On Secure Distributed Data Storage Under Repair Dynamics

Size: px
Start display at page:

Download "On Secure Distributed Data Storage Under Repair Dynamics"

Transcription

1 On Secure Distributed Data Storage Under Repair Dynamics Sameer Pawar, Salim El Rouayheb, Kannan Ramchandran University of California, Bereley s: Abstract We address the problem of securg distributed storage systems agast passive eavesdroppers that can observe a limited number of storage nodes. An important aspect of these systems is node failures over time, which demand a repair mechanism aimed at matag a targeted high level of system reliability. If an eavesdropper observes a node that is added to the system to replace a failed node, it will have access to all the data downloaded durg repair, which can potentially compromise the entire formation the system. We are terested determg the secrecy capacity of distributed storage systems under repair dynamics, i.e., the maximum amount of data that can be securely stored and made available to a legitimate user with revealg any formation to any eavesdropper. We derive a general upper bound on the secrecy capacity and show that this bound is tight for the bandwidth-limited regime which is of importance scenarios such as peer-to-peer distributed storage systems. We also provide a simple explicit code construction that achieves the capacity for this regime. I. INTRODUCTION Data storage devices have evolved significantly sce the days of punched cards. Nevertheless, storage devices, such as hard diss or flash drives, are still bound to fail after long periods of usage, risg the loss of valuable data. To solve this problem and to crease the reliability of the stored data, multiple storage nodes can be networed together to redundantly store the data, thus formg a distributed data storage system. Applications of such systems are numerable and clude large data centers and peer-to-peer storage systems, such as OceanStore [], that use a large number of nodes spread widely across the Internet to store files. Codes for protectg data from erasures have been well studied classical channel codg theory, and can be used here to crease the reliability of distributed storage systems. Fig. illustrates an example where a maximal distance separable (MDS) code is used to store a file F of 4 symbols, (a,a,b,b ) F 4 5, distributively on 4 nodes, v,...,v 4, each of capacity symbols. The MDS code implemented here ensures that any user, also called data collector, connectg to any storage nodes can obta the whole file F. However, what distguishes the scenario here from the erasure channel counterpart is that when a storage node fails, it needs to be repaired or replaced by a new node order to mata a desired level of system reliability. A straightforward repair mechanism would be to add a new replacement node of capacity, and mae it act as a data collector by connectg This research was funded part by an AFOSR grant (FA ), a DTRA grant (HDTRA ), and an NSF grant (CCF ). File F a,a b,b v a,a v b,b v 3 a + b a + b v 4 a +b a + b v 5 a + a a +4a Fig.. An example of a distributed data storage system under repair. A file F of 4 symbols (a,a,b,b ) F 4 5 is stored on four nodes usg an MDS code. Node v fails and is replaced by a new node v 5 that downloads (b + b ), (a + a + b + b ) and (a +4a +b +b ) from v, v 3, and v 4 respectively to compute and store (a + a,a +4a ). Nodes v,...,v 5 form a new MDS code. The edges the graph are labeled by their capacities. The figure also depicts a data collector connectg to nodes v and v 4 to recover the stored file. to survivg nodes. The new node can then download the whole file (4 symbols) to construct the lost part of the data and store it. Another repair scheme that consumes less bandwidth is depicted Fig. where node v fails and is replaced by node v 5. When node v 5 connect to 3 nodes stead of, it is possible to decrease the total repair bandwidth from 4 to 3 symbols. Note that v 5 does not need to store the exact data that was on v ; the only required property is that the data stored on all the active nodes v,v 3,v 4 and v 5 form an MDS code. The above important observations were the basis of the origal wor of [] where the authors showed that there exists a fundamental tradeoff between the storage capacity of each node and the repair bandwidth. They also troduced and constructed regeneratg codes as a new class of codes that generalize classical erasure codes and permit the operation of a distributed storage system at any pot on the tradeoff curve. When a distributed data storage system is formed usg nodes widely spread across the Internet, e.g., Internet based peer-to-peer systems, dividual nodes may not be secure and can become susceptible to eavesdroppg. This paper focuses on such scenarios where an eavesdropper can ga access to a certa number of the storage nodes. The compromised distributed storage system is always assumed to be dynamic with nodes contually failg and beg repaired. Thus, the compromised nodes can belong to the origal set of storage

2 nodes that the system starts with, or even clude some of the replacement nodes added to the system to repair it from failures. Under this settg, we are terested determg how much data can still be stored the system with revealg any formation to any of the eavesdroppers. To answer this question, we follow the approach of [] and model the distributed storage system as a multicast networ that uses networ codg. Under this model, the eavesdropper is an truder that can access a fixed number of the networ nodes of her choice. This eavesdropper model is natural for distributed storage systems and comes contrast with the wiretapper model studied the networ codg literature [3], [4], [5] where the truder can observe networ edges, stead of nodes. We derive a general upper bound on the secrecy capacity as a function of the node storage capacity and the repair bandwidth. Motivated by system considerations, we defe an important operatg regime, that we call the bandwidth-limited regime, where the repair bandwidth is constraed not to exceed a given upper bound, while no limitation is imposed on the storage capacity of the nodes. For this important operatg regime, we show that our upper bound is tight and present capacity-achievg codes. This paper is organized as follows. In Section II we describe the system and security model. We defe the problem and give a summary of our results Section III. In Section IV we illustrate two special cases of distributed storage systems that are structive understandg the general problem. In Section V, we derive an upper bound on the secrecy capacity, and Section VI, we present a scheme that achieves this upper bound for the case of bandwidth-limited regime. We conclude Section VII. A. Distributed storage system II. MODEL A distributed storage system (DSS) is a collection of storage nodes that cludes a source node s, that has an compressible data file F of R symbols, or units, each belongg to a fite field F. The source node is connected to n storage nodes v,...,v n, each with a storage capacity of symbols, which may be utilized to save coded parts of the file F. The storage nodes are dividually unreliable and may fail over time. To guarantee a certa desired level of reliability, we assume that the DSS is required to always have n active, i.e., non-failed, storage nodes that are service. Therefore, when a storage node fails, it is immediately replaced by a new node with same storage capacity. The DSS should be designed a way to allow any legitimate user, that we also call data collector, that connects to any of the n active storage nodes available at any given time, to be able to reconstruct the origal file F. We term this condition as the reconstruction property of distributed storage systems. We assume that nodes fail one at a time, and we denote by v n+i the new replacement node added to the system to repair the i-th failure. The new replacement node connects then to some d nodes, chosen randomly, of the remag active n nodes and downloads γ units from them total, which corresponds to the repair bandwidth of the system. The repair degree d is a system parameter satisfyg d n. In this wor, we focus on the case of symmetrical repair where the new node downloads equal amount of data, say units, from each of the d nodes it connects to, i.e., γ = d. The process of replenishg redundancy to mata the reliability of a DSS is referred to as the regeneration or repair process. Note that a new replacement node may download more data than what it actually stores. Moreover, the stored data can possibly be different than the one that was stored on the failed node, as long as the reconstruction property of the DSS is retaed. A distributed storage system D is thus characterized as D(n, ). For stance, the DSS depicted Fig. corresponds to D(4, ) which is operatg at (, γ) =(, 3). B. Flow Graph Representation We adopt the flow graph model troduced [] which we describe here for completeness. In this model, the distributed storage system is represented by an formation flow graph G. The graph G is a directed acyclic graph with capacity constraed edges that consists of three ds of nodes: a sgle source node s, put storage nodes x i and put storage nodes x i and data collectors j for i, j {,,...}. The source node s has an formation S of which a specific realization is the file F. Each storage node v i the DSS is represented by two nodes x i and xi joed by a directed edge of capacity (see Fig. ), to account for the node storage constrat. The repair process is itiated every time a failure occurs. As a result, the DSS, and consequently the flow graph, are dynamic and evolve with time. At any given time, each node the graph is either active or active dependg on whether it has failed or not. The graph G starts with only the source node s beg active and connected to the storage put nodes x,...,xn by gog edges of fite capacity. From this pot onwards, the source node s becomes and remas active and the n put and put storage nodes become active. When a node v i fails a DSS, the correspondg nodes x i and xi become active G. If a replacement node v j jos the DSS the process of repairg a failure and connects to d active nodes v i,...,v id, the correspondg nodes x j and x j, with the edge (x j,xj ), are added to the flow graph G, and node x j is connected to the nodes xi,...,x i d by comg edges of capacity each. A data collector is represented by a node connected to active storage put nodes through fite capacity ls enablg it to reconstruct the file F. The graph G constitutes a multicast networ with the data collectors as destations. An underlyg assumption here is that the flow graph correspondg to a distributed storage system depends on the sequence of failed nodes. As an example, we depict Fig. the flow graph correspondg to the DSS D(4, ) of Fig., when node v fails. C. Eavesdropper Model We assume the presence of an truder Eve the DSS, who can observe up to, <,nodes of her choice among all the storage nodes, v,v,..., possibly at different time stances as the system evolves. In the flow graph model, Eve is an eavesdropper who can access a fixed number of nodes chosen from the storage put nodes x,x,... Notice that while a data collector observes put storage nodes, i.e., the

