From Wireless Network Coding to Matroids. Rico Zenklusen

Size: px
Start display at page:

Download "From Wireless Network Coding to Matroids. Rico Zenklusen"

Transcription

1 From Wireless Network Coding to Matroids Rico Zenklusen

2 A sketch of my research areas/interests Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications in Engineering & Operations Research Wireless network coding Probability, Statistics Graph Theory, Combinatorics Network optimization Personal rapid transit (vehicle routing) Continuous Optimization Train routing Power grid maintenance 2 / 21

3 Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications in Engineering & Operations Research Wireless network coding Probability, Statistics Graph Theory, Combinatorics Network optimization Personal rapid transit (vehicle routing) Continuous Optimization Train routing Power grid maintenance 2 / 21

4 Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications in Engineering & Operations Research Wireless network coding Probability, Statistics Graph Theory, Combinatorics Network optimization Personal rapid transit (vehicle routing) Continuous Optimization Train routing Power grid maintenance 2 / 21

5 Wireless information flows Features of wireless information flows Broadcasting Superposition Complex signal interactions. 3 / 21

6 Wireless information flows Features of wireless information flows Broadcasting Superposition Complex signal interactions. Classical model: Multiuser Gaussian Channel Unknown how to determine capacity of network. 3 / 21

7 Wireless information flows Features of wireless information flows Broadcasting Superposition Complex signal interactions. Classical model: Multiuser Gaussian Channel Unknown how to determine capacity of network. The ADT model (Avestimehr, Diggavi, Tse [2007]) A deterministic model to approximate Multiuser Gaussian Channels. 3 / 21

8 The ADT information flow model 4 / 21

9 The ADT information flow model 4 / 21

10 The ADT information flow model 4 / 21

11 The ADT information flow model Task: Send maximum number of signals from s to t. A signal is an element of F 2. 4 / 21

12 The ADT information flow model 4 / 21

13 The ADT information flow model 4 / 21

14 The ADT information flow model 4 / 21

15 The ADT information flow model 4 / 21

16 The ADT information flow model 4 / 21

17 The ADT information flow model 4 / 21

18 The ADT information flow model Interference between the two signals! Interference is modelled as XOR. 4 / 21

19 The ADT information flow model Interference between the two signals! Interference is modelled as XOR. 4 / 21

20 The ADT information flow model Receiver gets signals (x, x + y). Due to linear independence, received signals can be decoded to get (x, y). 4 / 21

21 The ADT information flow model 4 / 21

22 The ADT information flow model Received signals are linearly dependent. Receiver cannot decode. 4 / 21

23 The ADT information flow model Goal Route maximum number of decodable (i.e., linearly indep.) signals from s to t. 4 / 21

24 What was known previously? Theorem ([Avestimehr et al., 2007b]) There is a notion of ADT cut (think of s-t cut) such that Max ADT flow (coding) = Min ADT cut. However, they do not show how to find a max flow or a min cut. Theorem ([Amaudruz and Fragouli, 2009]) A maximum flow and a minimum cut can be found in polynomial time. Algorithm is rather involved and computationally expensive. 5 / 21

25 Our contribution to ADT flows We present a strong link between the ADT model and matroids. Results/techniques from matroid theory translate into ADT setting. 6 / 21

26 Our contribution to ADT flows We present a strong link between the ADT model and matroids. Results/techniques from matroid theory translate into ADT setting. Implications to ADT model (Goemans, Iwata, Z. [2009]) Classical matroid algorithms can be used to find optimal coding. Yields fast algorithms to optimize ADT networks. Leads to interesting extensions (e.g., min-cost flows). Polyhedral descriptions of all feasible solutions. Max-flow min-cut theorem as a simple consequence. 6 / 21

27 Our contribution to ADT flows We present a strong link between the ADT model and matroids. Results/techniques from matroid theory translate into ADT setting. Implications to ADT model (Goemans, Iwata, Z. [2009]) Classical matroid algorithms can be used to find optimal coding. Yields fast algorithms to optimize ADT networks. Leads to interesting extensions (e.g., min-cost flows). Polyhedral descriptions of all feasible solutions. Max-flow min-cut theorem as a simple consequence. Further generalizations (Goemans, Iwata, Z. [2012]) We present a very general matroidal model containing ADT. allows for modeling a node-capacitated ADT model. 6 / 21

28 Moving towards a cleaner description of codings 7 / 21

29 Moving towards a cleaner description of codings An ADT flow can be represented by set of used vertices. Information about exact wiring is lost. Does not matter since wiring always preserves linear independence. 7 / 21

30 Moving towards a cleaner description of codings 7 / 21

31 Feasibility for red vertex sets Propagation of signals from second to third layer: ( ) 1 0 (x, y) = (x + y, y). 1 1 }{{} Induced adjacency matrix 8 / 21

32 Feasibility for red vertex sets 1st row 1st col 2nd row 2nd col Propagation of signals from second to third layer: ( ) 1 0 (x, y) = (x + y, y). 1 1 }{{} Induced adjacency matrix 8 / 21

33 Feasibility for red vertex sets 1st row 1st col 2nd row 2nd col Propagation of signals from second to third layer: ( ) 1 0 (x, y) = (x + y, y). 1 1 }{{} Induced adjacency matrix This matrix has to be full rank. 8 / 21

