Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Size: px
Start display at page:

Download "Secure Network Coding for Distributed Secret Sharing with Low Communication Cost"

Transcription

1 Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important component of several cryptographic protocols, such as those for secure multiparty-computation. These protocols typically assume the presence of irect communication links from the ealer to all participants, in which case the ealer can irectly pass the shares of the secret to every participant. In this paper, we consier the problem of secret sharing when the ealer oes not have irect communication links to all participants, an instea, they form a general network. We present an algorithm for secret sharing over networks that satisfy what we call the k- propagating-ealer conition. The algorithm is communicationefficient, istribute an eterministic. Interestingly, the solution constitutes an instance of a network coing problem amitting a istribute an eterministic solution, an furthermore, hanles the case of noal-eavesropping, about which very little appears to be known in the literature. In the secon part of the paper, we erive information-theoretic lower bouns on the communication complexity of secret sharing over any network, which may also be of inepenent interest. We show that for networks satisfying the k-propagating-ealer conition, the communication complexity of our algorithm is Θ(n), an furthermore, is always within a constant factor of the lower boun. We also show that, in contrast, existing solutions in the literature entail a communication-complexity that is superlinear for a wie class of networks, an is Θ(n ) in the worst case. Our algorithm thus allows for efficient generalization of several cryptographic protocols to a large class of networks. I. INTRODUCTION Shamir s classical (n,k) secret sharing scheme [1] is an essential ingreient of several cryptographic protocols. The scheme consiers a set of (n +1) entities: a ealer an n participants. The ealer possesses a secret s an wishes to pass functions (calle shares) of this secret to the n participants, such that the following properties are satisfie: k-secret-recovery: the shares of any k participants suffice to recover the secret s (k 1)-collusion-resistance: the aggregate ata gathere by any (k 1) noes reveals no knowlege (in the informationtheoretic sense) about the secret s. Several cryptographic protocols in the literature require execution of one or more instances of secret sharing among all the participants. These inclue protocols for secure multipartycomputation [], secure key management [3], an secure archival storage [4]. For instance, uner the celebrate Ben- Or-Golwasser-Wigerson (BGW) protocol [] for securemultiparty function computation, the initialization step requires n instances of secret sharing an every multiplication operation requires n aitional instances. Most protocols incluing those liste above assume that the ealer has irect communication links to every participant. In The authors are with the Dept. of EECS, University of California, Berkeley. {nihar, rashmikv, kannanr}@eecs.berkeley.eu N. B. Shah was supporte by a Berkeley Fellowship an K. V. Rashmi was supporte by a Facebook Fellowship. This work was also supporte in part by AFOSR grant FA an in part by NSF grant CCF this case, the ealer can compute the shares as per Shamir s scheme [1] an irectly pass the shares to the respective participants. In several situations, the ealer may not have irect communication links with every participant; instea, the ealer an the participants may form a general network, e.g., as in Fig. 1. The network is escribe by a graph G with (n +1) noes. These (n +1) noes comprise the ealer an the n participants. An ege represents a secure communication link between its two en-points. We shall say a participant is irectly connecte to the ealer if there exists an ege from the ealer to that participant. We shall use the terms ege or link to refer to a communication link. Uner a general network, all communication between the ealer an a participant who is not irectly connecte to it, must pass through other participants in the network. This poses the challenge of secret sharing over a network without leaking any aitional information to any participant. Previous solutions: The current practice is to perform separate secure transmissions across the network [5] from the ealer to each participant. Uner this solution, the ealer first encoes s into n shares {t l } n l=1 using Shamir s secret sharing scheme. To every noe l irectly connecte to the ealer, the ealer irectly passes the share t l. To isseminate shares to the remaining noes, the ealer performs the following actions, once separately for each remaining noe l {1,...,n}. The ealer applies Shamir s secret sharing treating t l as a secret. The resultant k shares are then passe to noe l via k noeisjoint paths in the graph. Noe l can ecoe its esire share t l, while the remaining noes in the network o not obtain any information about s or t l. Such a solution incurs a high communication cost, since the ealer nees to transmit shares across the network separately to every participant. Moreover, the requirement of setting up k noe-isjoint paths to every participant requires knowlege of the global topology, an also requires significant coorination in the network. 1 Due to lack of a specific name, in the sequel, we shall refer this solution simply as the previous solution. In this paper, we consier the problem of efficient issemination of the shares of a secret to participants forming a network. We provie an algorithm that performs this task over a wie class of networks in a communication-efficient an istribute manner. Our algorithm provies significant gains over the previous solution, with a communication complexity that is within a constant factor from the information-theoretic lower bouns, that are also erive in this paper. As a secure network coing problem: The problem of secret share issemination can also be cast as a specific instance of 1 The communication efficiency of this solution can be improve if more than k noe-isjoint paths are available, by employing two-threshol secret sharing over these noe-isjoint paths. The analysis an comparisons performe subsequently in Section IV consier this version of the solution /13/$ IEEE 404