3 s x x x 3 x 4 v v v 3 v 4 x x x 3 x 4 = x 5 = Fig.. The flow graph model of the DSS D(4, ), with d =3, of Fig. when node v fails and is replaced by node v 5. Each storage node v i is represented by two nodes x i and xi connected by an edge (xi,xi ) of capacity representg the node storage constrat. A data collector connectg to nodes v and v 4 is also depicted. data stored on the nodes it connects to, Eve, has access to put storage nodes, and thus can observe, addition to the stored data, all comg messages to these nodes. We also assume that Eve has complete nowledge of the storage and repair schemes implemented the DSS. Thus, she can choose some of the nodes to be among the itial n storage nodes, or, if she deems it more profitable, she can choose to wait for failures and eavesdrop on a replacement node by observg its downloaded data. Eve is assumed to be passive, and only observes the data with modifyg it. v 5 x 5 III. PROBLEM STATEMENT AND RESULTS A. Secrecy Capacity Let S be a random vector uniformly distributed over F R q, representg the compressible data file at the source node with H(S) = R. Let V := {x,x,...} and V := {x,x,...} be the sets of put and put storage nodes G respectively. For a storage node v i, let D i and C i be the random variables representg its downloaded messages and stored content respectively. Thus, C i, represents the data that can be downloaded by a data collector when contactg node v i, while D i, with H(D i ) γ, represents the total data revealed to Eve when she accesses node v i. The stored data C i is a function of the downloaded data D i. Let V a be the collection of all subsets of V of cardality consistg of nodes that are simultaneously active at some stant time. For any subset B of V, defe C B := {C i : x i B}. Similarly, for any subset E of V, defe D E := {D i : x i E}. The reconstruction property, then, can be written as H(S C B ) = 0 B V a, () and the perfect secrecy condition implies H(S D E ) = H(S), E V and E. () Given a DSS D(n, ) with compromised nodes, its secrecy capacity, denoted by C s (, γ), is then defed to be the maximum amount of data that can be stored this system such that the reconstruction property and the perfect secrecy condition are simultaneously satisfied for all possible data collectors and eavesdroppers i.e., C s (, γ) := sup H(S C B )=0 H(S D E )=H(S) where B V a, E V and E. B. Results B E H(S) (3) First, we give the followg general upper bound on the secrecy capacity of a DSS: Theorem : [Upper Bound] For a distributed data storage system D(n, ), with a repair degree d, and <compromised nodes, the secrecy capacity is upper bounded as C s (, γ) m{(d i + ),}, (4) where γ = d. Next, we consider an important operational regime, namely the bandwidth-limited regime, where the repair bandwidth γ is constraed to a maximum amount Γ, i.e., γ Γ, while no constrat is imposed on the storage capacity at each node. The secrecy capacity this regime is defed as, C BL s (Γ) := sup γ Γ, 0 C s (, γ). (5) For a fixed Γ, when the parameter d is a system design choice, the upper bound of Theorem on the secrecy capacity can be further optimized, and attas a maximum for d = n. In section VI, we demonstrate that this upper bound can be achieved for d = n the bandwidth-limited regime. Thus, establishg the followg theorem: Theorem : [Bandwidth-Limited Regime] For a distributed data storage system D(n, ), <compromised nodes, the secrecy capacity for a bandwidth-limited regime, for d = n, is C BL s (Γ) = Γ (n i) n, (6) and is achieved with a storage capacity of =Γ. A. Static Systems IV. SPECIAL CASES A static version of the problem studied here corresponds to a DSS with ideal storage nodes that do not fail. Hence there is no need for any repair the system. The flow graph of this system is then the combation networ studied networ codg theory (see for e.g. [6, Chap. 4] ). Therefore, the static storage problem can be regarded as a special case of wiretap networs [3], [4], or equivalently, as the erasureerasure wiretap-ii channel studied [7]. The secrecy capacity for such systems is ( ), and can be achieved usg either nested MDS codes [7], or the coset codes of [8], [4]. Even though the above proposed solution is optimal for the static case, it can have a very poor secrecy performance when applied directly to dynamic storage systems with failures. For stance, a straightforward way to repair a failed node would be to download the whole file on the new replacement node,

