coding [KM0] Y j Y k v source X i originating at v Y l = a i,l X i + f j,l Y j +f k,l Y k Y j Y k β receiver β output Z β,i = b βi,k Y j +b βi,k Y k Coefficients {a i,j, f l,j, b βi,l } give network-constrained transfer matrices (A, F, {B β }), a network code Matrix M β = A(I F) Bβ T sources to outputs [KM0]: gives transfer function from [X X 2...X r ] M β = [Z β, Z β,2...z β,r ]

12 Algebraic network coding [KM0] Y j Y k v source X i originating at v Y l = a i,l X i + f j,l Y j +f k,l Y k Y j Y k β receiver β output Z β,i = b βi,k Y j +b βi,k Y k Coefficients {a i,j, f l,j, b βi,l } give network-constrained transfer matrices (A, F, {B β }), a network code Matrix M β = A(I F) Bβ T sources to outputs [KM0]: gives transfer function from [X X 2...X r ] M β = [Z β, Z β,2...z β,r ] 2

13 Algebraic network coding [KM0] Y j Y k v source X i originating at v Y l = a i,l X i + f j,l Y j +f k,l Y k Y j Y k β receiver β output Z β,i = b βi,k Y j +b βi,k Y k Coefficients {a i,j, f l,j, b βi,l } give network-constrained transfer matrices (A, F, {B β }), a network code Matrix M β = A(I F) Bβ T sources to outputs [KM0]: gives transfer function from [X X 2...X r ] M β = [Z β, Z β,2...z β,r ] 3

14 Algebraic network coding [KM0] Y j Y k v source X i originating at v Y l = a i,l X i + f j,l Y j +f k,l Y k Y j Y k β receiver β output Z β,i = b βi,k Y j +b βi,k Y k Coefficients {a i,j, f l,j, b βi,l } give network-constrained transfer matrices (A, F, {B β }), a network code Matrix M β = A(I F) Bβ T sources to outputs [KM0]: gives transfer function from [X X 2...X r ] M β = [Z β, Z β,2...z β,r ] 4

15 Algebraic network coding [KM0] Y j Y k v source X i originating at v Y l = a i,l X i + f j,l Y j +f k,l Y k Y j Y k β receiver β output Z β,i = b βi,k Y j +b βi,k Y k Coefficients {a i,j, f l,j, b βi,l } give network-constrained transfer matrices (A, F, {B β }), a network code Matrix M β = A(I DF) Bβ T sources to outputs [KM0]: gives transfer function from [X X 2...X r ] M β = [Z β, Z β,2...z β,r ] 5

16 . Determining feasibility of a network connection problem non-multicast:? multicast: min-cut max-flow bound satisfied for each receiver [ACLY00] transfer matrix A(I F) Bβ T non-singular [KM0] for each receiver β is 6

17 2. Types of network codes needed multicast: linear [LY03], algebraic [KM0] sufficient non-multicast: nonlinear codes may be needed [DFZ04] 7

18 3. Constructing linear multicast network codes Centralized general graphs: set code coefficient values sequentially, keeping the transfer matrix determinant polynomial nonzero [KM0] acyclic graphs: consider subgraph consisting of flow solutions to individual receivers [SET03, JCJ03] set coefficient values in ancestral ordering, maintaining a full rank frontier set for each receiver Decentralized general graphs: randomized linear network coding [HKMKE03] acyclic graphs, two sources: subtree decomposition and token distribution [FSS04] 8

19 Polynomial-time deterministic construction for acyclic graphs [SET03, JCJ03] 9

20 Polynomial-time deterministic construction for acyclic graphs [SET03, JCJ03] 20

21 Polynomial-time deterministic construction for acyclic graphs [SET03, JCJ03] [ 0] 2

22 Polynomial-time deterministic construction for acyclic graphs [SET03, JCJ03] [ 0] [0 ] 22

23 Polynomial-time deterministic construction for acyclic graphs [SET03, JCJ03] [ 0] [0 ] [ 0] 23

24 Polynomial-time deterministic construction for acyclic graphs [SET03, JCJ03] [ 0] [0 ] [ 0] [0 ] 24

25 Polynomial-time deterministic construction for acyclic graphs [SET03, JCJ03] [ 0] [0 ] [ 0] [0 ] [ ] 25

26 3. Constructing linear multicast network codes Centralized general graphs: set code coefficient values sequentially, keeping the transfer matrix determinant polynomial nonzero [KM0] acyclic graphs: consider subgraph consisting of flow solutions to individual receivers [SET03, JCJ03] set coefficient values in ancestral ordering, maintaining a full rank frontier set for each receiver Decentralized general graphs: randomized linear network coding [HKMKE03] acyclic graphs, two sources: subtree decomposition and token distribution [FSS04] 26

27 Distributed random linear network coding Interior network nodes independently choose random linear mappings from inputs to outputs Coefficients of aggregate effect communicated to receivers X X X 2 X 2 y k = X 2 [0 0] y j = 2X + X 2 [2 0] X 3 y l = 3X 3 + 2y j + y k 3[0 0 ] + 2[2 0] + [0 0] = [4 3 3] Receiver nodes can decode if they receive as many independent linear combinations as the number of source processes 27

28 Distributed random linear network coding Interior network nodes independently choose random linear mappings from inputs to outputs Coefficients of aggregate effect communicated to receivers X X X 2 X 2 y k = X 2 [0 0] y j = 2X + X 2 [2 0] X 3 y l = 3X 3 + 2y j + y k 3[0 0 ] + 2[2 0] + [0 0] = [4 3 3] Receiver nodes can decode if they receive as many independent linear combinations as the number of source processes 28

