Secure Index Coding: Existence and Construction

Size: px
Start display at page:

Download "Secure Index Coding: Existence and Construction"

Transcription

1 Secure Index Codng: Exstence and Constructon Lawrence Ong 1, Badr N. Vellamb 2, Phee Lep Yeoh 3, Jörg Klewer 2, and Jnhong Yuan 4 1 The Unversty of Newcastle, Australa; 2 New Jersey Insttute of Technology, USA; 3 Unversty of Melbourne, Australa; 4 Unversty of New South Wales, Australa arxv: v2 [cs.it] 31 May 2016 Abstract We nvestgate the constructon of weakly-secure ndex codes for a sender to send messages to multple recevers wth sde nformaton n the presence of an eavesdropper. We derve a suffcent and necessary condton for the exstence of ndex codes that are secure aganst an eavesdropper wth access to any subset of messages of cardnalty t, for any fxed t. In contrast to the benefts of usng random keys n secure network codng, we prove that random keys do not promote securty n three classes of ndex-codng nstances. I. INTRODUCTION In classcal 1 ndex-codng problems, a sender sends multple messages to multple recevers through a common noseless broadcast medum, where each recever has a pror knowledge of a subset of messages [1] [5]. The subsets that each recever wants and knows can vary wth the recever. In ths work, we consder secure ndex codng, where n addton to the classcal setup, there s an eavesdropper who has access to a subset of messages from a collecton of subsets of messages. The sender and the recevers know a pror the collecton of message subsets, however, they do not know whch subset of messages n ths collecton s actually accessed by the eavesdropper. A weakly-secure ndex code must satsfy all recevers decodng requrements, whle ensurng that the eavesdropper s not able to decode any message t has no access to. A. Contrbutons of ths paper and related work The contrbutons of ths work are three-fold: 1) Exstence of secure ndex codes: Secure ndex codng was frst studed by Dau, Skachek, and Chee [6]. The authors derved condtons that any gven lnear code (of a gven message alphabet sze) must satsfy to smultaneously meet the recevers decodng requrements as well as be secure aganst an eavesdropper wth access to a message subset. In contrast to the code-centrc results by Dau et al., we obtan problem-centrc results. We derve a suffcent and necessary condton for the exstence of both lnear and nonlnear weakly-secure ndex codes over all fnte-feld alphabets for any ndex-codng problem where the eavesdropper can access any message subset of cardnalty t. We show how to construct such codes f they exst, and nvestgate ther optmalty. Ths work s supported by ARC grants FT , DE , and DP , and US NSF grants CNS and CCF We use the term classcal to ndcate the absence of any securty constrants. 2) Random keys: It has been shown [9] that there exst randomsed secure network codes (usng random keys) for nstances where no determnstc secure network code exsts. Owng to an equvalence between classcal versons of network and ndex codng [7, 8], t s plausble that there exst ndex-codng nstances where randomsed encodng can enable securty when determnstc encodng cannot. Whle we do not dentfy an nstance where ths s true, we have proven that random keys are not useful for weakly-secure ndex codes n the followng three cases: () the eavesdropper has access to any t messages, () the sender s encodng functon s lnear, or () the eavesdropper has access to only one message subset. 3) Secure vs classcal ndex codng: We hghlght a sgnfcant dfference between classcal and secure ndex codng. In classcal ndex codng, messages not requred at any recever are not useful and can be removed from the system. In weaklysecure ndex codng, these messages may be used as keys. II. PROBLEM DEFINITION AND NOTATION Let m,n N. For each [n] {1,...,n}, defne two subsets K,W [m]. A classcal ndex-codng nstance (K,W ) n =1 conssts of a sngle sender and n recevers. The sender hasmmessagesx = [X 1 X 2 X m ], where{x } m =1 are ndependent and unformly dstrbuted over a fnte feldf q wth q elements. For a subset of ntegers I = { 1, 2,..., I } where 1 < 2 < < I, letx I [X 1 X 2 X I ]. Each recever [n] has a pror knowledge of X K, and needs to decode X W. The sender encodes X and gves the codeword to all recevers. The codeword must be chosen so that each recever [n] s able to decode the messages X W t wants usng the codeword and the messages X K t already knows. Wthout loss of generalty, we may assume that W \K for all [n], snce recevers wantng only messages they already know can be expunged from the problem. Let A 2 [m], where 2 [m] s the set of all subsets of [m]. A secure ndex-codng nstance ((K,W ) n =1,A) s a classcal ndex-codng nstance (K,W ) n =1 n the added presence of an eavesdropper who can access the sender s codeword and precsely one subset of messages X A, where A A. The eavesdropper cannot smultaneously access messages correspondng to the ndces contaned n more than one member of A. The set A contans the possble subsets of ndces of compromsed messages. Whle the sender and the recevers are aware of A, they are oblvous to the exact subset of ndces the eavesdropper knows. In addton to meetng the recevers decodng requrements, a weakly-secure ndex codeword must ensure that the eavesdropper gans no addtonal nformaton