34 Feasibility for red vertex sets Set of is feasible if and only if: i) each node has same number of red inputs and outputs, ii) induced adjacency matrices are full rank. 8 / 21

35 Feasibility for red vertex sets Feasible ADT flow feasible set of red vertices. 8 / 21

36 Feasibility for red vertex sets Feasible ADT flow feasible set of red vertices. To better describe feasible red vertex sets we use matroids. 8 / 21

37 Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications in Engineering & Operations Research Wireless network coding Probability, Statistics Graph Theory, Combinatorics Network optimization Personal rapid transit (vehicle routing) Continuous Optimization Train routing Power grid maintenance 9 / 21

38 Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications in Engineering & Operations Research Wireless network coding Probability, Statistics Graph Theory, Combinatorics Network optimization Personal rapid transit (vehicle routing) Continuous Optimization Train routing Power grid maintenance 9 / 21

39 What are matroids? Matroids formalize problems that can be solved by the greedy algorithm. 10 / 21

40 What are matroids? Matroids formalize problems that can be solved by the greedy algorithm. Maximum weight spanning trees Graph: G = (V, E) Forests: I = {F E F forest} / 21

41 What are matroids? Matroids formalize problems that can be solved by the greedy algorithm. Maximum weight spanning trees Graph: G = (V, E) Forests: I = {F E F forest} What structure of the problem makes the greedy algorithm work? 10 / 21

42 Formal definition Definition: matroid M = (N, I) N: finite set (ground set) I 2 N : Non-empty family of subsets of N (i) If I I and J I, then J I. (ii) If I, J I and I > J, then s I \ J with J {s} I. I: independent sets (forests), given by independence oracle. Maximal independent sets: bases (spanning trees). Because of (ii) all bases of a matroid have the same cardinality. 11 / 21

43 Formal definition Definition: matroid M = (N, I) N: finite set (ground set) I 2 N : Non-empty family of subsets of N (i) If I I and J I, then J I. (ii) If I, J I and I > J, then s I \ J with J {s} I. I: independent sets (forests), given by independence oracle. Maximal independent sets: bases (spanning trees). Because of (ii) all bases of a matroid have the same cardinality. Another example: linear matroid N R m, N < (finite set of vectors). I = {I N vectors in I are linearly independent}. 11 / 21

44 Why care about matroids? It is surprising what can be optimized with a simple greedy algorithm. Rich algorithmic theory, going far beyond the greedy algorithm. (matroid intersection, matroid union/matroid partition, matroid duality, submodular functions,... ) Toolbox with numerous applications. 12 / 21

45 Why care about matroids? It is surprising what can be optimized with a simple greedy algorithm. Rich algorithmic theory, going far beyond the greedy algorithm. (matroid intersection, matroid union/matroid partition, matroid duality, submodular functions,... ) Toolbox with numerous applications. 12 / 21

46 Beyond greedy: matroid union Finding disjoint spanning trees / 21

47 Beyond greedy: matroid union Definition: union of matroids Union of matroids M i = (N, I i ) i [k] is k i=1 M i = (N, n i=1 I i), where k I i = { k i=1i i I i I i i [k]}. i=1 Finding disjoint spanning trees / 21

48 Beyond greedy: matroid union Definition: union of matroids Union of matroids M i = (N, I i ) i [k] is k i=1 M i = (N, n i=1 I i), where k I i = { k i=1i i I i I i i [k]}. i=1 Finding disjoint spanning trees M = k i=1 M i is a matroid. Independence oracle for M can be constructed out of the ones for M i. Partition for indep. set in M can be found efficiently / 21

49 Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications in Engineering & Operations Research Wireless network coding Probability, Statistics Graph Theory, Combinatorics Network optimization Personal rapid transit (vehicle routing) Continuous Optimization Train routing Power grid maintenance 14 / 21

50 Describing relationships between layers by matroids We distinguish between relationships V i V i+1 i odd i even 15 / 21

51 Describing full rank submatrices by matroids v 1 w 1 v 2 w 2 A = v 1 v 2 v 3 v 4 w 1 w 2 w 3 w v 3 v 4 w 3 w 4 M = (N, I) is a matroid, where N = V i V i+1 and I = {R C R V i, C V i+1, A[R, V i+1 \ C] has full row rank}. B N is basis of M A[B V i, V i+1 \ B] is (square and) full rank. 16 / 21

52 Describing wiring by matroids M = (N, I) is a matroid, where N = V i V i+1 and I = {U W U V i, W V i+1, U can be wired within V i+1 \ W }. B N is basis of M B V i can be wired with V i+1 \ B. 17 / 21

53 Putting things together 18 / 21

54 Putting things together 18 / 21

55 Putting things together 18 / 21

56 Putting things together 18 / 21

57 Putting things together 18 / 21

58 Putting things together M 1 M 2 M 3 M 4 M 5 18 / 21

59 Putting things together M 1 M 2 M 3 M 4 M 5 Each color is a basis in the matroid M i describing the relation V i V i+1. All colored vertices are a basis in M 1 M 2 M 3 M 4 M / 21

