Efficient Universal Recovery in Broadcast Networks

Size: px
Start display at page:

Download "Efficient Universal Recovery in Broadcast Networks"

Transcription

1 Efficient Universal Recovery in Broadcast Networks Thomas Courtade and Rick Wesel UCLA September 30, 2010 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

2 System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

3 System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

4 System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. p 1 p 3 p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

5 System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. Links are noiseless and interference-free. Each node knows the network topology and which packets each node already knows. p 1 p 1, p 2, p 3 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

6 System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. Links are noiseless and interference-free. Each node knows the network topology and which packets each node already knows. p 2, p 1 + p 3 p 2, p 1 + p 3 p 1 p 1, p 2, p 3 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

7 System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. Links are noiseless and interference-free. Each node knows the network topology and which packets each node already knows. Universal Recovery is achieved if some transmission scheme permits each node to recover all k packets. p 1, p 2, p 3 p 1, p 2, p 3 p 1, p 2, p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

8 System Model and Problem Statement Universal recovery in a broadcast network Consider a network of N nodes. Node i begins with a set of packets P i {p 1,..., p k }. Each node broadcasts packets to its neighbors. One transmission consists of one packet. Links are noiseless and interference-free. Each node knows the network topology and which packets each node already knows. Universal Recovery is achieved if some transmission scheme permits each node to recover all k packets. Question What is the minimum number of transmissions required for universal recovery? Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

9 Transmission Strategies The scheduling of transmissions Definition (Transmission Strategy) Let b j i be the number of transmissions by node i during round j. The set of values {b j i } i,j is called a transmission strategy. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

10 Transmission Strategies The scheduling of transmissions Definition (Transmission Strategy) Let b j i be the number of transmissions by node i during round j. The set of values {b j i } i,j is called a transmission strategy. For the previous example, b 1 1 = 1, b1 3 = 1, and b2 2 = 2 is a transmission strategy that permits universal recovery. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

11 Transmission Strategies The scheduling of transmissions Definition (Transmission Strategy) Let b j i be the number of transmissions by node i during round j. The set of values {b j i } i,j is called a transmission strategy. For the previous example, b 1 1 = 1, b1 3 = 1, and b2 2 = 2 is a transmission strategy that permits universal recovery. Given a transmission strategy that permits universal recovery, the encoding operations can be efficiently computed using the algorithm developed by Jaggi et al. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

12 Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

13 Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Proof. 1 Create an equivalent single-source network coding problem. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

14 Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Proof. 1 Create an equivalent single-source network coding problem. 2 Take any source-sink cut in the network coding graph and reduce to a minimal cut. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

15 Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Proof. 1 Create an equivalent single-source network coding problem. 2 Take any source-sink cut in the network coding graph and reduce to a minimal cut. 3 Each minimal cut corresponds to a constraint defining R r (and vice versa). Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

16 Transmission Strategies in R r Permit Universal Recovery Theorem For a fixed number of communication rounds r, a transmission strategy in which node i makes at most b j i transmissions during round j permits universal recovery if and only if {b j i } R r. Proof. 1 Create an equivalent single-source network coding problem. 2 Take any source-sink cut in the network coding graph and reduce to a minimal cut. 3 Each minimal cut corresponds to a constraint defining R r (and vice versa). 4 Thus, a transmission strategy permits universal recovery iff {b j i } R r. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

17 Neighborhood of a set S S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

18 Neighborhood of a set S Γ(S ) S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

19 The Region R r A Set of Transmission Strategies Definition (The region R r Z N r + ) {b j i } R r if and only if: S 0 S r [N] satisfying S j Γ(S j 1 ) for each j [r], the following inequalities hold : r b (r+1 j) i. j=1 i Sj c Γ(S j 1) i S r P c i Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

20 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

21 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

22 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

23 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 S 2 S 0 = {1}, S 1 = S 2 = {1, 2} b Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

24 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

25 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

26 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

27 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 S 2 S 0 = S 1 = {1}, S 2 = {1, 2} b Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

28 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

29 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

30 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 S 1 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

31 S 0 S 1 S 2 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i p 1 p 2 p 3 S 0 = S 1 = S 2 = {1} b b2 2 2 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

32 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i S 0 = {1}, S 1 = S 2 = {1, 2} b S 0 = S 1 = {1}, S 2 = {1, 2} b S 0 = S 1 = S 2 = {1} b b2 2 2 Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

33 An Example 3-Node Line Network Revisited Constraints defining R r r b (r+1 j) i j=1 i Sj c Γ(S j 1) i S r P c i S 0 = {1}, S 1 = S 2 = {1, 2} b S 0 = S 1 = {1}, S 2 = {1, 2} b S 0 = S 1 = S 2 = {1} b b2 2 2 By symmetry: b All other sequences of sets give redundant constraints. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

34 Sequences of Networks We can consider sequences of networks indexed by k. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

35 Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

36 Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

37 Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Definition (Well-behaved sequence of packet distributions) A sequence of packet distributions is well-behaved if 1 P S lim P i (k) k k exists for all subsets S {1,..., N}. i S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

38 Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Definition (Well-behaved sequence of packet distributions) A sequence of packet distributions is well-behaved if 1 P S lim P i (k) k k exists for all subsets S {1,..., N}. i S P S is the limit of the empirical probability that any node in S receives a particular packet. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

