From Wireless Network Coding to Matroids. Rico Zenklusen
|
|
- Benedict Robertson
- 5 years ago
- Views:
Transcription
1 From Wireless Network Coding to Matroids Rico Zenklusen
2 A sketch of my research areas/interests Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications in Engineering & Operations Research Wireless network coding Probability, Statistics Graph Theory, Combinatorics Network optimization Personal rapid transit (vehicle routing) Continuous Optimization Train routing Power grid maintenance 2 / 21
3 Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications in Engineering & Operations Research Wireless network coding Probability, Statistics Graph Theory, Combinatorics Network optimization Personal rapid transit (vehicle routing) Continuous Optimization Train routing Power grid maintenance 2 / 21
4 Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications in Engineering & Operations Research Wireless network coding Probability, Statistics Graph Theory, Combinatorics Network optimization Personal rapid transit (vehicle routing) Continuous Optimization Train routing Power grid maintenance 2 / 21
5 Wireless information flows Features of wireless information flows Broadcasting Superposition Complex signal interactions. 3 / 21
6 Wireless information flows Features of wireless information flows Broadcasting Superposition Complex signal interactions. Classical model: Multiuser Gaussian Channel Unknown how to determine capacity of network. 3 / 21
7 Wireless information flows Features of wireless information flows Broadcasting Superposition Complex signal interactions. Classical model: Multiuser Gaussian Channel Unknown how to determine capacity of network. The ADT model (Avestimehr, Diggavi, Tse [2007]) A deterministic model to approximate Multiuser Gaussian Channels. 3 / 21
8 The ADT information flow model 4 / 21
9 The ADT information flow model 4 / 21
10 The ADT information flow model 4 / 21
11 The ADT information flow model Task: Send maximum number of signals from s to t. A signal is an element of F 2. 4 / 21
12 The ADT information flow model 4 / 21
13 The ADT information flow model 4 / 21
14 The ADT information flow model 4 / 21
15 The ADT information flow model 4 / 21
16 The ADT information flow model 4 / 21
17 The ADT information flow model 4 / 21
18 The ADT information flow model Interference between the two signals! Interference is modelled as XOR. 4 / 21
19 The ADT information flow model Interference between the two signals! Interference is modelled as XOR. 4 / 21
20 The ADT information flow model Receiver gets signals (x, x + y). Due to linear independence, received signals can be decoded to get (x, y). 4 / 21
21 The ADT information flow model 4 / 21
22 The ADT information flow model Received signals are linearly dependent. Receiver cannot decode. 4 / 21
23 The ADT information flow model Goal Route maximum number of decodable (i.e., linearly indep.) signals from s to t. 4 / 21
24 What was known previously? Theorem ([Avestimehr et al., 2007b]) There is a notion of ADT cut (think of s-t cut) such that Max ADT flow (coding) = Min ADT cut. However, they do not show how to find a max flow or a min cut. Theorem ([Amaudruz and Fragouli, 2009]) A maximum flow and a minimum cut can be found in polynomial time. Algorithm is rather involved and computationally expensive. 5 / 21
25 Our contribution to ADT flows We present a strong link between the ADT model and matroids. Results/techniques from matroid theory translate into ADT setting. 6 / 21
26 Our contribution to ADT flows We present a strong link between the ADT model and matroids. Results/techniques from matroid theory translate into ADT setting. Implications to ADT model (Goemans, Iwata, Z. [2009]) Classical matroid algorithms can be used to find optimal coding. Yields fast algorithms to optimize ADT networks. Leads to interesting extensions (e.g., min-cost flows). Polyhedral descriptions of all feasible solutions. Max-flow min-cut theorem as a simple consequence. 6 / 21
27 Our contribution to ADT flows We present a strong link between the ADT model and matroids. Results/techniques from matroid theory translate into ADT setting. Implications to ADT model (Goemans, Iwata, Z. [2009]) Classical matroid algorithms can be used to find optimal coding. Yields fast algorithms to optimize ADT networks. Leads to interesting extensions (e.g., min-cost flows). Polyhedral descriptions of all feasible solutions. Max-flow min-cut theorem as a simple consequence. Further generalizations (Goemans, Iwata, Z. [2012]) We present a very general matroidal model containing ADT. allows for modeling a node-capacitated ADT model. 6 / 21
28 Moving towards a cleaner description of codings 7 / 21
29 Moving towards a cleaner description of codings An ADT flow can be represented by set of used vertices. Information about exact wiring is lost. Does not matter since wiring always preserves linear independence. 7 / 21
30 Moving towards a cleaner description of codings 7 / 21
31 Feasibility for red vertex sets Propagation of signals from second to third layer: ( ) 1 0 (x, y) = (x + y, y). 1 1 }{{} Induced adjacency matrix 8 / 21