4 d x n+ (d ) x n+ x n+ (d +) x n+ x n+ (d +) Fig. 3. Part of the flow graph correspondg to a DSS D(n, ), when nodes v,...,v fail successively, and are replaced by nodes v n+,...,v n+.a data collector connects to these nodes and wants to retrieve the whole file. Nodes v n+,...,v n+ shown with broen boundaries are compromised by Eve durg repair. and then generate the specific lost data. In this case, if Eve accesses the new replacement node while it is downloadg the whole file, it will be able to reconstruct the entire origal data. Hence, the secrecy rate for this scheme would be zero. However, Theorem suggests that for some systems we can achieve a positive secrecy capacity. This example highlights the fact that dynamical repair of the DSS renders it trsically different from the static counterpart, and one should be careful designg the repair scheme order to safeguard the whole stored data. x n+ x n+ B. Systems Usg Random Networ Codg Usg the flow graph model, the authors of [] showed that random lear networ codes over a large fite field can achieve any pot (, γ), on the optimal storage-repair bandwidth tradeoff curve with a high probability. Consider an example of random lear networ code used a compromised DSS D(4, 3), which stores R = 6 symbols and operates at d =3, =, and =3. In this case, each of the itial nodes v,...,v 4 stores 3 dependently generated random lear combations of these R =6symbols. Assume now that node v 4 fails and is replaced by a new node v 5 that connects to v,v, and v 3, and downloads from each one of them =random lear combation of their stored data. Assume that after some time, node v 5 fails and is replaced by node v 6 a similar fashion. Now, if =, and Eve accesses nodes v 5 and v 6 while they were beg repaired, it will observe 6 lear combations of the origal data symbols, which, with high probability are learly dependent. Therefore, she will be able to reconstruct the whole file. The above analysis shows that, when random networ codg is used, it is not possible to achieve a positive secrecy rate for this system, even with pre-processg at the source, usg for example Maximum Ran Distance (MRD) codes [5]. But accordg to Theorem, which we prove section VI, the secrecy capacity of the the above DSS D(4, 3) is equal to one unit when =. This is also contrast with the case of multicast networs with compromised edges stead of nodes [3], where, random networ codg can perform as good as x n+ any determistic secure code [5]. V. UPPER BOUND ON SECRECY CAPACITY In this section we derive the upper bound of Theorem. Consider a DSS D(n, ) with <. Assume that the nodes v,v,...,v have failed consecutively, and were replaced durg the repair process by the nodes v n+,v n+,...,v n+ respectively as shown Fig. 3. Now suppose that Eve accesses nodes E = {v n+,v n+,...,v n+ } while they were beg repaired, and consider a data collector connected to the nodes B = {v n+,v n+,...,v n+ }. The reconstruction property implies H(S C B )=0by Eq. (), and the perfect secrecy condition implies H(S D E ) = H(S) by Eq. (). We can therefore write H(S) =H(S D E ) H(S C B ) () H(S C E ) H(S C B ) () = H(S C E ) H(S C E,C B\E ) = I(S, C B\E C E ) H(C B\E C E ) = H(C n+i C n+,...,c n+i ) (3) m{(d i + ),}. Inequality () follows from the fact that the stored data C E is a function of the downloaded data D E, () from, C B\E := {C n++,...,c n+ }, (3) follows from the fact that each node can store at most units, and for each replacement node we have H(C i ) H(D i ) d, also from the topology of the networ (see Fig. 3). Note that each node x n+i is connected to each of the nodes x n+,...,x n+i by an edge of capacity. The upper bound of Theorem follows then directly from the defition of Eq. (3). VI. SECRECY CAPACITY IN THE BANDWIDTH-LIMITED REGIME A. Example Consider aga the DSS D(4, 3) with =3,d=3, =, and = of Section IV-B, for which the secrecy rate usg random lear networ codg was shown to be 0. The upper bound on the secrecy capacity of this system given by Theorem is. We provide a scheme that achieves this upper bound. The proposed code is depicted Fig. 4 and consists of the concatenation of an MDS coset code [8] with a special repetition code that was troduced [9] by Rashmi et al. for constructg exact regeneration codes. Let S F q denote the formation symbol to be securely stored on the system. S is encoded usg the er MDS code to a codeword (Z, K,K,...,K 5 ), where K,...,K 5 are dependent random eys uniformly distributed over F q and Z = S + 5 i= K i. The encoded symbols Z, K,...,K 5 are then stored on the nodes v,...,v 4 as shown Fig. 4, followg the special repetition code of [9]. It is easy to verify that any data collector connectg to 3 nodes, observes

5 Random eys K,K,...,K 5 Information symbol S MDS Z, K,...,K 5 coset code Node v Node v Node v 3 Node v 4 Z Z K K K K 3 K 5 K K 3 K 4 Fig. 4. Schematic representation of the optimal code for the DSS D(4, 3) with =3, =,d=3, and =that achieves the secrecy capacity of unit. An MDS coset code taes the formation symbol S and five dependent random eys K,...,K 5, as an put and puts a parity chec symbol Z = S + 5 i= K i, along with random eys systematic form. These symbols are then stored on the DSS usg the code structure of [9]. all the symbols Z, K,...,K 5, and can therefore decode S = Z 5 i= K i. However, an eavesdropper accessg any two nodes will only observe 5 symbols of 6, and cannot ga any formation ab S. Next, we generalize this construction to obta a capacity-achievg code for the bandwidth-limited regime. B. Code Construction Our approach builds on the results of [9] where the authors constructed a family of exact regeneratg codes for d = n. The exact property of these codes allows any repair node to reconstruct and store an identical copy of the data lost upon a failure. For simplicity, we will expla the construction for =, i.e., Γ=n. For any larger values of Γ, and turn of, the file can be split to chuns, each of which can be separately encoded usg the construction correspondg to =. Choose =Γ. From [] we now that M = i= (n i) is the capacity of the above DSS the absence of any adversary ( =0). Let R := (n i) be the number of formation symbols that we would lie to store securely on the DSS, and θ := n(n ). Let S = (s,...,s R ) F R q denote the formation file and K =(K,...,K M R ) F M R q denote M R dependent random eys each uniformly distributed over F q. Then, the proposed code consists of an er nested (θ, M) MDS coset code [7] which taes S and K as an put, and puts X =(x,...,x θ ), such that X = KG K + SG S, GK where G = is a generator matrix of a (θ, M) MDS G S code, and G K itself is a generator matrix for a (θ, M R) MDS code. The formation vector S effectively selects the coset of the MDS code generated by G K. This er (θ, M) MDS code is then followed by the special repetition code troduced [9] which stores the codeword X on the DSS. The procedure of constructg this ner code can be described usg an auxiliary complete graph over n vertices u,...,u n that consists of θ edges. Suppose the edges are dexed by the coded symbols x,...,x θ. The code then consists of storg on node v i the dices of the edges adjacent to vertex u i the complete graph. Consequently, every coded symbol x i is stored on exactly two storage nodes, and any pair of two storage nodes have exactly one distct coded symbol common, e.g., code Fig. 4 for n =4. This ner code transforms the dynamic storage system to K 4 K 5 an equivalent static pot-to-pot channel. First notice that = Γ, hence all the data downloaded durg the repair process, i.e., d = Γ, is stored on the new replacement node with any further compression. Thus, accessg a node durg repair process, i.e., observg its downloaded data, is equivalent to accessg it after the repair process, i.e., observg its stored data. Second, the exact regeneration codes restore a failed node with the exact lost data. So, even though there are failures and repairs, the data storage system loos exactly the same at any pot of time. Any data collector downloads M symbols of x,...,x θ by connectg to nodes. Moreover, any eavesdropper can observe µ = i= (n i) =M R symbols. Thus, the system becomes similar to the erasure-erasure wiretap channel-ii of parameters (θ, M, µ). Therefore, sce the er code is a nested MDS code, from [7] we now that it can achieve the secrecy capacity of M µ = M (M R) = R = (n i) of the correspondg erasure-erasure wiretap channel. This rate is achieved for every unit of. Thus, the total secrecy rate achieved for =Γ/(n ) is Γ (n i) VII. CONCLUSION n. In this paper we considered dynamic distributed data storage systems that are subject to eavesdroppg. Our ma objective was to determe the secrecy capacity of such systems, i.e., the maximum amount of data that these systems can store and deliver to data collectors, with revealg any formation to the eavesdropper. Modelg such systems as multicast networs with compromised nodes, we gave an upper bound on the secrecy capacity, and showed that it can be achieved the important bandwidth-limited regime where the nodes have sufficient storage capacity. Fdg the general expression of the secrecy capacity of distributed storage systems, and more generally of multicast networs with a fixed number of compromised nodes, remas an open problem that we hope to address future wor. REFERENCES [] S. Rhea, C. Wells, P. Eaton, D. Geels, B. Zhao, H. Weatherspoon, and J. Kubiatowicz, Matenance-free global data storage, IEEE Internet Computg, pp , 00. [] A. Dimais, P. Godfrey, Y. Wu, M. Waright, and K. Ramchandran, Networ codg for distributed storage systems, to appear IEEE Trans. Inform. Theory. [3] N. Cai and R. W. Yeung, Secure networ codg, Proc. IEEE Int. Symp. Inf. Theory (ISIT), 00. [4] S. El Rouayheb and E. Soljan, On wiretap networs II, Proc. IEEE Int. Symp. Inf. Theory (ISIT), (Nice, France), 007. [5] D. Silva and F. Kschischang, Security for wiretap networs via ranmetric codes, Proc. IEEE Int. Symp. Inf. Theory (ISIT), 008. [6] R. Yeung, S.-Y. Li, and N. Cai, Networ Codg Theory (Foundations and Trends Communications and Information Theory). Now Publishers Inc, 006. [7] S. Arunumar and S. W. Mclaughl, MDS codes on erasure-erasure wire-tap channel, arxiv: v, 009. [8] L. H. Ozarow and A. D. Wyner, Wire-tap channel-ii, AT&T Bell lab tech. journal vol. 63, no. 0, 984. [9] K. Rashmi, N. B. Shah, P. V. Kumar, and K. Ramchandran, Exact regeneratg codes for distributed storage, Allerton Conference on Control, Computg, and Communication, Urbana-Champaign, IL, 009. In the erasure-erasure wiretap channel-ii of parameters (θ, M, µ), the transmitter sends θ symbols. A legitimate receiver and an eavesdropper receive M and µ symbols respectively through dependent erasure channels [7].