2 D 1 3 Fig. 1: A network forme by the ealer (D) an participants (1 to 6), as consiere in Example 1. a secure network coing problem, by connecting sinks to each of the ( n k) subsets of k participants. It requires secrecy from an eavesropper that can gain access to subsets of the noes (in particular, to any subset of (k 1) participants). However, to the best of our knowlege, only the setting where the eavesropper can access subsets of links is well unerstoo in the literature. [6], [7] consier the setting where a collection of subsets of the links is specifie, an an eavesropper may gain access to precisely one of these subsets. This work aresses the problem of noe-compromise by treating it as a case of link-compromise by allowing the eavesropper to gain access to all links that are incient upon the compromise noes. However, this scheme requires the network to satisfy a certain conition, which is almost always violate in our problem. Moreover, the scheme is not explicit an requires the size of the finite fiel to be exponential in n. Communication-efficient algorithms to secure a network from an eavesropper having access to a boune number of links are provie in [8], [9]. These algorithms communicate a message of size equal to the ifference between the largest message that can be sent in the absence of secrecy requirements an the boun on number of compromise links. In our problem, this ifference is generally 0 or smaller (e.g., the ifference is in the network of Fig. 1), thus making these algorithms inapplicable here. The algorithms currently foun in the network coing literature, even for the setting where there are no secrecy requirements, are either ranom (thus not guarantee) [10], or eterministic but centralize [11]. On the other han, our algorithm is both istribute an eterministic (i.e., is successful with probability 1). Illustrative example: The following toy example illustrates the previous solution an our new algorithm. Example 1: Consier the network epicte in Fig. 1. Let n =6 an k =, with the finite fiel F 7 as the alphabet of operation. Uner Shamir s scheme of encoing the secret s, the share t i (1 i 6) for participant i is t i = s + ir where r is a value chosen by the ealer uniformly at ranom from F 7. While the ealer can irectly pass shares t 1 an t to participants 1 an respectively, the ifficulty arises in communicating shares to the remaining participants with whom the ealer oes not have irect communication links. For instance, if the ealer tries to pass share t 3 to 3 by passing t 3 along the path D 1 3, then 1 gains access to two shares, t 1 an t 3. Using these two shares, 1 can recover s, thus violating the (k 1)-collusion resistance requirement. The solution previously propose in the literature is to perform separate secure transmissions from the ealer to each participant [5]. In the example of Fig. 1, in orer to pass the share t 3 to participant 3, the ealer chooses another ranom value r 3, passes (t 3 + r 3 ) along the path D 1 3, an r 3 along D 3. Now, participant 3 can recover its share t 3, an no participant gains any aitional information about s or t 3 in this process. In a similar manner, the ealer communicates t i (4 i 6) to participant i by passing (t i + r i ) an r i through k = noe-isjoint paths. Although this solution guarantees successful share issemination, it is communication inefficient, an requires knowlege of the global topology, as well as consierable coorination in the network. Observe that the solution escribe above transmits ata across several hops in the network in every step, which is however, never use subsequently in the protocol. Thus, in orer to esign efficient algorithms, one may wish to propagate ata in a manner that allows its subsequent reuse ownstream, thus reucing the overall communication in the network, as typical of solutions base on network coing. Uner our algorithm, the ealer first raws two values r an r a uniformly at ranom from F 7. The ealer then passes the two values (s + r) an (r + r a ) to noe 1, an the two values (s +r) an (r +r a ) to noe. Now, noe 1 passes (s + r)+j(r + r a ) to its neighbouring noe j =3, an this expression can equivalently be written as (s + jr)+(r + jr a ). Similarly, noe passes (s +r)+j(r +r a )(=(s + jr)+ (r + jr a )) to its neighbours j {3,4}. Noe 3 thus receives (s +3r)+(r +3r a ) an (s +3r)+(r +3r a ) from which it recovers the two values (s +3r) an (r +3r a ). Noe 3 now passes (s +3r)+j(r +3r a )(=(s + jr)+3(r + jr a )) to its other neighbours j {4,5}. Noe 4 thus receives (s +4r)+ (r +4r a ) an (s +4r)+3(r +4r a ) from noes an 3 respectively, from which it recovers (s +4r) an (r +4r a ). In general, in this network, every noe i {1,...,6} recovers (r + ir a ) an (s + ir), an can thus recover its requisite share (s + ir), along with a ranom counterpart (r + ir a ) which is use to isseminate shares further ownstream. One can see that the new algorithm presente in this paper requires a communication of only 1 values, as oppose to 4 in the previous solution. Furthermore, this algorithm requires knowlege of only the local topology, whereas the previous solution requires the knowlege of the global topology to setup communication over noe-isjoint paths. Summary of results: We first present an algorithm that enables a ealer to isseminate shares of a secret to n participants in network G, such that the properties of k-secret-recovery (when G satisfies a conition, which we term the k-propagating-ealer conition) (k 1)-collusion-resistance (for any G) are satisfie. The algorithm is completely istribute, an each noe nees to know only the ientities of its neighbours. The algorithm is explicit, works with any finite fiel of size n or higher, an requires computations consisting only of encoing an ecoing one instance of a Ree-Solomon coe at every noe. Thus, this algorithm allows for efficient generalization of various cryptographic protocols, that previously assume irect communication links from the ealer to every participant, to a large class of networks. For any (n,k), an G with (n +1) noes, we also erive Information-theoretic lower bouns on the total communication complexity uner any algorithm. 405