32 Feasibility for red vertex sets 1st row 1st col 2nd row 2nd col Propagation of signals from second to third layer: ( ) 1 0 (x, y) = (x + y, y). 1 1 }{{} Induced adjacency matrix 8 / 21
33 Feasibility for red vertex sets 1st row 1st col 2nd row 2nd col Propagation of signals from second to third layer: ( ) 1 0 (x, y) = (x + y, y). 1 1 }{{} Induced adjacency matrix This matrix has to be full rank. 8 / 21
34 Feasibility for red vertex sets Set of is feasible if and only if: i) each node has same number of red inputs and outputs, ii) induced adjacency matrices are full rank. 8 / 21
35 Feasibility for red vertex sets Feasible ADT flow feasible set of red vertices. 8 / 21
36 Feasibility for red vertex sets Feasible ADT flow feasible set of red vertices. To better describe feasible red vertex sets we use matroids. 8 / 21
37 Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications in Engineering & Operations Research Wireless network coding Probability, Statistics Graph Theory, Combinatorics Network optimization Personal rapid transit (vehicle routing) Continuous Optimization Train routing Power grid maintenance 9 / 21
38 Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications in Engineering & Operations Research Wireless network coding Probability, Statistics Graph Theory, Combinatorics Network optimization Personal rapid transit (vehicle routing) Continuous Optimization Train routing Power grid maintenance 9 / 21
39 What are matroids? Matroids formalize problems that can be solved by the greedy algorithm. 10 / 21
40 What are matroids? Matroids formalize problems that can be solved by the greedy algorithm. Maximum weight spanning trees Graph: G = (V, E) Forests: I = {F E F forest} / 21
41 What are matroids? Matroids formalize problems that can be solved by the greedy algorithm. Maximum weight spanning trees Graph: G = (V, E) Forests: I = {F E F forest} What structure of the problem makes the greedy algorithm work? 10 / 21
42 Formal definition Definition: matroid M = (N, I) N: finite set (ground set) I 2 N : Non-empty family of subsets of N (i) If I I and J I, then J I. (ii) If I, J I and I > J, then s I \ J with J {s} I. I: independent sets (forests), given by independence oracle. Maximal independent sets: bases (spanning trees). Because of (ii) all bases of a matroid have the same cardinality. 11 / 21
43 Formal definition Definition: matroid M = (N, I) N: finite set (ground set) I 2 N : Non-empty family of subsets of N (i) If I I and J I, then J I. (ii) If I, J I and I > J, then s I \ J with J {s} I. I: independent sets (forests), given by independence oracle. Maximal independent sets: bases (spanning trees). Because of (ii) all bases of a matroid have the same cardinality. Another example: linear matroid N R m, N < (finite set of vectors). I = {I N vectors in I are linearly independent}. 11 / 21
44 Why care about matroids? It is surprising what can be optimized with a simple greedy algorithm. Rich algorithmic theory, going far beyond the greedy algorithm. (matroid intersection, matroid union/matroid partition, matroid duality, submodular functions,... ) Toolbox with numerous applications. 12 / 21
45 Why care about matroids? It is surprising what can be optimized with a simple greedy algorithm. Rich algorithmic theory, going far beyond the greedy algorithm. (matroid intersection, matroid union/matroid partition, matroid duality, submodular functions,... ) Toolbox with numerous applications. 12 / 21
46 Beyond greedy: matroid union Finding disjoint spanning trees / 21
47 Beyond greedy: matroid union Definition: union of matroids Union of matroids M i = (N, I i ) i [k] is k i=1 M i = (N, n i=1 I i), where k I i = { k i=1i i I i I i i [k]}. i=1 Finding disjoint spanning trees / 21
48 Beyond greedy: matroid union Definition: union of matroids Union of matroids M i = (N, I i ) i [k] is k i=1 M i = (N, n i=1 I i), where k I i = { k i=1i i I i I i i [k]}. i=1 Finding disjoint spanning trees M = k i=1 M i is a matroid. Independence oracle for M can be constructed out of the ones for M i. Partition for indep. set in M can be found efficiently / 21
49 Computer Science Combinatorial Optimization Matroids & submodular funct. Rounding algorithms Applications in Engineering & Operations Research Wireless network coding Probability, Statistics Graph Theory, Combinatorics Network optimization Personal rapid transit (vehicle routing) Continuous Optimization Train routing Power grid maintenance 14 / 21
50 Describing relationships between layers by matroids We distinguish between relationships V i V i+1 i odd i even 15 / 21
51 Describing full rank submatrices by matroids v 1 w 1 v 2 w 2 A = v 1 v 2 v 3 v 4 w 1 w 2 w 3 w v 3 v 4 w 3 w 4 M = (N, I) is a matroid, where N = V i V i+1 and I = {R C R V i, C V i+1, A[R, V i+1 \ C] has full row rank}. B N is basis of M A[B V i, V i+1 \ B] is (square and) full rank. 16 / 21
52 Describing wiring by matroids M = (N, I) is a matroid, where N = V i V i+1 and I = {U W U V i, W V i+1, U can be wired within V i+1 \ W }. B N is basis of M B V i can be wired with V i+1 \ B. 17 / 21
53 Putting things together 18 / 21
54 Putting things together 18 / 21
55 Putting things together 18 / 21