On Secure Distributed Data Storage Under Repair Dynamics

On Secure Distributed Data Storage Under Repair Dynamics On Secure Distributed Data Storage Under Repair Dynamics Sameer Pawar Salim El Rouayheb Kannan Ramchandran Electrical Engeerg and Computer Sciences University of California at Berkeley Technical Report

More information

Fractional Repetition Codes for Repair in Distributed Storage Systems

Fractional Repetition Codes for Repair in Distributed Storage Systems Fractional Repetition Codes for Repair in Distributed Storage Systems Salim El Rouayheb and Kannan Ramchandran Department of Electrical Engineering and Computer Sciences University of California, Bereley

More information

Information-theoretically Secure Regenerating Codes for Distributed Storage

Information-theoretically Secure Regenerating Codes for Distributed Storage Information-theoretically Secure Regenerating Codes for Distributed Storage Nihar B. Shah, K. V. Rashmi and P. Vijay Kumar Abstract Regenerating codes are a class of codes for distributed storage networks

More information

Enabling Node Repair in Any Erasure Code for Distributed Storage

Enabling Node Repair in Any Erasure Code for Distributed Storage Enabling Node Repair in Any Erasure Code for Distributed Storage K. V. Rashmi, Nihar B. Shah, and P. Vijay Kumar, Fellow, IEEE Abstract Erasure codes are an efficient means of storing data across a network

More information

SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES

SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES SCALING UP OF E-MSR CODES BASED DISTRIBUTED STORAGE SYSTEMS WITH FIXED NUMBER OF REDUNDANCY NODES Haotian Zhao, Yinlong Xu and Liping Xiang School of Computer Science and Technology, University of Science

More information

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks

Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Exact Optimized-cost Repair in Multi-hop Distributed Storage Networks Majid Gerami, Ming Xiao Communication Theory Lab, Royal Institute of Technology, KTH, Sweden, E-mail: {gerami, mingx@kthse arxiv:14012774v1

More information

Regenerating Codes for Errors and Erasures in Distributed Storage

Regenerating Codes for Errors and Erasures in Distributed Storage Regenerating Codes or Errors and Erasures in Distributed Storage K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE, and P Vijay Kumar, Fellow, IEEE arxiv:0050v csit] 3 May 0 Abstract Regenerating

More information

Private Information Retrieval from MDS Coded Data in Distributed Storage Systems

Private Information Retrieval from MDS Coded Data in Distributed Storage Systems Private Information Retrieval from MDS Coded Data in Distributed Storage Systems Razan Tajeddine Salim El Rouayheb ECE Department IIT Chicago Emails: rtajeddi@hawiitedu salim@iitedu arxiv:160201458v1 [csit]

More information

Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration

Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration Minimization of Storage Cost in Distributed Storage Systems with Repair Consideration Quan Yu Department of Electronic Engineering City University of Hong Kong Email: quanyu2@student.cityu.edu.hk Kenneth

More information

An Improvement of Quasi-cyclic Minimum Storage Regenerating Codes for Distributed Storage

An Improvement of Quasi-cyclic Minimum Storage Regenerating Codes for Distributed Storage An Improvement of Quasi-cyclic Minimum Storage Regenerating Codes for Distributed Storage Chenhui LI*, Songtao LIANG* * Shanghai Key Laboratory of Intelligent Information Processing, Fudan University,

More information

7.3.3 A Language With Nested Procedure Declarations

7.3.3 A Language With Nested Procedure Declarations 7.3. ACCESS TO NONLOCAL DATA ON THE STACK 443 7.3.3 A Language With Nested Procedure Declarations The C family of languages, and many other familiar languages do not support nested procedures, so we troduce

More information

On Coding Techniques for Networked Distributed Storage Systems

On Coding Techniques for Networked Distributed Storage Systems On Coding Techniques for Networked Distributed Storage Systems Frédérique Oggier frederique@ntu.edu.sg Nanyang Technological University, Singapore First European Training School on Network Coding, Barcelona,

More information

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction

Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 57, NO 8, AUGUST 2011 5227 Optimal Exact-Regenerating Codes for Distributed Storage at the MSR and MBR Points via a Product-Matrix Construction K V Rashmi,

More information

Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13

Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13 Network Coding for Distributed Storage Systems* Presented by Jayant Apte ASPITRG 7/9/13 & 7/11/13 *Dimakis, A.G.; Godfrey, P.B.; Wu, Y.; Wainwright, M.J.; Ramchandran, K. "Network Coding for Distributed

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email: mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006

2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 2386 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 6, JUNE 2006 The Encoding Complexity of Network Coding Michael Langberg, Member, IEEE, Alexander Sprintson, Member, IEEE, and Jehoshua Bruck,

More information

A Genetic Algorithm for the Number Partitioning Problem

A Genetic Algorithm for the Number Partitioning Problem A Algorithm for the Number Partitiong Problem Jordan Junkermeier Department of Computer Science, St. Cloud State University, St. Cloud, MN 5631 USA Abstract The Number Partitiong Problem (NPP) is an NPhard

More information

Global Optimization of Integrated Transformers for High Frequency Microwave Circuits Using a Gaussian Process Based Surrogate Model

Global Optimization of Integrated Transformers for High Frequency Microwave Circuits Using a Gaussian Process Based Surrogate Model Global Optimization of Integrated Transformers for High Frequency Microwave Circuits Usg a Gaussian Process Based Surrogate Model Bo Liu, Yg He, Patrick Reynaert, Georges Gielen ESAT-MICAS, Katholieke