60 ADT flows via matroid partitioning M 1 M 2 M 3 M 4 M 5 Let M = M 1 M 2 M 3 M 4 M / 21

61 ADT flows via matroid partitioning M 1 M 2 M 3 M 4 M 5 Let M = M 1 M 2 M 3 M 4 M 5. There is a one-to-one correspondence between: ADT flows Bases B (and corresponding color-partition) of M covering all middle layers (V 2, V 3, V 4, V 5 ). 19 / 21

62 ADT flows via matroid partitioning M 1 M 2 M 3 M 4 M 5 Let M = M 1 M 2 M 3 M 4 M 5. There is a one-to-one correspondence between: ADT flows Bases B (and corresponding color-partition) of M covering all middle layers (V 2, V 3, V 4, V 5 ). Number of indep. signals: B V / 21

63 Getting optimal coding via matroid union M 1 M 2 M 3 M 4 M 5 Goal: Find basis B in M covering all middle layers and maximizing B V 1. Solution: Use greedy algorithm to find maximum weight basis in M, using follows weights: first layer (V 1 ) : 1, middle layers (V 2, V 3, V 4, V 5 ) : 1 + ɛ, last layer (V 6 ) : 1 ɛ. 20 / 21

64 Conclusion The ADT model is just a special case of matroid union/partitioning. It is pretty surprising what can be solved by a simple greedy algorithm. Matroids are a powerful tool in the algorithmist s toolkit. 21 / 21

65 References I Amaudruz, A. and Fragouli, C. (2009). Combinatorial algorithms for wireless information flow. In SODA 09: Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, pages Avestimehr, A. S., Diggavi, S. N., and Tse, D. N. C. (2007a). A deterministic approach to wireless relay networks. In Proceedings of Allerton Conference on Communication, Control, and Computing. Avestimehr, A. S., Diggavi, S. N., and Tse, D. N. C. (2007b). Wireless network information flow. In Proceedings of Allerton Conference on Communication, Control, and Computing. Goemans, M. X., Iwata, S., and Zenklusen, R. (2009). An algorithmic framework for wireless information flow. In Proceedings of the Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing. Goemans, M. X., Iwata, S., and Zenklusen, R. (2011). A flow model based on polylinking systems. Mathematical Programming, Series A. Accepted for publication.

How (Information Theoretically) Optimal Are Distributed Decisions?

How (Information Theoretically) Optimal Are Distributed Decisions? How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr

More information

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge

On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge Alireza Vahid Cornell University Ithaca, NY, USA. av292@cornell.edu Vaneet Aggarwal Princeton University Princeton, NJ, USA.

More information

Feedback via Message Passing in Interference Channels

Feedback via Message Passing in Interference Channels Feedback via Message Passing in Interference Channels (Invited Paper) Vaneet Aggarwal Department of ELE, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr Department of

More information

Information Flow in Wireless Networks

Information Flow in Wireless Networks Information Flow in Wireless Networks Srikrishna Bhashyam Department of Electrical Engineering Indian Institute of Technology Madras National Conference on Communications IIT Kharagpur 3 Feb 2012 Srikrishna

More information

Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011

Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Lecture 9 In which we introduce the maximum flow problem. 1 Flows in Networks Today we start talking about the Maximum Flow

More information

A Bit of network information theory

A Bit of network information theory Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,

More information

Information flow over wireless networks: a deterministic approach

Information flow over wireless networks: a deterministic approach Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory

More information

Rumors Across Radio, Wireless, and Telephone

Rumors Across Radio, Wireless, and Telephone Rumors Across Radio, Wireless, and Telephone Jennifer Iglesias Carnegie Mellon University Pittsburgh, USA jiglesia@andrew.cmu.edu R. Ravi Carnegie Mellon University Pittsburgh, USA ravi@andrew.cmu.edu

More information

Lecture 2. 1 Nondeterministic Communication Complexity

Lecture 2. 1 Nondeterministic Communication Complexity Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols

More information

RESTRICTED PERMUTATIONS AND POLYGONS. Ghassan Firro and Toufik Mansour Department of Mathematics, University of Haifa, Haifa, Israel

RESTRICTED PERMUTATIONS AND POLYGONS. Ghassan Firro and Toufik Mansour Department of Mathematics, University of Haifa, Haifa, Israel RESTRICTED PERMUTATIONS AND POLYGONS Ghassan Firro and Toufik Mansour Department of Mathematics, University of Haifa, 905 Haifa, Israel {gferro,toufik}@mathhaifaacil abstract Several authors have examined

More information

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14

Introduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 25.1 Introduction Today we re going to spend some time discussing game

More information

Wireless Network Coding with Local Network Views: Coded Layer Scheduling

Wireless Network Coding with Local Network Views: Coded Layer Scheduling Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the

More information

Optimal Multicast Routing in Ad Hoc Networks

Optimal Multicast Routing in Ad Hoc Networks Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting

More information

PD-SETS FOR CODES RELATED TO FLAG-TRANSITIVE SYMMETRIC DESIGNS. Communicated by Behruz Tayfeh Rezaie. 1. Introduction

PD-SETS FOR CODES RELATED TO FLAG-TRANSITIVE SYMMETRIC DESIGNS. Communicated by Behruz Tayfeh Rezaie. 1. Introduction Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 7 No. 1 (2018), pp. 37-50. c 2018 University of Isfahan www.combinatorics.ir www.ui.ac.ir PD-SETS FOR CODES RELATED

More information

Bibliography. S. Gill Williamson

Bibliography. S. Gill Williamson Bibliography S. Gill Williamson 1. S. G. Williamson, A Combinatorial Property of Finite Sequences with Applications to Tensor Algebra, J. Combinatorial Theory, 1 (1966), pp. 401-410. 2. S. G. Williamson,

More information

Permutations and codes:

Permutations and codes: Hamming distance Permutations and codes: Polynomials, bases, and covering radius Peter J. Cameron Queen Mary, University of London p.j.cameron@qmw.ac.uk International Conference on Graph Theory Bled, 22

More information

ON THE PERMUTATIONAL POWER OF TOKEN PASSING NETWORKS.