29 Distributed random linear network coding Interior network nodes independently choose random linear mappings from inputs to outputs Coefficients of aggregate effect communicated to receivers X X X 2 X 2 y k = X 2 [0 0] y j = 2X + X 2 [2 0] X 3 y l = 3X 3 + 2y j + y k 3[0 0 ] + 2[2 0] + [0 0] = [4 3 3] Receiver nodes can decode if they receive as many independent linear combinations as the number of source processes 29

30 Success probability Theorem (HKMKE03, HMSEK03). For a feasible d-receiver multicast connection problem on a network with independent or linearly correlated sources a network code in which code coefficients a i,j, f l,j for η links are chosen independently and uniformly over F q the success probability is at least ( d/q) η for q > d. Error bound is of the order of the inverse of the field size q = 2 n, so error probability decreases exponentially with codeword length n 30

31 4. Choosing a minimum-cost coding subgraph Suppose each link (a, b) has cost C ab (g ab ) and capacity R ab linear or convex optimization Minimize ab C ab(g ab ) subject to λ i = b f β ib a f β ai i, β i λ i = a i f β aβ β T 0 f β ab g ab R ab a, b, β T where λ i is the source rate at node i 3

32 5. Throughput advantage of network coding directed wired networks, multicast: O(log V ) [SET03] directed wired networks, multiple unicasts: O( V ) [LL04] undirected wired networks, multicast: 2 [LL04] undirected wired networks, multiple unicasts: conjectured to be [LL04] 32

33 Throughput advantage in directed wired networks, multicast [SET03] source 2h relays h h sinks 33

34 Throughput advantage in directed wired networks, multicast [SET03] coding rate: h routing rate: 2 Proof: suppose source tries to send 2n symbols b,...,b 2n in n steps at most 2hn symbols can be sent to relay nodes in n steps let U i be the subset of relay nodes receiving b i since U +...U 2n 2hn, there is an i for which U i h any sink not connected to a node in U i does not receive b i 34

35 Throughput advantage in directed wired networks, multiple unicasts [LL04] 35

36 6. Network coding in wireless Additional elements to consider: Dependence of topology on transmit powers, medium access, etc. Wireless multicast advantage Network coding can offer advantages in throughput and energy: t b b 2 u t b b 2 u w w b b 2 b b 2 b 2 b b + b 2 y z y z 36

37 7. Complexity advantage of network coding Multicast throughput: integral/fractional routing: integral/fractional Steiner tree packing (NP complete) network coding: P Minimum-energy multicast/broadcast: routing: NP complete network coding: P [LMHK04] 37

38 Applications of network coding Network capacity / optimization Achieving capacity [ACLY00] Minimizing cost/energy [WCK04,LMHK04] Distributed compression [HMEK04] Network operations Analysis of network management [HMK02] Error correction [CY02a] Decentralized robust network operation [HKMKE03] Network security Wiretapping [CY02b] Byzantine fault detection [HLKMEK04] 38

39 Decentralized robust network operation using randomized network coding Decentralized scenarios X X X X Src Receiver position ( 2,4) (4,4) (8,0) (0,0) Randomized flooding upper bound Randomized F 2 6 lower bound Coding F 2 8 lower bound Online algorithms in dynamically varying environments Experimental demonstration on ISP graphs [CWJ03] 39

40 Byzantine security Robustness against faulty/malicious components with arbitrary behavior, e.g. dropping packets misdirecting packets sending spurious information Abstraction as Byzantine generals problem [LSP82] Byzantine robustness in networking [P88,MR97,KMM98,CL99] 40

41 Byzantine detection with network coding Distributed randomized network coding can be extended to detect Byzantine behavior Small computational and communication overhead small number of hash bits included with each packet, calculated as simple polynomial function of data Require only that a Byzantine attacker does not design and supply modified packets with complete knowledge of other nodes packets 4

42 Byzantine modification detection scheme Suppose each packet contains θ data symbols x,...,x θ and φ θ hash symbols y,...,y φ Consider the function π(x,...,x k ) = x x k+ k, and set k 2k x x π π π where k = θ φ y against detection probability y 2 y 3 is a design parameter trading off overhead 42

43 Detection probability Theorem (HLKMEK04). If the receiver gets s genuine packets, ( ) s. then the detection probability is at least k+ q E.g. With 2% overhead (k = 50), code length=7, s = 5, the detection probability is 98.9%. with % overhead (k = 00), code length=8, s = 5, the detection probability is 99.0%. 43

44 Distributed compression of correlated sources Distributed randomized network coding can remove or add redundancy according to network capacity Sources Receiver 44

45 Background Slepian-Wolf Separate encoding of two correlated sources for a single receiver X R rcv X 2 R 2 Achievable rate region found by Slepian and Wolf, 73 Error exponents for linear coding found by Csiszar, 82 45

46 Coding and decoding randomized linear network coding over vectors of bits in F 2 Y nc j j nc k Y j v source Xi originating at v Y nc l l = Υ,3 X nr i i + Ψ,3 Y nc j j + Ψ 2,3 Y nc k j receivers perform minimum entropy or maximum a posteriori probability decoding 46

47 Distributed compression problem Consider two sources of rates r, r 2 whose output values in each unit time period are i.i.d. with distribution Q. linear network coding in F 2 over vectors of nr i bits from each source Define m and m 2 the min cut capacities between the receiver and each source respectively m 3 the min cut capacity between the receiver and both sources L the maximum source-receiver path length 47

48 Theorem (HMEK04). The error probability at each receiver using minimum entropy or maximum a posteriori probability decoding is at most 3 i= pi e, where p i e exp n min D(P X X 2 Q) + X,X 2 m i( n log L) H(X i X i ) + +2 µ r +r 2 +r i log(n + ) for i =, 2 p 3 e exp n min D(P X X 2 Q) + X,X 2 m 3( n log L) H(X X 2 ) + +2 µ 2r +2r 2 log(n + ) Generalizes error exponents for linear Slepian-Wolf coding [Csi82] 48