More information

Cost-Bandwidth Tradeoff In Distributed Storage Systems

Cost-Bandwidth Tradeoff In Distributed Storage Systems Cost-Bandwidth Tradeoff In Distributed Storage Systems Soroush Ahlaghi, Abbas Kiani and ohammad Reza Ghanavati Department of Electrical Engineering Shahed University Tehran, Iran Email: {ahlaghi,aiani,ghanavati}@shahedacir

More information

ARELAY network consists of a pair of source and destination

ARELAY network consists of a pair of source and destination 158 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 55, NO 1, JANUARY 2009 Parity Forwarding for Multiple-Relay Networks Peyman Razaghi, Student Member, IEEE, Wei Yu, Senior Member, IEEE Abstract This paper

More information

BASIC Regenerating Code: Binary Addition and Shift for Exact Repair

BASIC Regenerating Code: Binary Addition and Shift for Exact Repair BASIC Regenerating Code: Binary Addition and Shift for Exact Repair Hanxu Hou, Kenneth W. Shum, Minghua Chen and Hui Li Shenzhen Eng. Lab of Converged Networks Technology, Shenzhen Key Lab of Cloud Computing

More information

Data Center Network Topologies using Optical Packet Switches

Data Center Network Topologies using Optical Packet Switches 1 Data Center Network Topologies usg Optical Packet Yuichi Ohsita, Masayuki Murata Graduate School of Economics, Osaka University Graduate School of Information Science and Technology, Osaka University

More information

Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions

Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions 2134 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 58, NO 4, APRIL 2012 Interference Alignment in Regenerating Codes for Distributed Storage: Necessity and Code Constructions Nihar B Shah, K V Rashmi, P

More information

Synchronizing Edits in Distributed Storage Networks

Synchronizing Edits in Distributed Storage Networks Synchronizing Edits in Distributed Storage Networks Salim El Rouayheb, Sreechakra Goparaju, Han Mao Kiah, Olgica Milenkovic Department of Electrical and Computer Engineering, Illinois Institute of Technology,

More information

On Secret Sharing Schemes based on Regenerating Codes

On Secret Sharing Schemes based on Regenerating Codes On Secret Sharing Schemes base on Regenerating Coes Masazumi Kurihara (University of Electro-Communications) 0 IEICE General Conference Okayama Japan 0- March 0. (Proc. of 0 IEICE General Conference AS--

More information

Thick separators. Luc Jaulin and Benoît Desrochers. Lab-STICC, ENSTA Bretagne, Brest, France

Thick separators. Luc Jaulin and Benoît Desrochers. Lab-STICC, ENSTA Bretagne, Brest, France Thick separators Luc Jaul and Benoît Desrochers Lab-TICC, ENTA Bretagne, Brest, France Abstract. If an terval of R is an uncerta real number, a thick set is an uncerta subset of R n. More precisely, a

More information

Cooperative Pipelined Regeneration in Distributed Storage Systems

Cooperative Pipelined Regeneration in Distributed Storage Systems Cooperative ipelined Regeneration in Distributed Storage Systems Jun Li, in Wang School of Computer Science Fudan University, China Baochun Li Department of Electrical and Computer Engineering University

More information

Coded Cooperative Data Exchange for Multiple Unicasts

Coded Cooperative Data Exchange for Multiple Unicasts Coded Cooperative Data Exchange for Multiple Unicasts Shahriar Etemadi Tajbakhsh and Parastoo Sadeghi Research School of Engineering The Australian National University Canberra, 000, Australia Emails:

More information

Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching

Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching Cache-Aided Private Information Retrieval with Partially Known Uncoded Prefetching Yi-Peng Wei Karim Banawan Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College

More information

Scheduling Unsplittable Flows Using Parallel Switches

Scheduling Unsplittable Flows Using Parallel Switches Scheduling Unsplittable Flows Using Parallel Switches Saad Mneimneh, Kai-Yeung Siu Massachusetts Institute of Technology 77 Massachusetts Avenue Room -07, Cambridge, MA 039 Abstract We address the problem

More information

15-451/651: Design & Analysis of Algorithms November 20, 2018 Lecture #23: Closest Pairs last changed: November 13, 2018

15-451/651: Design & Analysis of Algorithms November 20, 2018 Lecture #23: Closest Pairs last changed: November 13, 2018 15-451/651: Design & Analysis of Algorithms November 20, 2018 Lecture #23: Closest Pairs last changed: November 13, 2018 1 Prelimaries We ll give two algorithms for the followg closest pair problem: Given

More information

Broadcast Repair for Wireless Distributed Storage Systems

Broadcast Repair for Wireless Distributed Storage Systems Broadcast Repair for Wireless Distributed Storage Systems Ping Hu Department of Electronic Engineering City University of Hong Kong Email: ping.hu@my.cityu.edu.hk Chi Wan Sung Department of Electronic

More information

A Unified Coding Framework for Distributed Computing with Straggling Servers

A Unified Coding Framework for Distributed Computing with Straggling Servers A Unified Coding Framewor for Distributed Computing with Straggling Servers Songze Li, Mohammad Ali Maddah-Ali, and A. Salman Avestimehr Department of Electrical Engineering, University of Southern California,

More information

Static Analysis for Fast and Accurate Design Space Exploration of Caches

Static Analysis for Fast and Accurate Design Space Exploration of Caches Static Analysis for Fast and Accurate Design Space Exploration of Caches Yun iang, Tulika Mitra Department of Computer Science National University of Sgapore {liangyun,tulika}@comp.nus.edu.sg ABSTRACT

More information

Duality for Simple Multiple Access Networks

Duality for Simple Multiple Access Networks Duality for Simple Multiple Access Networks Iwan Duursma Department of Mathematics and Coordinated Science Laboratory U of Illinois at Urbana-Champaign DIMACS Workshop on Network Coding December 15-17,

More information

Network Codes for Next-Generation Distributed Storage:! Opportunities & Challenges. Kannan Ramchandran

Network Codes for Next-Generation Distributed Storage:! Opportunities & Challenges. Kannan Ramchandran Network Codes for Next-Generation Distributed Storage:! Opportunities & Challenges Kannan Ramchandran University of California, Berkeley Joint work with: Salim El Rouayheb (UCB), Hao Zhang (UCB), Sameer

More information

Multi-Cluster Interleaving on Paths and Cycles

Multi-Cluster Interleaving on Paths and Cycles Multi-Cluster Interleaving on Paths and Cycles Anxiao (Andrew) Jiang, Member, IEEE, Jehoshua Bruck, Fellow, IEEE Abstract Interleaving codewords is an important method not only for combatting burst-errors,

More information

A Connection between Network Coding and. Convolutional Codes

A Connection between Network Coding and. Convolutional Codes A Connection between Network Coding and 1 Convolutional Codes Christina Fragouli, Emina Soljanin christina.fragouli@epfl.ch, emina@lucent.com Abstract The min-cut, max-flow theorem states that a source

More information

Private Information Retrieval with Side Information: the Single Server Case

Private Information Retrieval with Side Information: the Single Server Case Private Information Retrieval with Side Information: the Single Server Case Swanand adhe, Brenden Garcia, Anoosheh Heidarzadeh, Salim El Rouayheb, and Alex Sprintson Abstract We study the problem of Private