39 Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Definition (Well-behaved sequence of packet distributions) A sequence of packet distributions is well-behaved if 1 P S lim P i (k) k k exists for all subsets S {1,..., N}. i S P S is the limit of the empirical probability that any node in S receives a particular packet. Let P c S = 1 P S. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

40 Sequences of Networks We can consider sequences of networks indexed by k. The packet distributions are denoted {P i (k)} N i=1. Naturally, we have N i=1 P i(k) = k. Definition (Well-behaved sequence of packet distributions) A sequence of packet distributions is well-behaved if 1 P S lim P i (k) k k exists for all subsets S {1,..., N}. i S P S is the limit of the empirical probability that any node in S receives a particular packet. Let P c S = 1 P S. Convergence can take place in probability. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

41 Border Nodes Characterized by simple cuts Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

42 Border Nodes Characterized by simple cuts S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

43 Border Nodes Characterized by simple cuts (S) S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

44 Per-round Transmission Constraints Simple Cuts Suffice Theorem For a fixed network topology, τ k/r fixed, and a well-behaved sequence of packet distributions {P i (k)} N i=1, if node i is allowed to transmit b i times per round and b i > τp c S, S [N] i (S) then universal recovery is possible for all sufficiently large k. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

45 Per-round Transmission Constraints Simple Cuts Suffice Theorem For a fixed network topology, τ k/r fixed, and a well-behaved sequence of packet distributions {P i (k)} N i=1, if node i is allowed to transmit b i times per round and b i > τp c S, S [N] i (S) then universal recovery is possible for all sufficiently large k. Interpretation: If border nodes have the ability to relay the packets S is missing, then universal recovery is possible. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

46 Per-round Transmission Constraints A corresponding converse Theorem Universal recovery is not possible if node i is allowed to make at most b i transmissions per communication round and there is some set S [N] for which b i < 1 Pi c r. i (S) i S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

47 Per-round Transmission Constraints A corresponding converse Theorem Universal recovery is not possible if node i is allowed to make at most b i transmissions per communication round and there is some set S [N] for which b i < 1 Pi c r. i (S) Interpretation: The nodes in (S) form a bottleneck which is too tight. i S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

48 Per-round Transmission Constraints A corresponding converse Theorem Universal recovery is not possible if node i is allowed to make at most b i transmissions per communication round and there is some set S [N] for which b i < 1 Pi c r. i (S) Interpretation: The nodes in (S) form a bottleneck which is too tight. Question What is the minimum number of transmissions required for universal recovery? i S Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

49 Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

50 Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Definition (d-connected Networks) A network is d-connected if at least d nodes must be removed in order to disconnect the network. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

51 Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Definition (d-connected Networks) A network is d-connected if at least d nodes must be removed in order to disconnect the network. Theorem (Bollobás): Almost every d-regular network is d-connected. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

52 Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Definition (d-connected Networks) A network is d-connected if at least d nodes must be removed in order to disconnect the network. Theorem (Bollobás): Almost every d-regular network is d-connected. Definition (Nonsingular Networks) A network is nonsingular if its adjacency matrix is nonsingular. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

53 Nonsingular, d-regular, d-connected Networks Definitions and Remarks Definition (d-regular Networks) A network is d-regular if each node is adjacent to d other nodes. Definition (d-connected Networks) A network is d-connected if at least d nodes must be removed in order to disconnect the network. Theorem (Bollobás): Almost every d-regular network is d-connected. Definition (Nonsingular Networks) A network is nonsingular if its adjacency matrix is nonsingular. Conjecture (Costello and Vu): For d 3, almost every d-regular network is nonsingular. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

54 Bounding Excess Transmissions by the Number of Nodes A theorem for structured networks Theorem For all nonsingular d-regular, d-connected networks with ρ > 0 fixed, and P i = ρ < P S, i [N], S : {i} S, (N S ) P c i > d P c S, S : S > N d we can explicitly construct a vector {b j i } that is within N transmissions of optimum. Moreover, for this {b j i }, we have that: 1 d Pi c (k) b j i 1 Pi c (k) + N. d i [N] i [N] j [r] i [N] Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

55 Packets Available to d Nodes Corollary For all nonsingular d-regular, d-connected networks with each packet available to at least d nodes, and P i = ρ < P S, i [N], S : {i} S, we can explicitly construct a vector {b j i } that is within N transmissions of optimum. Moreover, for this {b j i }, we have that: 1 d Pi c (k) b j i 1 Pi c (k) + N. d i [N] i [N] j [r] i [N] If each packet is originally available to d nodes, then almost all transmissions are useful. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

56 Sparsely Distributed Packets Corollary For all nonsingular d-regular, d-connected networks with 0 < ρ < 1 d+1 fixed, and P i = ρ < P S, i [N], S : {i} S, we can explicitly construct a vector {b j i } that is within N transmissions of optimum. Moreover, for this {b j i }, we have that: 1 d Pi c (k) b j i 1 Pi c (k) + N. d i [N] i [N] j [r] i [N] If packets are sparsely distributed and each node has ρ k packets, then almost every transmission is useful. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

57 Independent and Identically Distributed Packets Corollary For all nonsingular d-regular, d-connected networks with P S = 1 (1 q) S, S [N] 1 (1 q) N for some 0 < q < 1, we can explicitly construct a vector {b j i } that is within N transmissions of optimum. Moreover, for this {b j i }, we have that: 1 d Pi c (k) b j i 1 Pi c (k) + N. d i [N] i [N] j [r] i [N] If packets are available independently at each node with probability q, then almost every transmission is useful in recovering the set of packets available to the network. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

