THE throughput of information transmission within a data

Size: px
Start display at page:

Download "THE throughput of information transmission within a data"

Transcription

1 IEEE TRANACTION ON INFORMATION THEORY A Constnt Bound on Throughput Improvement of Multicst Network Coding in Undirected Networks Zongpeng Li, Memer, IEEE Bochun Li, enior Memer, IEEE Lp Chi Lu Deprtment of Computer cience Dept. of Electricl & Computer Engineering Dept. of Computer cience & Engineering University of Clgry University of Toronto Chinese University of Hong Kong zongpeng@uclgry.c li@eecg.toronto.edu chi@cse.cuhk.edu.hk Astrct Recent reserch in network coding shows tht, joint considertion of oth coding nd routing strtegies my led to higher informtion trnsmission rtes thn routing only. A fundmentl question in the field of network coding is: how lrge cn the throughput improvement due to network coding e? In this pper, we prove tht in undirected networks, the rtio of chievle multicst throughput with network coding to tht without network coding is ounded y constnt rtio of 2, i.e., network coding cn t most doule the throughput. This result holds for ny undirected network topology, ny link cpcity configurtion, ny multicst group size, nd ny source informtion rte. This constnt ound 2 represents the tightest ound tht hs een proved so fr in generl undirected settings, nd is to e contrsted with the unounded potentil of network coding in improving multicst throughput in directed networks. Index Terms Network Coding, Multicst, Undirected Networks, Routing, Complexity I. INTRODUCTION THE throughput of informtion trnsmission within dt network is constrined y the network topology nd link cpcities. Trditionl techniques in improving trnsmission throughput focus on strtegiclly routing informtion flows long high ndwidth or multiple pths from the source to the destintions. Recently, it is shown tht such routing strtegies lone my not e sufficient. Rther, it is necessry to consider encoding/decoding dt on nodes in the network, in order to chieve the optiml throughput [], [2]. ince these coding opertions re not restricted to source or destintion nodes, they re referred to s network coding. A clssic exmple tht illustrtes the power of network coding is shown in Fig., where ech link hs unit cpcity. With network coding, the chievle throughput is two. Without coding, the chievle throughput is only one, if integrl routing is required, i.e., if ll link flow rtes re integers (0 or in this exmple). imilr to source ersure codes, encoding nd decoding opertions in network coding re lso defined over finite fields, which hve fixed length representtion of symols. Therefore, informtion flows do not increse in size fter eing encoded. The introduction of network coding hs essentilly expnded the ville strtegies to chieve optiml trnsmission throughput: rther thn only relying on routing strtegies, n optiml trnsmission strtegy to chieve the mximum throughput includes oth routing scheme nd corresponding coding scheme. Optiml throughput chieved Mnuscript received Ferury 2007; revised Ferury 2008; ccepted August T Fig.. A clssic exmple from []: network coding helps chieve multicst throughput of 2, in topology where ech link hs unit cpcity. with coding is lwys lower ounded y tht chieved without coding. An importnt direction in network coding reserch is to understnd nd quntify the potentil of network coding in improving end-to-end throughput of informtion trnsmission, in generl multi-hop communiction networks [3], [], [5], [6], [7], [8], [9], [0], []. In this pper, we consider undirected networks with idirectionl links. We compre the chievle throughput with coding oth routing scheme nd corresponding coding scheme. Optiml throughput chieved with coding is lwys lower ounded y tht chieved without coding. An importnt direction in network coding reserch is to understnd nd quntify the potentil of network coding in improving end-to-end throughput of informtion trnsmission, in generl multi-hop communiction networks [3], [], [5], [6], [7], [8], [9], [0], []. In this pper, we consider undirected networks with idirectionl links. We compre the chievle throughput with coding to other prmeters tht hve een previously defined to reflect communiction network s connectivity or cpcity. uch prmeters include the pcking numer (which is lso the chievle throughput without coding), strength, nd connectivity. We consider three types of communiction sessions: unicst (one-to-one), rodcst (oneto-ll) nd multicst (one-to-mny). We exmine the reltive order mong the ove four quntities, from which we derive upper ounds for the coding dvntge, i.e., the rtio of throughput improvement due to network coding. In contrst to previous work, which shows the coding dvntge is not finitely ounded in directed networks [5], [9], [2], we show tht the coding dvntge is lwys ounded y constnt fctor of two in undirected networks. Our proof holds for either frctionl routing, where informtion flows cn e split +

2 IEEE TRANACTION ON INFORMATION THEORY 2 nd merged t ritrrily fine scles, or hlf-integer routing, where ech informtion flow eing trnsmitted hs either n integer or hlf-integer rte. We extend the result to n Internet-like idirected network model, where the ound for the coding dvntge depends on how imlnced link cpcities cn e on two opposite links etween the sme pir of nodes. We lso provide rief discussions on the integrl flow model nd the hypergrph model. In ddition, we prove tht the chievle throughput, nd therefore the coding dvntge, re independent of the loction of the informtion source within the communiction group, which is unique property tht is only vlid in undirected settings. Finlly, we show tht in mny cses, including in oth directed nd undirected networks, with oth integrl nd frctionl routing, optiml throughput with network coding is much esier to compute thn optiml throughput without coding. In prticulr, the smll ounds on the coding dvntge my led to nice pproximtion lgorithms. The reminder of the pper is orgnized s follows. We introduce relted work on network coding in ec. II, prove ounds on the coding dvntge for unicst, rodcst, nd multicst in ec. III, extend the result to group communictions in ec. IV, nd to other network models in ec. V. We then discuss the coding dvntge nd complexity issues in ec. VI nd finlly conclude the pper in ec. VII. II. PREVIOU REEARCH Ahlswede et l. [] initited the study of network coding. They show exmples tht demonstrte the enefit ofnetwork coding, in terms of throughput improvement. They lso prove the fundmentl result tht, for multicst trnsmission in directed network, if rte x cn e chieved for ech receiver independently, it cn lso e chieved for the entire session. Koetter et l. [2] lso derived this result for directed cyclic networks within n lgeric frmework. They further extend the discussion to multiple trnsmissions, nd exmined the enefit of network coding in terms of roust networking. Li et l. [3] show tht liner codes suffice in chieving optiml throughput for multicst trnsmission. The ound on the necessry se field size is first given y Koetter et l. [2]. They show tht for multicst session with throughput r nd numer of receivers k, there exists solution sed on finite field GF (2 m ),forsomem log 2 (kr +). This ound is then improved y Ho et l. to m log 2 (r +) []. Li et l. [3] lso proposed the first code ssignment lgorithm, which performs n exponentil numer of vector independence tests. Jggi et l. [9] oserved tht, exploiting flow informtion in the routing strtegy drmticlly simplifies the tsk, nd designed polynomil time code ssignment lgorithm ccordingly. They lso show tht, in directed networks with integrl routing, the coding dvntge my increse proportionlly s Ω(log V ), nd therefore my e ritrrily high. Agrwl nd Chrikr [] show tht the potentil of network coding to improve throughput is equivlent to the integrlity gp of the idirected cut relxtion of the minimum teiner tree prolem. This result is relted to the ound 2 on coding dvntge proved in this pper in the following two spects. First, it provides n lterntive proof method for the ound 2 in the frctionl flow cse, since the integrlity gp of the idirected cut relxtion is ounded y the gp of the undirected relxtion of the minimum teiner tree prolem, which is known to e ounded y 2 [5], [6]. econd, it shows tht the dvntge of network coding in decresing multicst cost is lso ounded y 2 (ssuming the liner link cost model in the clssic min-cost flow literture [7]), since the minimum teiner tree IP nd its idirected cut relxtion yield the optiml cost without nd with network coding, respectively. The proof of ound 2 in this pper is comintoril in nture nd does not rely on liner progrmming techniques; it works for not only frctionl routing ut lso hlf-integer routing. Chekuri et l. studied the coding dvntge in directed networks, without the symmetricl throughput requirement on multicst receivers [5]. They demonstrte clsses of networks where the coding dvntge is ounded y 2, including networks with two unit sources, or networks with two receivers. They lso construct network pttern where the coding dvntge grows t rte Θ( V ). In this pper, we focus on undirected networks with symmetricl multicst throughput. The ound we prove holds for ny multicst throughput nd ny multicst group size. Cnnons et l. [8] nd Dougherty et l. [9] lso performed comprison studies etween network cpcity with network coding (coding cpcity) nd network cpcity with routing only (routing cpcity). In prticulr, they show tht the network cpcity is independent of the coding lphet, nd tht while routing cpcity of network is lwys chievle, coding cpcity is not. Empiricl comprisons of multicst throughput with nd without network coding cn e found in [3] nd [20]. Both comprisons suggest tht for rndom network topologies, the coding dvntge is mrginl t est. Other dvntges re suggested insted, such s ese of mngement, roustness nd ese for lgorithm design. The coding dvntge in the cse of multiple unicst sessions hs lso een exmined in recent literture. While it is known tht the coding dvntge is lrger thn for either directed networks or integrl flows, it ws conjectured y Hrvey et l. [2] nd y us [22] tht network coding does not mke difference in undirected networks with frctionl flows. This conjecture remins unsettled except for some specil network cses [6], [7], [8]. Erly network coding reserch often focus on directed cyclic networks, where the lck of cycles fcilittes the definition nd computtion of the glol coding vectors t ech network node. For converting n undirected network into directed one, our pproch in this pper is the sme s tht used in clssic network flow reserch nd tht dopted y Hrvey et l. [6] nd Krmer et l. [23]: ech undirected link uv with cpcity C(uv) is viewed s pir of directed links uv nd vu, whose cpcities C( uv) nd C( vu) cn e flexily chosen s long s C( uv)+c( vu) C(uv). For extending the definition of network coding from directed cyclic networks to generl directed networks, we refer the reders to the technique