3 Communication complexity uner our algorithm Lower bouns on the communication complexity uner the previous solution. Using these results, we establish that when the k-propagating ealer property is satisfie, the communication complexity of our algorithm is Θ(n), an is always within a constant factor from the lower bouns. On the other han, the communication complexity of the previous solution grows super-linearly for a large class of graphs, an is Θ(n ) in the worst case. Aitional results in the extene version [1]: Heuristic methos, base on this algorithm, aressing the case when the k-propagating-ealer conition is not satisfie are provie. Extensions incorporating active aversaries, efficient aition of new participants in the absence of truste entities, an twothreshol secret sharing are also presente. Bouns on the amount of ranomness require are erive: the amount of ranomness require uner our algorithm is inepenent of n, which is not the case with the previous solution. Our algorithm is base on a variant of the Prouct-Matrix coes [13] which were originally constructe for istribute storage systems. Organization of the paper: Section II escribes the system moel. Section III presents the main algorithm. Section IV presents an analysis of the communication-complexity of the algorithm, lower bouns for the problem, an comparisons with the performance of the previous solution. Finally, Section V presents conclusions an iscusses open problems. II. SYSTEM MODEL A. Secret Sharing in a Network The ealer possesses a secret s that is rawn from some alphabet A, an wishes to pass shares of this secret to n participants. The ealer an the participants form a network, enote by graph G. The graph G has (n +1) noes comprising the ealer an the n participants, an an ege in the graph enotes a secure an private communication link between the two en-points. The problem is to esign a protocol which will allow the ealer to pass shares (of the secret) to the n participants, meeting the requirements of (k 1)- collusion-resistance an k-secret-recovery. All the participants are assume to be honest-but-curious, i.e., they follow the protocol correctly, but may store any accessible ata to gain information about the secret. 3 The eges in G can be irecte or unirecte: a irecte ege implies existence of only a one way communication link an an unirecte ege implies irect communication links both ways. n an k are assume to satisfy n k>1, since n k 1 prohibits the secret from ever being recovere, while k =1egenerates the problem to the case wherein no security is require. We shall now iscuss a conition that the graph G must necessarily satisfy for any algorithm to successfully perform secret sharing on it. Definition 1 (m-connecte-ealer): A graph with (n +1) noes (the ealer an n participants) satisfies the m- Thus, at times, we will also refer to a participant as a noe of the graph. We will also use the terms network an graph interchangeably. 3 An extension to hanling active aversaries is presente in the extene version [1] of this paper. connecte-ealer property for a positive integer m, if each of the n participants in the graph either has an incoming ege irectly from the ealer or has at least m noe-isjoint paths from the ealer to itself. Lemma 1 (Necessary conition): For any graph G, a necessary conition for any algorithm to perform (n,k) secret sharing is that G satisfies the k-connecte-ealer property. Proof: The proof is straightforwar. Suppose G oes not satisfy the k-connecte-ealer property. Then there exists some noe (say, noe i) that is not irectly connecte to the ealer, an has at most (k 1) noe-isjoint paths from the ealer to itself. Since every path from the ealer to noe i must necessarily pass through at least one of these (k 1) noes, they can together recover the entire share of participant i. Putting in their own (k 1) shares, these (k 1) participants can together recover s, thus violating the (k 1) collusion resistance requirement. Thus no algorithm can operate successfully on all network topologies, an must require the graph G to obey at least the k-connecte-ealer conition. In this regar, we remark that the algorithm presente in this paper is robust to the network topology, i.e., the (k 1)-collusion-resistance property is satisfie irrespective of the topology of the network. Our algorithm successfully isseminates secret shares on a large class of networks. This class is escribe below. B. Class of Networks Consiere The algorithm presente in this paper requires the communication network G to satisfy an aitional conition, the k-propagating-ealer conition, as iscusse below. Definition (m-propagating-ealer): A graph with (n + 1) noes (the ealer an n participants) satisfies the m- propagating-ealer property for a positive integer m, if there exists an orering of the n participants in the graph such that every noe either has an incoming ege irectly from the ealer, or has incoming eges from at least m noes preceing it in the orering. As an illustration of this conition, consier the network of Example 1 (Fig. 1). This network satisfies the -propagatingealer conition, with the orering 1,,3,4,5,6 (observe that this is also the orer in which the participants receive their shares uner our algorithm in Example 1). Examples of other classes of graphs that satisfy this conition inclue layere networks, one-imensional geometric graphs, backbone networks. In each of these graphs, the k-propagating-ealer conition is satisfie for any noe as the ealer. In aition, any irecte acyclic graph (DAG) that satisfies the m-connecteealer conition automatically satisfies the m-propagatingealer conition (any topological orering of the DAG suffices as the requisite noe-orering). Our algorithm successfully performs secret share issemination to all participants if the graph satisfies the k-propagatingealer property. We note that while our algorithm requires existence of some orering of the noes satisfying the k- propagating-ealer property, the algorithm itself is completely istribute an oblivious of this orering. Apart from the parameters n an k, an aitional parameter is associate to our algorithm. We saw earlier that the k- 406