58 Examples Two hypothetical scenarios N = 10, Ring Network Ten servers connected in a ring collectively have 1000 files. Each server has a unique 200-file subset. Between 4000 and 4010 file transfers are required for each server to recover all files. N = 1000, Fully Connected Network 1000 peers in a P2P network collectively have a movie consisting of 1,000,000 packets. Each peer has a random half of the movie (i.e. 500,000 randomly selected packets). Between 500,500 and 501,500 packet transmissions are required for universal recovery. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

59 Conclusions and Extensions Main Results Defined a region R r which characterizes all transmission strategies that permit universal recovery. Proved that it suffices to consider simple cuts in networks with a per-round transmission constraint. Bounded excess transmissions by the number of nodes for many structured networks. Extensions Can include scenarios where helper nodes are present, etc. Convergence in probability can replace Well-behaved and all results hold with arbitrarily high probability as the total number of packets grows. Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

60 Thank You! Courtade and Wesel (UCLA) Efficient Universal Recovery Allerton / 19

Near Optimal Broadcast with Network Coding in Large Sensor Networks

Near Optimal Broadcast with Network Coding in Large Sensor Networks in Large Sensor Networks Cédric Adjih, Song Yean Cho, Philippe Jacquet INRIA/École Polytechnique - Hipercom Team 1 st Intl. Workshop on Information Theory for Sensor Networks (WITS 07) - Santa Fe - USA

More information

Shannon capacity and related problems in Information Theory and Ramsey Theory

Shannon capacity and related problems in Information Theory and Ramsey Theory Shannon capacity and related problems in Information Theory and Ramsey Theory Eyal Lubetzky Based on Joint work with Noga Alon and Uri Stav May 2007 1 Outline of talk Shannon Capacity of of a graph: graph:

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 8, AUGUST 2011 5227 Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi,

More information

Lecture 5: Properties of convex sets

Lecture 5: Properties of convex sets Lecture 5: Properties of convex sets Rajat Mittal IIT Kanpur This week we will see properties of convex sets. These properties make convex sets special and are the reason why convex optimization problems

More information

Treewidth and graph minors

Treewidth and graph minors Treewidth and graph minors Lectures 9 and 10, December 29, 2011, January 5, 2012 We shall touch upon the theory of Graph Minors by Robertson and Seymour. This theory gives a very general condition under

More information

Distributed Computing over Communication Networks: Leader Election

Distributed Computing over Communication Networks: Leader Election Distributed Computing over Communication Networks: Leader Election Motivation Reasons for electing a leader? Reasons for not electing a leader? Motivation Reasons for electing a leader? Once elected, coordination

More information

Group Secret Key Generation Algorithms

Group Secret Key Generation Algorithms Group Secret Key Generation Algorithms Chunxuan Ye and Alex Reznik InterDigital Communications Corporation King of Prussia, PA 9406 Email: {Chunxuan.Ye, Alex.Reznik}@interdigital.com arxiv:cs/07024v [cs.it]

More information

11.1. Definitions. 11. Domination in Graphs

11.1. Definitions. 11. Domination in Graphs 11. Domination in Graphs Some definitions Minimal dominating sets Bounds for the domination number. The independent domination number Other domination parameters. 11.1. Definitions A vertex v in a graph

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

Lecture 11: Maximum flow and minimum cut

Lecture 11: Maximum flow and minimum cut Optimisation Part IB - Easter 2018 Lecture 11: Maximum flow and minimum cut Lecturer: Quentin Berthet 4.4. The maximum flow problem. We consider in this lecture a particular kind of flow problem, with

More information

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings

On the Relationships between Zero Forcing Numbers and Certain Graph Coverings On the Relationships between Zero Forcing Numbers and Certain Graph Coverings Fatemeh Alinaghipour Taklimi, Shaun Fallat 1,, Karen Meagher 2 Department of Mathematics and Statistics, University of Regina,

More information

Johns Hopkins Math Tournament Proof Round: Point Set Topology

Johns Hopkins Math Tournament Proof Round: Point Set Topology Johns Hopkins Math Tournament 2019 Proof Round: Point Set Topology February 9, 2019 Problem Points Score 1 3 2 6 3 6 4 6 5 10 6 6 7 8 8 6 9 8 10 8 11 9 12 10 13 14 Total 100 Instructions The exam is worth

More information

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS

IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS IMPROVING THE DATA COLLECTION RATE IN WIRELESS SENSOR NETWORKS BY USING THE MOBILE RELAYS 1 K MADHURI, 2 J.KRISHNA, 3 C.SIVABALAJI II M.Tech CSE, AITS, Asst Professor CSE, AITS, Asst Professor CSE, NIST

More information

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department

CS473-Algorithms I. Lecture 13-A. Graphs. Cevdet Aykanat - Bilkent University Computer Engineering Department CS473-Algorithms I Lecture 3-A Graphs Graphs A directed graph (or digraph) G is a pair (V, E), where V is a finite set, and E is a binary relation on V The set V: Vertex set of G The set E: Edge set of