3 IEEE TRANACTION ON INFORMATION THEORY 3 of time-prmeterized lyered grphs y Ahlswede et l. [] nd y Yeung [2]. III. FINITE BOUND ON CODING ADVANTAGE IN UNDIRECTED NETWORK Network coding introduces new dimension to the informtion trnsmission prolem. Trditionlly, only the routing dimension is considered in trnsmission strtegy; with network coding, trnsmission strtegy includes oth the routing scheme nd the coding scheme. Considering oth dimensions together is necessry to chieve the mximum informtion trnsmission rte. We use simple grph G =(V,E) to represent the topology of network, nd use function C : E Z + to denote link cpcities. However, when we study frctionl routing models, hving integer vlues in C is neither importnt nor necessry, nd we ssume C cn tke rtionl vlues too. The communiction group is M = {, T,...,T k } V, with eing the sender of the unicst, rodcst, or multicst session, y defult. In our grphicl illustrtions, terminl nodes (nodes in the communiction group) re lck, nd rely nodes (nodes not in the communiction group) re white. We focus on frctionl routing in this section, nd will extend our discussion to integrl routing lter in the pper. For integrl routing, ll link cpcities nd flow rtes hve integer vlues. For frctionl routing, we ssume link cpcities my e shred frctionlly in oth directions, nd flows cn e split nd merged t ritrrily fine scles. We use χ(n) to denote the mximum throughput of network N contining single trnsmission session. We compre χ(n) with other prmeters tht re defined to chrcterize the connectivity or cpcity of communiction network, including the pcking numer, strength nd connectivity. We study nd compre the four prmeters for unicst, rodcst, nd multicst trnsmissions, respectively. Bsed on results otined from such comprison studies, we derive ound on the coding dvntge in ech cse. We refer the reders to our previous work [20], [25] for precise liner progrmming formultions of χ(n). Pcking refers to the procedure of finding pirwise edgedisjoint su-trees of G, in ech of which the communiction group remins connected. The pcking numer of communiction network N is denoted s π(n), nd is equl to the mximum throughput without coding. The reson is tht, ech tree cn e used to trnsmit one unit informtion flow from the sender to ll receivers, therefore the pcking numer gives the mximum numer of unit informtion flows tht cn e trnsmitted. Formlly, let T denote the set of ll possile trees connecting the communiction group, then the pcking numer cn e defined using the following liner progrm: P t T f(t) Mximize uject to: j P uv t f(t) C(uv) uv f(t) 0 E t T In the LP ove, f(t) is vrile representing the mount of informtion flow one ships long tree t. One cn either require f(t) to tke integer vlues only (ssuming ll inputs in C(uv) re integers), leding to integrl pcking, or llow f(t) to tke rtionl vlues, leding to frctionl pcking. trength is kind of prtition connectivity of the network [26], nd is denoted s η(n). LetP denote ll possile wys of prtitioning N into numer of disconnected components, such tht ech component contins t lest one terminl node. Then: η(n) =min p P E c p Here E c is the set of inter-component links, nd E c = uv E c C(uv); p is the numer of components tht the network is seprted into, in p. Connectivity refers to the minimum edge connectivity etween pir of nodes in the communiction group, nd is denoted s λ(n). It is lso the minimum size of cut tht seprtes the communiction group. Fig. 2 illustrtes the concept of these four prmeters using n exmple multicst network. T T efgh cdi defh defgh cdi Pcking trength cdi fghi cegi cefgh T T + Throughput + Connectivity Fig. 2. The four prmeters of communiction network N: pcking numer π(n), throughput χ(n), strength η(n) nd connectivity λ(n). In this prticulr network with unit cpcity t ech undirected link: π(n) =.8, nine trees (ech leled with letter etween nd i ) ech of rte 0.2 cn e pcked; χ(n) =2, two unit informtion flows nd cn e delivered to ll receivers simultneously; η(n) =2, in the illustrted optiml prtition, E c p = 6 = 2; λ(n) = 2, ech pir of terminl nodes is 2-edgeconnected. + A. Unicst In n undirected network with unicst session N = {(G(V,E),C:E Z +,M = {, T } V }, the pcking numer π(n) ecomes the numer of edge-disjoint -T pths. The throughput χ(n) is the mximum informtion rte tht

4 IEEE TRANACTION ON INFORMATION THEORY cn e chieved in the T trnsmission. The strength η(n) is now minimized over ll cuts seprting nd T no vlid prtition with more thn two components exists, since ech vlid component contins t lest one terminl node nd there re two terminl nodes only in the network. The connectivity ecomes the edge-connectivity etween nd T, i.e., the minimum mount of edge cpcity one needs to remove from the network, in order to seprte nd T into disconnected components. Bsed on previous results, we cn show tht the four quntities turn out to e ll equl for unicst trnsmission: Theorem. For unicst trnsmission in n undirected network, N, π(n) =χ(n) =η(n) =λ(n). Proof: Due to the fct tht η(n) cn e minimized over simple cuts (cuts which seprtes the network into exctly two components) only, it ecomes identicl to λ(n) y definition; oth re equl to the size of the min-cut etween nd T. Furthermore, oserve tht uncoded throughput is lwys ounded y coded throughput network coding llows insted of requires coding, nd ny vlid trnsmission scheme with routing only is still vlid in the prdigm of network coding. Therefore π(n) χ(n). Next, the T informtion rte is ounded y the -T min-cut, i.e., χ(n) η(n). In order to finish the proof, it is sufficient to show π(n) =λ(n), which is implied y Menger s Theorem [27]: Let u, v e two vertices of grph G. The mximum numer of pirwise edgedisjoint u-v pths equls to the minimum numer of edges whose removl seprtes u from v in G. It follows from Theorem tht network coding is not necessry in order to chieve the mximum throughput for unicst session: Corollry. The coding dvntge for unicst session is lwys. B. Brodcst Let N = {G(V,E),C : E Z +,M = V = {, T,...,T k }} e n undirected network contining rodcst session, with eing the rodcst sender, nd ll other nodes in the network eing receivers. The pcking numer π(n) ecomes the spnning tree pcking numer, i.e., the mximum numer of pir-wise edge-disjoint spnning trees tht cn e identified in the network. A spnning tree is tree tht connects every node in the network. The throughput χ(n) is the mximum informtion rte from to every other node in the network, simultneously. The strength η(n) is still s defined; just note tht for rodcst network, every prtition is vlid, since ech component of prtition lwys contins some node from the communiction group. Connectivity λ(n) ecomes the size of the minimum simple cut of the network. The fct tht ll nodes in the network request the sme informtion leds to the following nice property for rodcst trnsmissions: Theorem 2. For rodcst trnsmission in n undirected network, N, λ(n) π(n) =χ(n) =η(n) λ(n) 2 Proof: We first show tht π(n) =χ(n) =η(n). Tutte-Nsh- Willims Theorem chrcterizes the reltionship etween integrl spnning tree pcking nd network strength [27], [28], [29]: A grph G hs x pirwise edge-disjoint spnning trees if nd only if, for every vertex prtition, there re t lest (p )x edges with endpoints in different components, where p is the numer of components in the prtition. Tutte-Nsh-Willims Theorem shows tht, for the integrl spnning tree pcking prolem, π(n) = η(n). In the frctionl flow model, one cn pply the technique of scling edge cpcities up, nd then scling the solution down ccordingly, to derive π(n) = η(n) from the integrl pcking result. Furthermore, since the spnning tree pcking numer π(n) is equl to the uncoded throughput, it cn not exceed the coded throughput χ(n), i.e. π(n) χ(n). Next, we oserve tht, if the network is prtitioned into p components, ech component not contining the source needs totl incoming edge cpcity x in order to chieve throughput x; therefore (p )x inter-component edge cpcity is required in totl. This leds to χ(n) η(n). Comining the ove results, we hve π(n) =χ(n) =η(n). We next show tht 2λ(N) π(n) nd η(n) λ(n). By definition, η(n) λ(n) holds since λ(n) cn e viewed s specil cse of η(n), where only prtitions contining two components re considered. We now prove tht 2 λ(n) χ(n), using Nsh-Willims Wek Grph Orienttion Theorem [30]: grph G hs n x-edge-connected orienttion if nd only if it is 2x-edge-connected. The wek orienttion theorem implies tht, in the frctionl model, rodcst network N lwys hs 2 λ(n)-edge-connected orienttion, i.e., n orienttion where the mx-flow etween ech pir of nodes is t lest 2λ(N). Comined with the result in directed networks, trnsmission rte tht cn e independently chieved for ech receiver cn e chieved for the entire session, this implies 2λ(N) χ(n). From Theorem 2, we cn see tht network coding hs no potentil in improving rodcst throughput either: Corollry 2. The coding dvntge for rodcst session is lwys. C. Multicst Multicst is more generl form of communiction thn oth unicst nd rodcst. A unicst session cn e viewed s specil cse of multicst, where exctly two nodes in V re in the multicst group M. A rodcst session cn lso e viewed s specil cse of multicst, where ll nodes in V re in the multicst group M. In generl, the multicst group M cn e ny suset of V tht hs size two or lrger, nd the pcking prolem ecomes teiner tree pcking. A teiner tree is sutree in the network connecting ll the terminl nodes, ech rely node my or my not pper in the tree. Theorem 3. For multicst trnsmission in n undirected network, N={G(V,E),C : E Z +,M = {, T,...,T k }