4 connecte-ealer conition is necessary for any secret sharing algorithm, an our algorithm requires the k-propagating-ealer conition to be satisfie. Now, assuming that these necessary conitions have been met, one woul intuitively expect the efficiency of the algorithm to be higher if the graph has a greater connectivity. The parameter is use to capture this intuition: our algorithm takes the parameter ( k) as input, an uner the assumption that the graph satisfies the -propagating-ealer conition, achieves a greater communication efficiency. Note that in the scenario that one oes not have an estimate of, one can execute the algorithm by simply setting to be equal to the secret sharing parameter k. C. Notational Conventions For any noe j, the set of its neighbouring noes is enote as N (j). In case of a irecte graph, N (j) enotes the set of noes that have an incoming ege from noe j. The ealer is enote by D. We say that a noe j is irectly connecte to the ealer if j N(D). Transpose of a vector or matrix is enote by a superscript T. For any integer l 1, [l] represents the set {1,...,l}. III. MAIN ALGORITHM Consier a network G that obeys the -propagating-ealer conition for some parameter ( k). Assume secret s belongs to the alphabet F k+1 q, for some q>n. Thus we can equivalently enote the secret as a vector s = [s 1 s s k+1 ] T with each element of this vector belonging to the finite fiel F q. A. Initial Setting up by the Dealer The ealer first constructs an (n ) Vanermone matrix Ψ, with the i th (1 i n) row of Ψ being ψ T i =[1 ii i 1 ]. (1) The vector ψ i is terme the encoing vector of noe i. Next, the ealer constructs a ( ) symmetric matrix M comprising the secret s an a collection of ranom values as: M = s T T A r a s B r a R b Rc T () s B R c 0 }{{}}{{}}{{} 1 k 1 k where the epicte sub-matrices of M are s A = s k+1 is a scalar, s B =[s 1 s k ] T is a vector of length ( k), r a is a ranom vector of length (k 1), R b is a ((k 1) (k 1)) symmetric matrix with its k(k 1) istinct entries populate by ranom values, R c is a (( k) (k 1)) matrix with its (k 1)( k) entries populate by ranom values. These ranom values are all picke inepenently an uniformly from F q. Note that the total number of ranom values R in matrix M is The share t j for participant j (1 j n) is a vector of length ( k +1): t T j = ψ T s T A s B j r a Rc T. (3) s B 0 We shall show subsequently in Theorem 3 that any k of these shares suffice to recover the entire secret. B. Communication across the Network Algorithm 1 escribes the communication protocol to securely transmit the shares {t j } n j=1 to the n participants. Algorithm 1 Communication Protocol Dealer: For every j N(D), compute an pass the -length vector ψ T j M to participant j. Participant l N(D): Wait until receipt of ata ψ T l M from the ealer. Then, for every j N(l), compute inner prouct of the ata ψ T l M with the encoing vector ψ j of participant j. Pass the resultant value ψ T l Mψ j to participant j. Participant l/ N(D): Wait until receipt of one value each from any neighbours. Then, enote this set of neighbours as {i 1,...,i }, an the values receive from them as {σ 1,...,σ } respectively. Compute the vector v T =[σ 1 σ ] T [ψ i1 ψ i ] 1. For every neighbour i N(l) from whom you i not receive ata, pass the inner prouct v T ψ i to participant i. 4 C. Correctness of the Algorithm The proofs of the following theorems are available in [1]. Theorem (Successful share issemination): Uner the algorithm presente, every participant l [n] can recover ψ T l M, an hence obtain its intene share (3). Theorem 3 (k-secret-recovery): Any k shares suffice to recover the secret. Theorem 4 ((k 1)-collusion-resistance): Any set of (k 1) or fewer colluing participants can gain no information about the secret. This hols for any graph, irrespective of whether it satisfies the require conitions. This algorithm is also robust to any run-time changes in the network topology (e.g., removal or aition of new links). IV. COMPLEXITY ANALYSIS AND LOWER BOUNDS In this section we provie an analysis an comparison of the communication complexity of our algorithm, the previous solution, an lower bouns for any scheme. Let N (D) enote the size of the set N (D). In the analysis, the parameters k an are treate as constants, however, most part of the analysis consiers finite n, k, an, an hence hols even when these parameters epen on n. All proofs are available in [1]. ( ) We efine, without loss of generality, one unit of ata to be k(k 1) k 1 the size of the secret. We shall use the notation Γ(.) to enote R =(k 1) + +(k 1)( k)=(k 1). communication complexity. The following theorem provies a The entire secret is containe in the components s A an s B comparison of the communication complexity of our algorithm as s T =[s 1 s k+1 ]=[s T B s A ]. Observe that the structure with lower bouns an with the previous solution. of M as escribe in (), along with the symmetry of matrix R b, makes the matrix M symmetric. Theorem 5: For any (n,k) an any G satisfying the k- propagating-ealer conition, the communication complexity 407