49 Conclusions Network coding is potentially useful in many aspects of practical and theoretical networking Multicast in wired networks is well understood (algebraic codes suffice, efficient algorithms for constructing optimal solutions) Advantages exist for non-multicast, wireless settings, but many interesting questions remain 49

50 Further work Richer wireless network models: variable rates, correlated link variations Distributed, adaptive resource optimization and scheduling algorithms for networks with concurrent multicast and unicast connections Use of network coding in conjunction with signal combination or cooperation at the physical layer 50

51 The End My web page: trace Network coding homepage: 5

52 Proof outline Recall transfer matrix M β = A(I F) Bβ T must be non-singular for each receiver β We show an equivalent condition connected with bipartite A 0 matching: the Edmonds matrices (in the I F Bβ T A 0 acyclic delay-free case) or (in the case with I DF delays) are non-singular This shows that if η links have random coefficients, the determinant polynomial has maximum degree η in the random variables {a x,j, f i,j } is linear in each of these variables B T β 52

53 Proof outline (cont d) We want the product of the d receivers determinant polynomials to be nonzero We can show inductively, using the Schwartz-Zippel Theorem, that for any polynomial P F[ξ, ξ 2,...] of degree dη, in which each ξ i has exponent at most d, if ξ, ξ 2,... are chosen independently and uniformly at random from F q F, then P = 0 with probability at most ( d/q) η for d < q Particular form of the determinant polynomials gives rise to a tighter bound than the Schwartz-Zippel bound for general polynomials of the same total degree 53

54 Improvement with spare capacity Theorem. Consider multicasting independent or linearly correlated sources of joint entropy rate r on an acyclic graph with minimum redundancy y, i.e. deletion of any y links in the network preserves feasibility. At any receiver, successful reception occurs with probability at least r+y x=r ( r + y x ) ( ) ( Lx q ( ) ) L r+y x q where L is the longest source-receiver path in the network. Proof uses Theorem?? 54

55 Analysis Let M be the matrix whose i th row m i represents the concatenation of the data and corresponding hash value for packet i Suppose the receiver tries to decode using s unmodified packets, represented as C a [M I], where the i th row of the coefficient matrix C a is the vector of code coefficients of the i th packet r s modified packets, represented by [C b M + V C b ], where V is an arbitrary matrix 55

56 Analysis (cont d) Let C = C a C b Decoding is equivalent to pre-multiplying the matrix C a M C a C b M + V C b with C, which gives M + C 0 V I Consider any fixed C b and V. Since the receiver decodes only when it has a full rank set of packets, possible values of C a are such that C is non-singular 56

57 Analysis (cont d) We can show that for each of s packets, the attacker knows only that the decoded value will be one of q rank(v ) possibilities rank(v ) m i + γ i,j v j γ i,j F q j= at most k + out of the q vectors in a set {u + γv γ F q }, where u = (u,...,u k+ ) is a fixed length-(k + ) vector and v = (v,...,v k+ ) a fixed nonzero length-(k + ) vector, can satisfy the property that the last element of the vector equals the hash of the first k elements. 57

58 Outline Network coding tutorial Randomized linear network coding Decentralized robust network operation Byzantine fault detection Distributed compression [HMEK04] 58

59 Outline of proof of Theorem 48 Error probability 3 i= pi e, where p i e, i =, 2, is the probability of error in X i only p 3 e is the probability of error in both X, X 2 Proof approach using method of types similar to that in [Csi82] Type P x of a vector x is the empirical distribution of elements in the vector Bound error probabilities by summing over sequences of different joint types P X X X 2 X2 59

60 Proof outline (cont d) probability of source vector of type (x,x 2 ) T X X 2 Q n (x x 2 ) = exp{ n(d(p X X 2 Q) + H(X X 2 ))} decoding conditions minimum entropy decoder: H( X X2 ) H(X X 2 ) maximum a posteriori probability decoder: D(P X Q) + H( X X2 X2 ) D(P X X 2 Q) + H(X X 2 ) 60

61 Define Proof outline (cont d) P i, i =, 2, the probability that (x i,x i ), ( x i,x i ), where x i x i, give the same signals at the receiver P 3, the probability that (x,x 2 ), ( x, x 2 ), where x x,x 2 x 2, give the same signals at the receiver Two distinct input values are mapped to the same value on a link of capacity c with probability 2 nc We can show by induction on the minimum cut capacities m i that ( P i ( ) mi ( ) mi L 2 n )L 2 n 6

62 Proof outline (cont d) Bound error probabilities by summing over sets of joint types {P X X X 2 X X X2, X 2 = X 2 } i = P i n = {P X X X 2 X = X X2, X 2 X 2 } i = 2 {P X X X 2 X X X2, X 2 X 2 } i = 3 where X i, X i F nr i 2 sequences of each type T X X 2 = { [ x x 2 ] F n(r +r 2 ) 2 Px x 2 = P X X 2 } T X X2 X X 2 (x x 2 ) = { [ x x 2 ] F n(r +r 2 ) 2 P x x 2 x x 2 = P X X2 X X 2 } 62

63 Proof outline (cont d) We also use the cardinality bounds P n < (n + ) 22r +r 2 P 2 n < (n + ) 2r +2r 2 P 3 n < (n + ) 22r +2r 2 T X X 2 exp{nh(x X 2 )} T X X2 X X 2 (x x 2 ) exp{nh( X X2 X X 2 )} 63

64 Distributed random routing scheme RR: The source node sends one process in both directions on one axis and the other process in both directions along the other axis. A node receiving information on one link sends the same information on its three other links (these are nodes along the grid axes passing through the source node). A node receiving signals on two links sends one of the incoming signals on one of its two other links with equal probability, and the other signal on the remaining link. The probability that a receiver located at grid position (x, y) relative to the source receives both source processes is at most + 2 x y + (4 min( x, y ) )/3 2 x + y 2 64