2 about each ndvdual message X j, j [m] \ A, gven X A and the codeword. Formally, we have the followng: Defnton 1 (Determnstc weakly-secure ndex code): Gven a secure ndex-codng nstance ((K,W ) n =1,A), a determnstc weakly-secure ndex code (f,{g } n =1 ) of codelength l N conssts of an encodng functon for the sender, f : F m q F l q, to encode X nto C f(x), and a decodng functon for each recever [n], g : F l q F K q such that F q W, to decode X W from C and X K decodablty: g (f(x),x K ) = X W for each [n]; and weak securty: for all A A, an eavesdropper accessng X A has no nformaton about any sngle message n A c [m]\a,.e., H(X f(x),x A ) = H(X ), for all A c. Remark 1: If A = {[m]}, we have a classcal ndex-codng nstance wthout any securty constrant. The noton of weak securty consdered here, also known as 1-block weakly secure n the lterature [6, 10], does not preclude the eavesdropper from ganng nformaton about X A c despte ganng no knowledge about any sngle message thereof. Other notons of securty have also been consdered n the lterature. For example, Mojahedan, Aref, and Gohar [11] consdered strongly-secure ndex codng, where the eavesdropper has no access to any message, and must not gan any nformaton about the messages X. Ther approach nvolves the sender encodng messages wth keys that are pre-shared wth the recevers, but are unknown to the eavesdropper. It may be possble for the sender to use random keys along wth the messages X durng the encodng process to ensure securty aganst the eavesdropper. We therefore ntroduce the followng noton of random weakly-secure ndex codes that generalse determnstc weakly-secure ndex codes. Defnton 2 (Random weakly-secure ndex code): Let Y be a random varable takng values n a fnte alphabet Y known only to the the sender, and unknown to the recevers and the eavesdropper. A random weakly-secure ndex code (f,{g } n =1 ) of codelength l N s dentcal to the determnstc ndex-code setup wth the only excepton that the sender encodes X nto C f(x,y) usng the functon f : Fq m Y Fq. l The decodng operatons, decodablty condtons, and securty condtons are dentcal to those n Defnton 1. For the rest of ths paper, unless otherwse stated, by secure ndex codes, we mean weakly-secure ndex codes. Defnton 3 (Lnear ndex code): A random ndex code s lnear f and only f the key Y = [Y 1 Y 2 Y k ] for some k N, where {Y } k =1 are ndependent and unformly dstrbuted over F q, and the encodng functon C f(x,y ) = XG+Y G, (1) for some matrces G and G over F q of szes m l and k l, respectvely. Smlarly, a determnstc ndex code s lnear f and only f the encodng functon f(x) = XG. We say that a secure ndex code exsts for a secure ndexcodng nstance I = ((K,W ) n =1,A) f and only f there exsts a (determnstc or random) secure ndex code (f,(g ) n =1 ) for some q that meets all the condtons n Defnton 1. If one such code exsts, we say that the code s secure aganst an eavesdropper havng access to any message subset n A. As we wll see later, a secure ndex code may or may not exst dependng on A. The optmal secure ndex codelength s(i) for a secure ndex-codng nstance I, for whch secure ndex codes exst, s defned as nfmum of the codelengths of secure ndex codes over all alphabet szes. III. FUNDAMENTAL PROPERTIES We begn wth the followng counter-ntutve proposton: Proposton 1: Let A A [m]. An ndex code secure aganst an eavesdropper who knows X A may not be secure aganst an eavesdropper who knows X A, and vce versa. Proof: The followng example proves ths clam. Consder four recevers, where W = {}, for all [4], K 1 = {2}, K 2 = {1}, K 3 = {2,4}, K 4 = {2,3}. Consder two eavesdroppers: the frst eavesdropper has access to A 1 = {{3,4}}; the second eavesdropper has access to A 2 = {{3}}. The ndex code C 1 f 1 (X) = [X 1 + X 2 X 3 + X 4 ], where + denotes addton of the fnte feld F q, s secure aganst the frst eavesdropper (because H(X C 1,X 3,X 4 ) = H(X ) for each {1, 2}) but not the second eavesdropper (because t can decode X 4 ). The ndex code C 2 f 2 (X) = [X 1 + X 2 X 2 +X 3 +X 4 ] s secure aganst the second eavesdropper, but not the frst. Proposton 1 s n contrast to secure network codng [9], where a network code that s strongly secure aganst an eavesdropper who can access a subset of lnks, say L, s also secure aganst an eavesdropper who can access any L L. Proposton 2: No secure ndex code exsts for any secure ndex-codng nstance ((K,W ) n =1,A) where there exsts A A and [n] such that K A and W A c. Proof: Pck j W A c. Let C = f(x,y) be the codeword of a random ndex code that uses a key Y. Snce H(X j C,X A ) H(X j C,X K ) = 0, the eavesdropper s able to decode X j. Thus, the code cannot be secure. IV. EXISTENCE OF SECURE INDEX CODES Here, we present a necessary and suffcent condton for the exstence of secure ndex codes, and ther constructon. Furthermore, we derve optmal secure ndex codes for certan classes of nstances. We begn wth a specfc type of eavesdroppers. Defnton 4: For a gven (K,W ) n =1, we say that an ndex code s secure aganst an eavesdropper wth t-level access, for some t {0,1,...,m 1}, f and only f t s a secure ndex code for ((K,W ) n =1,{A [m] : A = t}). Lemma 1: Any (determnstc or random) ndex code secure aganst an eavesdropper wth t-level access s also secure aganst an eavesdropper wth t -level access, for any t < t.