More information

arxiv:math/ v3 [math.co] 24 Dec 1999

arxiv:math/ v3 [math.co] 24 Dec 1999 arxiv:math/9911125v3 [math.co] 24 Dec 1999 Dynamic Monopolies of Constant Size Eli Berger February 8, 2008 Abstract The paper deals with a polling game on a graph. Initially, each vertex is colored white

More information

The strong chromatic number of a graph

The strong chromatic number of a graph The strong chromatic number of a graph Noga Alon Abstract It is shown that there is an absolute constant c with the following property: For any two graphs G 1 = (V, E 1 ) and G 2 = (V, E 2 ) on the same

More information

Discrete mathematics , Fall Instructor: prof. János Pach

Discrete mathematics , Fall Instructor: prof. János Pach Discrete mathematics 2016-2017, Fall Instructor: prof. János Pach - covered material - Lecture 1. Counting problems To read: [Lov]: 1.2. Sets, 1.3. Number of subsets, 1.5. Sequences, 1.6. Permutations,

More information

On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments

On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments Electronic Journal of Graph Theory and Applications 3 (2) (2015), 191 196 On the Balanced Case of the Brualdi-Shen Conjecture on 4-Cycle Decompositions of Eulerian Bipartite Tournaments Rafael Del Valle

More information

Graph Connectivity G G G

Graph Connectivity G G G Graph Connectivity 1 Introduction We have seen that trees are minimally connected graphs, i.e., deleting any edge of the tree gives us a disconnected graph. What makes trees so susceptible to edge deletions?

More information

by conservation of flow, hence the cancelation. Similarly, we have

by conservation of flow, hence the cancelation. Similarly, we have Chapter 13: Network Flows and Applications Network: directed graph with source S and target T. Non-negative edge weights represent capacities. Assume no edges into S or out of T. (If necessary, we can

More information

Coded Cooperative Data Exchange for Multiple Unicasts

Coded Cooperative Data Exchange for Multiple Unicasts Coded Cooperative Data Exchange for Multiple Unicasts Shahriar Etemadi Tajbakhsh and Parastoo Sadeghi Research School of Engineering The Australian National University Canberra, 000, Australia Emails:

More information

The Capacity of Wireless Networks

The Capacity of Wireless Networks The Capacity of Wireless Networks Piyush Gupta & P.R. Kumar Rahul Tandra --- EE228 Presentation Introduction We consider wireless networks without any centralized control. Try to analyze the capacity of

More information

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks

Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Bounds on the Benefit of Network Coding for Multicast and Unicast Sessions in Wireless Networks Alireza Keshavarz-Haddad Rudolf Riedi Department of Electrical and Computer Engineering and Department of

More information

Bipartite Perfect Matching in O(n log n) Randomized Time. Nikhil Bhargava and Elliot Marx

Bipartite Perfect Matching in O(n log n) Randomized Time. Nikhil Bhargava and Elliot Marx Bipartite Perfect Matching in O(n log n) Randomized Time Nikhil Bhargava and Elliot Marx Background Matching in bipartite graphs is a problem that has many distinct applications. Many problems can be reduced

More information

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions.

NP-Hardness. We start by defining types of problem, and then move on to defining the polynomial-time reductions. CS 787: Advanced Algorithms NP-Hardness Instructor: Dieter van Melkebeek We review the concept of polynomial-time reductions, define various classes of problems including NP-complete, and show that 3-SAT

More information

Graph Definitions. In a directed graph the edges have directions (ordered pairs). A weighted graph includes a weight function.

Graph Definitions. In a directed graph the edges have directions (ordered pairs). A weighted graph includes a weight function. Graph Definitions Definition 1. (V,E) where An undirected graph G is a pair V is the set of vertices, E V 2 is the set of edges (unordered pairs) E = {(u, v) u, v V }. In a directed graph the edges have

More information

Math 170- Graph Theory Notes

Math 170- Graph Theory Notes 1 Math 170- Graph Theory Notes Michael Levet December 3, 2018 Notation: Let n be a positive integer. Denote [n] to be the set {1, 2,..., n}. So for example, [3] = {1, 2, 3}. To quote Bud Brown, Graph theory

More information

Error correction guarantees

Error correction guarantees Error correction guarantees Drawback of asymptotic analyses Valid only as long as the incoming messages are independent. (independence assumption) The messages are independent for l iterations only if

More information

Judicious bisections

Judicious bisections Judicious bisections Po-Shen Loh Carnegie Mellon University Joint work with Choongbum Lee and Benny Sudakov Max Cut Problem Given a graph, find a bipartition which maximizes the number of crossing edges.

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Majid Gerami, Ming Xiao Communication Theory Lab, Royal Institute of Technology, KTH, Sweden, E-mail: {gerami, mingx@kthse arxiv:14012774v1

More information

Suppose we have a function p : X Y from a topological space X onto a set Y. we want to give a topology on Y so that p becomes a continuous map.