65 Distributed random coding scheme RC: The source node sends one process in both directions on one axis and the other process in both directions along the other axis. A node receiving information on one link sends the same information on its three other links. A node receiving signals on two links sends a random linear combination of the source signals on each of its two other links. The probability that a receiver located at grid position (x, y) relative to the source can decode both source processes is at least ( /q) 2(x+y 2). 65

Network coding for security and robustness

Network coding for security and robustness Network coding for security and robustness 1 Outline Network coding for detecting attacks Network management requirements for robustness Centralized versus distributed network management 2 Byzantine security

More information

Network Monitoring in Multicast Networks Using Network Coding

Network Monitoring in Multicast Networks Using Network Coding Network Monitoring in Multicast Networks Using Network Coding Tracey Ho Coordinated Science Laboratory University of Illinois Urbana, IL 6181 Email: trace@mit.edu Ben Leong, Yu-Han Chang, Yonggang Wen

More information

Gambling and Data Compression

Gambling and Data Compression Gambling and Data Compression Gambling. Horse Race Definition The wealth relative S(X) = b(x)o(x) is the factor by which the gambler s wealth grows if horse X wins the race, where b(x) is the fraction

More information

Achievable Strategies for General Secure Network Coding

Achievable Strategies for General Secure Network Coding Achievable Strategies for General Secure Network Coding Tao Cui and Tracey Ho Department of Electrical Engineering California Institute of Technology Pasadena, CA 91125, USA Email: {taocui, tho}@caltech.edu

More information

Weakly Secure Network Coding

Weakly Secure Network Coding Weakly Secure Network Coding Kapil Bhattad, Student Member, IEEE and Krishna R. Narayanan, Member, IEEE Department of Electrical Engineering, Texas A&M University, College Station, USA Abstract In this

More information

Network Coding for Security and Error Correction

Network Coding for Security and Error Correction Network Coding for Security and Error Correction NGAI, Chi Kin A Thesis Submitted in Partial Fulfilment of the Requirements for the Degree of Doctor of Philosophy in Information Engineering c The Chinese

More information

Secure Network Coding via Filtered Secret Sharing

Secure Network Coding via Filtered Secret Sharing Secure Network Coding via Filtered Secret Sharing Jon Feldman, Tal Malkin, Rocco Servedio, Cliff Stein (Columbia University) jonfeld@ieor, tal@cs, rocco@cs, cliff@ieor columbiaedu Feldman, Malkin, Servedio,

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms or: How I Learned to Stop Worrying and Deal with NP-Completeness Ong Jit Sheng, Jonathan (A0073924B) March, 2012 Overview Key Results (I) General techniques: Greedy algorithms

More information

Security for Wiretap Networks via Rank-Metric Codes

Security for Wiretap Networks via Rank-Metric Codes Security for Wiretap Networks via Rank-Metric Codes Danilo Silva and Frank R. Kschischang Department of Electrical and Computer Engineering, University of Toronto Toronto, Ontario M5S 3G4, Canada, {danilo,

More information

On the Multiple Unicast Network Coding Conjecture

On the Multiple Unicast Network Coding Conjecture On the Multiple Unicast Networ Coding Conjecture Michael Langberg Computer Science Division Open University of Israel Raanana 43107, Israel miel@openu.ac.il Muriel Médard Research Laboratory of Electronics

More information

A Numerical Study on the Wiretap Network with a Simple Network Topology

A Numerical Study on the Wiretap Network with a Simple Network Topology A Numerical Study on the Wiretap Network with a Simple Network Topology Fan Cheng and Vincent Tan Department of Electrical and Computer Engineering National University of Singapore Mathematical Tools of

More information

A Practical Scheme for Wireless Network Operation

A Practical Scheme for Wireless Network Operation A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Amir F. Dana, Babak Hassibi, Michelle Effros June 21, 2004 Abstract In many problems in wireline networks, it is known that achieving

More information

Scheduling Shop Scheduling. Tim Nieberg

Scheduling Shop Scheduling. Tim Nieberg Scheduling Shop Scheduling Tim Nieberg Shop models: General Introduction Remark: Consider non preemptive problems with regular objectives Notation Shop Problems: m machines, n jobs 1,..., n operations

More information

Linear Network Coding on Multi-Mesh of Trees (MMT) using All to All Broadcast (AAB)

Linear Network Coding on Multi-Mesh of Trees (MMT) using All to All Broadcast (AAB) 462 Linear Network Coding on Multi-Mesh of Trees (MMT) using All to All Broadcast (AAB) Nitin Rakesh 1 and VipinTyagi 2 1, 2 Department of CSE & IT, Jaypee University of Information Technology, Solan,

More information

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs

Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs CSE599s: Extremal Combinatorics November 21, 2011 Lecture 15 An Arithmetic Circuit Lowerbound and Flows in Graphs Lecturer: Anup Rao 1 An Arithmetic Circuit Lower Bound An arithmetic circuit is just like

More information

Link Status Monitoring Using Network Coding

Link Status Monitoring Using Network Coding Link Status Monitoring Using Network Coding Mohammad H. Firooz, Student Member, IEEE, Sumit Roy, Fellow, IEEE, Christopher Lydick, Student Member, IEEE, and Linda Bai, Student Member, IEEE Abstract In

More information

5.1 Bipartite Matching

5.1 Bipartite Matching CS787: Advanced Algorithms Lecture 5: Applications of Network Flow In the last lecture, we looked at the problem of finding the maximum flow in a graph, and how it can be efficiently solved using the Ford-Fulkerson

More information

On the Security and Efficiency of Content Distribution Via Network Coding

On the Security and Efficiency of Content Distribution Via Network Coding 1 On the Security and Efficiency of Content Distribution Via Network Coding Qiming Li John C.S. Lui + Dah-Ming Chiu Crypto. & Security Department, Institute for Infocomm Research, Singapore + Computer

More information

Secure Network Coding: Bounds and Algorithms for Secret and Reliable Communications