3 Proof: Consder an eavesdropper wth t-level access who has access to any member of A = {A [m] : A = t}. An ndex code secure aganst ths eavesdropper must satsfy H(X C,X A ) = H(X ), for all A A, A c. (2) Consder an eavesdropper wth an access level t < t who has access to any member of A = {B [m] : B = t }. Pck any A A and any [m] \ A. As t < t m 1, we can always fnd a subset A A such that A A and / A. So, H(X ) (a) = H(X C,X A ) (b) H(X C,X A ) (c) H(X ), where (a) follows from (2), and (b) and (c) follow snce condtonng cannot ncrease entropy. Snce the choces of A and are arbtrary, we must have H(X C,X A ) = H(X ), for all A A and all [m]\a. Thus, the ndex code s also secure aganst an eavesdropper wth t -level access. Remark 2: Lemma 1 generalses the result by Dau et al. [6, Theorem 4.9] that pertans specfcally to determnstc lnear ndex codes to any (random or determnstc, lnear or nonlnear) ndex code. Remark 3: Although Proposton 1 states that an ndex code secure aganst an eavesdropper wth access to A = {A} may not be secure aganst an eavesdropper wth access toa = {A } where A A, any ndex code secure aganst an eavesdropper wth t-level access,.e., A = {A [m] : A = t}, s also secure aganst an eavesdropper wth any access level t < t. A. Exstence of secure ndex codes and ther constructon We now present a necessary and suffcent condton for the exstence of secure ndex codes. Theorem 1: Consder a secure ndex-codng nstance ((K,W ) n =1,A) wth A = {A [m] : A = t} for some t < m,.e., the eavesdropper has t-level access. Secure ndex codes exst f and only f t < K mn mn [n] K. (3) Determnstc lnear secure ndex codes exst f (3) s satsfed. Proof: We frst prove the converse. Suppose thatt K mn. By defnton, there exsts a recever, say, wth K = K mn, and W \K. Pck some j W \K,.e., K [m]\{j}. SnceK mn t m 1, we can always fnd somea A such that K A [m] \{j}. From Proposton 2, we conclude that no secure ndex code exsts. Next, we prove the forward part. Consder a determnstc lnear ndex code of length l = m K mn, formed by C = XG = X g, (4) [m] where G s an m l matrx over F q, and g Fq l s the -th row of G. Let G be the transpose of the generatng matrx of a maxmum-dstance-separable (MDS) code, whch always exsts for a suffcently large q. For any such code, t follows that any l rows of G are lnearly ndependent over F q. (Decodng) Recever [n] forms C X k g k = X j g j. (5) k K j [m]\k Snce [m]\k = m K m K mn = l, t follows that {g j : j [m] \ K } are lnearly ndependent. So, by usng C and {X k : k K }, recever can decode X [m]\k, and consequently the message(s) X W t wants, by solvng (5). (Securty) Denote the Hammng dstance between two vectors a = [a 1 a 2 a m ] Fq m and b = [b 1 b 2 b m ] Fq m by d(a,b) { [m] : a b }, the mnmum dstance of a vector space S by d(s) = mn {a,b S:a b} d(a,b), and the vector space spanned by the rows and columns of a matrx M byrowsp(m) andcolsp(g), respectvely. Dau et al. [6] showed that the lnear ndex code of the form (4) s secure aganst an eavesdropper wth an access level d(colsp(g)) 2. Note that G T s the generator matrx of an MDS code (m,l,d) whose codewords are vectors n rowsp(g T ). The mnmum dstance of ths MDS code equals d = d(rowsp(g T )) = d(colsp(g)) = m l+1. Invokng Lemma 1, we see that the ndex code (4) s secure aganst an eavesdropper wth an access level up to and ncludng (m l+1) 2 = K mn 1. Some remarks are now n order. Remark 4: MDS codes are also used n the partal-clquecover codng scheme [1] and ts tme-shared verson [4], and the local-chromatc-number codng scheme [12] for uncast ndex codng, where W = {} for all recevers [n]. Remark 5: Recever cooperaton can ncrease the securty level. Allowng two recevers, say and j, to cooperate and share ther messages s equvalent to solvng a new secure ndex-codng nstance where everythng remans the same except that recevers and j both know X K K j. Thus, cooperaton can potentally ncrease K mn (see (3)), whch then translates to securty aganst eavesdroppers wth hgher access levels. Remark 6: Theorem 1 also holds f we consder b-block securty (see Dau et al. [6]) for b 1 n Defnton 1. In the settng of b-block securty, an eavesdropper who knows X A, A A, gans no nformaton about any b messages t does not know,.e., H(X B C,X A ) = H(X B ), for all B A c wth B = b. In ths case, the necessary and suffcent condton for the exstence of secure ndex codes n (3) s replaced by t K mn b. Corollary 1.1: If A max max A A A < K mn, then determnstc lnear secure ndex codes exst. Proof: Proof follows from Theorem 1 and Lemma 1. Intutvely, Corollary 1.1 says that we can always fnd secure ndex codes f the eavesdropper can access fewer messages than each recever can. However, unlke Theorem 1, we do not have a converse for Corollary 1.1. Ths s because even f an eavesdropper can access (numercally) more messages than some recevers can, we may stll be able to construct secure ndex codes, dependng on the sets of messages to whch the eavesdropper has access. For example, see the secure ndex codes for the two nstances wth A max K mn n the proof of Proposton 1. B. Optmalty of secure ndex codes From the constructon of secure ndex codes n Theorem 1, we have the followng:

4 Corollary 1.2: If A max < K mn, the optmal secure ndex codelength s upper-bounded as s(i) m K mn. The upper bound s achevable by determnstc lnear ndex codes. Proof: See the proof of Theorem 1. We say that a recever has complementary message requests f t wants all messages t does not know,.e., K W = [m]. Proposton 3: If A max < K mn, and f any recever knowng exactly K mn messages has complementary message requests, then the optmal codelength s(i) = m K mn, and s achevable by determnstc secure lnear ndex codes. Proof: Wthout loss of generalty, let K 1 = K mn and K 1 W 1 = [m]. For any (determnstc or random) ndex code C, we have H(X W1 C,X K1 ) = 0. Thus, mlog 2 q = H(X) H(C,X K1,X W1 ) = H(C,X K1 ) log 2 q l +log 2 q Kmn, where we have made use of the facts that X = X K1 W 1, H(X W1 C,X K1 ) = 0, H(C) log 2 C = log 2 q l, and H(X K1 ) = log 2 q Kmn. Therefore, l m K mn. Snce C was arbtrary, t follows that s(i) = nfl m K mn. The proof s then complete by nvokng Corollary 1.2. V. SECURE VS CLASSICAL INDEX CODING We can represent a secure ndex-codng nstance ((G,K ) n =1,A) by a drected bpartte graph D = (U,M,E), smlar to that by Neely, Tehran, and Zhang [13]. Here, U and M are ndependent vertex sets, where each arc (.e., drected edge) n E connects a vertex n U to a vertex n M. We further partton U nto two dsjont sets: R = {r 1,r 2,...,r n } representng the n recevers, and V = {v 1,v 2,...,v A } representng the possble sets of messages to whch the eavesdropper can access. The set M = [m] represents the message ndces. The arc set E s defned as follows: There s an arc from r R to j M f and only f recever knows the message X j,.e., j K. There s an arc from j M to r R f and only f recever wants the message X j,.e., j W. For each A A, we have a unque v V such that N + D (v ) = A, where N + D (v ) {j M : (v j) E} s the out-neghbourhood of v. For a gven secure ndex-codng nstance D, f we gnore the securty constrant, the subgraph D[R M] nduced by (R,M) s n fact the bpartte graph used by Neely et al. [13] to represent the classcal ndex-codng nstance. Proposton 4: Consder a secure ndex-codng nstance ((G,K ) n =1,A), where A {[m]}. Let D = ((R,V),M,E) be ts drected bpartte graph representaton. If (C1) D[R M] s acyclc, or equvalently, D s acyclc, and (C2) every message s wanted by some recever,.e., for each [m], we have W j for some j [n], then no secure ndex code exsts. Proof: For the classcal ndex-codng nstance D[R M], Neely et al. [13, Appendx A] have shown that f condton C1 s true (condton C2 s always assumed to be true for non-secure ndex codng), one can obtan all messages from any ndex code, even wthout usng sde nformaton. Snce any secure ndex code for D, denoted by C, s an ndex code for D[R M], we have H(X [m] C) = 0. Therefore, for any A [m] and any [m] \ A, we have H(X C,X A ) H(X [m] C) = 0 < H(X ). Snce A {[m]}, there exsts some A [m]. It follows that no ndex code can be secure. Condton C2 n Proposton 4 that every message s wanted by some recever s mplct n classcal ndex codng as removng messages not wanted by any recever wll change nether the ndex code nor the optmal ndex codelength. However, removng unwanted messages may affect secure ndex codng, because these messages can be used as keys to protect the ndex code aganst the eavesdropper. The followng example llustrates ths dea. Example 1: Consder the followng secure ndex-codng nstance depcted by ts drected bpartte graph representaton. 1 r 1 2 The message X 2 s not wanted by any recever. If we remove t from the setup, by nvokng Proposton 4, we conclude that there s no secure ndex code. However, keepng X 2 n the system, by nvokng Corollary 1.1, we conclude that secure ndex codes exst. Indeed, the ndex code C = X 1 + X 2 s secure. Here, X 2 acts as a key between the sender and recever 1 to protect message X 1 aganst the eavesdropper. VI. RANDOM KEYS FOR SECURE INDEX CODING We saw n Example 1 that usng unwanted messages as keys may be essental n ensurng securty. One wonders f generatng random keys unknown to the recevers and the eavesdropper can also help n secure ndex codng. Whle the answer to ths queston s not known n general, we show that n the followng three scenaros, random keys are not useful n the sense that random secure ndex codes exst f and only f determnstc secure ndex codes also exst. A. Eavesdroppers wth t-level access From Theorem 1, t follows that usng random keys does not provde greater securty aganst an eavesdropper wth t- level access,.e., when A = {A [m] : A = t}, for any t < m. B. Lnear ndex codes We now restrct the secure ndex codes to be lnear, whle A s arbtrary. Theorem 2: Gven any secure ndex-codng nstance I. Random secure lnear ndex codes of codelength l exst for I f and only f determnstc secure lnear ndex codes of codelength l also exst for I. Proof: We only need to prove the only f drecton of the clam. Any random lnear ndex code can be expressed as C = XG + Y G. Snce each recever recovers ts ntended v 1