More information

Max-Flow Protection using Network Coding

Max-Flow Protection using Network Coding Max-Flow Protection using Network Coding Osameh M. Al-Kofahi Department of Computer Engineering Yarmouk University, Irbid, Jordan Ahmed E. Kamal Department of Electrical and Computer Engineering Iowa State

More information

A New Combinatorial Design of Coded Distributed Computing

A New Combinatorial Design of Coded Distributed Computing A New Combinatorial Design of Coded Distributed Computing Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT, USA

More information

Fountain Codes Based on Zigzag Decodable Coding

Fountain Codes Based on Zigzag Decodable Coding Fountain Codes Based on Zigzag Decodable Coding Takayuki Nozaki Kanagawa University, JAPAN Email: nozaki@kanagawa-u.ac.jp Abstract Fountain codes based on non-binary low-density parity-check (LDPC) codes

More information

Edge Eavesdropping Games

Edge Eavesdropping Games Edge Eavesdropping Games Amos Beimel 1, and Matthew Franklin 2, 1 Department of Computer Science, Ben-Gurion University. 2 Department of Computer Science, University of California, Davis. Abstract. Motivated

More information

AVALANCHE: A NETWORK CODING ANALYSIS

AVALANCHE: A NETWORK CODING ANALYSIS COMMUNICATIONS IN INFORMATION AND SYSTEMS c 2007 International Press Vol. 7, No. 4, pp. 353-358, 2007 003 AVALANCHE: A NETWORK CODING ANALYSIS RAYMOND W. YEUNG Abstract. In this paper, we study the application

More information

Coding Techniques for Distributed Storage Systems

Coding Techniques for Distributed Storage Systems Coding Techniques for Distributed Storage Systems Jung-Hyun Kim, {jh.kim06}@yonsei.ac.kr, Hong-Yeop Song Yonsei Univ. Seoul, KORE 3 rd CITW, Oct. 25. 1, 2013 Contents Introduction Codes for Distributed

More information

Strong Dominating Sets of Direct Product Graph of Cayley Graphs with Arithmetic Graphs

Strong Dominating Sets of Direct Product Graph of Cayley Graphs with Arithmetic Graphs International Journal of Applied Information Systems (IJAIS) ISSN : 9-088 Volume No., June 01 www.ijais.org Strong Domatg Sets of Direct Product Graph of Cayley Graphs with Arithmetic Graphs M. Manjuri

More information

Optimization of Test/Diagnosis/Rework Location(s) and Characteristics in Electronic Systems Assembly Using Real-Coded Genetic Algorithms

Optimization of Test/Diagnosis/Rework Location(s) and Characteristics in Electronic Systems Assembly Using Real-Coded Genetic Algorithms Proceedgs of the International Test Conference, October 3 Optimization of Test/Diagnosis/Rework Location(s) and Characteristics Electronic Systems Assembly Usg Real-Coded Genetic Algorithms Zhen Shi and

More information

Codes for distributed storage from 3 regular graphs

Codes for distributed storage from 3 regular graphs Codes for distributed storage from 3 regular graphs Shuhong Gao, Fiona Knoll, Felice Manganiello, and Gretchen Matthews Clemson University arxiv:1610.00043v1 [cs.it] 30 Sep 2016 October 4, 2016 Abstract

More information

When Locally Repairable Codes Meet Regenerating Codes What If Some Helpers Are Unavailable

When Locally Repairable Codes Meet Regenerating Codes What If Some Helpers Are Unavailable When Locally Repairable Codes Meet Regenerating Codes What If Some Helpers Are Unavailable Imad Ahmad, Chih-Chun Wang; {ahmadi,chihw}@purdue.edu School of Electrical and Computer Engineering, Purdue University,

More information

Fuzzy Systems. Fuzzy Systems in Knowledge Engineering. Chapter 4. Christian Jacob. 4. Fuzzy Systems. Fuzzy Systems in Knowledge Engineering

Fuzzy Systems. Fuzzy Systems in Knowledge Engineering. Chapter 4. Christian Jacob. 4. Fuzzy Systems. Fuzzy Systems in Knowledge Engineering Chapter 4 Fuzzy Systems Knowledge Engeerg Fuzzy Systems Christian Jacob jacob@cpsc.ucalgary.ca Department of Computer Science University of Calgary [Kasabov, 1996] Fuzzy Systems Knowledge Engeerg [Kasabov,

More information

Cascaded Coded Distributed Computing on Heterogeneous Networks

Cascaded Coded Distributed Computing on Heterogeneous Networks Cascaded Coded Distributed Computing on Heterogeneous Networks Nicholas Woolsey, Rong-Rong Chen, and Mingyue Ji Department of Electrical and Computer Engineering, University of Utah Salt Lake City, UT,

More information

3. Sequential Logic 1

3. Sequential Logic 1 Chapter 3: Sequential Logic 1 3. Sequential Logic 1 It's a poor sort of memory that only works backward. Lewis Carroll (1832-1898) All the Boolean and arithmetic chips that we built previous chapters were

More information

Device-to-Device Networking Meets Cellular via Network Coding

Device-to-Device Networking Meets Cellular via Network Coding Device-to-Device Networking Meets Cellular via Network Coding Yasaman Keshtkarjahromi, Student Member, IEEE, Hulya Seferoglu, Member, IEEE, Rashid Ansari, Fellow, IEEE, and Ashfaq Khokhar, Fellow, IEEE

More information

About coding style Spring February 9, 2004

About coding style Spring February 9, 2004 About codg style 15-212 Sprg 2004 February 9, 2004 Contents 1 Correctness 2 2 Specification 2 3 Style 2 3.1 if-then- Expressions... 3 3.1.1 Boolean if-then- Expressions... 3 3.1.2 if-then- stead of Pattern

More information

Data Integrity Protection scheme for Minimum Storage Regenerating Codes in Multiple Cloud Environment

Data Integrity Protection scheme for Minimum Storage Regenerating Codes in Multiple Cloud Environment International Journal of Advanced Research in Computer Engineering & Technology (IJARCET) Data Integrity Protection scheme for Minimum Storage Regenerating Codes in Multiple Cloud Environment Saravana

More information

Enhancement in Weighted PageRank Algorithm Using VOL

Enhancement in Weighted PageRank Algorithm Using VOL IOSR Journal of Computer Engeerg (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 14, Issue 5 (Sep. - Oct. 2013), PP 135-141 Enhancement Weighted PageRank Algorithm Usg VOL Sonal Tuteja 1 1 (Software

More information

EECS 121: Coding for Digital Communication & Beyond Fall Lecture 22 December 3. Introduction

EECS 121: Coding for Digital Communication & Beyond Fall Lecture 22 December 3. Introduction EECS 121: Coding for Digital Communication & Beyond Fall 2013 Lecture 22 December 3 Lecturer: K. V. Rashmi Scribe: Ajay Shanker Tripathi 22.1 Context Introduction Distributed storage is a deeply relevant

More information

Cache-Aided Private Information Retrieval with Unknown and Uncoded Prefetching

Cache-Aided Private Information Retrieval with Unknown and Uncoded Prefetching Cache-Aided Private Information Retrieval with Unknown and Uncoded Prefetching Yi-Peng Wei Karim Banawan Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College