ON THE PERMUTATIONAL POWER OF TOKEN PASSING NETWORKS. ON THE PERMUTATIONAL POWER OF TOKEN PASSING NETWORKS. M. H. ALBERT, N. RUŠKUC, AND S. LINTON Abstract. A token passing network is a directed graph with one or more specified input vertices and one or more

More information

On Coding for Cooperative Data Exchange

On Coding for Cooperative Data Exchange On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University

More information

arxiv: v2 [cs.cc] 18 Mar 2013

arxiv: v2 [cs.cc] 18 Mar 2013 Deciding the Winner of an Arbitrary Finite Poset Game is PSPACE-Complete Daniel Grier arxiv:1209.1750v2 [cs.cc] 18 Mar 2013 University of South Carolina grierd@email.sc.edu Abstract. A poset game is a

More information

Symmetric Decentralized Interference Channels with Noisy Feedback

Symmetric Decentralized Interference Channels with Noisy Feedback 4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en

More information

The Game-Theoretic Approach to Machine Learning and Adaptation

The Game-Theoretic Approach to Machine Learning and Adaptation The Game-Theoretic Approach to Machine Learning and Adaptation Nicolò Cesa-Bianchi Università degli Studi di Milano Nicolò Cesa-Bianchi (Univ. di Milano) Game-Theoretic Approach 1 / 25 Machine Learning

More information

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Algorithmic Game Theory Date: 12/6/18

/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Algorithmic Game Theory Date: 12/6/18 601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Algorithmic Game Theory Date: 12/6/18 24.1 Introduction Today we re going to spend some time discussing game theory and algorithms.

More information

Graphs of Tilings. Patrick Callahan, University of California Office of the President, Oakland, CA

Graphs of Tilings. Patrick Callahan, University of California Office of the President, Oakland, CA Graphs of Tilings Patrick Callahan, University of California Office of the President, Oakland, CA Phyllis Chinn, Department of Mathematics Humboldt State University, Arcata, CA Silvia Heubach, Department

More information

INFLUENCE OF ENTRIES IN CRITICAL SETS OF ROOM SQUARES

INFLUENCE OF ENTRIES IN CRITICAL SETS OF ROOM SQUARES INFLUENCE OF ENTRIES IN CRITICAL SETS OF ROOM SQUARES Ghulam Chaudhry and Jennifer Seberry School of IT and Computer Science, The University of Wollongong, Wollongong, NSW 2522, AUSTRALIA We establish

More information

Wireless Network Information Flow

Wireless Network Information Flow Š#/,% 0/,94%#(.)15% Wireless Network Information Flow Suhas iggavi School of Computer and Communication Sciences, Laboratory for Information and Communication Systems (LICOS), EPFL Email: suhas.diggavi@epfl.ch

More information

Interference management with mismatched partial channel state information

Interference management with mismatched partial channel state information Vahid et al. EURASIP Journal on Wireless Communications and Networking (2017 2017:134 DOI 10.1186/s13638-017-0917-0 RESEARCH Open Access Interference management with mismatched partial channel state information

More information

Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying

Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying 013 IEEE International Symposium on Information Theory Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying M. Jorgovanovic, M. Weiner, D. Tse and B. Nikolić

More information

Adaptive CDMA Cell Sectorization with Linear Multiuser Detection

Adaptive CDMA Cell Sectorization with Linear Multiuser Detection Adaptive CDMA Cell Sectorization with Linear Multiuser Detection Changyoon Oh Aylin Yener Electrical Engineering Department The Pennsylvania State University University Park, PA changyoon@psu.edu, yener@ee.psu.edu

More information

Analysis of Power Assignment in Radio Networks with Two Power Levels

Analysis of Power Assignment in Radio Networks with Two Power Levels Analysis of Power Assignment in Radio Networks with Two Power Levels Miguel Fiandor Gutierrez & Manuel Macías Córdoba Abstract. In this paper we analyze the Power Assignment in Radio Networks with Two

More information

On Achieving Local View Capacity Via Maximal Independent Graph Scheduling

On Achieving Local View Capacity Via Maximal Independent Graph Scheduling On Achieving Local View Capacity Via Maximal Independent Graph Scheduling Vaneet Aggarwal, A. Salman Avestimehr and Ashutosh Sabharwal Abstract If we know more, we can achieve more. This adage also applies

More information

Math 152: Applicable Mathematics and Computing

Math 152: Applicable Mathematics and Computing Math 152: Applicable Mathematics and Computing May 8, 2017 May 8, 2017 1 / 15 Extensive Form: Overview We have been studying the strategic form of a game: we considered only a player s overall strategy,