56 Putting things together 18 / 21
57 Putting things together 18 / 21
58 Putting things together M 1 M 2 M 3 M 4 M 5 18 / 21
59 Putting things together M 1 M 2 M 3 M 4 M 5 Each color is a basis in the matroid M i describing the relation V i V i+1. All colored vertices are a basis in M 1 M 2 M 3 M 4 M / 21
60 ADT flows via matroid partitioning M 1 M 2 M 3 M 4 M 5 Let M = M 1 M 2 M 3 M 4 M / 21
61 ADT flows via matroid partitioning M 1 M 2 M 3 M 4 M 5 Let M = M 1 M 2 M 3 M 4 M 5. There is a one-to-one correspondence between: ADT flows Bases B (and corresponding color-partition) of M covering all middle layers (V 2, V 3, V 4, V 5 ). 19 / 21
62 ADT flows via matroid partitioning M 1 M 2 M 3 M 4 M 5 Let M = M 1 M 2 M 3 M 4 M 5. There is a one-to-one correspondence between: ADT flows Bases B (and corresponding color-partition) of M covering all middle layers (V 2, V 3, V 4, V 5 ). Number of indep. signals: B V / 21
63 Getting optimal coding via matroid union M 1 M 2 M 3 M 4 M 5 Goal: Find basis B in M covering all middle layers and maximizing B V 1. Solution: Use greedy algorithm to find maximum weight basis in M, using follows weights: first layer (V 1 ) : 1, middle layers (V 2, V 3, V 4, V 5 ) : 1 + ɛ, last layer (V 6 ) : 1 ɛ. 20 / 21
64 Conclusion The ADT model is just a special case of matroid union/partitioning. It is pretty surprising what can be solved by a simple greedy algorithm. Matroids are a powerful tool in the algorithmist s toolkit. 21 / 21
65 References I Amaudruz, A. and Fragouli, C. (2009). Combinatorial algorithms for wireless information flow. In SODA 09: Proceedings of the Twentieth Annual ACM-SIAM Symposium on Discrete Algorithms, pages Avestimehr, A. S., Diggavi, S. N., and Tse, D. N. C. (2007a). A deterministic approach to wireless relay networks. In Proceedings of Allerton Conference on Communication, Control, and Computing. Avestimehr, A. S., Diggavi, S. N., and Tse, D. N. C. (2007b). Wireless network information flow. In Proceedings of Allerton Conference on Communication, Control, and Computing. Goemans, M. X., Iwata, S., and Zenklusen, R. (2009). An algorithmic framework for wireless information flow. In Proceedings of the Forty-Seventh Annual Allerton Conference on Communication, Control, and Computing. Goemans, M. X., Iwata, S., and Zenklusen, R. (2011). A flow model based on polylinking systems. Mathematical Programming, Series A. Accepted for publication.
How (Information Theoretically) Optimal Are Distributed Decisions?
How (Information Theoretically) Optimal Are Distributed Decisions? Vaneet Aggarwal Department of Electrical Engineering, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr
More informationOn the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge
On the Capacity of Multi-Hop Wireless Networks with Partial Network Knowledge Alireza Vahid Cornell University Ithaca, NY, USA. av292@cornell.edu Vaneet Aggarwal Princeton University Princeton, NJ, USA.
More informationFeedback via Message Passing in Interference Channels
Feedback via Message Passing in Interference Channels (Invited Paper) Vaneet Aggarwal Department of ELE, Princeton University, Princeton, NJ 08544. vaggarwa@princeton.edu Salman Avestimehr Department of
More informationInformation Flow in Wireless Networks
Information Flow in Wireless Networks Srikrishna Bhashyam Department of Electrical Engineering Indian Institute of Technology Madras National Conference on Communications IIT Kharagpur 3 Feb 2012 Srikrishna
More informationStanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011
Stanford University CS261: Optimization Handout 9 Luca Trevisan February 1, 2011 Lecture 9 In which we introduce the maximum flow problem. 1 Flows in Networks Today we start talking about the Maximum Flow
More informationA Bit of network information theory
Š#/,% 0/,94%#(.)15% A Bit of network information theory Suhas Diggavi 1 Email: suhas.diggavi@epfl.ch URL: http://licos.epfl.ch Parts of talk are joint work with S. Avestimehr 2, S. Mohajer 1, C. Tian 3,
More informationInformation flow over wireless networks: a deterministic approach
Information flow over wireless networks: a deterministic approach alman Avestimehr In collaboration with uhas iggavi (EPFL) and avid Tse (UC Berkeley) Overview Point-to-point channel Information theory
More informationRumors Across Radio, Wireless, and Telephone
Rumors Across Radio, Wireless, and Telephone Jennifer Iglesias Carnegie Mellon University Pittsburgh, USA jiglesia@andrew.cmu.edu R. Ravi Carnegie Mellon University Pittsburgh, USA ravi@andrew.cmu.edu
More informationLecture 2. 1 Nondeterministic Communication Complexity
Communication Complexity 16:198:671 1/26/10 Lecture 2 Lecturer: Troy Lee Scribe: Luke Friedman 1 Nondeterministic Communication Complexity 1.1 Review D(f): The minimum over all deterministic protocols
More informationRESTRICTED PERMUTATIONS AND POLYGONS. Ghassan Firro and Toufik Mansour Department of Mathematics, University of Haifa, Haifa, Israel
RESTRICTED PERMUTATIONS AND POLYGONS Ghassan Firro and Toufik Mansour Department of Mathematics, University of Haifa, 905 Haifa, Israel {gferro,toufik}@mathhaifaacil abstract Several authors have examined