Suppose we have a function p : X Y from a topological space X onto a set Y. we want to give a topology on Y so that p becomes a continuous map. V.3 Quotient Space Suppose we have a function p : X Y from a topological space X onto a set Y. we want to give a topology on Y so that p becomes a continuous map. Remark If we assign the indiscrete topology

More information

Ma/CS 6b Class 26: Art Galleries and Politicians

Ma/CS 6b Class 26: Art Galleries and Politicians Ma/CS 6b Class 26: Art Galleries and Politicians By Adam Sheffer The Art Gallery Problem Problem. We wish to place security cameras at a gallery, such that they cover it completely. Every camera can cover

More information

Graph Theory S 1 I 2 I 1 S 2 I 1 I 2

Graph Theory S 1 I 2 I 1 S 2 I 1 I 2 Graph Theory S I I S S I I S Graphs Definition A graph G is a pair consisting of a vertex set V (G), and an edge set E(G) ( ) V (G). x and y are the endpoints of edge e = {x, y}. They are called adjacent

More information

Module 7. Independent sets, coverings. and matchings. Contents

Module 7. Independent sets, coverings. and matchings. Contents Module 7 Independent sets, coverings Contents and matchings 7.1 Introduction.......................... 152 7.2 Independent sets and coverings: basic equations..... 152 7.3 Matchings in bipartite graphs................

More information

MAXIMAL FLOW THROUGH A NETWORK

MAXIMAL FLOW THROUGH A NETWORK MAXIMAL FLOW THROUGH A NETWORK L. R. FORD, JR. AND D. R. FULKERSON Introduction. The problem discussed in this paper was formulated by T. Harris as follows: "Consider a rail network connecting two cities

More information

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions

Minimum Delay Packet-sizing for Linear Multi-hop Networks with Cooperative Transmissions Minimum Delay acket-sizing for inear Multi-hop Networks with Cooperative Transmissions Ning Wen and Randall A. Berry Department of Electrical Engineering and Computer Science Northwestern University, Evanston,

More information

An algorithm for Performance Analysis of Single-Source Acyclic graphs

An algorithm for Performance Analysis of Single-Source Acyclic graphs An algorithm for Performance Analysis of Single-Source Acyclic graphs Gabriele Mencagli September 26, 2011 In this document we face with the problem of exploiting the performance analysis of acyclic graphs

More information

The Role of Network Coding in Wireless Unicast

The Role of Network Coding in Wireless Unicast The Role of Network Coding in Wireless Unicast Ramakrishna Gummadi (Ramki), UIUC Laurent Massoulie, Thomson Paris Research Lab Ramavarapu Sreenivas, UIUC June 10, 2010 Introduction Wireline: Some well

More information

1 Minimum Cut Problem

1 Minimum Cut Problem CS 6 Lecture 6 Min Cut and Karger s Algorithm Scribes: Peng Hui How, Virginia Williams (05) Date: November 7, 07 Anthony Kim (06), Mary Wootters (07) Adapted from Virginia Williams lecture notes Minimum

More information

Notes for Lecture 20

Notes for Lecture 20 U.C. Berkeley CS170: Intro to CS Theory Handout N20 Professor Luca Trevisan November 13, 2001 Notes for Lecture 20 1 Duality As it turns out, the max-flow min-cut theorem is a special case of a more general

More information

Ma/CS 6b Class 13: Counting Spanning Trees

Ma/CS 6b Class 13: Counting Spanning Trees Ma/CS 6b Class 13: Counting Spanning Trees By Adam Sheffer Reminder: Spanning Trees A spanning tree is a tree that contains all of the vertices of the graph. A graph can contain many distinct spanning

More information

Layer 2 functionality bridging and switching

Layer 2 functionality bridging and switching Layer 2 functionality bridging and switching BSAD 141 Dave Novak Sources: Network+ Guide to Networks, Dean 2013 Overview Layer 2 functionality Error detection Bridges Broadcast and collision domains How

More information

CMPSCI 311: Introduction to Algorithms Practice Final Exam

CMPSCI 311: Introduction to Algorithms Practice Final Exam CMPSCI 311: Introduction to Algorithms Practice Final Exam Name: ID: Instructions: Answer the questions directly on the exam pages. Show all your work for each question. Providing more detail including

More information

Disjoint directed cycles

Disjoint directed cycles Disjoint directed cycles Noga Alon Abstract It is shown that there exists a positive ɛ so that for any integer k, every directed graph with minimum outdegree at least k contains at least ɛk vertex disjoint

More information

FOUR EDGE-INDEPENDENT SPANNING TREES 1

FOUR EDGE-INDEPENDENT SPANNING TREES 1 FOUR EDGE-INDEPENDENT SPANNING TREES 1 Alexander Hoyer and Robin Thomas School of Mathematics Georgia Institute of Technology Atlanta, Georgia 30332-0160, USA ABSTRACT We prove an ear-decomposition theorem

More information

Abstract. A graph G is perfect if for every induced subgraph H of G, the chromatic number of H is equal to the size of the largest clique of H.

Abstract. A graph G is perfect if for every induced subgraph H of G, the chromatic number of H is equal to the size of the largest clique of H. Abstract We discuss a class of graphs called perfect graphs. After defining them and getting intuition with a few simple examples (and one less simple example), we present a proof of the Weak Perfect Graph

More information

Paths, Circuits, and Connected Graphs

Paths, Circuits, and Connected Graphs Paths, Circuits, and Connected Graphs Paths and Circuits Definition: Let G = (V, E) be an undirected graph, vertices u, v V A path of length n from u to v is a sequence of edges e i = {u i 1, u i} E for

More information

Tutorial for Algorithm s Theory Problem Set 5. January 17, 2013

Tutorial for Algorithm s Theory Problem Set 5. January 17, 2013 Tutorial for Algorithm s Theory Problem Set 5 January 17, 2013 Exercise 1: Maximum Flow Algorithms Consider the following flow network: a) Solve the maximum flow problem on the above network by using the

More information

Module 11. Directed Graphs. Contents

Module 11. Directed Graphs. Contents Module 11 Directed Graphs Contents 11.1 Basic concepts......................... 256 Underlying graph of a digraph................ 257 Out-degrees and in-degrees.................. 258 Isomorphism..........................