More information

Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks

Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks B.Vijayanarasimha Raju 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:

More information

Interference: An Information Theoretic View

Interference: An Information Theoretic View Interference: An Information Theoretic View David Tse Wireless Foundations U.C. Berkeley ISIT 2009 Tutorial June 28 Thanks: Changho Suh. Context Two central phenomena in wireless communications: Fading

More information

NANYANG TECHNOLOGICAL UNIVERSITY SEMESTER II EXAMINATION MH1301 DISCRETE MATHEMATICS. Time Allowed: 2 hours

NANYANG TECHNOLOGICAL UNIVERSITY SEMESTER II EXAMINATION MH1301 DISCRETE MATHEMATICS. Time Allowed: 2 hours NANYANG TECHNOLOGICAL UNIVERSITY SEMESTER II EXAMINATION 206-207 DISCRETE MATHEMATICS May 207 Time Allowed: 2 hours INSTRUCTIONS TO CANDIDATES. This examination paper contains FOUR (4) questions and comprises

More information

Connecting Identifying Codes and Fundamental Bounds

Connecting Identifying Codes and Fundamental Bounds Connecting Identifying Codes and Fundamental Bounds Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu

More information

An improvement to the Gilbert-Varshamov bound for permutation codes

An improvement to the Gilbert-Varshamov bound for permutation codes An improvement to the Gilbert-Varshamov bound for permutation codes Yiting Yang Department of Mathematics Tongji University Joint work with Fei Gao and Gennian Ge May 11, 2013 Outline Outline 1 Introduction

More information

17. Symmetries. Thus, the example above corresponds to the matrix: We shall now look at how permutations relate to trees.

17. Symmetries. Thus, the example above corresponds to the matrix: We shall now look at how permutations relate to trees. 7 Symmetries 7 Permutations A permutation of a set is a reordering of its elements Another way to look at it is as a function Φ that takes as its argument a set of natural numbers of the form {, 2,, n}

More information

Connected Identifying Codes

Connected Identifying Codes Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu

More information

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL

IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL 2011 1911 Fading Multiple Access Relay Channels: Achievable Rates Opportunistic Scheduling Lalitha Sankar, Member, IEEE, Yingbin Liang, Member,

More information

Network coding an introduction. Playing The Butterfly Lovers melody

Network coding an introduction. Playing The Butterfly Lovers melody Network coding an introduction Playing The Butterfly Lovers melody Store-and-forward conventional mode of transport Store-and-forward inherited by telecommunications Internet Store-and-forward over the

More information

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan

Design of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Outline Introduction to Game Theory and solution concepts Game definition

More information

Advanced Automata Theory 4 Games

Advanced Automata Theory 4 Games Advanced Automata Theory 4 Games Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced Automata Theory 4 Games p. 1 Repetition

More information

RAINBOW COLORINGS OF SOME GEOMETRICALLY DEFINED UNIFORM HYPERGRAPHS IN THE PLANE

RAINBOW COLORINGS OF SOME GEOMETRICALLY DEFINED UNIFORM HYPERGRAPHS IN THE PLANE 1 RAINBOW COLORINGS OF SOME GEOMETRICALLY DEFINED UNIFORM HYPERGRAPHS IN THE PLANE 1 Introduction Brent Holmes* Christian Brothers University Memphis, TN 38104, USA email: bholmes1@cbu.edu A hypergraph

More information

Heuristic Search with Pre-Computed Databases

Heuristic Search with Pre-Computed Databases Heuristic Search with Pre-Computed Databases Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Abstract Use pre-computed partial results to improve the efficiency of heuristic

More information

Robust Location Detection in Emergency Sensor Networks. Goals

Robust Location Detection in Emergency Sensor Networks. Goals Robust Location Detection in Emergency Sensor Networks S. Ray, R. Ungrangsi, F. D. Pellegrini, A. Trachtenberg, and D. Starobinski. Robust location detection in emergency sensor networks. In Proceedings

More information

An Optimal Algorithm for a Strategy Game

An Optimal Algorithm for a Strategy Game International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) An Optimal Algorithm for a Strategy Game Daxin Zhu 1, a and Xiaodong Wang 2,b* 1 Quanzhou Normal University,

More information

Modeling, Analysis and Optimization of Networks. Alberto Ceselli

Modeling, Analysis and Optimization of Networks. Alberto Ceselli Modeling, Analysis and Optimization of Networks Alberto Ceselli alberto.ceselli@unimi.it Università degli Studi di Milano Dipartimento di Informatica Doctoral School in Computer Science A.A. 2015/2016

More information

Perfect Domination for Bishops, Kings and Rooks Graphs On Square Chessboard

Perfect Domination for Bishops, Kings and Rooks Graphs On Square Chessboard Annals of Pure and Applied Mathematics Vol. 1x, No. x, 201x, xx-xx ISSN: 2279-087X (P), 2279-0888(online) Published on 6 August 2018 www.researchmathsci.org DOI: http://dx.doi.org/10.22457/apam.v18n1a8