5 IEEE TRANACTION ON INFORMATION THEORY 5 V }, λ(n) π(n) χ(n) η(n) λ(n). 2 Proof: The fct tht uncoded throughput is ounded y coded throughput gin leds to π(n) χ(n). Furthermore, the prtition connectivity condition is necessry for certin throughput to e fesile in multicst networks s well, therefore χ(n) η(n). Next, η(n) λ(n) still holds due to the sme rgument s in the rodcst cse λ(n) cn e considered s specil cse of η(n) where only prtitions contining two components re llowed. We now hve π(n) χ(n) η(n) λ(n), nd need only to focus on the vlidity of 2λ(N) π(n) in the rest of the proof, which is more complex in the cse of multicst. We uild the proof of 2λ(N) π(n) in the multicst cse upon the sme result proven in the rodcst cse. More specificlly, we trnsform the multicst network into rodcst network, y eliminting the existence of rely nodes, while gurnteeing tht 2λ(N) π(n) holds fter the trnsformtion only if it holds efore it. Before descriing the trnsformtion in more detil, we first introduce Mder s Undirected plitting Theorem [30]: Let G(V + z,e) e n undirected grph so tht (V,E) is connected nd the degree d(z) is even. Then there exists complete splitting t z preserving the edge-connectivity etween ll pirs of nodes in V. A split-off opertion t node z refers to the replcement of 2-hop pth u-z-v y direct edge etween u nd v, s illustrted in Fig. 3. A complete splitting t z is the procedure of repetedly pplying split-off opertions t z until z is isolted. u Fig. 3. A split-off t node z. z v The Undirected plitting Theorem sys tht, if grph hs n even-degree non-cut node, then there exists split-off opertion t tht node, fter which the pirwise connectivities mong the other nodes remin unchnged; nd y repetedly pplying such split-off opertions t this node, one cn eventully isolte it from the rest of the grph, without ffecting the edge-connectivity of ny pir of nodes in it. Now, consider repetedly pplying one of the following two opertions on multicst network: () pply complete splitting t non-cut rely node, preserving pirwise edge connectivities mong terminl nodes in M; or(2)ddrely node tht is M-cut node into the multicst group M, i.e., chnge its role from rely node to receiver node. Here M-cut node is one whose removl seprtes the multicst group into more thn one disconnected components. Fig. illustrtes these two opertions with concrete exmple. In order to meet the even node degree requirement in the Undirected plitting Theorem, we first doule ech link u z v B A () T B () Fig.. Trnsforming multicst network into rodcst network, where the vlidity of λ(n) π(n) cn e trced ck. () The originl multicst 2 network, with unit cpcity on ech link. () The network fter pplying opertion (2), moving the M-cut node A into the multicst group. A ecomes receiver. (c) The network fter pplying opertion (). A split-off ws done t rely node B. A rodcst network is otined. cpcity in the input network, then we scle the solution down y fctor of 2 t the end. Note tht, ssuming the input network hs integer link cpcities, then ech node hs n even degree fter douling link cpcities. Furthermore, split-off opertion does not ffect the prity of the degree of ny node in the network. Therefore the Undirected plitting Theorem gurntees tht s long s there re rely nodes tht re not cut nodes, opertion () is possile. Furthermore, opertion T () does not increse π(n). Therefore, if 2λ(N) π(n) holds fter pplying opertion (), it holds efore pplying opertion () s well. Opertion (2), pplied to M-cut nodes, does not ffect either π(n) or λ(n). o, gin we cn clim tht for opertion (2), if 2 λ(n) π(n) holds fter pplying the opertion, it holds efore pplying the opertion s well. As long s there re rely nodes in the multicst network, t lest one of the two opertions cn e pplied. If oth opertions re possile, opertion () tkes priority. ince ech opertion reduces the numer of rely nodes y one, eventully we otin rodcst network with terminl nodes only. By Theorem 2, 2λ(N) π(n) holds. Finlly, note tht we otined n integrl trnsmission strtegy fter douling ech link cpcity. Therefore, fter we scle the solution ck y fctor of 2, the trnsmission strtegy is hlf-integrl. Corollry 3. For multicst trnsmission in n undirected network, the coding dvntge is upper-ounded y constnt fctor of two, s long s hlf-integer routing is llowed. Proof: By Theorem 3, 2λ(N) π(n) nd χ(n) λ(n) s long s hlf integer routing is llowed. Therefore we conclude 2 χ(n) π(n), i.e., the coding dvntge χ(n)/π(n) 2. Fig. 5 shows the optiml throughput without coding of the multicst session given in Fig., ssuming hlf-integrl routing nd ritrrily frctionl routing respectively, with the network eing undirected. Links leled with the sme letter or numer form teiner tree. For exmple, the tree leled with is highlighted in old edges. In (), ech tree hs cpcity 0.5; in (), trees leled with letter ech hs cpcity 0.25, nd trees leled with numer hve cpcity As result, uncoded throughput chieved is.5 in () nd.875 in () respectively, y trnsmitting flow long ech teiner tree, with the flow rte equl to the tree cpcity. ince optiml throughput with coding is 2, the corresponding coding dvntges re.333 nd.067, respectively. (c) T

6 IEEE TRANACTION ON INFORMATION THEORY 6 c c T c c () de2 ce2 cde cef df23 df df23 cf3 ce3 T Fig. 5. Throughput without network coding, for the exmple shown in Fig.. () With hlf-integer routing, optiml throughput is.5. Ech flow is of rte 0.5. () With ritrry frctionl routing, optiml throughput is.875. Ech flow leled with letter nd numer hs rte 0.25 nd 0.25, respectively. We point out tht none of the inequlities in Theorem 3 cn e replced with equlity in generl multicst networks. In prticulr, the network in Fig. is n exmple where π(n) <χ(n), showing tht pcking numer is not lwys equl to multicst throughput; the network in Fig. 6 is n exmple where χ(n) <η(n), showing tht strength is not lwys equl to multicst throughput either. The vlue of χ(n) ws computed using the liner optimiztion pproch in [25]; the vlue of η(n) ws computed y optimizing over ll vlid network prtitions. In the sme network, π(n) =3.5 cn e otined y enumerting ll different multicst trees nd then solving the tree-pcking LP, nd λ(n) =6cn e otined y solving two mx-flow LPs. Therefore, we lso hve 2λ(N) < π(n) nd η(n) < λ(n) here. The construction of the network topology ws inspired y the gdget used in the proof y Dhlhous et l. [3] tht shows the multiterminl cut prolem is NP-Complete. T 8 8 Fig. 6. A multicst network where pcking numer π(n) =3.5, mximum throughput χ(n) =3.5, strength η(n) =nd connectivity λ(n) = 6. Unleled links ech hs cpcity. This exmple shows tht multicst throughput is in generl not equivlent to strength in undirected networks. IV. OURCE INDEPENDENCE AND CODING ADVANTAGE FOR GROUP COMMUNICATION In this section, we show tht the chievle throughput for multicst trnsmission does not depend on which node in the multicst group cts s the sender. In other words, if we move the informtion source from one node in the multicst group onto nother, the optiml coding throughput remins unchnged. First, note tht such property does not hold in directed networks, where the connectivity etween two nodes () cn e ritrrily different in the two directions. econd, it is rther ovious tht this property holds for multicst without coding. The uncoded multicst prolem is equivlent to the teiner tree pcking prolem, nd the pcking numer is defined upon the network topology nd the terminl set, regrdless of which node in the terminl set is the sender. However, with network coding considered, it is less ovious whether the source independence property still holds. In Theorem, we provide n ffirmtive nswer, sed on which we then extend the ound 2 on coding dvntge for multicst to the cse of group communiction. Theorem. The optiml throughput of multicst trnsmission in n undirected network is completely determined y the network topology, the link cpcities, nd the multicst group; it is not dependent on the selection of the sender within the multicst group. A B C Fig. 7. Two scenrios of reversing the A B flow. Thicker links re eing reversed. Proof: The proof we present elow is sed on the following fct: directed multicst trnsmission is fesile if nd only if it stisfies ll the simple cut conditions [2], i.e., ifevery simple cut etween the source nd ny receiver hs size no less thn the multicst rte. uppose we exchnge the sender nd receiver roles etween two terminl nodes A nd B, nd the optiml throughput efore the exchnge is f. Then there must exist network flow of rte f from the sender to every receiver (including, in prticulr, from A to B). Consider reversing the A B network flow, which hs rte f. We show tht fter the reversl, simple cut conditions re still stisfied. Let C e nother multicst node. Consider cut tht seprtes B nd C. There re two cses, either A is in the sme prtition s B, ora is in the sme prtition s C, s shown in Fig. 7. In the first cse, we hve net flow of rte f trversing the cut from the AB component to the C component efore the reversl, nd n equl mount of flow in oth directions will e reversed; therefore fter the reversl, we still hve the sme mount of flow going from the AB component towrds the C component. In the second cse, similrly, the totl flow going from the AC component towrds the B component is f efore the reversl, nd ll flows crossing the cut will e reversed. Therefore, fter the flow reversl, we hve flows of totl rte f going from the B component towrds the AC component. Our proof lso shows tht, fter the informtion source is moved, the sme multicst throughput cn e chieved with exctly the sme ndwidth consumption on ech link. Therefore, we cn derive the following corollry: Corollry. A multicst rte is fesile if nd only if it is A C B