5 of our algorithm is Θ(n), an is always within a constant (multiplicative) factor of the lower boun. The previous solution entails a super-linear communication-complexity for a wie class of networks, an there exists a class of graphs for which its communication complexity is Θ(n ). These claims are mae more precise via the following results, which may also be of inepenent interest. 1) Our Algorithm Theorem 6: For any (n,k), an any G with (n +1) noes satisfying the -propagating-ealer conition for some (known), our algorithm entails a communication complexity Γ our (G)=n k +1. ) Information-theoretic Lower Bouns The following theorem provies an information-theoretic lower boun to the amount of ownloa at any noe in the network uner any scheme. Theorem 7: For an (n,k) secret sharing problem on any graph G with (n +1) noes, any noe l [n] must ownloa eg(l) eg(l) k+1 if l/ N(D) an eg(l) k Γ any (l) 1 if l N(D) if l/ N(D) an eg(l) <k where eg(l) enotes the number of incoming eges at noe l. Furthermore, this boun is the best possible, given only the ientities of the neighbours of noe l. Corollary 8: For an (n,k) secret sharing problem on any graph G with (n +1) noes, the total communication complexity is lower boune by Γ any (G) N(D) + eg(i) eg(i) k +1 n. i/ N (D) Thus the communication complexity of our algorithm is a constant multiplicative factor away from the lower boun. Corollary 9: For any (n,k) an any -regular graph with (n +1) noes satisfying the -propagating-ealer conition, uner our algorithm, the amount of ata ownloae by any noe l/ N(D) is the minimum possible. Furthermore, the amount of ata ownloae by any noe l N(D) is inepenent of n. Corollary 10: For any (n,k), an any (k <n), there exists a class of graphs with (n +1) noes such that each graph in this class satisfies the -propagating ealer property, an the communication complexity for (n,k) secret sharing on any graph G in this class is lower boune by Γ any (G) n (k 1) k +1 k +1. Thus, the complexity of our algorithm is a constant aitive factor away from the lower boun for this class of graphs. 3) Previous Solution Theorem 11: For any (n,k) an G, the communication complexity of the previous solution is Γ prev (G)= N (D) + [ ] w min w k w k +1 l w(d i) i/ N (D) where l w (D i) is the average of the path lengths of the w shortest noe-isjoint paths from D to i (with l w (D i)= if there o not exist w noe-isjoint paths from D to i). Corollary 1: For any sequence of graphs of increasing size with the maximum outgoing egree being O((log n) 1 ɛ )) for some ɛ>0, the previous solution requires a super-linear communication complexity. Corollary 13: For any (n,k) an any (k <n), there exists a class of graphs with (n +1) noes such that each graph in this class satisfies the -propagating ealer property, an (n,k) secret sharing on any graph G in this class using the previous solution requires a communication complexity n(n +1) Γ prev (G). 4 Thus, on a sequence of such classes of graphs, our algorithm requires Θ(n) communication complexity, as compare to Θ(n ) require uner the previous solution. V. CONCLUSIONS AND OPEN PROBLEMS The problem of secret sharing in a network arises funamentally in several problems for security an cryptography. By means of an explicit algorithm an information theoretic bouns, this paper provies upper an lower bouns on the communication complexity require for this problem. However, obtaining the precise complexity still remains open. The algorithm presente here requires the network to satisfy the k- propagating ealer conition, an heuristics to aress general networks are presente in the extene version [1]. However, the guarantees achieve by the algorithm in the general case are not known. Finally, it remains to see if any of the ieas from this specific case of secure network coing carry over to more general network coing problems. REFERENCES [1] A. Shamir, How to share a secret, Communications of the ACM, vol., no. 11, pp , [] M. Ben-Or, S. Golwasser, an A. Wigerson, Completeness theorems for non-cryptographic fault-tolerant istribute computation, in ACM STOC, [3] T. Peersen, A threshol cryptosystem without a truste party, in Avances in Cryptology EUROCRYPT, 1991, pp [4] M. Storer, K. Greenan, E. Miller, an K. Voruganti, Potshars: A secure, recoverable, long-term archival storage system, ACM Trans. on Storage, 009. [5] D. Dolev, C. Dwork, O. Waarts, an M. Yung, Perfectly secure message transmission, Journal of the ACM, vol. 40, no. 1, pp , [6] N. Cai an R. Yeung, Secure network coing on a wiretap network, IEEE Trans. on Inf. Th., Jan [7] J. Felman, T. Malkin, C. Stein, an R. Serveio, On the capacity of secure network coing, in Allerton Conf., 004. [8] H. Yao, D. Silva, S. Jaggi, an M. Langberg, Network coes resilient to jamming an eavesropping, in NetCo, 010. [9] C. Ngai an R. Yeung, Secure error-correcting (sec) network coes, in NetCo, 009. [10] T. Ho, M. Méar, R. Koetter, D. Karger, M. Effros, J. Shi, an B. Leong, A ranom linear network coing approach to multicast, IEEE Trans. Inf. Th., Oct [11] S. Jaggi, P. Saners, P. Chou, M. Effros, S. Egner, K. Jain, an L. Tolhuizen, Polynomial time algorithms for multicast network coe construction, IEEE Trans. Inf. Th., Jun [1] N. B. Shah, K. V. Rashmi, an K. Ramchanran, Secure network coing for istribute secret sharing with low communication cost. [Online]. Available: arxiv: [13] K. V. Rashmi, N. B. Shah, an P. V. Kumar, Optimal exact-regenerating coes for the MSR an MBR points via a prouct-matrix construction, IEEE Trans. Inf. Th., Aug