More information

Scheduling complex streaming applications on the Cell processor. LIP Research Report RR-LIP

Scheduling complex streaming applications on the Cell processor. LIP Research Report RR-LIP Schedulg complex streamg applications on the Cell processor Matthieu Gallet 1,3,4 Mathias Jacquel 1,3,4 Loris Marchal 2,4 1 ENS Lyon 2 CNRS 3 Université de Lyon 4 LIP laboratory, UMR 5668, ENS Lyon CNRS

More information

Reviewing High-Radix Signed-Digit Adders

Reviewing High-Radix Signed-Digit Adders .9/TC.4.39678, IEEE Transactions on Computers Reviewg High-Radix Signed-Digit s Peter Kornerup University of Shern Denmark Abstract Higher radix values of the form β = r have been employed traditionally

More information

Graph based codes for distributed storage systems

Graph based codes for distributed storage systems /23 Graph based codes for distributed storage systems July 2, 25 Christine Kelley University of Nebraska-Lincoln Joint work with Allison Beemer and Carolyn Mayer Combinatorics and Computer Algebra, COCOA

More information

Adaptive Linear Programming Decoding of Polar Codes

Adaptive Linear Programming Decoding of Polar Codes Adaptive Linear Programming Decoding of Polar Codes Veeresh Taranalli and Paul H. Siegel University of California, San Diego, La Jolla, CA 92093, USA Email: {vtaranalli, psiegel}@ucsd.edu Abstract Polar

More information

DRESS Code For The Storage Cloud

DRESS Code For The Storage Cloud DRESS Code For The Storage Cloud Distributed Replication-based Exact Simple Storage Salim El Rouayheb EECS Department University of California, Berkeley Joint work with: Sameer Pawar Nima Noorshams Prof.

More information

15-451/651: Design & Analysis of Algorithms April 18, 2016 Lecture #25 Closest Pairs last changed: April 18, 2016

15-451/651: Design & Analysis of Algorithms April 18, 2016 Lecture #25 Closest Pairs last changed: April 18, 2016 15-451/651: Design & Analysis of Algorithms April 18, 2016 Lecture #25 Closest Pairs last changed: April 18, 2016 1 Prelimaries We ll give two algorithms for the followg closest pair proglem: Given n pots

More information

Towards Control of Evolutionary Games on Networks

Towards Control of Evolutionary Games on Networks 53rd IEEE Conference on Decision and Control December 15-17, 2014. Los Angeles, California, USA Towards Control of Evolutionary Games on Networks James R. Riehl and Mg Cao Abstract We vestigate a problem

More information

Check-hybrid GLDPC Codes Without Small Trapping Sets

Check-hybrid GLDPC Codes Without Small Trapping Sets Check-hybrid GLDPC Codes Without Small Trapping Sets Vida Ravanmehr Department of Electrical and Computer Engineering University of Arizona Tucson, AZ, 8572 Email: vravanmehr@ece.arizona.edu David Declercq

More information

Group Secret Key Generation Algorithms

Group Secret Key Generation Algorithms Group Secret Key Generation Algorithms Chunxuan Ye and Alex Reznik InterDigital Communications Corporation King of Prussia, PA 9406 Email: {Chunxuan.Ye, Alex.Reznik}@interdigital.com arxiv:cs/07024v [cs.it]

More information

Min-Cost Multicast Networks in Euclidean Space

Min-Cost Multicast Networks in Euclidean Space Min-Cost Multicast Networks in Euclidean Space Xunrui Yin, Yan Wang, Xin Wang, Xiangyang Xue School of Computer Science Fudan University {09110240030,11110240029,xinw,xyxue}@fudan.edu.cn Zongpeng Li Dept.

More information

An example DFA: reaching definitions

An example DFA: reaching definitions Dataflow analysis: what is it? Dataflow analysis A common framework for expressg algorithms that compute formation ab a program Why is such a framework useful? Dataflow analysis: what is it? A common framework

More information

Network Image Coding for Multicast

Network Image Coding for Multicast Network Image Coding for Multicast David Varodayan, David Chen and Bernd Girod Information Systems Laboratory, Stanford University Stanford, California, USA {varodayan, dmchen, bgirod}@stanford.edu Abstract

More information

Quantized Iterative Message Passing Decoders with Low Error Floor for LDPC Codes

Quantized Iterative Message Passing Decoders with Low Error Floor for LDPC Codes Quantized Iterative Message Passing Decoders with Low Error Floor for LDPC Codes Xiaojie Zhang and Paul H. Siegel University of California, San Diego 1. Introduction Low-density parity-check (LDPC) codes

More information

sort items in each transaction in the same order in NL (d) B E B C B C E D C E A (c) 2nd scan B C E A D D Node-Link NL

sort items in each transaction in the same order in NL (d) B E B C B C E D C E A (c) 2nd scan B C E A D D Node-Link NL ppears the st I onference on Data Mg (200) LPMer: n lgorithm for Fdg Frequent Itemsets Usg Length-Decreasg Support onstrat Masakazu Seno and George Karypis Department of omputer Science and ngeerg, rmy

More information

The Encoding Complexity of Network Coding

The Encoding Complexity of Network Coding The Encoding Complexity of Network Coding Michael Langberg Alexander Sprintson Jehoshua Bruck California Institute of Technology Email mikel,spalex,bruck @caltech.edu Abstract In the multicast network

More information

An XML Viewer for Tabular Forms for use with Mechanical Documentation

An XML Viewer for Tabular Forms for use with Mechanical Documentation An XML Viewer for Tabular Forms for use with Mechanical Documentation Osamu Inoue and Kensei Tsuchida Dept. Information & Computer Sciences Toyo University 2100, Kujirai, Kawagoe Saitama, 350-8585, Japan

More information

Memory Placement in Network Compression: Line and Grid Topologies

Memory Placement in Network Compression: Line and Grid Topologies ISITA212, Honolulu, Hawaii, USA, October 28-31, 212 Memory Placement in Network Compression: Line and Grid Topologies Mohsen Sardari, Ahmad Beirami, Faramarz Fekri School of Electrical and Computer Engineering,

More information

Source Coding with Distortion through Graph Coloring

Source Coding with Distortion through Graph Coloring Source Coding with Distortion through Graph Coloring Vishal Doshi, Devavrat Shah, and Muriel Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge, MA 02139

More information

Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes

Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Benefits of Coded Placement for Networks with Heterogeneous Cache Sizes Abdelrahman M. Ibrahim, Ahmed A. Zewail, and Aylin Yener ireless Communications and Networking Laboratory CAN Electrical Engineering

More information

A Consistent Design Methodology to Meet SDR Challenges

A Consistent Design Methodology to Meet SDR Challenges Published the proceedgs of Wireless World Research Forum, Zurich, 2003 A Consistent Design Methodology to Meet SDR Challenges M. Holzer, P. Belanović, and M. Rupp Vienna University of Technology Institute

More information

INTERLEAVING codewords is an important method for

INTERLEAVING codewords is an important method for IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 2, FEBRUARY 2005 597 Multicluster Interleaving on Paths Cycles Anxiao (Andrew) Jiang, Member, IEEE, Jehoshua Bruck, Fellow, IEEE Abstract Interleaving

More information

Efficiently decodable insertion/deletion codes for high-noise and high-rate regimes

Efficiently decodable insertion/deletion codes for high-noise and high-rate regimes Efficiently decodable insertion/deletion codes for high-noise and high-rate regimes Venkatesan Guruswami Carnegie Mellon University Pittsburgh, PA 53 Email: guruswami@cmu.edu Ray Li Carnegie Mellon University

More information

Codes for Modern Applications

Codes for Modern Applications Codes for Modern Applications Current Research Topics in the Code and Signal Design Group P. Vijay Kumar Indian Institute of Science, Bangalore, India Nov. 16, 2018 1/28 Codes for Modern Applications:

More information

COP-5555 PROGRAMMING LANGUAGEPRINCIPLES NOTES ON RPAL

COP-5555 PROGRAMMING LANGUAGEPRINCIPLES NOTES ON RPAL COP-5555 PROGRAMMING LANGUAGEPRINCIPLES NOTES ON 1. Introduction is a subset of PAL, the Pedagogic Algorithmic Language. There are three versions of PAL:, LPAL, and JPAL. The only one of terest here is.