5 messages, for each recever [n] and each j W, there exst an l 1 vector D,j and a K 1 vector E,j such that X j = CD,j +X K E,j. (7) Let V be defned as the nullspace of G,.e., V = Null( G) {A F l q : GA = 0}. (8) Note that V s a vector space. From (7), t follows that D,j V for any [n] and j W, snce X j X K E,j = CD,j = XGD,j +Y GD,j, (9) whch can hold only f GD,j = 0 for any [n] and j W. Now, let A 1,...,Aˆl be a bass for V. Note that ˆl l, snce V F l q. If the sender broadcastsĉ [Ĉ1 Ĉ2 Ĉˆl], where Ĉ = CA = XGA, [ˆl], then each recever wll stll be able to recover ts ntended messages, snce for any [m] and j W, X j X K E,j = ĈD,j s a lnear combnaton of Ĉ1,...,Ĉˆl. Furthermore, for any A A and any j A c, H(X j ) H(X j X A,Ĉ) H(X j X A,C) = H(X j ), (10) where the second nequalty follows snce Ĉ s a functon of C. Hence, the new code Ĉ s also secure. The proof s then complete by notng that Ĉ s a determnstc ndex code. Remark 7: Random keys have also been shown not to be useful for lnear secure ndex codes n the strong-securty settng consdered by Mojahedan et al. [11]. C. Eavesdroppers havng access to only one message subset Lastly, we consder the class of secure ndex-codng nstances where the eavesdropper can access only one message subset. Proposton 5: Gven any ndex-codng nstance I wth A = 1, random secure ndex codes exst for I f and only f determnstc secure ndex codes also exst for I. Proof: Note that we only need to consder ndex-codng nstances where for each recever [n], ether (Type 1) K W A; (Type 2) K \A and W \A ; or (Type 3) K \A and W A. Otherwse, accordng to Proposton 2, no (determnstc or random) secure ndex code exsts. Let recevers 1,...,n be of Type 2, for some 0 n n, and the rest, of Type 1 or 3. Consder a related ndex-codng nstance I = ((K,W )n =1,A ) wth only A c messages X A c, n recevers that are of Type 2 n I, where A = { }, K = (K A c ), and W = (W A c ), for all [n ]. By the defnton of Type-2 recever, K 1 for all [n ]. For I, as A max = 0 and K mn 1, by nvokng Corollary 1.1, we see that there exsts a determnstc secure ndex code, say, C = f (X A c). Ths means that there exsts a functon g (C,X K ) = X W for each [n ], and H(X C ) = H(X ) for each A c. We now show that C = [X A C ] s a secure ndex code for I. For any recever of Type 1 or 3, ts decodng requrement s fulflled from observngx A, becausew A. Any recever of Type 2 gets X W A from X A, and X W A c = X W from g (C,X K ), snce t knows X K X K. Fnally,H(X C,X A ) = H(X C,X A ) (a) = H(X C ) = H(X ), for any A c, where (a) follows from the ndependence of (X,C ) and X A. Hence, C s a determnstc secure ndex code for I. So, for any I wth A = 1, ether no (determnstc or random) secure ndex codes exst, or we can always fnd a determnstc secure ndex code. D. Secure ndex vs network codng We now dscuss some ssues n extendng the equvalence 2 [7, 8] between classcal ndex and network codng to the secure settng. Consder the followng network-codng nstance N wth a source s havng two lnks e 1 and e 2 to a recever d. e 1 X 1 F q s d X 1 The codewords conveyed on lnks e 1 and e 2 n any network code can be wrtten as Y 1 = f 1 (X 1 ) and Y 2 = f 2 (X 1 ), respectvely, and the decodng operaton X 1 = g(y 1,Y 2 ). An equvalent [8] ndex-codng nstance I has three ndependent messages ˆX 1,Ŷ1,Ŷ2, and four recevers, as follows: Recever Has ˆX1 ˆX1 (Ŷ1,Ŷ2) ˆX1 Wants Ŷ 1 Ŷ 2 ˆX1 (Ŷ1,Ŷ2) Snce the codes for nstances I and N can be translated to one another [8], we can translate the above code for N to an ndex code Ĉ = [Ŷ1 +f 1 ( ˆX 1 ) Ŷ2 +f 2 ( ˆX 1 )] for I. Next, consder a secure verson of N, wth an eavesdropper who has access to any one lnk (e 1 ore 2 ) [9]. A secure network code must strongly secure X 1 aganst the eavesdropper. To ths end, we need random network codes, e.g., f 1 (X 1 ) = K, where K s a random key unformly dstrbuted on F q and ndependent of X 1, and f 2 (X 1 ) = X 1 +K. Unfortunately, the code translaton breaks down here n the presence of securty constrants. In I, for recever 1 to decode Ŷ 1 from Ĉ and the message ˆX 1 t knows, t addtonally needs to know the random key K = f 1 ( ˆX 1 ) generated by the sender. One dffculty n establshng an equvalence between secure network codng and secure ndex codng s that random keys used by the sender for encodng need not be avalable to the recevers for decodng. Furthermore, t s also not straghtforward to translate (strong or weak) securty constrants for the eavesdropper n N to equvalent and meanngful (strong or weak) securty constrants n I, and vce versa. e 2 REFERENCES [1] Y. Brk and T. Kol, Codng on demand by an nformed source (ISCOD) for effcent broadcast of dfferent supplemental data to cachng clents, IEEE Trans. Inf. Theory, 52(6), pp , June [2] Z. Bar-Yossef, Y. Brk, T. S. Jayram, and T. Kol, Index codng wth sde nformaton, IEEE Trans. Inf. Theory, 57(3), pp , Mar [3] A. Blasak, R. Klenberg, and E. Lubetzky, Broadcastng wth sde nformaton: Boundng and approxmatng the broadcast rate, IEEE Trans. Inf. Theory, 59(9), pp , Sept [4] H. Yu and M. J. Neely, Dualty codes and the ntegralty gap bound for ndex codng, IEEE Trans. Inf. Theory, 60(11), pp , Nov The nstances are equvalent n the sense that a code for one nstance can be translated to a code for the other, and vce versa.

6 [5] F. Arbabjolfae, B. Bandemer, Y.-H. Km, E. Şaşoğlu, and L. Wang, On the capacty regon for ndex codng, n Proc. ISIT, 2013, pp [6] S. H. Dau, V. Skachek, and Y. M. Chee, On the securty of ndex codng wth sde nformaton, IEEE Trans. Inf. Theory, 58(6), pp , June [7] S. El Rouayheb, A. Sprntson, and C. Georghades, On the ndex codng problem and ts relaton to network codng and matrod theory, IEEE Trans. Inf. Theory, 56(7), pp , July [8] M. Effros, S. El Rouayheb, and M. Langberg, An equvalence between network codng and ndex codng, IEEE Trans. Inf. Theory, 61(5), pp , May [9] N. Ca and R. W. Yeung, Secure network codng on wretap network, IEEE Trans. Inf. Theory, 57(1), pp , Jan [10] K. Bhattad and K. R. Narayanan, Weakly secure network codng, n Proc. Netcod, [11] M. M. Mojahedan, M. R. Aref, and A. Gohar, Perfectly secure ndex codng [Onlne]. Avalable: [12] K. Shanmugam, A. G. Dmaks, and M. Langberg, Local graph colorng and ndex codng, n Proc. ISIT, 2013, pp [13] M. J. Neely, A. S. Tehran, and Z. Zhang, Dynamc ndex codng for wreless broadcast networks, n Proc. INFOCOM, 2012, pp

Secure Index Coding: Existence and Construction

Secure Index Coding: Existence and Construction Secure Index Codng: Exstence and Constructon Lawrence Ong 1, Badr N. Vellamb 2, Phee Lep Yeoh 3, Jörg Klewer 2, and Jnhong Yuan 4 1 The Unversty of Newcastle, Australa; 2 New Jersey Insttute of Technology,

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Ramsey numbers of cubes versus cliques