Secret Sharing Across a Network with Low Communication Cost: Distributed Algorithm and Bounds

Secret Sharing Across a Network with Low Communication Cost: Distributed Algorithm and Bounds Secret Sharing Across a Network with Low Communication Cost: istributed Algorithm and Bounds Nihar B. Shah, K. V. Rashmi and Kannan Ramchandran, Fellow, IEEE epartment of Electrical Engineering and Computer

More information

Secret Share Dissemination across a Network

Secret Share Dissemination across a Network Secret Share Dissemination across a Network Nihar B. Shah, K. V. Rashmi and Kannan Ramchandran Dept. of Electrical Engineering and Computer Sciences University of California, Berkeley {nihar, rashmikv,

More information

On Secret Sharing Schemes based on Regenerating Codes

On Secret Sharing Schemes based on Regenerating Codes On Secret Sharing Schemes base on Regenerating Coes Masazumi Kurihara (University of Electro-Communications) 0 IEICE General Conference Okayama Japan 0- March 0. (Proc. of 0 IEICE General Conference AS--

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Information-theoretically Secure Regenerating Codes for Distributed Storage

Information-theoretically Secure Regenerating Codes for Distributed Storage Information-theoretically Secure Regenerating Codes for Distributed Storage Nihar B. Shah, K. V. Rashmi and P. Vijay Kumar Abstract Regenerating codes are a class of codes for distributed storage networks

More information

Enabling Node Repair in Any Erasure Code for Distributed Storage

Enabling Node Repair in Any Erasure Code for Distributed Storage Enabling Node Repair in Any Erasure Code for Distributed Storage K. V. Rashmi, Nihar B. Shah, and P. Vijay Kumar, Fellow, IEEE Abstract Erasure codes are an efficient means of storing data across a network

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 8, AUGUST 2011 5227 Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi,

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

1 Surprises in high dimensions

1 Surprises in high dimensions 1 Surprises in high imensions Our intuition about space is base on two an three imensions an can often be misleaing in high imensions. It is instructive to analyze the shape an properties of some basic

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

A Systematic Approach to Network Coding Problems using Conflict Graphs

A Systematic Approach to Network Coding Problems using Conflict Graphs A Systematic Approach to Network Coding Problems using Conflict Graphs Jay Kumar Sundararajan Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge, MA 02139,

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Regenerating Codes for Errors and Erasures in Distributed Storage

Regenerating Codes for Errors and Erasures in Distributed Storage Regenerating Codes or Errors and Erasures in Distributed Storage K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE, and P Vijay Kumar, Fellow, IEEE arxiv:0050v csit] 3 May 0 Abstract Regenerating

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis

Multilevel Linear Dimensionality Reduction using Hypergraphs for Data Analysis Multilevel Linear Dimensionality Reuction using Hypergraphs for Data Analysis Haw-ren Fang Department of Computer Science an Engineering University of Minnesota; Minneapolis, MN 55455 hrfang@csumneu ABSTRACT

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

EXACT SIMULATION OF A BOOLEAN MODEL

EXACT SIMULATION OF A BOOLEAN MODEL Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