Secure Network Coding: Bounds and Algorithms for Secret and Reliable Communications Secure Network Coding: Bounds and Algorithms for Secret and Reliable Communications S. Jaggi and M. Langberg 1 Introduction Network coding allows the routers to mix the information content in packets before

More information

On Secure Communication over Wireless Erasure Networks

On Secure Communication over Wireless Erasure Networks On Secure Communication over Wireless Erasure Networks Andrew Mills Department of CS amills@cs.utexas.edu Brian Smith bsmith@ece.utexas.edu T. Charles Clancy University of Maryland College Park, MD 20472

More information

A Network Flow Approach in Cloud Computing

A Network Flow Approach in Cloud Computing 1 A Network Flow Approach in Cloud Computing Soheil Feizi, Amy Zhang, Muriel Médard RLE at MIT Abstract In this paper, by using network flow principles, we propose algorithms to address various challenges

More information

Secure Network Coding on a Wiretap Network

Secure Network Coding on a Wiretap Network IEEE TRANSACTIONS ON INFORMATION THEORY 1 Secure Network Coding on a Wiretap Network Ning Cai, Senior Member, IEEE, and Raymond W. Yeung, Fellow, IEEE Abstract In the paradigm of network coding, the nodes

More information

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay

Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding

More information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information

Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Optimal Index Codes for a Class of Multicast Networks with Receiver Side Information Lawrence Ong School of Electrical Engineering and Computer Science, The University of Newcastle, Australia Email: lawrence.ong@cantab.net

More information

Review Horse Race Gambling and Side Information Dependent horse races and the entropy rate. Gambling. Besma Smida. ES250: Lecture 9.

Review Horse Race Gambling and Side Information Dependent horse races and the entropy rate. Gambling. Besma Smida. ES250: Lecture 9. Gambling Besma Smida ES250: Lecture 9 Fall 2008-09 B. Smida (ES250) Gambling Fall 2008-09 1 / 23 Today s outline Review of Huffman Code and Arithmetic Coding Horse Race Gambling and Side Information Dependent

More information

Influences in low-degree polynomials

Influences in low-degree polynomials Influences in low-degree polynomials Artūrs Bačkurs December 12, 2012 1 Introduction In 3] it is conjectured that every bounded real polynomial has a highly influential variable The conjecture is known

More information

Nimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff

Nimble Algorithms for Cloud Computing. Ravi Kannan, Santosh Vempala and David Woodruff Nimble Algorithms for Cloud Computing Ravi Kannan, Santosh Vempala and David Woodruff Cloud computing Data is distributed arbitrarily on many servers Parallel algorithms: time Streaming algorithms: sublinear

More information

1 Introduction to Matrices

1 Introduction to Matrices 1 Introduction to Matrices In this section, important definitions and results from matrix algebra that are useful in regression analysis are introduced. While all statements below regarding the columns

More information

LECTURE 4. Last time: Lecture outline

LECTURE 4. Last time: Lecture outline LECTURE 4 Last time: Types of convergence Weak Law of Large Numbers Strong Law of Large Numbers Asymptotic Equipartition Property Lecture outline Stochastic processes Markov chains Entropy rate Random

More information

2.1 Complexity Classes

2.1 Complexity Classes 15-859(M): Randomized Algorithms Lecturer: Shuchi Chawla Topic: Complexity classes, Identity checking Date: September 15, 2004 Scribe: Andrew Gilpin 2.1 Complexity Classes In this lecture we will look

More information

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding

Mathematical Modelling of Computer Networks: Part II. Module 1: Network Coding Mathematical Modelling of Computer Networks: Part II Module 1: Network Coding Lecture 3: Network coding and TCP 12th November 2013 Laila Daniel and Krishnan Narayanan Dept. of Computer Science, University

More information

In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection

In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection In-Network Coding for Resilient Sensor Data Storage and Efficient Data Mule Collection Michele Albano Jie Gao Instituto de telecomunicacoes, Aveiro, Portugal Stony Brook University, Stony Brook, USA Data

More information

Lecture 4: Partitioned Matrices and Determinants

Lecture 4: Partitioned Matrices and Determinants Lecture 4: Partitioned Matrices and Determinants 1 Elementary row operations Recall the elementary operations on the rows of a matrix, equivalent to premultiplying by an elementary matrix E: (1) multiplying

More information

Secure Network Coding for Wiretap Networks of Type II

Secure Network Coding for Wiretap Networks of Type II 1 Secure Network Coding for Wiretap Networks of Type II Salim El Rouayheb, Emina Soljanin, Alex Sprintson Abstract We consider the problem of securing a multicast network against a wiretapper that can

More information

Transportation Polytopes: a Twenty year Update

Transportation Polytopes: a Twenty year Update Transportation Polytopes: a Twenty year Update Jesús Antonio De Loera University of California, Davis Based on various papers joint with R. Hemmecke, E.Kim, F. Liu, U. Rothblum, F. Santos, S. Onn, R. Yoshida,

More information

Lecture 1: Course overview, circuits, and formulas

Lecture 1: Course overview, circuits, and formulas Lecture 1: Course overview, circuits, and formulas Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: John Kim, Ben Lund 1 Course Information Swastik

More information

Linear Codes. Chapter 3. 3.1 Basics

Linear Codes. Chapter 3. 3.1 Basics Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length

More information

Lecture 4: AC 0 lower bounds and pseudorandomness

Lecture 4: AC 0 lower bounds and pseudorandomness Lecture 4: AC 0 lower bounds and pseudorandomness Topics in Complexity Theory and Pseudorandomness (Spring 2013) Rutgers University Swastik Kopparty Scribes: Jason Perry and Brian Garnett In this lecture,