7 IEEE TRANACTION ON INFORMATION THEORY 7 fesile with the informtion source seprted into independent su-sources nd redistriuted mong the multicst group. Fig. 8 shows n exmple contining the sme network s in Fig., with the two unit informtion sources t the top multicst node moved onto the two ottom multicst nodes respectively. Ech informtion source cn still e trnsmitted to ll three multicst nodes, fter the movement. + P 3 + P P 2 Fig. 8. Optiml trnsmission strtegy fter splitting nd moving the informtion source, for the network shown in Fig.. Here P is the source for nd P 2 is the source for. Corollry. is relevnt to video conferencing, where ech prticipnt multicsts his/her locl udio/video dt to every other prticipnt, nd receives udio/video dt from them s well. By Corollry., video conferencing session is fesile with certin sending throughput requirement t ech prticipnt, if nd only if the multicst trnsmission otined y congregting ll throughput requirement t one of the prticipnts is fesile. ince oth throughput with nd without network coding re source independent in undirected networks, we cn extend the ound of 2 proved in Theorem 3 to the cse of group communiction: Corollry. The coding dvntge for group communiction session in n undirected network is upper-ounded y constnt fctor of 2. As finl note of this section, we point out tht the flow reversing technique used in the proof of Theorem is not lwys pplicle in generl networks. For exmple, Dougherty nd Zeger [32] demonstrted specific (directed) network N 7 consisting of multiple unicst sessions, such tht N 7 hs network coding solution while its reverse network does not. A reverse network is defined s the network otined from reversing every link direction nd exchnging the sender/receiver role of every unicst session. V. CODING ADVANTAGE IN RELATED NETWORK MODEL A. Internet-like Bidirectionl Networks Given the fct tht the coding dvntge is finitely ounded in undirected networks ut not in directed ones, it is nturl to sk which model is closer to rel-world networks, nd whether the coding dvntge is ounded in such networks. A rel-world computer network, such s the current genertion Internet, is usully idirectionl ut not undirected. If u nd v re two neighoring routers in the Internet, the mount of ndwidth ville from u to v nd tht from v to u re oth fixed nd independent of ech other. At certin + moment, if the u v link is congested nd the v u link is idling, it is not fesile to orrow ndwidth from the v u direction to the u v direction, due to the lck of dynmic ndwidth lloction module. Therefore, the Internet resemles n undirected network in tht communiction is idirectionl, nd resemles directed network in tht ech link is directed with fixed mount of ndwidth. The Internet cn e etter modeled with lnced directed network. In lnced directed network, ech link hs fixed direction. However, pir of neighoring nodes u nd v re lwys mutully rechle through direct link, nd the rtio etween c( uv) nd c( vu) is upper-ounded y constnt rtio α. In cses where α =, we hve n solutely lnced directed network. This is rther close to the relity in the Internet ckone, lthough lst-hop connections to the Internet exhiit higher level of symmetry in upstrem/downstrem cpcities. Bsed on the constnt ound developed in the previous section, we now show tht the coding dvntge in such n α-lnced network is lso finitely ounded. Theorem 5. For multicst session in n α-lnced idirectionl network, the coding dvntge is upper-ounded y 2(α +). Proof: We first define few nottions. Let N :α e the α- lnced network; let N e n undirected network with the sme topology s N :α,wherec(uv) in N is equl to the smller one of c( uv) nd c( vu) in N :α ;letn α+ e the undirected network otined y multiplying every link cpcity in N with α +.Thenwehve: π(n :α ) π(n ) α + π(n α+) α +2 χ(n α+) 2(α +) χ(n :α) In the derivtions ove, the third inequlity is n ppliction of Theorem 3; the other inequlities re sed on definitions. From Theorem 5, we cn see tht the more lnced directed network is, smller ound on the coding dvntge cn e climed. In the cse of n solutely lnced network, the ound is. In ritrry directed networks, α my pproch, nd correspondingly finite ound on the coding dvntge does not exist. B. Integrl Flows nd Hypergrph Models We now riefly discuss the cses of integrl flow rtes nd hypergrph network models. The motivtion of hving integrl flows lies ehind the fct tht in pcket-switched networks, ech pcket constitutes n tomic dt unit nd dt flow rtes should e discrete. We showed in [33] tht in the model of undirected networks with integrl flows, χ(n) 26π(N), i.e., the coding dvntge is ounded y constnt fctor of 26. A hypergrph is similr to grph except tht ech edge my connect more thn two vertices. It nturlly models dt trnsmission in wireless networks equipped with omnidirectionl ntenne, where ech trnsmission is herd y ll users within certin effective reception rnge. Király nd