Network Routing Capacity

Network Routing Capacity IEEE TRANSACTIONS ON INFORMATION THEORY (FINAL VERSION NOV., 2005) CANNONS-DOUGHERTY-FREILING-ZEGER Network Routing Capacity Jillian Cannons, Randall Dougherty, Chris Freiling, and Kenneth Zeger Abstract

More information

Calculation on diffraction aperture of cube corner retroreflector

Calculation on diffraction aperture of cube corner retroreflector November 10, 008 / Vol., No. 11 / CHINESE OPTICS LETTERS 8 Calculation on iffraction aperture of cube corner retroreflector Song Li (Ó Ø, Bei Tang (», an Hui Zhou ( ï School of Electronic Information,

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Insecure Provable Secure Network Coding

Insecure Provable Secure Network Coding Insecure Provable Secure Network Coding Yongge Wang UNC Charlotte, USA yonwang@uncc.edu October 18, 2009 Abstract Network coding allows the routers to mix the received information before forwarding them

More information

arxiv: v1 [math.co] 15 Dec 2017

arxiv: v1 [math.co] 15 Dec 2017 Rectilinear Crossings in Complete Balance -Partite -Uniform Hypergraphs Rahul Gangopahyay Saswata Shannigrahi arxiv:171.05539v1 [math.co] 15 Dec 017 December 18, 017 Abstract In this paper, we stuy the

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

6 Gradient Descent. 6.1 Functions

6 Gradient Descent. 6.1 Functions 6 Graient Descent In this topic we will iscuss optimizing over general functions f. Typically the function is efine f : R! R; that is its omain is multi-imensional (in this case -imensional) an output

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space

Analysis of half-space range search using the k-d search skip list. Here we analyse the expected time for half-space Analysis of half-space range search using the k- search skip list Mario A. Lopez Brafor G. Nickerson y 1 Abstract We analyse the average cost of half-space range reporting for the k- search skip list.

More information

Design Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity

Design Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity IEEE TRANSACTIONS ON COMPUTERS, VOL. 46, NO. 10, OCTOBER 1997 1 Design Principles for Practical Self-Routing Nonblocking Switching Networks with O(N log N) Bit-Complexity Te H. Szymanski, Member, IEEE

More information

Tracking and Regulation Control of a Mobile Robot System With Kinematic Disturbances: A Variable Structure-Like Approach

Tracking and Regulation Control of a Mobile Robot System With Kinematic Disturbances: A Variable Structure-Like Approach W. E. Dixon e-mail: wixon@ces.clemson.eu D. M. Dawson e-mail: awson@ces.clemson.eu E. Zergeroglu e-mail: ezerger@ces.clemson.eu Department of Electrical & Computer Engineering, Clemson University, Clemson,

More information

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Optimal Distributed P2P Streaming under Node Degree Bounds

Optimal Distributed P2P Streaming under Node Degree Bounds Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,

More information

A Versatile Model-Based Visibility Measure for Geometric Primitives

A Versatile Model-Based Visibility Measure for Geometric Primitives A Versatile Moel-Base Visibility Measure for Geometric Primitives Marc M. Ellenrieer 1,LarsKrüger 1, Dirk Stößel 2, an Marc Hanheie 2 1 DaimlerChrysler AG, Research & Technology, 89013 Ulm, Germany 2 Faculty

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks

Architecture Design of Mobile Access Coordinated Wireless Sensor Networks Architecture Design of Mobile Access Coorinate Wireless Sensor Networks Mai Abelhakim 1 Leonar E. Lightfoot Jian Ren 1 Tongtong Li 1 1 Department of Electrical & Computer Engineering, Michigan State University,

More information

AVALANCHE: A NETWORK CODING ANALYSIS

AVALANCHE: A NETWORK CODING ANALYSIS COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Majid Gerami, Ming Xiao Communication Theory Lab, Royal Institute of Technology, KTH, Sweden, E-mail: {gerami, mingx@kthse arxiv:14012774v1

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

MCMix: Anonymous Messaging via Secure Multiparty Computation

MCMix: Anonymous Messaging via Secure Multiparty Computation MCMix: Anonymous Messaging via Secure Multiparty Computation Nikolaos Alexopoulos 1, Aggelos Kiayias 2, Riivo Talviste 3, an Thomas Zacharias 2 1 Technische Universität Darmstat 2 School of Informatics,

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

Network Monitoring in Multicast Networks Using Network Coding

Network Monitoring in Multicast Networks Using Network Coding Network Monitoring in Multicast Networks Using Network Coding Tracey Ho Coordinated Science Laboratory University of Illinois Urbana, IL 6181 Email: trace@mit.edu Ben Leong, Yu-Han Chang, Yonggang Wen

More information

Hybrid Network-Erasure Coding Protection of Multi- Source, Multi-Sink Multicast Sessions in WSNs