More informationIntroduction to Algorithms / Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14
600.363 Introduction to Algorithms / 600.463 Algorithms I Lecturer: Michael Dinitz Topic: Algorithms and Game Theory Date: 12/4/14 25.1 Introduction Today we re going to spend some time discussing game
More informationWireless Network Coding with Local Network Views: Coded Layer Scheduling
Wireless Network Coding with Local Network Views: Coded Layer Scheduling Alireza Vahid, Vaneet Aggarwal, A. Salman Avestimehr, and Ashutosh Sabharwal arxiv:06.574v3 [cs.it] 4 Apr 07 Abstract One of the
More informationOptimal Multicast Routing in Ad Hoc Networks
Mat-2.108 Independent esearch Projects in Applied Mathematics Optimal Multicast outing in Ad Hoc Networks Juha Leino 47032J Juha.Leino@hut.fi 1st December 2002 Contents 1 Introduction 2 2 Optimal Multicasting
More informationPD-SETS FOR CODES RELATED TO FLAG-TRANSITIVE SYMMETRIC DESIGNS. Communicated by Behruz Tayfeh Rezaie. 1. Introduction
Transactions on Combinatorics ISSN (print): 2251-8657, ISSN (on-line): 2251-8665 Vol. 7 No. 1 (2018), pp. 37-50. c 2018 University of Isfahan www.combinatorics.ir www.ui.ac.ir PD-SETS FOR CODES RELATED
More informationBibliography. S. Gill Williamson
Bibliography S. Gill Williamson 1. S. G. Williamson, A Combinatorial Property of Finite Sequences with Applications to Tensor Algebra, J. Combinatorial Theory, 1 (1966), pp. 401-410. 2. S. G. Williamson,
More informationPermutations and codes:
Hamming distance Permutations and codes: Polynomials, bases, and covering radius Peter J. Cameron Queen Mary, University of London p.j.cameron@qmw.ac.uk International Conference on Graph Theory Bled, 22
More informationON THE PERMUTATIONAL POWER OF TOKEN PASSING NETWORKS.
ON THE PERMUTATIONAL POWER OF TOKEN PASSING NETWORKS. M. H. ALBERT, N. RUŠKUC, AND S. LINTON Abstract. A token passing network is a directed graph with one or more specified input vertices and one or more
More informationOn Coding for Cooperative Data Exchange
On Coding for Cooperative Data Exchange Salim El Rouayheb Texas A&M University Email: rouayheb@tamu.edu Alex Sprintson Texas A&M University Email: spalex@tamu.edu Parastoo Sadeghi Australian National University
More informationarxiv: v2 [cs.cc] 18 Mar 2013
Deciding the Winner of an Arbitrary Finite Poset Game is PSPACE-Complete Daniel Grier arxiv:1209.1750v2 [cs.cc] 18 Mar 2013 University of South Carolina grierd@email.sc.edu Abstract. A poset game is a
More informationSymmetric Decentralized Interference Channels with Noisy Feedback
4 IEEE International Symposium on Information Theory Symmetric Decentralized Interference Channels with Noisy Feedback Samir M. Perlaza Ravi Tandon and H. Vincent Poor Institut National de Recherche en
More informationThe Game-Theoretic Approach to Machine Learning and Adaptation
The Game-Theoretic Approach to Machine Learning and Adaptation Nicolò Cesa-Bianchi Università degli Studi di Milano Nicolò Cesa-Bianchi (Univ. di Milano) Game-Theoretic Approach 1 / 25 Machine Learning
More information/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Algorithmic Game Theory Date: 12/6/18
601.433/633 Introduction to Algorithms Lecturer: Michael Dinitz Topic: Algorithmic Game Theory Date: 12/6/18 24.1 Introduction Today we re going to spend some time discussing game theory and algorithms.
More informationGraphs of Tilings. Patrick Callahan, University of California Office of the President, Oakland, CA
Graphs of Tilings Patrick Callahan, University of California Office of the President, Oakland, CA Phyllis Chinn, Department of Mathematics Humboldt State University, Arcata, CA Silvia Heubach, Department
More informationINFLUENCE OF ENTRIES IN CRITICAL SETS OF ROOM SQUARES
INFLUENCE OF ENTRIES IN CRITICAL SETS OF ROOM SQUARES Ghulam Chaudhry and Jennifer Seberry School of IT and Computer Science, The University of Wollongong, Wollongong, NSW 2522, AUSTRALIA We establish
More informationWireless Network Information Flow
Š#/,% 0/,94%#(.)15% Wireless Network Information Flow Suhas iggavi School of Computer and Communication Sciences, Laboratory for Information and Communication Systems (LICOS), EPFL Email: suhas.diggavi@epfl.ch
More informationInterference management with mismatched partial channel state information
Vahid et al. EURASIP Journal on Wireless Communications and Networking (2017 2017:134 DOI 10.1186/s13638-017-0917-0 RESEARCH Open Access Interference management with mismatched partial channel state information
More informationRelay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying
013 IEEE International Symposium on Information Theory Relay Scheduling and Interference Cancellation for Quantize-Map-and-Forward Cooperative Relaying M. Jorgovanovic, M. Weiner, D. Tse and B. Nikolić
More informationAdaptive CDMA Cell Sectorization with Linear Multiuser Detection
Adaptive CDMA Cell Sectorization with Linear Multiuser Detection Changyoon Oh Aylin Yener Electrical Engineering Department The Pennsylvania State University University Park, PA changyoon@psu.edu, yener@ee.psu.edu
More informationAnalysis of Power Assignment in Radio Networks with Two Power Levels