Ramsey numbers of cubes versus cliques Ramsey numbers of cubes versus clques Davd Conlon Jacob Fox Choongbum Lee Benny Sudakov Abstract The cube graph Q n s the skeleton of the n-dmensonal cube. It s an n-regular graph on 2 n vertces. The Ramsey

More information

Report on On-line Graph Coloring

Report on On-line Graph Coloring 2003 Fall Semester Comp 670K Onlne Algorthm Report on LO Yuet Me (00086365) cndylo@ust.hk Abstract Onlne algorthm deals wth data that has no future nformaton. Lots of examples demonstrate that onlne algorthm

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

5 The Primal-Dual Method

5 The Primal-Dual Method 5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

The Erdős Pósa property for vertex- and edge-disjoint odd cycles in graphs on orientable surfaces

The Erdős Pósa property for vertex- and edge-disjoint odd cycles in graphs on orientable surfaces Dscrete Mathematcs 307 (2007) 764 768 www.elsever.com/locate/dsc Note The Erdős Pósa property for vertex- and edge-dsjont odd cycles n graphs on orentable surfaces Ken-Ich Kawarabayash a, Atsuhro Nakamoto

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

An Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane

An Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane An Approach n Colorng Sem-Regular Tlngs on the Hyperbolc Plane Ma Louse Antonette N De Las Peñas, mlp@mathscmathadmueduph Glenn R Lago, glago@yahoocom Math Department, Ateneo de Manla Unversty, Loyola

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

More on the Linear k-arboricity of Regular Graphs R. E. L. Aldred Department of Mathematics and Statistics University of Otago P.O. Box 56, Dunedin Ne

More on the Linear k-arboricity of Regular Graphs R. E. L. Aldred Department of Mathematics and Statistics University of Otago P.O. Box 56, Dunedin Ne More on the Lnear k-arborcty of Regular Graphs R E L Aldred Department of Mathematcs and Statstcs Unversty of Otago PO Box 56, Dunedn New Zealand Ncholas C Wormald Department of Mathematcs Unversty of

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Lecture 5: Probability Distributions. Random Variables

Lecture 5: Probability Distributions. Random Variables Lecture 5: Probablty Dstrbutons Random Varables Probablty Dstrbutons Dscrete Random Varables Contnuous Random Varables and ther Dstrbutons Dscrete Jont Dstrbutons Contnuous Jont Dstrbutons Independent

More information

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

Math Homotopy Theory Additional notes

Math Homotopy Theory Additional notes Math 527 - Homotopy Theory Addtonal notes Martn Frankland February 4, 2013 The category Top s not Cartesan closed. problem. In these notes, we explan how to remedy that 1 Compactly generated spaces Ths

More information

the nber of vertces n the graph. spannng tree T beng part of a par of maxmally dstant trees s called extremal. Extremal trees are useful n the mxed an

the nber of vertces n the graph. spannng tree T beng part of a par of maxmally dstant trees s called extremal. Extremal trees are useful n the mxed an On Central Spannng Trees of a Graph S. Bezrukov Unverstat-GH Paderborn FB Mathematk/Informatk Furstenallee 11 D{33102 Paderborn F. Kaderal, W. Poguntke FernUnverstat Hagen LG Kommunkatonssysteme Bergscher

More information

All-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University

All-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University Approxmate All-Pars shortest paths Approxmate dstance oracles Spanners and Emulators Ur Zwck Tel Avv Unversty Summer School on Shortest Paths (PATH05 DIKU, Unversty of Copenhagen All-Pars Shortest Paths

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr)

Helsinki University Of Technology, Systems Analysis Laboratory Mat Independent research projects in applied mathematics (3 cr) Helsnk Unversty Of Technology, Systems Analyss Laboratory Mat-2.08 Independent research projects n appled mathematcs (3 cr) "! #$&% Antt Laukkanen 506 R ajlaukka@cc.hut.f 2 Introducton...3 2 Multattrbute

More information

NETWORKS of dynamical systems appear in a variety of

NETWORKS of dynamical systems appear in a variety of Necessary and Suffcent Topologcal Condtons for Identfablty of Dynamcal Networks Henk J. van Waarde, Petro Tes, and M. Kanat Camlbel arxv:807.09v [math.oc] 2 Jul 208 Abstract Ths paper deals wth dynamcal

More information

UNIT 2 : INEQUALITIES AND CONVEX SETS

UNIT 2 : INEQUALITIES AND CONVEX SETS UNT 2 : NEQUALTES AND CONVEX SETS ' Structure 2. ntroducton Objectves, nequaltes and ther Graphs Convex Sets and ther Geometry Noton of Convex Sets Extreme Ponts of Convex Set Hyper Planes and Half Spaces

More information

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu

More information

b * -Open Sets in Bispaces

b * -Open Sets in Bispaces Internatonal Journal of Mathematcs and Statstcs Inventon (IJMSI) E-ISSN: 2321 4767 P-ISSN: 2321-4759 wwwjmsorg Volume 4 Issue 6 August 2016 PP- 39-43 b * -Open Sets n Bspaces Amar Kumar Banerjee 1 and

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

The Multi-Sender Multicast Index Coding

The Multi-Sender Multicast Index Coding The Multi-Sender Multicast Index Coding Lawrence Ong The University of Newcastle, Australia Email: lawrence.ong@cantab.net Fabian Lim Massachusetts Institute of Technology, USA Email: flim@mit.edu Chin

More information

Generalized Interlinked Cycle Cover for Index Coding

Generalized Interlinked Cycle Cover for Index Coding Generalized Interlinked Cycle Cover for Index Coding Chandra Thapa, Lawrence Ong, and Sarah J. Johnson School of Electrical Engineering and Computer Science, The University of Newcastle, Newcastle, Australia

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Tree Spanners for Bipartite Graphs and Probe Interval Graphs 1

Tree Spanners for Bipartite Graphs and Probe Interval Graphs 1 Algorthmca (2007) 47: 27 51 DOI: 10.1007/s00453-006-1209-y Algorthmca 2006 Sprnger Scence+Busness Meda, Inc. Tree Spanners for Bpartte Graphs and Probe Interval Graphs 1 Andreas Brandstädt, 2 Feodor F.