More information

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks

Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University

More information

THE mobile wireless environment provides several unique

THE mobile wireless environment provides several unique 2796 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 7, NOVEMBER 1998 Multiaccess Fading Channels Part I: Polymatroid Structure, Optimal Resource Allocation Throughput Capacities David N. C. Tse,

More information

Location Problems in Wireless Sensor Network for Improving Its Reliability and Performance

Location Problems in Wireless Sensor Network for Improving Its Reliability and Performance Location Problems in Wireless Sensor Network for Improving Its Reliability and Performance DENIS MIGOV Institute of Computational Mathematics and Mathematical Geophysics of SB RAS Laboratory of Dynamical

More information

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints

Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Brian Smith Department of ECE University of Texas at Austin Austin, TX 7872 bsmith@ece.utexas.edu Piyush Gupta

More information

Permutation Generation Method on Evaluating Determinant of Matrices

Permutation Generation Method on Evaluating Determinant of Matrices Article International Journal of Modern Mathematical Sciences, 2013, 7(1): 12-25 International Journal of Modern Mathematical Sciences Journal homepage:www.modernscientificpress.com/journals/ijmms.aspx

More information

Games on graphs. Keywords: positional game, Maker-Breaker, Avoider-Enforcer, probabilistic

Games on graphs. Keywords: positional game, Maker-Breaker, Avoider-Enforcer, probabilistic Games on graphs Miloš Stojaković Department of Mathematics and Informatics, University of Novi Sad, Serbia milos.stojakovic@dmi.uns.ac.rs http://www.inf.ethz.ch/personal/smilos/ Abstract. Positional Games

More information

Kalman Filtering, Factor Graphs and Electrical Networks

Kalman Filtering, Factor Graphs and Electrical Networks Kalman Filtering, Factor Graphs and Electrical Networks Pascal O. Vontobel, Daniel Lippuner, and Hans-Andrea Loeliger ISI-ITET, ETH urich, CH-8092 urich, Switzerland. Abstract Factor graphs are graphical

More information

Broadcasting in Conflict-Aware Multi-Channel Networks

Broadcasting in Conflict-Aware Multi-Channel Networks Broadcasting in Conflict-Aware Multi-Channel Networks Francisco Claude 1, Reza Dorrigiv 2, Shahin Kamali 1, Alejandro López-Ortiz 1, Pawe l Pra lat 3, Jazmín Romero 1, Alejandro Salinger 1, and Diego Seco

More information

Gateways Placement in Backbone Wireless Mesh Networks

Gateways Placement in Backbone Wireless Mesh Networks I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract

More information

Easy Games and Hard Games

Easy Games and Hard Games Easy Games and Hard Games Igor Minevich April 30, 2014 Outline 1 Lights Out Puzzle 2 NP Completeness 3 Sokoban 4 Timeline 5 Mancala Original Lights Out Puzzle There is an m n grid of lamps that can be

More information

Edge-disjoint tree representation of three tree degree sequences

Edge-disjoint tree representation of three tree degree sequences Edge-disjoint tree representation of three tree degree sequences Ian Min Gyu Seong Carleton College seongi@carleton.edu October 2, 208 Ian Min Gyu Seong (Carleton College) Trees October 2, 208 / 65 Trees

More information

Q(A) - Balance Super Edge Magic Graphs Results

Q(A) - Balance Super Edge Magic Graphs Results International Journal of Pure and Applied Mathematical Sciences. ISSN 0972-9828 Volume 10, Number 2 (2017), pp. 157-170 Research India Publications http://www.ripublication.com Q(A) - Balance Super Edge

More information

arxiv: v1 [cs.ai] 13 Dec 2014

arxiv: v1 [cs.ai] 13 Dec 2014 Combinatorial Structure of the Deterministic Seriation Method with Multiple Subset Solutions Mark E. Madsen Department of Anthropology, Box 353100, University of Washington, Seattle WA, 98195 USA arxiv:1412.6060v1

More information

Pattern Avoidance in Unimodal and V-unimodal Permutations

Pattern Avoidance in Unimodal and V-unimodal Permutations Pattern Avoidance in Unimodal and V-unimodal Permutations Dido Salazar-Torres May 16, 2009 Abstract A characterization of unimodal, [321]-avoiding permutations and an enumeration shall be given.there is

More information

Optimal Positioning of Flying Relays for Wireless Networks

Optimal Positioning of Flying Relays for Wireless Networks Optimal Positioning of Flying Relays for Wireless Networks Junting Chen 1 and David Gesbert 2 1 Ming Hsieh Department of Electrical Engineering, University of Southern California, USA 2 Department of Communication

More information

Bounds on Achievable Rates for Cooperative Channel Coding

Bounds on Achievable Rates for Cooperative Channel Coding Bounds on Achievable Rates for Cooperative Channel Coding Ameesh Pandya and Greg Pottie Department of Electrical Engineering University of California, Los Angeles {ameesh, pottie}@ee.ucla.edu Abstract

More information

Capacitated Cell Planning of 4G Cellular Networks

Capacitated Cell Planning of 4G Cellular Networks Capacitated Cell Planning of 4G Cellular Networks David Amzallag, Roee Engelberg, Joseph (Seffi) Naor, Danny Raz Computer Science Department Technion, Haifa 32000, Israel {amzallag,roee,naor,danny}@cs.technion.ac.il