Analysis of Power Assignment in Radio Networks with Two Power Levels Miguel Fiandor Gutierrez & Manuel Macías Córdoba Abstract. In this paper we analyze the Power Assignment in Radio Networks with Two
More informationOn Achieving Local View Capacity Via Maximal Independent Graph Scheduling
On Achieving Local View Capacity Via Maximal Independent Graph Scheduling Vaneet Aggarwal, A. Salman Avestimehr and Ashutosh Sabharwal Abstract If we know more, we can achieve more. This adage also applies
More informationMath 152: Applicable Mathematics and Computing
Math 152: Applicable Mathematics and Computing May 8, 2017 May 8, 2017 1 / 15 Extensive Form: Overview We have been studying the strategic form of a game: we considered only a player s overall strategy,
More informationPerformance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks
Performance Enhancement of Interference Alignment Techniques for MIMO Multi Cell Networks B.Vijayanarasimha Raju 1 PG Student, ECE Department Gokula Krishna College of Engineering Sullurpet, India e-mail:
More informationInterference: An Information Theoretic View
Interference: An Information Theoretic View David Tse Wireless Foundations U.C. Berkeley ISIT 2009 Tutorial June 28 Thanks: Changho Suh. Context Two central phenomena in wireless communications: Fading
More informationNANYANG TECHNOLOGICAL UNIVERSITY SEMESTER II EXAMINATION MH1301 DISCRETE MATHEMATICS. Time Allowed: 2 hours
NANYANG TECHNOLOGICAL UNIVERSITY SEMESTER II EXAMINATION 206-207 DISCRETE MATHEMATICS May 207 Time Allowed: 2 hours INSTRUCTIONS TO CANDIDATES. This examination paper contains FOUR (4) questions and comprises
More informationConnecting Identifying Codes and Fundamental Bounds
Connecting Identifying Codes and Fundamental Bounds Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu
More informationAn improvement to the Gilbert-Varshamov bound for permutation codes
An improvement to the Gilbert-Varshamov bound for permutation codes Yiting Yang Department of Mathematics Tongji University Joint work with Fei Gao and Gennian Ge May 11, 2013 Outline Outline 1 Introduction
More information17. Symmetries. Thus, the example above corresponds to the matrix: We shall now look at how permutations relate to trees.
7 Symmetries 7 Permutations A permutation of a set is a reordering of its elements Another way to look at it is as a function Φ that takes as its argument a set of natural numbers of the form {, 2,, n}
More informationConnected Identifying Codes
Connected Identifying Codes Niloofar Fazlollahi, David Starobinski and Ari Trachtenberg Dept. of Electrical and Computer Engineering Boston University, Boston, MA 02215 Email: {nfazl,staro,trachten}@bu.edu
More informationIEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL
IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 57, NO. 4, APRIL 2011 1911 Fading Multiple Access Relay Channels: Achievable Rates Opportunistic Scheduling Lalitha Sankar, Member, IEEE, Yingbin Liang, Member,
More informationNetwork coding an introduction. Playing The Butterfly Lovers melody
Network coding an introduction Playing The Butterfly Lovers melody Store-and-forward conventional mode of transport Store-and-forward inherited by telecommunications Internet Store-and-forward over the
More informationDesign of intelligent surveillance systems: a game theoretic case. Nicola Basilico Department of Computer Science University of Milan
Design of intelligent surveillance systems: a game theoretic case Nicola Basilico Department of Computer Science University of Milan Outline Introduction to Game Theory and solution concepts Game definition
More informationAdvanced Automata Theory 4 Games
Advanced Automata Theory 4 Games Frank Stephan Department of Computer Science Department of Mathematics National University of Singapore fstephan@comp.nus.edu.sg Advanced Automata Theory 4 Games p. 1 Repetition
More informationRAINBOW COLORINGS OF SOME GEOMETRICALLY DEFINED UNIFORM HYPERGRAPHS IN THE PLANE
1 RAINBOW COLORINGS OF SOME GEOMETRICALLY DEFINED UNIFORM HYPERGRAPHS IN THE PLANE 1 Introduction Brent Holmes* Christian Brothers University Memphis, TN 38104, USA email: bholmes1@cbu.edu A hypergraph
More informationHeuristic Search with Pre-Computed Databases
Heuristic Search with Pre-Computed Databases Tsan-sheng Hsu tshsu@iis.sinica.edu.tw http://www.iis.sinica.edu.tw/~tshsu 1 Abstract Use pre-computed partial results to improve the efficiency of heuristic
More informationRobust Location Detection in Emergency Sensor Networks. Goals
Robust Location Detection in Emergency Sensor Networks S. Ray, R. Ungrangsi, F. D. Pellegrini, A. Trachtenberg, and D. Starobinski. Robust location detection in emergency sensor networks. In Proceedings
More informationAn Optimal Algorithm for a Strategy Game
International Conference on Materials Engineering and Information Technology Applications (MEITA 2015) An Optimal Algorithm for a Strategy Game Daxin Zhu 1, a and Xiaodong Wang 2,b* 1 Quanzhou Normal University,
More informationModeling, Analysis and Optimization of Networks. Alberto Ceselli