8 IEEE TRANACTION ON INFORMATION THEORY 8 Lu [3] recently showed tht in the hypergrph model, if communiction group is 2x-hyperedge-connected, then there is n orienttion within which it is x-hyperedge-connected. This demonstrtes tht the multicst throughput cn chieve t lest hlf hyperedge connectivity. Furthermore, the hypertree pcking numer is upper-ounded y the hyperedge connectivity. In conclusion, the coding dvntge is ounded y fctor of 2 in hypergrph models. C. Non-Uniform Demnd Networks nd Averge Throughput Internet clients often exhiit significnt heterogeneity in their network connections. Dil-up, cle modem, ADL nd cmpus networks ech my provide different connection cpcity. Consequently, the mx-flows etween the multicst sender nd different receivers my e drsticlly different. For rel-world multicst pplictions such s medi streming, common technique for ccommodting heterogeneous clients in the sme session is lyered coding [35]. With lyered coding, the source medi is encoded into se lyer nd severl enhncement lyers. Depending on the receiving cpcity, receiver my choose to receive nd decode suset of ll the lyers only, nd ccept suoptiml plyck qulity. uch rel-world heterogeneity is nturlly modeled y the non-uniform demnd network model [36], [37]. A non-uniform demnd network is very similr to multicst network, with one node cting s the informtion source nd set of nodes cting s receivers. However, the requirement tht ll receivers receive informtion t the sme rte is relxed. Different users my receive informtion t rte tilored ccording to her own cpcity. The gol is to mximize the totl throughput of ll the receivers, or equivlent, the verge throughput mong ll the receivers. Unfortuntely, non-uniform multicst is computtionlly much hrder prolem thn multicst. Cssuto nd Bruck [37] proved tht determining whether rte vector χ,...,χ k (χ i denotes the desired throughput for receiver T i ) is fesile is NP-hrd; consequently, mximizing the verge throughput k i χ i is lso NP-hrd. A prcticl heuristic to circumvent the complexity of nonuniform multicst is to use successive lyering [35]. The ide is to first compute the multicst rte tht cn e chieved for ll receivers, nd the corresponding multicst flow; then remove the utilized network cpcities from N, remove the ottleneck receivers who cn not chieve higher rtes, nd compute the mximum multicst rte in the residul network. These two steps re repeted until there is no more receivers in the residul network. By Theorem 3, within ech lyer of norml multicst, we cn still chieve t lest hlf of the coding throughput. Therefore the upper ound of 2 for the coding dvntge holds if the verge throughput with network coding is computed using this prcticl solution. Chrcterizing the coding dvntge using the true mximum verge throughput with network coding is theoreticlly more interesting direction. A similr frmework s in the proofs of Theorem 2 nd Theorem 3 cn e dopted, i.e., utilize the fct tht coding throughput is upper-ounded y the connectivity, nd then ound the rtio etween throughput without coding nd connectivity. Bsed on prtil teiner tree pcking result y Bng-Jensen et l. [38], Chekuri et l. [36] proved tht without network coding, rte vector χ,...,χ k cn e chieved, such tht for ech T i, χ is no less thn hlf of the mx-flow from to T i. This implies tht the upperound of 2 for the coding dvntge remins vlid, for verge throughput of non-uniform multicst. VI. CODING ADVANTAGE AND COMPLEXITY By estlishing constnt ounds on the coding dvntge, so fr in the pper we hve een rguing in the direction tht the enefit of network coding in terms of improving throughput is limited. Empiricl studies on the coding dvntge revel similr picture. For multicst in undirected networks, the lrgest coding dvntge vlue oserved is only slightly lrger thn one. In [25], we showed smll network where the vlue is 9 8 ; in [], the uthors there pointed out network pttern in which the coding dvntge pproches 8 7 s the network size grows towrds infinity. It ws lso oserved in [25] tht the coding dvntge vlue is lmost lwys in rndomly constructed network topologies. On the other hnd, however, network coding my drmticlly reduce the complexity of mny optimiztion prolems tht rise in informtion dissemintion. In some cses, the underlying network flow structure of coded multicst trnsmission leds to efficient liner optimiztion lgorithms; in some other cses, the smll ound on coding dvntge leds to nice polynomil-time pproximtion lgorithms. We provide some of such exmples in the rest of this section. A. Informtion Exchnge In n informtion exchnge session, two nodes A nd B need to trnsmit informtion to ech other, with throughput requirement f AB nd f BA respectively. This form of communiction rises in scenrios such s: two sensor nodes exchnge sensed dt with ech other [39], [0], two receivers in n synchronous file downloding session reconcile received dt with ech other [], or two online messging pplictions strem multimedi dt to ech other concurrently. An informtion exchnge session cn lso e viewed s two simultneous unicst sessions etween pir of nodes, in opposite directions. If network coding is ignored, then even prolem s simple s determining the fesiility of single informtion exchnge session is NP-hrd, in directed networks with integrl routing. One my derive this NP-hrdness result from the proof given y Fortune et l. [2] tht shows the edge-disjoint pth prolem is NP-hrd for two opposite commodities. On the other hnd, when network coding is tken into considertion, the informtion exchnge prolem ecomes nicely trctle. As shown in Fig. 9, we cn trnsform the coded informtion exchnge prolem into coded multicst prolem, which requires just two mx-flow computtions []. In the trnsformtion, we dd n extr source node to e the multicst sender, then ssume the two unicst nodes re multicst receivers. Connect the sender with A nd B with n edge of cpcity f AB nd f BA respectively. Then we cn verify tht the originl

9 IEEE TRANACTION ON INFORMATION THEORY 9 informtion exchnge session is fesile if nd only if the resulting multicst session cn chieve throughput f AB + f BA with coding. The ltter requirement is equivlent to hve oth the A mx-flow nd the B mx-flow to e t lest f AB + f BA []. A f AB Fig. 9. Trnsforming the coded informtion exchnge prolem to the coded multicst prolem. B. Multicst with Frctionl Routing We now switch ck to the undirected network model, nd consider gin multicst with frctionl routing. Without network coding, the optiml multicst throughput prolem is equivlent to the frctionl teiner tree pcking prolem, which is NP-Complete nd APX-hrd [3]. However, once network coding is supported, the optiml throughput cn then e computed efficiently, due to the nice network flow structure underlying the coded informtion dissemintion prolem. We pointed out in [] tht optiml multicst with network coding in the frctionl flow model cn e solved using the liner progrmming pproch. Vrious efficient nd distriuted lgorithms hve een designed therefter within the liner optimiztion frmework, for chieving mximum multicst throughput or minimum multicst cost [5], [6], [25], [7], [8], [9]. To conclude, in ll the ove three exmples we hve shown, the optiml trnsmission throughput prolem is much more trctle with network coding considered. In the first nd the third exmple, the prolem is NP-Complete without network coding, nd is P with network coding. In the second exmple, the prolem is NP-hrd either with or without network coding, ut with network coding the optiml solution is much esier to pproximte using polynomil-time lgorithms. C. Multicst with Integrl Routing Continuing from the previous susection, we now further restrict our solutions to integrl flows only. Without network coding, the chievle multicst throughput equls to the (integrl) teiner tree pcking numer. It hs een shown tht the teiner tree pcking prolem is NP-Complete [3], [50]; it is even worse in the integrl cse: there did not exist ny known polynomil time lgorithm tht cn pproximte the prolem to ny constnt rtio, until the result 26π(N) λ(n) [33] ws recently proven in the integrl flow model. On the other hnd, y tking network coding into considertion, we re led to 2-pproximtion for the optiml multicst throughput. We show this clim y exmining the reltion etween connectivity nd throughput in the integrl f BA B model. We hve shown tht 2λ(N) π(n) χ(n) holds in the frctionl model; more ccurtely, it holds s long s hlf-integer flows re llowed. In the integrl model, it is not known whether 2λ(N) π(n) still holds or not. In fct, it is well known open prolem in grph theory. The est result known so fr is the forementioned rtio 26. On the other hnd, we show tht throughput with network coding cn still chieve hlf connectivity in the integrl routing model. Theorem 5. For multicst trnsmission in n undirected network, N, 2λ(N) χ(n) holds under the integrl routing requirement. Proof: Our proof is sed on Nsh-Willims trong Grph Orienttion Theorem [30]: every undirected grph G(V,E) hs n orienttion G = (V,D) for which λ G (u, v) 2 λ G(u, v), for ll u, v V. This theorem gurntees the existence of well-lnced orienttion of n undirected network, within which the connectivity from ny node u to ny other node v is t lest hlf of the connectivity etween u nd v in the originl undirected network. From the theorem ove, we know tht if λ(n) =x, then there is n integrl orienttion of the network, such tht the directed connectivity mong the multicst group M is t lest 2x. This implies tht the integrl mx-flow from to ech receiver T i is t lest 2x. Then y the fesiility condition of directed multicst [], [2], there is n integrl routing scheme to chieve χ(n) 2 x. Corollry 5. The optiml multicst throughput prolem in undirected networks with integrl routing cn e pproximted within fctor of two in polynomil time. Proof: The clim χ(n) λ(n) in Theorem 3 still holds in the integrl cse. Comined with Theorem 5, we hve 2λ(N) χ(n) λ(n). Therefore computing λ(n) gives 2-pproximtion for χ(n). Note tht λ(n) is oviously computle in polynomil time in the worst cse, one cn compute the mx-flow etween ech pir of multicst nodes, nd tke the minimum vlue mong them. It is lso possile to find the detiled trnsmission strtegy tht chieves the pproximted throughput vlue, since polynomil time lgorithms exist for oth the orienttion [30] nd code ssignment [9], [2]. To conclude, in ll the ove three exmples we hve shown, the optiml trnsmission throughput prolem is much more trctle with network coding considered. In the first nd the third exmple, the prolem is NP-Complete without network coding, nd is P with network coding. In the second exmple, the prolem is NP-hrd either with or without network coding, ut with network coding the optiml solution is much esier to pproximte using polynomil-time lgorithms. VII. CONCLUDING REMARK In this pper, we hve compred the coded trnsmission throughput with the pcking numer, strength, nd connectivity, in n undirected network with unicst, rodcst, nd multicst trnsmission, respectively. Our results led to smll constnt ounds on the coding dvntge in these cses: the coding dvntge is lwys for unicst or rodcst, nd