More information

Network Coding Applications

Network Coding Applications Foundations and Trends R in Networking Vol. 2, No. 2 (2007) 135 269 c 2007 C. Fragouli and E. Soljanin DOI: 10.1561/1300000013 Network Coding Applications Christina Fragouli 1 and Emina Soljanin 2 1 École

More information

Lecture 22: November 10

Lecture 22: November 10 CS271 Randomness & Computation Fall 2011 Lecture 22: November 10 Lecturer: Alistair Sinclair Based on scribe notes by Rafael Frongillo Disclaimer: These notes have not been subjected to the usual scrutiny

More information

1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification)

1. Nondeterministically guess a solution (called a certificate) 2. Check whether the solution solves the problem (called verification) Some N P problems Computer scientists have studied many N P problems, that is, problems that can be solved nondeterministically in polynomial time. Traditionally complexity question are studied as languages:

More information

Compressing Forwarding Tables for Datacenter Scalability

Compressing Forwarding Tables for Datacenter Scalability TECHNICAL REPORT TR12-03, TECHNION, ISRAEL 1 Compressing Forwarding Tables for Datacenter Scalability Ori Rottenstreich, Marat Radan, Yuval Cassuto, Isaac Keslassy, Carmi Arad, Tal Mizrahi, Yoram Revah

More information

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks

Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Comparison of Network Coding and Non-Network Coding Schemes for Multi-hop Wireless Networks Jia-Qi Jin, Tracey Ho California Institute of Technology Pasadena, CA Email: {jin,tho}@caltech.edu Harish Viswanathan

More information

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis

SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis SYSM 6304: Risk and Decision Analysis Lecture 5: Methods of Risk Analysis M. Vidyasagar Cecil & Ida Green Chair The University of Texas at Dallas Email: M.Vidyasagar@utdallas.edu October 17, 2015 Outline

More information

Applied Algorithm Design Lecture 5

Applied Algorithm Design Lecture 5 Applied Algorithm Design Lecture 5 Pietro Michiardi Eurecom Pietro Michiardi (Eurecom) Applied Algorithm Design Lecture 5 1 / 86 Approximation Algorithms Pietro Michiardi (Eurecom) Applied Algorithm Design

More information

Lecture Topic: Low-Rank Approximations

Lecture Topic: Low-Rank Approximations Lecture Topic: Low-Rank Approximations Low-Rank Approximations We have seen principal component analysis. The extraction of the first principle eigenvalue could be seen as an approximation of the original

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Vector and Matrix Norms

Vector and Matrix Norms Chapter 1 Vector and Matrix Norms 11 Vector Spaces Let F be a field (such as the real numbers, R, or complex numbers, C) with elements called scalars A Vector Space, V, over the field F is a non-empty

More information

Capacity Limits of MIMO Channels

Capacity Limits of MIMO Channels Tutorial and 4G Systems Capacity Limits of MIMO Channels Markku Juntti Contents 1. Introduction. Review of information theory 3. Fixed MIMO channels 4. Fading MIMO channels 5. Summary and Conclusions References

More information

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks

Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Energy Benefit of Network Coding for Multiple Unicast in Wireless Networks Jasper Goseling IRCTR/CWPC, WMC Group Delft University of Technology The Netherlands j.goseling@tudelft.nl Abstract Jos H. Weber

More information

Power Control is Not Required for Wireless Networks in the Linear Regime

Power Control is Not Required for Wireless Networks in the Linear Regime Power Control is Not Required for Wireless Networks in the Linear Regime Božidar Radunović, Jean-Yves Le Boudec School of Computer and Communication Sciences EPFL, Lausanne CH-1015, Switzerland Email:

More information

Analysis of Algorithms, I

Analysis of Algorithms, I Analysis of Algorithms, I CSOR W4231.002 Eleni Drinea Computer Science Department Columbia University Thursday, February 26, 2015 Outline 1 Recap 2 Representing graphs 3 Breadth-first search (BFS) 4 Applications

More information

Performance of networks containing both MaxNet and SumNet links

Performance of networks containing both MaxNet and SumNet links Performance of networks containing both MaxNet and SumNet links Lachlan L. H. Andrew and Bartek P. Wydrowski Abstract Both MaxNet and SumNet are distributed congestion control architectures suitable for

More information

FACTORING SPARSE POLYNOMIALS

FACTORING SPARSE POLYNOMIALS FACTORING SPARSE POLYNOMIALS Theorem 1 (Schinzel): Let r be a positive integer, and fix non-zero integers a 0,..., a r. Let F (x 1,..., x r ) = a r x r + + a 1 x 1 + a 0. Then there exist finite sets S

More information

Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes

Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Ron Steinfeld (Macquarie University, Australia) (email: rons@ics.mq.edu.au) Joint work with: Huaxiong Wang (Macquarie University)

More information

Basics of information theory and information complexity

Basics of information theory and information complexity Basics of information theory and information complexity a tutorial Mark Braverman Princeton University June 1, 2013 1 Part I: Information theory Information theory, in its modern format was introduced

More information

by the matrix A results in a vector which is a reflection of the given

by the matrix A results in a vector which is a reflection of the given Eigenvalues & Eigenvectors Example Suppose Then So, geometrically, multiplying a vector in by the matrix A results in a vector which is a reflection of the given vector about the y-axis We observe that

More information

Functional-Repair-by-Transfer Regenerating Codes

Functional-Repair-by-Transfer Regenerating Codes Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can

More information

Maximum Entropy Functions: Approximate Gács-Körner for Distributed Compression

Maximum Entropy Functions: Approximate Gács-Körner for Distributed Compression Maximum Entropy Functions: Approximate Gács-Körner for Distributed Compression Salman Salamatian MIT Asaf Cohen Ben-Gurion University of the Negev Muriel Médard MIT ariv:60.03877v [cs.it] Apr 06 Abstract

More information

Enhancing Wireless Security with Physical Layer Network Cooperation

Enhancing Wireless Security with Physical Layer Network Cooperation Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory

More information

National Sun Yat-Sen University CSE Course: Information Theory. Gambling And Entropy

National Sun Yat-Sen University CSE Course: Information Theory. Gambling And Entropy Gambling And Entropy 1 Outline There is a strong relationship between the growth rate of investment in a horse race and the entropy of the horse race. The value of side information is related to the mutual

More information

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH

SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH 31 Kragujevac J. Math. 25 (2003) 31 49. SHARP BOUNDS FOR THE SUM OF THE SQUARES OF THE DEGREES OF A GRAPH Kinkar Ch. Das Department of Mathematics, Indian Institute of Technology, Kharagpur 721302, W.B.,

More information

Graph theoretic techniques in the analysis of uniquely localizable sensor networks

Graph theoretic techniques in the analysis of uniquely localizable sensor networks Graph theoretic techniques in the analysis of uniquely localizable sensor networks Bill Jackson 1 and Tibor Jordán 2 ABSTRACT In the network localization problem the goal is to determine the location of

More information

NETWORK CODING OVERHEAD

NETWORK CODING OVERHEAD NETWORK CODING OVERHEAD Yalin Saguyu y-saguyu@northwestern.eu Department of Electrical Engineering an Computer Science Northwestern University Joint work with M. Rimensberger, M. L. Honig, an W. Utschick

More information

Steiner Tree Approximation via IRR. Randomized Rounding

Steiner Tree Approximation via IRR. Randomized Rounding Steiner Tree Approximation via Iterative Randomized Rounding Graduate Program in Logic, Algorithms and Computation μπλ Network Algorithms and Complexity June 18, 2013 Overview 1 Introduction Scope Related

More information

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1

5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 5 INTEGER LINEAR PROGRAMMING (ILP) E. Amaldi Fondamenti di R.O. Politecnico di Milano 1 General Integer Linear Program: (ILP) min c T x Ax b x 0 integer Assumption: A, b integer The integrality condition

More information

PEER TO PEER FILE SHARING USING NETWORK CODING

PEER TO PEER FILE SHARING USING NETWORK CODING PEER TO PEER FILE SHARING USING NETWORK CODING Ajay Choudhary 1, Nilesh Akhade 2, Aditya Narke 3, Ajit Deshmane 4 Department of Computer Engineering, University of Pune Imperial College of Engineering

More information

Design of LDPC codes

Design of LDPC codes Design of LDPC codes Codes from finite geometries Random codes: Determine the connections of the bipartite Tanner graph by using a (pseudo)random algorithm observing the degree distribution of the code

More information

Information Theoretic Analysis of Proactive Routing Overhead in Mobile Ad Hoc Networks

Information Theoretic Analysis of Proactive Routing Overhead in Mobile Ad Hoc Networks Information Theoretic Analysis of Proactive Routing Overhead in obile Ad Hoc Networks Nianjun Zhou and Alhussein A. Abouzeid 1 Abstract This paper considers basic bounds on the overhead of link-state protocols

More information

MATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix.

MATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix. MATH 304 Linear Algebra Lecture 18: Rank and nullity of a matrix. Nullspace Let A = (a ij ) be an m n matrix. Definition. The nullspace of the matrix A, denoted N(A), is the set of all n-dimensional column

More information

On Secure Network Coding With Nonuniform or Restricted Wiretap Sets

On Secure Network Coding With Nonuniform or Restricted Wiretap Sets 166 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 59, NO. 1, JANUARY 2013 On Secure Network Coding With Nonuniform or Restricted Wiretap Sets Tao Cui, Student Member, IEEE, TraceyHo, Senior Member, IEEE,

More information

Exponential time algorithms for graph coloring

Exponential time algorithms for graph coloring Exponential time algorithms for graph coloring Uriel Feige Lecture notes, March 14, 2011 1 Introduction Let [n] denote the set {1,..., k}. A k-labeling of vertices of a graph G(V, E) is a function V [k].

More information

Lecture 2 Linear functions and examples

Lecture 2 Linear functions and examples EE263 Autumn 2007-08 Stephen Boyd Lecture 2 Linear functions and examples linear equations and functions engineering examples interpretations 2 1 Linear equations consider system of linear equations y

More information

Direct Methods for Solving Linear Systems. Matrix Factorization

Direct Methods for Solving Linear Systems. Matrix Factorization Direct Methods for Solving Linear Systems Matrix Factorization Numerical Analysis (9th Edition) R L Burden & J D Faires Beamer Presentation Slides prepared by John Carroll Dublin City University c 2011

More information

Data Link Layer Overview

Data Link Layer Overview Data Link Layer Overview Date link layer deals with two basic issues: Part I How data frames can be reliably transmitted, and Part II How a shared communication medium can be accessed In many networks,

More information

Distance Degree Sequences for Network Analysis

Distance Degree Sequences for Network Analysis Universität Konstanz Computer & Information Science Algorithmics Group 15 Mar 2005 based on Palmer, Gibbons, and Faloutsos: ANF A Fast and Scalable Tool for Data Mining in Massive Graphs, SIGKDD 02. Motivation

More information

Integer factorization is in P

Integer factorization is in P Integer factorization is in P Yuly Shipilevsky Toronto, Ontario, Canada E-mail address: yulysh2000@yahoo.ca Abstract A polynomial-time algorithm for integer factorization, wherein integer factorization

More information

Sensitivity analysis of utility based prices and risk-tolerance wealth processes

Sensitivity analysis of utility based prices and risk-tolerance wealth processes Sensitivity analysis of utility based prices and risk-tolerance wealth processes Dmitry Kramkov, Carnegie Mellon University Based on a paper with Mihai Sirbu from Columbia University Math Finance Seminar,

More information

The Binary Blocking Flow Algorithm. Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/

The Binary Blocking Flow Algorithm. Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ The Binary Blocking Flow Algorithm Andrew V. Goldberg Microsoft Research Silicon Valley www.research.microsoft.com/ goldberg/ Theory vs. Practice In theory, there is no difference between theory and practice.