Modeling, Analysis and Optimization of Networks Alberto Ceselli alberto.ceselli@unimi.it Università degli Studi di Milano Dipartimento di Informatica Doctoral School in Computer Science A.A. 2015/2016
More informationPerfect Domination for Bishops, Kings and Rooks Graphs On Square Chessboard
Annals of Pure and Applied Mathematics Vol. 1x, No. x, 201x, xx-xx ISSN: 2279-087X (P), 2279-0888(online) Published on 6 August 2018 www.researchmathsci.org DOI: http://dx.doi.org/10.22457/apam.v18n1a8
More informationSuperimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks
Superimposed Code Based Channel Assignment in Multi-Radio Multi-Channel Wireless Mesh Networks ABSTRACT Kai Xing & Xiuzhen Cheng & Liran Ma Department of Computer Science The George Washington University
More informationTHE mobile wireless environment provides several unique
2796 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 7, NOVEMBER 1998 Multiaccess Fading Channels Part I: Polymatroid Structure, Optimal Resource Allocation Throughput Capacities David N. C. Tse,
More informationLocation Problems in Wireless Sensor Network for Improving Its Reliability and Performance
Location Problems in Wireless Sensor Network for Improving Its Reliability and Performance DENIS MIGOV Institute of Computational Mathematics and Mathematical Geophysics of SB RAS Laboratory of Dynamical
More informationRouting versus Network Coding in Erasure Networks with Broadcast and Interference Constraints
Routing versus Network Coding in Erasure Networks with Broadcast and Interference Constraints Brian Smith Department of ECE University of Texas at Austin Austin, TX 7872 bsmith@ece.utexas.edu Piyush Gupta
More informationPermutation Generation Method on Evaluating Determinant of Matrices
Article International Journal of Modern Mathematical Sciences, 2013, 7(1): 12-25 International Journal of Modern Mathematical Sciences Journal homepage:www.modernscientificpress.com/journals/ijmms.aspx
More informationGames on graphs. Keywords: positional game, Maker-Breaker, Avoider-Enforcer, probabilistic
Games on graphs Miloš Stojaković Department of Mathematics and Informatics, University of Novi Sad, Serbia milos.stojakovic@dmi.uns.ac.rs http://www.inf.ethz.ch/personal/smilos/ Abstract. Positional Games
More informationKalman Filtering, Factor Graphs and Electrical Networks
Kalman Filtering, Factor Graphs and Electrical Networks Pascal O. Vontobel, Daniel Lippuner, and Hans-Andrea Loeliger ISI-ITET, ETH urich, CH-8092 urich, Switzerland. Abstract Factor graphs are graphical
More informationBroadcasting in Conflict-Aware Multi-Channel Networks
Broadcasting in Conflict-Aware Multi-Channel Networks Francisco Claude 1, Reza Dorrigiv 2, Shahin Kamali 1, Alejandro López-Ortiz 1, Pawe l Pra lat 3, Jazmín Romero 1, Alejandro Salinger 1, and Diego Seco
More informationGateways Placement in Backbone Wireless Mesh Networks
I. J. Communications, Network and System Sciences, 2009, 1, 1-89 Published Online February 2009 in SciRes (http://www.scirp.org/journal/ijcns/). Gateways Placement in Backbone Wireless Mesh Networks Abstract
More informationEasy Games and Hard Games
Easy Games and Hard Games Igor Minevich April 30, 2014 Outline 1 Lights Out Puzzle 2 NP Completeness 3 Sokoban 4 Timeline 5 Mancala Original Lights Out Puzzle There is an m n grid of lamps that can be
More informationEdge-disjoint tree representation of three tree degree sequences
Edge-disjoint tree representation of three tree degree sequences Ian Min Gyu Seong Carleton College seongi@carleton.edu October 2, 208 Ian Min Gyu Seong (Carleton College) Trees October 2, 208 / 65 Trees
More informationQ(A) - Balance Super Edge Magic Graphs Results
International Journal of Pure and Applied Mathematical Sciences. ISSN 0972-9828 Volume 10, Number 2 (2017), pp. 157-170 Research India Publications http://www.ripublication.com Q(A) - Balance Super Edge
More informationarxiv: v1 [cs.ai] 13 Dec 2014
Combinatorial Structure of the Deterministic Seriation Method with Multiple Subset Solutions Mark E. Madsen Department of Anthropology, Box 353100, University of Washington, Seattle WA, 98195 USA arxiv:1412.6060v1
More informationPattern Avoidance in Unimodal and V-unimodal Permutations
Pattern Avoidance in Unimodal and V-unimodal Permutations Dido Salazar-Torres May 16, 2009 Abstract A characterization of unimodal, [321]-avoiding permutations and an enumeration shall be given.there is
More informationOptimal Positioning of Flying Relays for Wireless Networks
Optimal Positioning of Flying Relays for Wireless Networks Junting Chen 1 and David Gesbert 2 1 Ming Hsieh Department of Electrical Engineering, University of Southern California, USA 2 Department of Communication
More informationBounds on Achievable Rates for Cooperative Channel Coding
Bounds on Achievable Rates for Cooperative Channel Coding Ameesh Pandya and Greg Pottie Department of Electrical Engineering University of California, Los Angeles {ameesh, pottie}@ee.ucla.edu Abstract
More informationCapacitated Cell Planning of 4G Cellular Networks
Capacitated Cell Planning of 4G Cellular Networks David Amzallag, Roee Engelberg, Joseph (Seffi) Naor, Danny Raz Computer Science Department Technion, Haifa 32000, Israel {amzallag,roee,naor,danny}@cs.technion.ac.il