10 IEEE TRANACTION ON INFORMATION THEORY 0 is t most 2 for multicst. The ound 2 for multicst is then extended to the cse of group communiction, y showing tht chievle throughput is source independent in undirected networks, either with or without network coding. We lso mke the oservtion tht pplying network coding mkes it possile to design efficient lgorithms tht compute nd chieve the optiml trnsmission throughput. Finite ounds on the coding dvntge discussed throughout this pper re summrized in Tle I. The following questions on the coding dvntge re still open. First, for multiple unicst sessions tht concurrently coexist in the sme network, is the coding dvntge lwys, ssuming undirected networks with frctionl routing [2], [22]? econd, with ritrry frctionl routing, cn the ound of two for coding dvntge e further tightened? Third, is the ound of two still vlid if we replce the hlf-integer routing requirement with integrl routing? Finlly, is the ound of two still vlid if we hve multiple concurrent communiction sessions? REFERENCE [] R. Ahlswede, N. Ci,. R. Li, nd R. W. Yeung, Network Informtion Flow, IEEE Trns. on Inform. Theory, vol. 6, no., pp , July [2] R. Koetter nd M. Médrd, An Algeric Approch to Network Coding, IEEE/ACM Trns. on Networking, vol., no. 5, pp , Octoer [3] Y. Wu, P. A. Chou, nd K. Jin, A Comprison of Network Coding nd Tree Pcking, in Proc. of IIT, 200. [] A. Agrwl nd M. Chrikr, On the Advntge of Network Coding for Improving Network Throughput, in IEEE Inform. Theory Workshop, Octoer 200. [5] C. Chekuri, C. Frgouli, nd E. oljnin, On Averge Throughput nd Alphet ize in Network Coding, IEEE Trns. on Inform. Theory, vol. 52, no. 6, pp , June [6] N. J. A. Hrvey, R. Kleinerg, nd A. R. Lehmn, On the Cpcity of Informtion Networks, IEEE Trns. on Inform. Theory, vol. 52, no. 6, pp , June [7] N. J. A. Hrvey nd R. Kleinerg, Tighter Cut-Bsed Bounds for k- pirs Communiction Prolems, in 3rd Annul Allerton Conference on Communiction, Control, nd Computing, [8] K. Jin, V. V. Vzirni, nd G. Yuvl, On the Cpcity of Multiple Unicst essions in Undirected Grphs, IEEE Trns. on Inform. Theory, vol. 52, no. 6, pp , June [9]. Jggi, P. nders, P. A. Chou, M. Effros,. Egner, K. Jin, nd L. M. G. Tolhuizen, Polynomil Time Algorithms for Multicst Network Code Construction, IEEE Trns. on Inform. Theory, vol. 5, no. 6, pp , June [0] D. Tuninetti nd C. Frgouli, On the Throughput Improvement due to Limited Complexity Processing t Rely Nodes, in Proc. of IIT, [] J. Liu, D. Goeckel, nd D. Towsley, Bounds on the Gin of Network Coding nd Brodcsting in Wireless Networks, Deprtment of Computer cience, University of Msschusetts, UM-C , Tech. Rep., Octoer [2] P. nders,. Egner, nd L. Tolhuizen, Polynomil Time Algorithm for Network Informtion Flow, in Proc. of the 5th ACM ymposium on Prllelism in Algorithms nd Architectures, [3]. Y. R. Li, R. W. Yeung, nd N. Ci, Liner Network Coding, IEEE Trns. on Inform. Theory, vol. 9, no. 2, pp , Ferury [] T. Ho, D. R. Krger, M. Médrd, nd R. Koetter, Network Coding From Network Flow Perspective, in Proc. of IIT, [5] A. Agrwl, P. Klein, nd R. Rvi, When Trees Collide: An Approximtion Algorithm for the Generlized teiner Tree Prolem on Networks, IAM Journl on Computing, vol. 23, no. 3, pp. 0 56, June 995. [6] M. X. Goemns nd D. P. Willimson, A Generl Approximtion Technique for Constrined Forest Prolems, IAM Journl on Computing, vol. 2, no. 2, pp , April 995. [7] R. K. Ahuj, T. L. Mgnnti, nd J. B. Orlin, Network Flows: Theory, Algorithms, nd Applictions. Upper ddle River, New Jersey: Prentice Hll, 993. [8] J. Cnnons, R. Dougherty, C. Freiling, nd K. Zeger, Network Routing Cpcity, in Proc. of IIT, [9] R. Dougherty, C. Freiling, nd K. Zeger, Unchievility of Network Coding Cpcity, IEEE Trns. on Inform. Theory, vol. 52, no. 6, pp , June [20] Z. Li, B. Li, D. Jing, nd L. C. Lu, On Achieving Optiml Throughput with Network Coding, in Proc. of IEEE INFOCOM, [2] N. J. A. Hrvey, R. D. Kleinerg, nd A. R. Lehmn, Compring Network Coding with Multicommodity Flow for the k- pirs Communiction Prolem, Computer cience nd Artificil Intelligence Lortory, Msschusetts Institute of Technology, nickh/pulictions/gps/tr96.pdf, Tech. Rep., Novemer 200. [22] Z. Li nd B. Li, Network Coding: The Cse of Multiple Unicst essions, in 2nd Annul Allerton Conference on Communiction, Control, nd Computing, 200. [23] G. Krmer nd. A. vri, Edge-Cut Bounds on Network Coding Rtes, Journl of Network nd ystems Mngement, vol., no., pp. 9 67, [2] R. W. Yeung, A First Course in Informtion Theory. New York, NY: pringer, [25] Z. Li, B. Li, nd L. C. Lu, On Achieving Optiml Multicst Throughput in Undirected Networks, IEEE Trns. on Inform. Theory, vol. 52, no. 6, pp , June [26] W. H. Cunninghm, Optiml Attck nd Reinforcement of Network, Journl of the ACM, vol. 32, pp , 985. [27] D. B. West, Introduction To Grph Theory, 2nd Edition. Upper ddle River, New Jersey: Prentice Hll, 200. [28] W. T. Tutte, On the Prolem of Decomposing Grph Into n Connected Fctors, J. London Mth. oc., vol. 36, pp , 96. [29] C.. J. A. Nsh-Willims, Edge-disjoint pnning Trees of Finite Grphs, J. London Mth. oc., vol. 36, pp. 5 50, 96. [30] A. Frnk, Edge-connection of Grphs, Digrphs, nd Hypergrphs, Enervry Reserch Group on Comintoril Optimiztion, Budpest, Hungry, Tech. Rep., eptemer [3] E. Dhlhus, D.. Johnson, C. H. Ppdimitriou, P. D. eymour, nd M. Ynnkkis, The Complexity of Multiterminl Cuts, IAM Journl on Computing, vol. 23, no., pp , 99. [32] R. Dougherty nd K. Zeger, Nonreversiility nd Equivlent Construction of Multiple-Unicst Networks, IEEE Trns. on Inform. Theory, vol. 52, no., pp , [33] L. C. Lu, An Approximte Mx-teiner-Tree-Pcking Min-teiner- Cut Theorem, in Proc. of the 5th IEEE ymposium on Foundtions of Computer cience (FOC), 200. [3] T. Király nd L. C. Lu, Approximte Min-Mx Theorems for teiner Rooted-Orienttion of Hypergrphs, in Proc. of the 7th IEEE ymposium on Foundtions of Computer cience (FOC), [35] J. Zho, F. Yng, Q. Zhng, Z. Zhng, nd F. Zhng, LION: Lyered Overly Multicst with Network Coding, IEEE Trns. on Multimedi, vol. 8, no. 5, Octoer [36] C. Chekuri, C. Frgouli, nd E. oljnin, On Achievle Informtion Rtes in ingle-ource Non-Uniform Demnd Networks, in Proc. of IIT, [37] Y. Cssuto nd J. Bruck, Network Coding for Non-Uniform Demnds, in Proc. of IIT, [38] J. Bng-Jensen, A. Frnk, nd B. Jckson, Preserving nd Incresing Locl Edge-Connectivity in Mixed Grphs, IAM Journl on Discrete Mthemtics, vol. 8, no. 2, pp , My 995. [39] J. M. Khn, R. H. Ktz, nd K.. J. Pister, Next Century Chllenges: Moile Networking for mrt Dust, in Proc. of the 5th Annul ACM Interntionl Conference on Moile Computing nd Networking (MoiCom), 999. [0] D. Estrin, L. Girod, G. Pottie, nd M. rivstv, Instrumenting the World With Wireless ensor Networks, in Proc. of the Interntionl Conference on Acoustics, peech nd ignl Processing, 200. [] J. Byers, J. Considine, M. Mitzenmcher, nd. Rost, Informed Content Delivery Across Adptive Overly Networks, in Proc. of ACM IGCOMM, [2]. Fortune, J. Hopcroft, nd J. Wyllie, The Directed ugrph Homeomorphism Prolem, Theoreticl Computer cience, vol. 0, no. 2, pp. 2, 980. [3] K. Jin, M. Mhdin, nd M. R. lvtipour, Pcking teiner Trees, in Proc. of the 0th Annul ACM-IAM ymposium on Discrete Algorithms (ODA), [] Z. Li nd B. Li, Network Coding in Undirected Networks, in Proc. of the 38th Annul Conference on Informtion ciences nd ystems (CI), 200.