More information

The Multi-Sender Multicast Index Coding

The Multi-Sender Multicast Index Coding The Multi-Sender Multicast Index Coding Lawrence Ong The University of Newcastle, Australia Email: lawrence.ong@cantab.net Fabian Lim Massachusetts Institute of Technology, USA Email: flim@mit.edu Chin

More information

Connectivity of the zero-divisor graph for finite rings

Connectivity of the zero-divisor graph for finite rings Connectivity of the zero-divisor graph for finite rings Reza Akhtar and Lucas Lee Abstract The vertex-connectivity and edge-connectivity of the zero-divisor graph associated to a finite commutative ring

More information

Superconcentrators of depth 2 and 3; odd levels help (rarely)

Superconcentrators of depth 2 and 3; odd levels help (rarely) Superconcentrators of depth 2 and 3; odd levels help (rarely) Noga Alon Bellcore, Morristown, NJ, 07960, USA and Department of Mathematics Raymond and Beverly Sackler Faculty of Exact Sciences Tel Aviv

More information

Delay Minimization for Relay-Based Cooperative Data Exchange With Network Coding

Delay Minimization for Relay-Based Cooperative Data Exchange With Network Coding 1890 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 23, NO. 6, DECEMBER 2015 Delay Minimization for Relay-Based Cooperative Data Exchange With Network Coding Zheng Dong, Son Hoang Dau, Chau Yuen, Senior Member,

More information

Modeling web-crawlers on the Internet with random walksdecember on graphs11, / 15

Modeling web-crawlers on the Internet with random walksdecember on graphs11, / 15 Modeling web-crawlers on the Internet with random walks on graphs December 11, 2014 Modeling web-crawlers on the Internet with random walksdecember on graphs11, 2014 1 / 15 Motivation The state of the

More information

Minimal Classes of Bipartite Graphs of Unbounded Clique-width

Minimal Classes of Bipartite Graphs of Unbounded Clique-width Minimal Classes of Bipartite Graphs of Unbounded Clique-width A. Atminas, R. Brignall, N. Korpelainen, V. Lozin, J. Stacho Abstract The celebrated result of Robertson and Seymour states that in the family

More information

Convexity: an introduction

Convexity: an introduction Convexity: an introduction Geir Dahl CMA, Dept. of Mathematics and Dept. of Informatics University of Oslo 1 / 74 1. Introduction 1. Introduction what is convexity where does it arise main concepts and

More information

arxiv: v1 [math.co] 4 Apr 2011

arxiv: v1 [math.co] 4 Apr 2011 arxiv:1104.0510v1 [math.co] 4 Apr 2011 Minimal non-extensible precolorings and implicit-relations José Antonio Martín H. Abstract. In this paper I study a variant of the general vertex coloring problem

More information

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality

Planar Graphs. 1 Graphs and maps. 1.1 Planarity and duality Planar Graphs In the first half of this book, we consider mostly planar graphs and their geometric representations, mostly in the plane. We start with a survey of basic results on planar graphs. This chapter

More information

Integer Programming Theory

Integer Programming Theory Integer Programming Theory Laura Galli October 24, 2016 In the following we assume all functions are linear, hence we often drop the term linear. In discrete optimization, we seek to find a solution x

More information

Exercise set 2 Solutions

Exercise set 2 Solutions Exercise set 2 Solutions Let H and H be the two components of T e and let F E(T ) consist of the edges of T with one endpoint in V (H), the other in V (H ) Since T is connected, F Furthermore, since T

More information

In this chapter, we define limits of functions and describe some of their properties.

In this chapter, we define limits of functions and describe some of their properties. Chapter 2 Limits of Functions In this chapter, we define its of functions and describe some of their properties. 2.. Limits We begin with the ϵ-δ definition of the it of a function. Definition 2.. Let

More information

Assignment # 4 Selected Solutions

Assignment # 4 Selected Solutions Assignment # 4 Selected Solutions Problem 2.3.3 Let G be a connected graph which is not a tree (did you notice this is redundant?) and let C be a cycle in G. Prove that the complement of any spanning tree

More information

Pebble Sets in Convex Polygons

Pebble Sets in Convex Polygons 2 1 Pebble Sets in Convex Polygons Kevin Iga, Randall Maddox June 15, 2005 Abstract Lukács and András posed the problem of showing the existence of a set of n 2 points in the interior of a convex n-gon

More information

Edge intersection graphs. of systems of grid paths. with bounded number of bends

Edge intersection graphs. of systems of grid paths. with bounded number of bends Edge intersection graphs of systems of grid paths with bounded number of bends Andrei Asinowski a, Andrew Suk b a Caesarea Rothschild Institute, University of Haifa, Haifa 31905, Israel. b Courant Institute,

More information

Today. Maximum flow. Maximum flow. Problem

Today. Maximum flow. Maximum flow. Problem 5 Maximum Flow (slides 1 4) Today Maximum flow Algorithms and Networks 2008 Maximum flow problem Applications Briefly: Ford-Fulkerson; min cut max flow theorem Preflow push algorithm Lift to front algorithm