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. #-approximation algorithm. Approximation Algorithms 11 Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of three

More information

5. Orthogonal matrices

5. Orthogonal matrices L Vandenberghe EE133A (Spring 2016) 5 Orthogonal matrices matrices with orthonormal columns orthogonal matrices tall matrices with orthonormal columns complex matrices with orthonormal columns 5-1 Orthonormal

More information

MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets.

MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets. MATH 304 Linear Algebra Lecture 20: Inner product spaces. Orthogonal sets. Norm The notion of norm generalizes the notion of length of a vector in R n. Definition. Let V be a vector space. A function α

More information

Optimization Modeling for Mining Engineers

Optimization Modeling for Mining Engineers Optimization Modeling for Mining Engineers Alexandra M. Newman Division of Economics and Business Slide 1 Colorado School of Mines Seminar Outline Linear Programming Integer Linear Programming Slide 2

More information

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 2. x n. a 11 a 12 a 1n b 1 a 21 a 22 a 2n b 2 a 31 a 32 a 3n b 3. a m1 a m2 a mn b m

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS. + + x 2. x n. a 11 a 12 a 1n b 1 a 21 a 22 a 2n b 2 a 31 a 32 a 3n b 3. a m1 a m2 a mn b m MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS 1. SYSTEMS OF EQUATIONS AND MATRICES 1.1. Representation of a linear system. The general system of m equations in n unknowns can be written a 11 x 1 + a 12 x 2 +

More information

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm.

! Solve problem to optimality. ! Solve problem in poly-time. ! Solve arbitrary instances of the problem. !-approximation algorithm. Approximation Algorithms Chapter Approximation Algorithms Q Suppose I need to solve an NP-hard problem What should I do? A Theory says you're unlikely to find a poly-time algorithm Must sacrifice one of

More information

Group Testing a tool of protecting Network Security

Group Testing a tool of protecting Network Security Group Testing a tool of protecting Network Security Hung-Lin Fu 傅 恆 霖 Department of Applied Mathematics, National Chiao Tung University, Hsin Chu, Taiwan Group testing (General Model) Consider a set N

More information

Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation

Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation Du et al. EURASIP Journal on Wireless Communications and Networking 2014, 2014:5 RESEARCH Open Access Efficient weakly secure network coding scheme against node conspiracy attack based on network segmentation

More information

Quadratic forms Cochran s theorem, degrees of freedom, and all that

Quadratic forms Cochran s theorem, degrees of freedom, and all that Quadratic forms Cochran s theorem, degrees of freedom, and all that Dr. Frank Wood Frank Wood, fwood@stat.columbia.edu Linear Regression Models Lecture 1, Slide 1 Why We Care Cochran s theorem tells us

More information

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling

Chapter 11. 11.1 Load Balancing. Approximation Algorithms. Load Balancing. Load Balancing on 2 Machines. Load Balancing: Greedy Scheduling Approximation Algorithms Chapter Approximation Algorithms Q. Suppose I need to solve an NP-hard problem. What should I do? A. Theory says you're unlikely to find a poly-time algorithm. Must sacrifice one

More information

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs

Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Analysis of Approximation Algorithms for k-set Cover using Factor-Revealing Linear Programs Stavros Athanassopoulos, Ioannis Caragiannis, and Christos Kaklamanis Research Academic Computer Technology Institute

More information

Factorization Theorems

Factorization Theorems Chapter 7 Factorization Theorems This chapter highlights a few of the many factorization theorems for matrices While some factorization results are relatively direct, others are iterative While some factorization

More information

A New Generic Digital Signature Algorithm

A New Generic Digital Signature Algorithm Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study

More information

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS

MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS MATRIX ALGEBRA AND SYSTEMS OF EQUATIONS Systems of Equations and Matrices Representation of a linear system The general system of m equations in n unknowns can be written a x + a 2 x 2 + + a n x n b a

More information

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION

OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION OPTIMAL DESIGN OF DISTRIBUTED SENSOR NETWORKS FOR FIELD RECONSTRUCTION Sérgio Pequito, Stephen Kruzick, Soummya Kar, José M. F. Moura, A. Pedro Aguiar Department of Electrical and Computer Engineering

More information

LINEAR ALGEBRA. September 23, 2010

LINEAR ALGEBRA. September 23, 2010 LINEAR ALGEBRA September 3, 00 Contents 0. LU-decomposition.................................... 0. Inverses and Transposes................................. 0.3 Column Spaces and NullSpaces.............................

More information

Adaptive Linear Programming Decoding

Adaptive Linear Programming Decoding Adaptive Linear Programming Decoding Mohammad H. Taghavi and Paul H. Siegel ECE Department, University of California, San Diego Email: (mtaghavi, psiegel)@ucsd.edu ISIT 2006, Seattle, USA, July 9 14, 2006

More information

Sketch As a Tool for Numerical Linear Algebra

Sketch As a Tool for Numerical Linear Algebra Sketching as a Tool for Numerical Linear Algebra (Graph Sparsification) David P. Woodruff presented by Sepehr Assadi o(n) Big Data Reading Group University of Pennsylvania April, 2015 Sepehr Assadi (Penn)

More information

THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS

THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS THE FUNDAMENTAL THEOREM OF ALGEBRA VIA PROPER MAPS KEITH CONRAD 1. Introduction The Fundamental Theorem of Algebra says every nonconstant polynomial with complex coefficients can be factored into linear

More information

Lecture 7: NP-Complete Problems

Lecture 7: NP-Complete Problems IAS/PCMI Summer Session 2000 Clay Mathematics Undergraduate Program Basic Course on Computational Complexity Lecture 7: NP-Complete Problems David Mix Barrington and Alexis Maciel July 25, 2000 1. Circuit

More information