More informationDetection of Compound Structures in Very High Spatial Resolution Images
Detection of Compound Structures in Very High Spatial Resolution Images Selim Aksoy Department of Computer Engineering Bilkent University Bilkent, 06800, Ankara, Turkey saksoy@cs.bilkent.edu.tr Joint work
More informationDegrees of Freedom of the MIMO X Channel
Degrees of Freedom of the MIMO X Channel Syed A. Jafar Electrical Engineering and Computer Science University of California Irvine Irvine California 9697 USA Email: syed@uci.edu Shlomo Shamai (Shitz) Department
More informationConvergence in competitive games
Convergence in competitive games Vahab S. Mirrokni Computer Science and AI Lab. (CSAIL) and Math. Dept., MIT. This talk is based on joint works with A. Vetta and with A. Sidiropoulos, A. Vetta DIMACS Bounded
More informationA NEW COMPUTATION OF THE CODIMENSION SEQUENCE OF THE GRASSMANN ALGEBRA
A NEW COMPUTATION OF THE CODIMENSION SEQUENCE OF THE GRASSMANN ALGEBRA JOEL LOUWSMA, ADILSON EDUARDO PRESOTO, AND ALAN TARR Abstract. Krakowski and Regev found a basis of polynomial identities satisfied
More informationPUTNAM PROBLEMS FINITE MATHEMATICS, COMBINATORICS
PUTNAM PROBLEMS FINITE MATHEMATICS, COMBINATORICS 2014-B-5. In the 75th Annual Putnam Games, participants compete at mathematical games. Patniss and Keeta play a game in which they take turns choosing
More informationComputing functions over wireless networks
This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 Unported License. Based on a work at decision.csl.illinois.edu See last page and http://creativecommons.org/licenses/by-nc-nd/3.0/
More informationApproximation Algorithms for Conflict-Free Vehicle Routing
Approximation Algorithms for Conflict-Free Vehicle Routing Kaspar Schupbach and Rico Zenklusen Παπαηλίου Νικόλαος CFVRP Problem Undirected graph of stations and roads Vehicles(k): Source-Destination stations
More informationHamming Codes as Error-Reducing Codes
Hamming Codes as Error-Reducing Codes William Rurik Arya Mazumdar Abstract Hamming codes are the first nontrivial family of error-correcting codes that can correct one error in a block of binary symbols.
More informationCooperative Broadcast for Maximum Network Lifetime. Ivana Maric and Roy Yates
Cooperative Broadcast for Maximum Network Lifetime Ivana Maric and Roy Yates Wireless Multihop Network Broadcast N nodes Source transmits at rate R Messages are to be delivered to all the nodes Nodes can
More informationMinimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks
Minimum-Latency Broadcast Scheduling in Wireless Ad Hoc Networks Scott C.-H. Huang, Peng-Jun Wan, Xiaohua Jia, Hongwei Du and Weiping Shang Department of Computer Science, City University of Hong Kong.
More informationReflections on the N + k Queens Problem
Integre Technical Publishing Co., Inc. College Mathematics Journal 40:3 March 12, 2009 2:02 p.m. chatham.tex page 204 Reflections on the N + k Queens Problem R. Douglas Chatham R. Douglas Chatham (d.chatham@moreheadstate.edu)
More informationMultiple Input Multiple Output (MIMO) Operation Principles
Afriyie Abraham Kwabena Multiple Input Multiple Output (MIMO) Operation Principles Helsinki Metropolia University of Applied Sciences Bachlor of Engineering Information Technology Thesis June 0 Abstract
More informationA Genetic Approach with a Simple Fitness Function for Sorting Unsigned Permutations by Reversals
A Genetic Approach with a Simple Fitness Function for Sorting Unsigned Permutations by Reversals José Luis Soncco Álvarez Department of Computer Science University of Brasilia Brasilia, D.F., Brazil Email:
More informationDegrees of Freedom of Multi-hop MIMO Broadcast Networks with Delayed CSIT
Degrees of Freedom of Multi-hop MIMO Broadcast Networs with Delayed CSIT Zhao Wang, Ming Xiao, Chao Wang, and Miael Soglund arxiv:0.56v [cs.it] Oct 0 Abstract We study the sum degrees of freedom (DoF)
More informationChapter 1. The alternating groups. 1.1 Introduction. 1.2 Permutations
Chapter 1 The alternating groups 1.1 Introduction The most familiar of the finite (non-abelian) simple groups are the alternating groups A n, which are subgroups of index 2 in the symmetric groups S n.
More informationA Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model
A Simple Greedy Algorithm for Link Scheduling with the Physical Interference Model Abstract In wireless networks, mutual interference prevents wireless devices from correctly receiving packages from others
More informationMultiple Antennas in Wireless Communications
Multiple Antennas in Wireless Communications Luca Sanguinetti Department of Information Engineering Pisa University lucasanguinetti@ietunipiit April, 2009 Luca Sanguinetti (IET) MIMO April, 2009 1 / 46
More informationJoint Scheduling and Fast Cell Selection in OFDMA Wireless Networks
1 Joint Scheduling and Fast Cell Selection in OFDMA Wireless Networks Reuven Cohen Guy Grebla Department of Computer Science Technion Israel Institute of Technology Haifa 32000, Israel Abstract In modern
More informationUniversity of Groningen. Graph theory for alternating hydrocarbons with attached ports Hesselink, Wim H.