On Achieving Optimal Throughput with Network Coding

On Achieving Optimal Throughput with Network Coding In IEEE INFOCOM On Achieving Optiml Throughput with Network Coding Zongpeng Li, Bochun Li, Dn Jing, Lp Chi Lu Astrct With the constrints of network topologies nd link cpcities, chieving the optiml end-to-end

More information

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs.

If you are at the university, either physically or via the VPN, you can download the chapters of this book as PDFs. Lecture 5 Wlks, Trils, Pths nd Connectedness Reding: Some of the mteril in this lecture comes from Section 1.2 of Dieter Jungnickel (2008), Grphs, Networks nd Algorithms, 3rd edition, which is ville online

More information

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1):

Before We Begin. Introduction to Spatial Domain Filtering. Introduction to Digital Image Processing. Overview (1): Administrative Details (1): Overview (): Before We Begin Administrtive detils Review some questions to consider Winter 2006 Imge Enhncement in the Sptil Domin: Bsics of Sptil Filtering, Smoothing Sptil Filters, Order Sttistics Filters

More information

A dual of the rectangle-segmentation problem for binary matrices

A dual of the rectangle-segmentation problem for binary matrices A dul of the rectngle-segmenttion prolem for inry mtrices Thoms Klinowski Astrct We consider the prolem to decompose inry mtrix into smll numer of inry mtrices whose -entries form rectngle. We show tht

More information

2 Computing all Intersections of a Set of Segments Line Segment Intersection

2 Computing all Intersections of a Set of Segments Line Segment Intersection 15-451/651: Design & Anlysis of Algorithms Novemer 14, 2016 Lecture #21 Sweep-Line nd Segment Intersection lst chnged: Novemer 8, 2017 1 Preliminries The sweep-line prdigm is very powerful lgorithmic design

More information

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards

A Tautology Checker loosely related to Stålmarck s Algorithm by Martin Richards A Tutology Checker loosely relted to Stålmrck s Algorithm y Mrtin Richrds mr@cl.cm.c.uk http://www.cl.cm.c.uk/users/mr/ University Computer Lortory New Museum Site Pemroke Street Cmridge, CB2 3QG Mrtin

More information

What are suffix trees?

What are suffix trees? Suffix Trees 1 Wht re suffix trees? Allow lgorithm designers to store very lrge mount of informtion out strings while still keeping within liner spce Allow users to serch for new strings in the originl

More information

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming

Lecture 10 Evolutionary Computation: Evolution strategies and genetic programming Lecture 10 Evolutionry Computtion: Evolution strtegies nd genetic progrmming Evolution strtegies Genetic progrmming Summry Negnevitsky, Person Eduction, 2011 1 Evolution Strtegies Another pproch to simulting

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Adm Sheffer. Office hour: Tuesdys 4pm. dmsh@cltech.edu TA: Victor Kstkin. Office hour: Tuesdys 7pm. 1:00 Mondy, Wednesdy, nd Fridy. http://www.mth.cltech.edu/~2014-15/2term/m006/

More information

COMP 423 lecture 11 Jan. 28, 2008

COMP 423 lecture 11 Jan. 28, 2008 COMP 423 lecture 11 Jn. 28, 2008 Up to now, we hve looked t how some symols in n lphet occur more frequently thn others nd how we cn sve its y using code such tht the codewords for more frequently occuring

More information

The Greedy Method. The Greedy Method

The Greedy Method. The Greedy Method Lists nd Itertors /8/26 Presenttion for use with the textook, Algorithm Design nd Applictions, y M. T. Goodrich nd R. Tmssi, Wiley, 25 The Greedy Method The Greedy Method The greedy method is generl lgorithm

More information

From Dependencies to Evaluation Strategies

From Dependencies to Evaluation Strategies From Dependencies to Evlution Strtegies Possile strtegies: 1 let the user define the evlution order 2 utomtic strtegy sed on the dependencies: use locl dependencies to determine which ttriutes to compute

More information

Efficient Rerouting Algorithms for Congestion Mitigation

Efficient Rerouting Algorithms for Congestion Mitigation 2009 IEEE Computer Society Annul Symposium on VLSI Efficient Rerouting Algorithms for Congestion Mitigtion M. A. R. Chudhry*, Z. Asd, A. Sprintson, nd J. Hu Deprtment of Electricl nd Computer Engineering

More information

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus

Unit #9 : Definite Integral Properties, Fundamental Theorem of Calculus Unit #9 : Definite Integrl Properties, Fundmentl Theorem of Clculus Gols: Identify properties of definite integrls Define odd nd even functions, nd reltionship to integrl vlues Introduce the Fundmentl

More information

Efficient Algorithms For Optimizing Policy-Constrained Routing

Efficient Algorithms For Optimizing Policy-Constrained Routing Efficient Algorithms For Optimizing Policy-Constrined Routing Andrew R. Curtis curtis@cs.colostte.edu Ross M. McConnell rmm@cs.colostte.edu Dn Mssey mssey@cs.colostte.edu Astrct Routing policies ply n

More information

Ma/CS 6b Class 1: Graph Recap

Ma/CS 6b Class 1: Graph Recap M/CS 6 Clss 1: Grph Recp By Adm Sheffer Course Detils Instructor: Adm Sheffer. TA: Cosmin Pohot. 1pm Mondys, Wednesdys, nd Fridys. http://mth.cltech.edu/~2015-16/2term/m006/ Min ook: Introduction to Grph

More information

Presentation Martin Randers

Presentation Martin Randers Presenttion Mrtin Rnders Outline Introduction Algorithms Implementtion nd experiments Memory consumption Summry Introduction Introduction Evolution of species cn e modelled in trees Trees consist of nodes

More information

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have

P(r)dr = probability of generating a random number in the interval dr near r. For this probability idea to make sense we must have Rndom Numers nd Monte Crlo Methods Rndom Numer Methods The integrtion methods discussed so fr ll re sed upon mking polynomil pproximtions to the integrnd. Another clss of numericl methods relies upon using

More information

9 Graph Cutting Procedures

9 Graph Cutting Procedures 9 Grph Cutting Procedures Lst clss we begn looking t how to embed rbitrry metrics into distributions of trees, nd proved the following theorem due to Brtl (1996): Theorem 9.1 (Brtl (1996)) Given metric

More information

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES)

1. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) Numbers nd Opertions, Algebr, nd Functions 45. SEQUENCES INVOLVING EXPONENTIAL GROWTH (GEOMETRIC SEQUENCES) In sequence of terms involving eponentil growth, which the testing service lso clls geometric

More information

Lecture 7: Integration Techniques

Lecture 7: Integration Techniques Lecture 7: Integrtion Techniques Antiderivtives nd Indefinite Integrls. In differentil clculus, we were interested in the derivtive of given rel-vlued function, whether it ws lgeric, eponentil or logrithmic.

More information

MATH 25 CLASS 5 NOTES, SEP

MATH 25 CLASS 5 NOTES, SEP MATH 25 CLASS 5 NOTES, SEP 30 2011 Contents 1. A brief diversion: reltively prime numbers 1 2. Lest common multiples 3 3. Finding ll solutions to x + by = c 4 Quick links to definitions/theorems Euclid

More information

An evolutionary approach to inter-session network coding

An evolutionary approach to inter-session network coding An evolutionry pproch to inter-session network coding The MIT Fculty hs mde this rticle openly ville. Plese shre how this ccess enefits you. Your story mtters. Cittion As Pulished Pulisher Kim, M. et l.

More information

Pointwise convergence need not behave well with respect to standard properties such as continuity.

Pointwise convergence need not behave well with respect to standard properties such as continuity. Chpter 3 Uniform Convergence Lecture 9 Sequences of functions re of gret importnce in mny res of pure nd pplied mthemtics, nd their properties cn often be studied in the context of metric spces, s in Exmples

More information

Graphs with at most two trees in a forest building process

Graphs with at most two trees in a forest building process Grphs with t most two trees in forest uilding process rxiv:802.0533v [mth.co] 4 Fe 208 Steve Butler Mis Hmnk Mrie Hrdt Astrct Given grph, we cn form spnning forest y first sorting the edges in some order,

More information

Evolutionary Approaches To Minimizing Network Coding Resources

Evolutionary Approaches To Minimizing Network Coding Resources This full text pper ws peer reviewed t the direction of IEEE Communictions Society suject mtter experts for puliction in the IEEE INFOCOM 2007 proceedings. Evolutionry Approches To Minimizing Network Coding

More information

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers?

1.1. Interval Notation and Set Notation Essential Question When is it convenient to use set-builder notation to represent a set of numbers? 1.1 TEXAS ESSENTIAL KNOWLEDGE AND SKILLS Prepring for 2A.6.K, 2A.7.I Intervl Nottion nd Set Nottion Essentil Question When is it convenient to use set-uilder nottion to represent set of numers? A collection

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. General Tree Search. Uniform Cost. Lecture 3: A* Search 9/4/2007 CS 88: Artificil Intelligence Fll 2007 Lecture : A* Serch 9/4/2007 Dn Klein UC Berkeley Mny slides over the course dpted from either Sturt Russell or Andrew Moore Announcements Sections: New section 06:

More information

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997.