More information

MATH 682 Notes Combinatorics and Graph Theory II. One interesting class of graphs rather akin to trees and acyclic graphs is the bipartite graph:

MATH 682 Notes Combinatorics and Graph Theory II. One interesting class of graphs rather akin to trees and acyclic graphs is the bipartite graph: 1 Bipartite graphs One interesting class of graphs rather akin to trees and acyclic graphs is the bipartite graph: Definition 1. A graph G is bipartite if the vertex-set of G can be partitioned into two

More information

Mathematical and Algorithmic Foundations Linear Programming and Matchings

Mathematical and Algorithmic Foundations Linear Programming and Matchings Adavnced Algorithms Lectures Mathematical and Algorithmic Foundations Linear Programming and Matchings Paul G. Spirakis Department of Computer Science University of Patras and Liverpool Paul G. Spirakis

More information

Throughout this course, we use the terms vertex and node interchangeably.

Throughout this course, we use the terms vertex and node interchangeably. Chapter Vertex Coloring. Introduction Vertex coloring is an infamous graph theory problem. It is also a useful toy example to see the style of this course already in the first lecture. Vertex coloring

More information

Approximation Algorithms

Approximation Algorithms Approximation Algorithms Prof. Tapio Elomaa tapio.elomaa@tut.fi Course Basics A 4 credit unit course Part of Theoretical Computer Science courses at the Laboratory of Mathematics There will be 4 hours

More information

6.854 Advanced Algorithms. Scribes: Jay Kumar Sundararajan. Duality

6.854 Advanced Algorithms. Scribes: Jay Kumar Sundararajan. Duality 6.854 Advanced Algorithms Scribes: Jay Kumar Sundararajan Lecturer: David Karger Duality This lecture covers weak and strong duality, and also explains the rules for finding the dual of a linear program,

More information

Queue Length Stability in Trees Under Slowly Convergent Traffic Using Sequential Maximal Scheduling

Queue Length Stability in Trees Under Slowly Convergent Traffic Using Sequential Maximal Scheduling University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering November 2008 Queue Length Stability in Trees Under Slowly Convergent Traffic Using

More information

Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks. Presented by Yao Zheng

Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks. Presented by Yao Zheng Lifetime Analysis of Random Event-Driven Clustered Wireless Sensor Networks Presented by Yao Zheng Contributions Analyzing the lifetime of WSN without knowing the lifetime of sensors Find a accurate approximation

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

Λέων-Χαράλαμπος Σταματάρης

Λέων-Χαράλαμπος Σταματάρης Λέων-Χαράλαμπος Σταματάρης INTRODUCTION Two classical problems of information dissemination in computer networks: The broadcasting problem: Distributing a particular message from a distinguished source

More information

On the Robustness of Distributed Computing Networks

On the Robustness of Distributed Computing Networks 1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,

More information

GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS. March 3, 2016

GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS. March 3, 2016 GRAPH DECOMPOSITION BASED ON DEGREE CONSTRAINTS ZOÉ HAMEL March 3, 2016 1. Introduction Let G = (V (G), E(G)) be a graph G (loops and multiple edges not allowed) on the set of vertices V (G) and the set

More information

cs/ee 143 Fall

cs/ee 143 Fall cs/ee 143 Fall 2018 5 2 Ethernet 2.1 W&P, P3.2 3 Points. Consider the Slotted ALOHA MAC protocol. There are N nodes sharing a medium, and time is divided into slots. Each packet takes up a single slot.

More information

VIZING S THEOREM AND EDGE-CHROMATIC GRAPH THEORY. Contents

VIZING S THEOREM AND EDGE-CHROMATIC GRAPH THEORY. Contents VIZING S THEOREM AND EDGE-CHROMATIC GRAPH THEORY ROBERT GREEN Abstract. This paper is an expository piece on edge-chromatic graph theory. The central theorem in this subject is that of Vizing. We shall

More information

CSE 417 Network Flows (pt 3) Modeling with Min Cuts

CSE 417 Network Flows (pt 3) Modeling with Min Cuts CSE 417 Network Flows (pt 3) Modeling with Min Cuts Reminders > HW6 is due on Friday start early bug fixed on line 33 of OptimalLineup.java: > change true to false Review of last two lectures > Defined

More information

Network flows and Menger s theorem

Network flows and Menger s theorem Network flows and Menger s theorem Recall... Theorem (max flow, min cut strong duality). Let G be a network. The maximum value of a flow equals the minimum capacity of a cut. We prove this strong duality

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

On the Robustness of Distributed Computing Networks

On the Robustness of Distributed Computing Networks 1 On the Robustness of Distributed Computing Networks Jianan Zhang, Hyang-Won Lee, and Eytan Modiano Lab for Information and Decision Systems, Massachusetts Institute of Technology, USA Dept. of Software,

More information

Introduction to Graph Theory

Introduction to Graph Theory Introduction to Graph Theory Tandy Warnow January 20, 2017 Graphs Tandy Warnow Graphs A graph G = (V, E) is an object that contains a vertex set V and an edge set E. We also write V (G) to denote the vertex

More information

Hierarchical Coded Caching

Hierarchical Coded Caching Hierarchical Coded Caching ikhil Karamchandani, Urs iesen, Mohammad Ali Maddah-Ali, and Suhas Diggavi Abstract arxiv:403.7007v2 [cs.it] 6 Jun 204 Caching of popular content during off-peak hours is a strategy