More information

Detection of Compound Structures in Very High Spatial Resolution Images

Detection of Compound Structures in Very High Spatial Resolution Images Detection of Compound Structures in Very High Spatial Resolution Images Selim Aksoy Department of Computer Engineering Bilkent University Bilkent, 06800, Ankara, Turkey saksoy@cs.bilkent.edu.tr Joint work

More information

Degrees of Freedom of the MIMO X Channel

Degrees of Freedom of the MIMO X Channel Degrees of Freedom of the MIMO X Channel Syed A. Jafar Electrical Engineering and Computer Science University of California Irvine Irvine California 9697 USA Email: syed@uci.edu Shlomo Shamai (Shitz) Department

More information

Convergence in competitive games

Convergence in competitive games Convergence in competitive games Vahab S. Mirrokni Computer Science and AI Lab. (CSAIL) and Math. Dept., MIT. This talk is based on joint works with A. Vetta and with A. Sidiropoulos, A. Vetta DIMACS Bounded

More information

A NEW COMPUTATION OF THE CODIMENSION SEQUENCE OF THE GRASSMANN ALGEBRA

A NEW COMPUTATION OF THE CODIMENSION SEQUENCE OF THE GRASSMANN ALGEBRA A NEW COMPUTATION OF THE CODIMENSION SEQUENCE OF THE GRASSMANN ALGEBRA JOEL LOUWSMA, ADILSON EDUARDO PRESOTO, AND ALAN TARR Abstract. Krakowski and Regev found a basis of polynomial identities satisfied

More information

PUTNAM PROBLEMS FINITE MATHEMATICS, COMBINATORICS

PUTNAM PROBLEMS FINITE MATHEMATICS, COMBINATORICS PUTNAM PROBLEMS FINITE MATHEMATICS, COMBINATORICS 2014-B-5. In the 75th Annual Putnam Games, participants compete at mathematical games. Patniss and Keeta play a game in which they take turns choosing

More information

Computing functions over wireless networks

Computing functions over wireless networks This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/

More information

Approximation Algorithms for Conflict-Free Vehicle Routing

Approximation Algorithms for Conflict-Free Vehicle Routing Approximation Algorithms for Conflict-Free Vehicle Routing Kaspar Schupbach and Rico Zenklusen Παπαηλίου Νικόλαος CFVRP Problem Undirected graph of stations and roads Vehicles(k): Source-Destination stations

More information

Hamming Codes as Error-Reducing Codes

Hamming Codes as Error-Reducing Codes Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.

More information

Cooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates

Cooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates Cooperative Broadcast for Maximum Network Lifetime Ivana Maric and Roy Yates Wireless Multihop Network Broadcast N nodes Source transmits at rate R Messages are to be delivered to all the nodes Nodes can

More information

Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks

Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Scott C.-H. Huang, Peng-Jun Wan, Xiaohua Jia, Hongwei Du and Weiping Shang Department of Computer Science, City University of Hong Kong.

More information

Reflections on the N + k Queens Problem

Reflections on the N + k Queens Problem Integre Technical Publishing Co., Inc. College Mathematics Journal 40:3 March 12, 2009 2:02 p.m. chatham.tex page 204 Reflections on the N + k Queens Problem R. Douglas Chatham R. Douglas Chatham (d.chatham@moreheadstate.edu)

More information

Multiple Input Multiple Output (MIMO) Operation Principles

Multiple Input Multiple Output (MIMO) Operation Principles Afriyie Abraham Kwabena Multiple Input Multiple Output (MIMO) Operation Principles Helsinki Metropolia University of Applied Sciences Bachlor of Engineering Information Technology Thesis June 0 Abstract

More information

A Genetic Approach with a Simple Fitness Function for Sorting Unsigned Permutations by Reversals

A Genetic Approach with a Simple Fitness Function for Sorting Unsigned Permutations by Reversals A Genetic Approach with a Simple Fitness Function for Sorting Unsigned Permutations by Reversals José Luis Soncco Álvarez Department of Computer Science University of Brasilia Brasilia, D.F., Brazil Email:

More information

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT

Degrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)

More information

Chapter 1. The alternating groups. 1.1 Introduction. 1.2 Permutations

Chapter 1. The alternating groups. 1.1 Introduction. 1.2 Permutations Chapter 1 The alternating groups 1.1 Introduction The most familiar of the finite (non-abelian) simple groups are the alternating groups A n, which are subgroups of index 2 in the symmetric groups S n.

More information

A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model

A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model Abstract In wireless networks, mutual interference prevents wireless devices from correctly receiving packages from others

More information

Multiple Antennas in Wireless Communications

Multiple Antennas in Wireless Communications Multiple Antennas in Wireless Communications Luca Sanguinetti Department of Information Engineering Pisa University lucasanguinetti@ietunipiit April, 2009 Luca Sanguinetti (IET) MIMO April, 2009 1 / 46

More information

Joint Scheduling and Fast Cell Selection in OFDMA Wireless Networks

Joint Scheduling and Fast Cell Selection in OFDMA Wireless Networks 1 Joint Scheduling and Fast Cell Selection in OFDMA Wireless Networks Reuven Cohen Guy Grebla Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel Abstract In modern

More information

University of Groningen. Graph theory for alternating hydrocarbons with attached ports Hesselink, Wim H.