More information

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

More information

Communication-Minimal Partitioning and Data Alignment for Af"ne Nested Loops

Communication-Minimal Partitioning and Data Alignment for Afne Nested Loops Communcaton-Mnmal Parttonng and Data Algnment for Af"ne Nested Loops HYUK-JAE LEE 1 AND JOSÉ A. B. FORTES 2 1 Department of Computer Scence, Lousana Tech Unversty, Ruston, LA 71272, USA 2 School of Electrcal

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Spatially Coupled Repeat-Accumulate Coded Cooperation

Spatially Coupled Repeat-Accumulate Coded Cooperation Spatally Coupled Repeat-Accumulate Coded Cooperaton Naok Takesh and Ko Ishbash Advanced Wreless Communcaton Research Center (AWCC) The Unversty of Electro-Communcatons, 1-5-1 Chofugaoka, Chofu-sh, Tokyo

More information

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR Judth Aronow Rchard Jarvnen Independent Consultant Dept of Math/Stat 559 Frost Wnona State Unversty Beaumont, TX 7776 Wnona, MN 55987 aronowju@hal.lamar.edu

More information

1 Introducton Effcent and speedy recovery of electrc power networks followng a major outage, caused by a dsaster such as extreme weather or equpment f

1 Introducton Effcent and speedy recovery of electrc power networks followng a major outage, caused by a dsaster such as extreme weather or equpment f Effcent Recovery from Power Outage (Extended Summary) Sudpto Guha Λ Anna Moss y Joseph (Seff) Naor z Baruch Scheber x Abstract We study problems that are motvated by the real-lfe problem of effcent recovery

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Lecture #15 Lecture Notes

Lecture #15 Lecture Notes Lecture #15 Lecture Notes The ocean water column s very much a 3-D spatal entt and we need to represent that structure n an economcal way to deal wth t n calculatons. We wll dscuss one way to do so, emprcal

More information

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time

Introduction. Leslie Lamports Time, Clocks & the Ordering of Events in a Distributed System. Overview. Introduction Concepts: Time Lesle Laports e, locks & the Orderng of Events n a Dstrbuted Syste Joseph Sprng Departent of oputer Scence Dstrbuted Systes and Securty Overvew Introducton he artal Orderng Logcal locks Orderng the Events

More information

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract

More information

LECTURE NOTES Duality Theory, Sensitivity Analysis, and Parametric Programming

LECTURE NOTES Duality Theory, Sensitivity Analysis, and Parametric Programming CEE 60 Davd Rosenberg p. LECTURE NOTES Dualty Theory, Senstvty Analyss, and Parametrc Programmng Learnng Objectves. Revew the prmal LP model formulaton 2. Formulate the Dual Problem of an LP problem (TUES)

More information

Distortion-Memory Tradeoffs in Cache-Aided Wireless Video Delivery

Distortion-Memory Tradeoffs in Cache-Aided Wireless Video Delivery Dstorton-Memory Tradeoffs n Cache-Aded Wreless Vdeo Delvery P. Hassanzadeh, E. Erkp, J. Llorca, A. Tulno arxv:1511.03932v1 [cs.it] 12 Nov 2015 Abstract Moble network operators are consderng cachng as one

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

1 Introducton Gven a graph G = (V; E), a non-negatve cost on each edge n E, and a set of vertces Z V, the mnmum Stener problem s to nd a mnmum cost su

1 Introducton Gven a graph G = (V; E), a non-negatve cost on each edge n E, and a set of vertces Z V, the mnmum Stener problem s to nd a mnmum cost su Stener Problems on Drected Acyclc Graphs Tsan-sheng Hsu y, Kuo-Hu Tsa yz, Da-We Wang yz and D. T. Lee? September 1, 1995 Abstract In ths paper, we consder two varatons of the mnmum-cost Stener problem

More information

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure Internatonal Journal of Engneerng, Scence and Mathematcs (UGC Approved) Journal Homepage: http://www.jesm.co.n, Emal: jesmj@gmal.com Double-Blnd Peer Revewed Refereed Open Access Internatonal Journal -

More information

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems

More information

y and the total sum of

y and the total sum of Lnear regresson Testng for non-lnearty In analytcal chemstry, lnear regresson s commonly used n the constructon of calbraton functons requred for analytcal technques such as gas chromatography, atomc absorpton

More information

Greedy Technique - Definition

Greedy Technique - Definition Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:

More information

Optimal Workload-based Weighted Wavelet Synopses

Optimal Workload-based Weighted Wavelet Synopses Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

F Geometric Mean Graphs

F Geometric Mean Graphs Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 2 (December 2015), pp. 937-952 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) F Geometrc Mean Graphs A.

More information

Esc101 Lecture 1 st April, 2008 Generating Permutation

Esc101 Lecture 1 st April, 2008 Generating Permutation Esc101 Lecture 1 Aprl, 2008 Generatng Permutaton In ths class we wll look at a problem to wrte a program that takes as nput 1,2,...,N and prnts out all possble permutatons of the numbers 1,2,...,N. For

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Approximating Clique and Biclique Problems*

Approximating Clique and Biclique Problems* Ž. JOURNAL OF ALGORITHMS 9, 17400 1998 ARTICLE NO. AL980964 Approxmatng Clque and Bclque Problems* Dort S. Hochbaum Department of Industral Engneerng and Operatons Research and Walter A. Haas School of

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Covering Pairs in Directed Acyclic Graphs

Covering Pairs in Directed Acyclic Graphs Advance Access publcaton on 5 November 2014 c The Brtsh Computer Socety 2014. All rghts reserved. For Permssons, please emal: ournals.permssons@oup.com do:10.1093/comnl/bxu116 Coverng Pars n Drected Acyclc