More information

Lecture 2 September 3

Lecture 2 September 3 EE 381V: Large Scale Optimization Fall 2012 Lecture 2 September 3 Lecturer: Caramanis & Sanghavi Scribe: Hongbo Si, Qiaoyang Ye 2.1 Overview of the last Lecture The focus of the last lecture was to give

More information

Characterizing Graphs (3) Characterizing Graphs (1) Characterizing Graphs (2) Characterizing Graphs (4)

Characterizing Graphs (3) Characterizing Graphs (1) Characterizing Graphs (2) Characterizing Graphs (4) S-72.2420/T-79.5203 Basic Concepts 1 S-72.2420/T-79.5203 Basic Concepts 3 Characterizing Graphs (1) Characterizing Graphs (3) Characterizing a class G by a condition P means proving the equivalence G G

More information

Mobility Control for Complete Coverage in Wireless Sensor Networks

Mobility Control for Complete Coverage in Wireless Sensor Networks Mobility Control for Complete Coverage in Wireless Sensor Networks Zhen Jiang Computer Sci. Dept. West Chester University West Chester, PA 9383, USA zjiang@wcupa.edu Jie Wu Computer Sci. & Eng. Dept. Florida

More information

Generalized Interlinked Cycle Cover for Index Coding

Generalized Interlinked Cycle Cover for Index Coding Generalized Interlinked Cycle Cover for Index Coding Chandra Thapa, Lawrence Ong, and Sarah J. Johnson School of Electrical Engineering and Computer Science, The University of Newcastle, Newcastle, Australia

More information

IN A WIRELINE network having a single source and a single

IN A WIRELINE network having a single source and a single IEEE TRANSACTIONS ON COMMUNICATIONS, VOL. 55, NO. 3, MARCH 2007 463 A Practical Scheme for Wireless Network Operation Radhika Gowaikar, Student Member, IEEE, Amir F. Dana, Student Member, IEEE, Babak Hassibi,

More information

Independence Number and Cut-Vertices

Independence Number and Cut-Vertices Independence Number and Cut-Vertices Ryan Pepper University of Houston Downtown, Houston, Texas 7700 pepperr@uhd.edu Abstract We show that for any connected graph G, α(g) C(G) +1, where α(g) is the independence

More information

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi

Efficient Content Delivery and Low Complexity Codes. Amin Shokrollahi Efficient Content Delivery and Low Complexity Codes Amin Shokrollahi Content Goals and Problems TCP/IP, Unicast, and Multicast Solutions based on codes Applications Goal Want to transport data from a transmitter

More information

Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem

Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem Methods and Models for Combinatorial Optimization Exact methods for the Traveling Salesman Problem L. De Giovanni M. Di Summa The Traveling Salesman Problem (TSP) is an optimization problem on a directed

More information

Discharging and reducible configurations

Discharging and reducible configurations Discharging and reducible configurations Zdeněk Dvořák March 24, 2018 Suppose we want to show that graphs from some hereditary class G are k- colorable. Clearly, we can restrict our attention to graphs

More information

POLYHEDRAL GEOMETRY. Convex functions and sets. Mathematical Programming Niels Lauritzen Recall that a subset C R n is convex if

POLYHEDRAL GEOMETRY. Convex functions and sets. Mathematical Programming Niels Lauritzen Recall that a subset C R n is convex if POLYHEDRAL GEOMETRY Mathematical Programming Niels Lauritzen 7.9.2007 Convex functions and sets Recall that a subset C R n is convex if {λx + (1 λ)y 0 λ 1} C for every x, y C and 0 λ 1. A function f :

More information

Analysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two

Analysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two Analysis of an ( )-Approximation Algorithm for the Maximum Edge-Disjoint Paths Problem with Congestion Two Nabiha Asghar Department of Combinatorics & Optimization University of Waterloo, Ontario, Canada

More information

SANDRA SPIROFF AND CAMERON WICKHAM

SANDRA SPIROFF AND CAMERON WICKHAM A ZERO DIVISOR GRAPH DETERMINED BY EQUIVALENCE CLASSES OF ZERO DIVISORS arxiv:0801.0086v2 [math.ac] 17 Aug 2009 SANDRA SPIROFF AND CAMERON WICKHAM Abstract. We study the zero divisor graph determined by

More information

Matching and Planarity

Matching and Planarity Matching and Planarity Po-Shen Loh June 010 1 Warm-up 1. (Bondy 1.5.9.) There are n points in the plane such that every pair of points has distance 1. Show that there are at most n (unordered) pairs of

More information

Lecture 6: Graph Properties

Lecture 6: Graph Properties Lecture 6: Graph Properties Rajat Mittal IIT Kanpur In this section, we will look at some of the combinatorial properties of graphs. Initially we will discuss independent sets. The bulk of the content

More information

WHILE traditional information transmission in a data network. Bounding the Coding Advantage of Combination Network Coding in Undirected Networks

WHILE traditional information transmission in a data network. Bounding the Coding Advantage of Combination Network Coding in Undirected Networks 570 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 58, NO. 2, FEBRUARY 2012 Bounding the Coding Advantage of Combination Network Coding in Undirected Networks Shreya Maheshwar, Zongpeng Li, Member, IEEE,

More information