University of Groningen. Graph theory for alternating hydrocarbons with attached ports Hesselink, Wim H. University of Groningen Graph theory for alternating hydrocarbons with attached ports Hesselink, Wim H. Published in: Indagationes mathematicae-new series DOI: 10.1016/j.indag.2012.07.002 IMPORTANT NOTE:

More information

From Fountain to BATS: Realization of Network Coding

From Fountain to BATS: Realization of Network Coding From Fountain to BATS: Realization of Network Coding Shenghao Yang Jan 26, 2015 Shenzhen Shenghao Yang Jan 26, 2015 1 / 35 Outline 1 Outline 2 Single-Hop: Fountain Codes LT Codes Raptor codes: achieving

More information

On Information Theoretic Interference Games With More Than Two Users

On Information Theoretic Interference Games With More Than Two Users On Information Theoretic Interference Games With More Than Two Users Randall A. Berry and Suvarup Saha Dept. of EECS Northwestern University e-ma: rberry@eecs.northwestern.edu suvarups@u.northwestern.edu

More information

Slide 1 Math 1520, Lecture 13

Slide 1 Math 1520, Lecture 13 Slide 1 Math 1520, Lecture 13 In chapter 7, we discuss background leading up to probability. Probability is one of the most commonly used pieces of mathematics in the world. Understanding the basic concepts

More information

Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010

Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010 Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 21 Peter Bro Miltersen November 1, 21 Version 1.3 3 Extensive form games (Game Trees, Kuhn Trees)

More information

arxiv: v1 [cs.cc] 12 Dec 2017

arxiv: v1 [cs.cc] 12 Dec 2017 Computational Properties of Slime Trail arxiv:1712.04496v1 [cs.cc] 12 Dec 2017 Matthew Ferland and Kyle Burke July 9, 2018 Abstract We investigate the combinatorial game Slime Trail. This game is played

More information

Localization (Position Estimation) Problem in WSN

Localization (Position Estimation) Problem in WSN Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless

More information

Mathematics Competition Practice Session 6. Hagerstown Community College: STEM Club November 20, :00 pm - 1:00 pm STC-170

Mathematics Competition Practice Session 6. Hagerstown Community College: STEM Club November 20, :00 pm - 1:00 pm STC-170 2015-2016 Mathematics Competition Practice Session 6 Hagerstown Community College: STEM Club November 20, 2015 12:00 pm - 1:00 pm STC-170 1 Warm-Up (2006 AMC 10B No. 17): Bob and Alice each have a bag

More information

Online Frequency Assignment in Wireless Communication Networks

Online Frequency Assignment in Wireless Communication Networks Online Frequency Assignment in Wireless Communication Networks Francis Y.L. Chin Taikoo Chair of Engineering Chair Professor of Computer Science University of Hong Kong Joint work with Dr WT Chan, Dr Deshi

More information

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors

Single Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate

More information

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies

Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com

More information

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO

Antennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO Antennas and Propagation b: Path Models Rayleigh, Rician Fading, MIMO Introduction From last lecture How do we model H p? Discrete path model (physical, plane waves) Random matrix models (forget H p and

More information

Approaching the Capacity of the Multi-Pair Bidirectional Relay Network via a Divide and Conquer Strategy

Approaching the Capacity of the Multi-Pair Bidirectional Relay Network via a Divide and Conquer Strategy Approaching the Capacity of the Multi-Pair Bidirectional elay Network via a Divide and Conquer Strategy Salman Avestimehr Cornell In collaboration with: Amin Khajehnejad (Caltech), Aydin Sezgin (UC Irvine)

More information

Improved Algorithm for Broadcast Scheduling of Minimal Latency in Wireless Ad Hoc Networks

Improved Algorithm for Broadcast Scheduling of Minimal Latency in Wireless Ad Hoc Networks Acta Mathematicae Applicatae Sinica, English Series Vol. 26, No. 1 (2010) 13 22 DOI: 10.1007/s10255-008-8806-2 http://www.applmath.com.cn Acta Mathema ca Applicatae Sinica, English Series The Editorial

More information

Discrete Mathematics and Probability Theory Spring 2018 Ayazifar and Rao Midterm 2 Solutions

Discrete Mathematics and Probability Theory Spring 2018 Ayazifar and Rao Midterm 2 Solutions CS 70 Discrete Mathematics and Probability Theory Spring 2018 Ayazifar and Rao Midterm 2 Solutions PRINT Your Name: Oski Bear SIGN Your Name: OS K I PRINT Your Student ID: CIRCLE your exam room: Pimentel

More information

arxiv: v1 [math.co] 11 Jul 2016

arxiv: v1 [math.co] 11 Jul 2016 OCCURRENCE GRAPHS OF PATTERNS IN PERMUTATIONS arxiv:160703018v1 [mathco] 11 Jul 2016 BJARNI JENS KRISTINSSON AND HENNING ULFARSSON Abstract We define the occurrence graph G p (π) of a pattern p in a permutation

More information

Tic-Tac-Toe on graphs

Tic-Tac-Toe on graphs AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(1) (2018), Pages 106 112 Tic-Tac-Toe on graphs Robert A. Beeler Department of Mathematics and Statistics East Tennessee State University Johnson City, TN

More information