More information

11. APPROXIMATION ALGORITHMS

11. APPROXIMATION ALGORITHMS Copng wth NP-completeness 11. APPROXIMATION ALGORITHMS load balancng center selecton prcng method: vertex cover LP roundng: vertex cover generalzed load balancng knapsack problem Q. Suppose I need to solve

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Succinct Indexable Dictionaries with Applications to Encoding k-ary Trees, Prefix Sums and Multisets

Succinct Indexable Dictionaries with Applications to Encoding k-ary Trees, Prefix Sums and Multisets Succnct Indexable Dctonares wth Applcatons to Encodng k-ary Trees, Prefx Sums and Multsets RAJEEV RAMAN Unversty of Lecester VENKATESH RAMAN Insttute of Mathematcal Scences AND SRINIVASA RAO SATTI Unversty

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast

On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast On Maxmzng the Lfetme of Delay-Senstve Wreless Sensor Networks wth Anycast Joohwan Km, Xaojun Ln, Ness B. Shroff, and Prasun Snha School of Electrcal and Computer Engneerng, Purdue Unversty Departments

More information

A Geometric Approach for Multi-Degree Spline

A Geometric Approach for Multi-Degree Spline L X, Huang ZJ, Lu Z. A geometrc approach for mult-degree splne. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 27(4): 84 850 July 202. DOI 0.007/s390-02-268-2 A Geometrc Approach for Mult-Degree Splne Xn L

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

On Correctness of Nonserializable Executions

On Correctness of Nonserializable Executions Journal of Computer and System Scences 56, 688 (1998) Artcle No. SS971536 On Correctness of Nonseralzable Executons Rajeev Rastog,* Sharad Mehrotra, - Yur Bretbart, [,1 Henry F. Korth,* and Av Slberschatz*

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints TPL-ware Dsplacement-drven Detaled Placement Refnement wth Colorng Constrants Tao Ln Iowa State Unversty tln@astate.edu Chrs Chu Iowa State Unversty cnchu@astate.edu BSTRCT To mnmze the effect of process

More information

CHOICE OF THE CONTROL VARIABLES OF AN ISOLATED INTERSECTION BY GRAPH COLOURING

CHOICE OF THE CONTROL VARIABLES OF AN ISOLATED INTERSECTION BY GRAPH COLOURING Yugoslav Journal of Operatons Research 25 (25), Number, 7-3 DOI:.2298/YJOR38345B CHOICE OF THE CONTROL VARIABLES OF AN ISOLATED INTERSECTION BY GRAPH COLOURING Vladan BATANOVIĆ Mhalo Pupn Insttute, Volgna

More information

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*

More information

A SYSTOLIC APPROACH TO LOOP PARTITIONING AND MAPPING INTO FIXED SIZE DISTRIBUTED MEMORY ARCHITECTURES

A SYSTOLIC APPROACH TO LOOP PARTITIONING AND MAPPING INTO FIXED SIZE DISTRIBUTED MEMORY ARCHITECTURES A SYSOLIC APPROACH O LOOP PARIIONING AND MAPPING INO FIXED SIZE DISRIBUED MEMORY ARCHIECURES Ioanns Drosts, Nektaros Kozrs, George Papakonstantnou and Panayots sanakas Natonal echncal Unversty of Athens

More information

Clustering on antimatroids and convex geometries

Clustering on antimatroids and convex geometries Clusterng on antmatrods and convex geometres YULIA KEMPNER 1, ILYA MUCNIK 2 1 Department of Computer cence olon Academc Insttute of Technology 52 Golomb tr., P.O. Box 305, olon 58102 IRAEL 2 Department

More information

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vdyanagar Faculty Name: Am D. Trved Class: SYBCA Subject: US03CBCA03 (Advanced Data & Fle Structure) *UNIT 1 (ARRAYS AND TREES) **INTRODUCTION TO ARRAYS If we want

More information

Concurrent models of computation for embedded software

Concurrent models of computation for embedded software Concurrent models of computaton for embedded software and hardware! Researcher overvew what t looks lke semantcs what t means and how t relates desgnng an actor language actor propertes and how to represent

More information

On a Local Protocol for Concurrent File Transfers

On a Local Protocol for Concurrent File Transfers On a Local Protocol for Concurrent Fle Transfers MohammadTagh Hajaghay Dep. of Computer Scence Unversty of Maryland College Park, MD hajagha@cs.umd.edu Roht Khandekar IBM T.J. Watson Research Center 19

More information

Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing

Gossip Codes for Fingerprinting: Construction, Erasure Analysis and Pirate Tracing Journal of Unversal Computer Scence, vol. 11, no. 1 (005), 1-149 submtted: 15/7/04, accepted: 6/1/04, appeared: 8/1/05 J.UCS Gossp Codes for Fngerprntng: Constructon, Erasure Analyss and Prate Tracng Rav

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

ALEKSANDROV URYSOHN COMPACTNESS CRITERION ON INTUITIONISTIC FUZZY S * STRUCTURE SPACE

ALEKSANDROV URYSOHN COMPACTNESS CRITERION ON INTUITIONISTIC FUZZY S * STRUCTURE SPACE mercan Journal of Mathematcs and cences Vol. 5, No., (January-December, 206) Copyrght Mnd Reader Publcatons IN No: 2250-302 www.journalshub.com LEKNDROV URYOHN COMPCTNE CRITERION ON INTUITIONITIC FUZZY

More information

Lecture 13: High-dimensional Images

Lecture 13: High-dimensional Images Lec : Hgh-dmensonal Images Grayscale Images Lecture : Hgh-dmensonal Images Math 90 Prof. Todd Wttman The Ctadel A grayscale mage s an nteger-valued D matrx. An 8-bt mage takes on values between 0 and 55.

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information