Hybrid Network-Erasure Coding Protection of Multi- Source, Multi-Sink Multicast Sessions in WSNs Hybrid Network-Erasure Coding Protection of Multi- Source, Multi-Sink Multicast Sessions in WSNs Suhas Shetty Ahmed E. Kamal Department of Electrical and Computer Engineering, Iowa State University, Ames,

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

PART 2. Organization Of An Operating System

PART 2. Organization Of An Operating System PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms

More information

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks

Optimal Routing and Scheduling for Deterministic Delay Tolerant Networks Optimal Routing an Scheuling for Deterministic Delay Tolerant Networks Davi Hay Dipartimento i Elettronica olitecnico i Torino, Italy Email: hay@tlc.polito.it aolo Giaccone Dipartimento i Elettronica olitecnico

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Compact Routing on Internet-Like Graphs

Compact Routing on Internet-Like Graphs Compact Routing on Internet-Like Graphs Dmitri Krioukov Email: ima@krioukov.net Kevin Fall Intel Research, Berkeley Email: kfall@intel-research.net Xiaowei Yang Massachusetts Institute of Technology Email:

More information

PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING

PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that

More information

Performance Modelling of Necklace Hypercubes

Performance Modelling of Necklace Hypercubes erformance Moelling of ecklace ypercubes. Meraji,,. arbazi-aza,, A. atooghy, IM chool of Computer cience & harif University of Technology, Tehran, Iran {meraji, patooghy}@ce.sharif.eu, aza@ipm.ir a Abstract

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Variable Independence and Resolution Paths for Quantified Boolean Formulas

Variable Independence and Resolution Paths for Quantified Boolean Formulas Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Ad-Hoc Networks Beyond Unit Disk Graphs

Ad-Hoc Networks Beyond Unit Disk Graphs A-Hoc Networks Beyon Unit Disk Graphs Fabian Kuhn, Roger Wattenhofer, Aaron Zollinger Department of Computer Science ETH Zurich 8092 Zurich, Switzerlan {kuhn, wattenhofer, zollinger}@inf.ethz.ch ABSTRACT

More information

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles

Figure 1: 2D arm. Figure 2: 2D arm with labelled angles 2D Kinematics Consier a robotic arm. We can sen it commans like, move that joint so it bens at an angle θ. Once we ve set each joint, that s all well an goo. More interesting, though, is the question of

More information

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11: airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References

More information

Algebraic transformations of Gauss hypergeometric functions

Algebraic transformations of Gauss hypergeometric functions Algebraic transformations of Gauss hypergeometric functions Raimunas Viūnas Faculty of Mathematics, Kobe University Abstract This article gives a classification scheme of algebraic transformations of Gauss

More information

Test-Based Inference of Polynomial Loop-Bound Functions

Test-Based Inference of Polynomial Loop-Bound Functions Test-Base Inference of Polynomial Loop-Boun Functions Olha Shkaravska Roy Kersten Rabou University Nijmegen {shkarav,r.kersten}@cs.ru.nl Marko van Eekelen Rabou University Nijmegen an Open Universiteit

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions

Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions 2134 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 4, APRIL 2012 Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions Nihar B Shah, K V Rashmi, P

More information

Large Monochromatic Components in Two-colored Grids

Large Monochromatic Components in Two-colored Grids Large Monochromatic Components in Two-colore Gris Jiří Matoušek 1 Aleš Přívětivý 2 Department of Applie Mathematics 1,2 an Institute of Theoretical Computer Science (ITI) 1 Charles University Malostranské

More information

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks

A Stochastic Process on the Hypercube with Applications to Peer to Peer Networks A Stochastic Process on the Hypercube with Applications to Peer to Peer Networs [Extene Abstract] Micah Aler Department of Computer Science, University of Massachusetts, Amherst, MA 0003 460, USA micah@cs.umass.eu

More information

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm

Parallel Directionally Split Solver Based on Reformulation of Pipelined Thomas Algorithm NASA/CR-1998-208733 ICASE Report No. 98-45 Parallel Directionally Split Solver Base on Reformulation of Pipeline Thomas Algorithm A. Povitsky ICASE, Hampton, Virginia Institute for Computer Applications

More information

THE increasingly digitized power system offers more data,

THE increasingly digitized power system offers more data, 1 Cyber Risk Analysis of Combine Data Attacks Against Power System State Estimation Kaikai Pan, Stuent Member, IEEE, Anré Teixeira, Member, IEEE, Milos Cvetkovic, Member, IEEE, an Peter Palensky, Senior

More information

Compiler Optimisation

Compiler Optimisation Compiler Optimisation Michael O Boyle mob@inf.e.ac.uk Room 1.06 January, 2014 1 Two recommene books for the course Recommene texts Engineering a Compiler Engineering a Compiler by K. D. Cooper an L. Torczon.

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information