More information

Construction C : an inter-level coded version of Construction C

Construction C : an inter-level coded version of Construction C Construction C : an inter-level coded version of Construction C arxiv:1709.06640v2 [cs.it] 27 Dec 2017 Abstract Besides all the attention given to lattice constructions, it is common to find some very

More information

Secret Sharing Across a Network with Low Communication Cost: Distributed Algorithm and Bounds

Secret Sharing Across a Network with Low Communication Cost: Distributed Algorithm and Bounds Secret Sharing Across a Network with Low Communication Cost: istributed Algorithm and Bounds Nihar B. Shah, K. V. Rashmi and Kannan Ramchandran, Fellow, IEEE epartment of Electrical Engineering and Computer

More information

Novel Decentralized Coded Caching through Coded Prefetching

Novel Decentralized Coded Caching through Coded Prefetching ovel Decentralized Coded Caching through Coded Prefetching Yi-Peng Wei Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland College Park, MD 2072 ypwei@umd.edu ulukus@umd.edu

More information

Formal Reasoning about Communication Systems II

Formal Reasoning about Communication Systems II Formal Reasong about Communication Systems II Automated Fast-Track Reconfiguration Christoph Kreitz Abstract. We present formal techniques for improvg the performance of group communication systems built

More information

Math 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus)

Math 302 Introduction to Proofs via Number Theory. Robert Jewett (with small modifications by B. Ćurgus) Math 30 Introduction to Proofs via Number Theory Robert Jewett (with small modifications by B. Ćurgus) March 30, 009 Contents 1 The Integers 3 1.1 Axioms of Z...................................... 3 1.

More information

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition.

Matching Algorithms. Proof. If a bipartite graph has a perfect matching, then it is easy to see that the right hand side is a necessary condition. 18.433 Combinatorial Optimization Matching Algorithms September 9,14,16 Lecturer: Santosh Vempala Given a graph G = (V, E), a matching M is a set of edges with the property that no two of the edges have

More information

Symmetric Private Information Retrieval For MDS Coded Distributed Storage

Symmetric Private Information Retrieval For MDS Coded Distributed Storage Symmetric Private Information Retrieval For DS Coded Distributed Storage Qiwen Wang, and ikael Skoglund School of Electrical Engineering, KTH Royal Institute of Technology Email: {qiwenw, skoglund}@kthse

More information

Lisbon Mobility Simulations for Performance Evaluation of Mobile Networks

Lisbon Mobility Simulations for Performance Evaluation of Mobile Networks Lisbon Mobility Simulations for Performance Evaluation of Mobile Networks Pedro Vieira 1,3, Manuel Vieira 1,2 1 DEETC / Instituto Superior de Engenharia de Lisboa, Tel. +351 21 8317291, FAX +351 21 8317114

More information

ITERATIVE decoders have gained widespread attention

ITERATIVE decoders have gained widespread attention IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 53, NO. 11, NOVEMBER 2007 4013 Pseudocodewords of Tanner Graphs Christine A. Kelley, Member, IEEE, and Deepak Sridhara, Member, IEEE Abstract This paper presents

More information

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can

LOW-DENSITY PARITY-CHECK (LDPC) codes [1] can 208 IEEE TRANSACTIONS ON MAGNETICS, VOL 42, NO 2, FEBRUARY 2006 Structured LDPC Codes for High-Density Recording: Large Girth and Low Error Floor J Lu and J M F Moura Department of Electrical and Computer

More information

129 (2004) MATHEMATICA BOHEMICA No. 4, , Liberec

129 (2004) MATHEMATICA BOHEMICA No. 4, , Liberec 129 (2004) MATHEMATICA BOHEMICA No. 4, 393 398 SIGNED 2-DOMINATION IN CATERPILLARS, Liberec (Received December 19, 2003) Abstract. A caterpillar is a tree with the property that after deleting all its

More information

Latency Analysis for Distributed Storage

Latency Analysis for Distributed Storage Latency Analysis for Distributed Storage Parimal Parag, Archana Bura Department of Electrical Communication Engineering Indian Institute of Science, Bengaluru, KA 56002, India parimal, archanabura}@ece.iisc.ernet.in

More information

Recognizing Interval Bigraphs by Forbidden Patterns

Recognizing Interval Bigraphs by Forbidden Patterns Recognizing Interval Bigraphs by Forbidden Patterns Arash Rafiey Simon Fraser University, Vancouver, Canada, and Indiana State University, IN, USA arashr@sfu.ca, arash.rafiey@indstate.edu Abstract Let

More information

On the Improvement of Weighted Page Content Rank

On the Improvement of Weighted Page Content Rank On the Improvement of Weighted Page Content Rank Seifede Kadry and Ali Kalakech Abstract The World Wide Web has become one of the most useful formation resource used for formation retrievals and knowledge

More information

A Systematic Approach to Network Coding Problems using Conflict Graphs

A Systematic Approach to Network Coding Problems using Conflict Graphs A Systematic Approach to Network Coding Problems using Conflict Graphs Jay Kumar Sundararajan Laboratory for Information and Decision Systems Massachusetts Institute of Technology Cambridge, MA 02139,

More information

3186 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 9, SEPTEMBER Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays

3186 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 51, NO. 9, SEPTEMBER Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays 3186 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL 51, NO 9, SEPTEMBER 2005 Zero/Positive Capacities of Two-Dimensional Runlength-Constrained Arrays Tuvi Etzion, Fellow, IEEE, and Kenneth G Paterson, Member,

More information

MAXIMAL PLANAR SUBGRAPHS OF FIXED GIRTH IN RANDOM GRAPHS

MAXIMAL PLANAR SUBGRAPHS OF FIXED GIRTH IN RANDOM GRAPHS MAXIMAL PLANAR SUBGRAPHS OF FIXED GIRTH IN RANDOM GRAPHS MANUEL FERNÁNDEZ, NICHOLAS SIEGER, AND MICHAEL TAIT Abstract. In 99, Bollobás and Frieze showed that the threshold for G n,p to contain a spanning

More information

arxiv: v1 [cs.cc] 30 Jun 2017

arxiv: v1 [cs.cc] 30 Jun 2017 On the Complexity of Polytopes in LI( Komei Fuuda May Szedlá July, 018 arxiv:170610114v1 [cscc] 30 Jun 017 Abstract In this paper we consider polytopes given by systems of n inequalities in d variables,

More information