University of Groningen Graph theory for alternating hydrocarbons with attached ports Hesselink, Wim H. Published in: Indagationes mathematicae-new series DOI: 10.1016/j.indag.2012.07.002 IMPORTANT NOTE:
More informationFrom Fountain to BATS: Realization of Network Coding
From Fountain to BATS: Realization of Network Coding Shenghao Yang Jan 26, 2015 Shenzhen Shenghao Yang Jan 26, 2015 1 / 35 Outline 1 Outline 2 Single-Hop: Fountain Codes LT Codes Raptor codes: achieving
More informationOn Information Theoretic Interference Games With More Than Two Users
On Information Theoretic Interference Games With More Than Two Users Randall A. Berry and Suvarup Saha Dept. of EECS Northwestern University e-ma: rberry@eecs.northwestern.edu suvarups@u.northwestern.edu
More informationSlide 1 Math 1520, Lecture 13
Slide 1 Math 1520, Lecture 13 In chapter 7, we discuss background leading up to probability. Probability is one of the most commonly used pieces of mathematics in the world. Understanding the basic concepts
More informationComputational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 2010
Computational aspects of two-player zero-sum games Course notes for Computational Game Theory Section 3 Fall 21 Peter Bro Miltersen November 1, 21 Version 1.3 3 Extensive form games (Game Trees, Kuhn Trees)
More informationarxiv: v1 [cs.cc] 12 Dec 2017
Computational Properties of Slime Trail arxiv:1712.04496v1 [cs.cc] 12 Dec 2017 Matthew Ferland and Kyle Burke July 9, 2018 Abstract We investigate the combinatorial game Slime Trail. This game is played
More informationLocalization (Position Estimation) Problem in WSN
Localization (Position Estimation) Problem in WSN [1] Convex Position Estimation in Wireless Sensor Networks by L. Doherty, K.S.J. Pister, and L.E. Ghaoui [2] Semidefinite Programming for Ad Hoc Wireless
More informationMathematics Competition Practice Session 6. Hagerstown Community College: STEM Club November 20, :00 pm - 1:00 pm STC-170
2015-2016 Mathematics Competition Practice Session 6 Hagerstown Community College: STEM Club November 20, 2015 12:00 pm - 1:00 pm STC-170 1 Warm-Up (2006 AMC 10B No. 17): Bob and Alice each have a bag
More informationOnline Frequency Assignment in Wireless Communication Networks
Online Frequency Assignment in Wireless Communication Networks Francis Y.L. Chin Taikoo Chair of Engineering Chair Professor of Computer Science University of Hong Kong Joint work with Dr WT Chan, Dr Deshi
More informationSingle Error Correcting Codes (SECC) 6.02 Spring 2011 Lecture #9. Checking the parity. Using the Syndrome to Correct Errors
Single Error Correcting Codes (SECC) Basic idea: Use multiple parity bits, each covering a subset of the data bits. No two message bits belong to exactly the same subsets, so a single error will generate
More informationVolume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 9, September 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
More informationAntennas and Propagation. Chapter 6b: Path Models Rayleigh, Rician Fading, MIMO
Antennas and Propagation b: Path Models Rayleigh, Rician Fading, MIMO Introduction From last lecture How do we model H p? Discrete path model (physical, plane waves) Random matrix models (forget H p and
More informationApproaching the Capacity of the Multi-Pair Bidirectional Relay Network via a Divide and Conquer Strategy
Approaching the Capacity of the Multi-Pair Bidirectional elay Network via a Divide and Conquer Strategy Salman Avestimehr Cornell In collaboration with: Amin Khajehnejad (Caltech), Aydin Sezgin (UC Irvine)
More informationImproved Algorithm for Broadcast Scheduling of Minimal Latency in Wireless Ad Hoc Networks
Acta Mathematicae Applicatae Sinica, English Series Vol. 26, No. 1 (2010) 13 22 DOI: 10.1007/s10255-008-8806-2 http://www.applmath.com.cn Acta Mathema ca Applicatae Sinica, English Series The Editorial
More informationDiscrete Mathematics and Probability Theory Spring 2018 Ayazifar and Rao Midterm 2 Solutions
CS 70 Discrete Mathematics and Probability Theory Spring 2018 Ayazifar and Rao Midterm 2 Solutions PRINT Your Name: Oski Bear SIGN Your Name: OS K I PRINT Your Student ID: CIRCLE your exam room: Pimentel
More informationarxiv: v1 [math.co] 11 Jul 2016
OCCURRENCE GRAPHS OF PATTERNS IN PERMUTATIONS arxiv:160703018v1 [mathco] 11 Jul 2016 BJARNI JENS KRISTINSSON AND HENNING ULFARSSON Abstract We define the occurrence graph G p (π) of a pattern p in a permutation
More informationTic-Tac-Toe on graphs
AUSTRALASIAN JOURNAL OF COMBINATORICS Volume 72(1) (2018), Pages 106 112 Tic-Tac-Toe on graphs Robert A. Beeler Department of Mathematics and Statistics East Tennessee State University Johnson City, TN
More information