F. R. K. Chung y. University ofpennsylvania. Philadelphia, Pennsylvania R. L. Graham. AT&T Labs - Research. March 2,1997. Forced convex n-gons in the plne F. R. K. Chung y University ofpennsylvni Phildelphi, Pennsylvni 19104 R. L. Grhm AT&T Ls - Reserch Murry Hill, New Jersey 07974 Mrch 2,1997 Astrct In seminl pper from 1935,

More information

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis

CS143 Handout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexical Analysis CS143 Hndout 07 Summer 2011 June 24 th, 2011 Written Set 1: Lexicl Anlysis In this first written ssignment, you'll get the chnce to ply round with the vrious constructions tht come up when doing lexicl

More information

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved

Network Interconnection: Bridging CS 571 Fall Kenneth L. Calvert All rights reserved Network Interconnection: Bridging CS 57 Fll 6 6 Kenneth L. Clvert All rights reserved The Prolem We know how to uild (rodcst) LANs Wnt to connect severl LANs together to overcome scling limits Recll: speed

More information

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers

4452 Mathematical Modeling Lecture 4: Lagrange Multipliers Mth Modeling Lecture 4: Lgrnge Multipliers Pge 4452 Mthemticl Modeling Lecture 4: Lgrnge Multipliers Lgrnge multipliers re high powered mthemticl technique to find the mximum nd minimum of multidimensionl

More information

Fig.25: the Role of LEX

Fig.25: the Role of LEX The Lnguge for Specifying Lexicl Anlyzer We shll now study how to uild lexicl nlyzer from specifiction of tokens in the form of list of regulr expressions The discussion centers round the design of n existing

More information

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li

Complete Coverage Path Planning of Mobile Robot Based on Dynamic Programming Algorithm Peng Zhou, Zhong-min Wang, Zhen-nan Li, Yang Li 2nd Interntionl Conference on Electronic & Mechnicl Engineering nd Informtion Technology (EMEIT-212) Complete Coverge Pth Plnning of Mobile Robot Bsed on Dynmic Progrmming Algorithm Peng Zhou, Zhong-min

More information

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search.

Today. CS 188: Artificial Intelligence Fall Recap: Search. Example: Pancake Problem. Example: Pancake Problem. General Tree Search. CS 88: Artificil Intelligence Fll 00 Lecture : A* Serch 9//00 A* Serch rph Serch Tody Heuristic Design Dn Klein UC Berkeley Multiple slides from Sturt Russell or Andrew Moore Recp: Serch Exmple: Pncke

More information

In the last lecture, we discussed how valid tokens may be specified by regular expressions.

In the last lecture, we discussed how valid tokens may be specified by regular expressions. LECTURE 5 Scnning SYNTAX ANALYSIS We know from our previous lectures tht the process of verifying the syntx of the progrm is performed in two stges: Scnning: Identifying nd verifying tokens in progrm.

More information

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016

Solving Problems by Searching. CS 486/686: Introduction to Artificial Intelligence Winter 2016 Solving Prolems y Serching CS 486/686: Introduction to Artificil Intelligence Winter 2016 1 Introduction Serch ws one of the first topics studied in AI - Newell nd Simon (1961) Generl Prolem Solver Centrl

More information

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries

Tries. Yufei Tao KAIST. April 9, Y. Tao, April 9, 2013 Tries Tries Yufei To KAIST April 9, 2013 Y. To, April 9, 2013 Tries In this lecture, we will discuss the following exct mtching prolem on strings. Prolem Let S e set of strings, ech of which hs unique integer

More information

Approximation of Two-Dimensional Rectangle Packing

Approximation of Two-Dimensional Rectangle Packing pproximtion of Two-imensionl Rectngle Pcking Pinhong hen, Yn hen, Mudit Goel, Freddy Mng S70 Project Report, Spring 1999. My 18, 1999 1 Introduction 1-d in pcking nd -d in pcking re clssic NP-complete

More information

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem

Announcements. CS 188: Artificial Intelligence Fall Recap: Search. Today. Example: Pancake Problem. Example: Pancake Problem Announcements Project : erch It s live! Due 9/. trt erly nd sk questions. It s longer thn most! Need prtner? Come up fter clss or try Pizz ections: cn go to ny, ut hve priority in your own C 88: Artificil

More information

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases

Overview. Network characteristics. Network architecture. Data dissemination. Network characteristics (cont d) Mobile computing and databases Overview Mobile computing nd dtbses Generl issues in mobile dt mngement Dt dissemintion Dt consistency Loction dependent queries Interfces Detils of brodcst disks thlis klfigopoulos Network rchitecture

More information

On network coding and routing in dynamic wireless multicast networks

On network coding and routing in dynamic wireless multicast networks On network coding nd routing in dynmic wireless multicst networks Trcey Ho, Ji-Qi Jin Cliforni Institute of Technology Psden, CA Emil: {tho, jin}@cltechedu Hrish Viswnthn Lucent Technologies, Bell Ls Murry

More information

Summer Review Packet For Algebra 2 CP/Honors

Summer Review Packet For Algebra 2 CP/Honors Summer Review Pcket For Alger CP/Honors Nme Current Course Mth Techer Introduction Alger uilds on topics studied from oth Alger nd Geometr. Certin topics re sufficientl involved tht the cll for some review

More information

Slides for Data Mining by I. H. Witten and E. Frank

Slides for Data Mining by I. H. Witten and E. Frank Slides for Dt Mining y I. H. Witten nd E. Frnk Simplicity first Simple lgorithms often work very well! There re mny kinds of simple structure, eg: One ttriute does ll the work All ttriutes contriute eqully

More information

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley

AI Adjacent Fields. This slide deck courtesy of Dan Klein at UC Berkeley AI Adjcent Fields Philosophy: Logic, methods of resoning Mind s physicl system Foundtions of lerning, lnguge, rtionlity Mthemtics Forml representtion nd proof Algorithms, computtion, (un)decidility, (in)trctility

More information

Spectral Analysis of MCDF Operations in Image Processing

Spectral Analysis of MCDF Operations in Image Processing Spectrl Anlysis of MCDF Opertions in Imge Processing ZHIQIANG MA 1,2 WANWU GUO 3 1 School of Computer Science, Northest Norml University Chngchun, Jilin, Chin 2 Deprtment of Computer Science, JilinUniversity

More information

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011

CSCI 3130: Formal Languages and Automata Theory Lecture 12 The Chinese University of Hong Kong, Fall 2011 CSCI 3130: Forml Lnguges nd utomt Theory Lecture 12 The Chinese University of Hong Kong, Fll 2011 ndrej Bogdnov In progrmming lnguges, uilding prse trees is significnt tsk ecuse prse trees tell us the

More information

Lily Yen and Mogens Hansen

Lily Yen and Mogens Hansen SKOLID / SKOLID No. 8 Lily Yen nd Mogens Hnsen Skolid hs joined Mthemticl Myhem which is eing reformtted s stnd-lone mthemtics journl for high school students. Solutions to prolems tht ppered in the lst

More information

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method

A New Learning Algorithm for the MAXQ Hierarchical Reinforcement Learning Method A New Lerning Algorithm for the MAXQ Hierrchicl Reinforcement Lerning Method Frzneh Mirzzdeh 1, Bbk Behsz 2, nd Hmid Beigy 1 1 Deprtment of Computer Engineering, Shrif University of Technology, Tehrn,

More information

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig

CS311H: Discrete Mathematics. Graph Theory IV. A Non-planar Graph. Regions of a Planar Graph. Euler s Formula. Instructor: Işıl Dillig CS311H: Discrete Mthemtics Grph Theory IV Instructor: Işıl Dillig Instructor: Işıl Dillig, CS311H: Discrete Mthemtics Grph Theory IV 1/25 A Non-plnr Grph Regions of Plnr Grph The plnr representtion of

More information

Grade 7/8 Math Circles Geometric Arithmetic October 31, 2012

Grade 7/8 Math Circles Geometric Arithmetic October 31, 2012 Fculty of Mthemtics Wterloo, Ontrio N2L 3G1 Grde 7/8 Mth Circles Geometric Arithmetic Octoer 31, 2012 Centre for Eduction in Mthemtics nd Computing Ancient Greece hs given irth to some of the most importnt

More information

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5

CS321 Languages and Compiler Design I. Winter 2012 Lecture 5 CS321 Lnguges nd Compiler Design I Winter 2012 Lecture 5 1 FINITE AUTOMATA A non-deterministic finite utomton (NFA) consists of: An input lphet Σ, e.g. Σ =,. A set of sttes S, e.g. S = {1, 3, 5, 7, 11,

More information

CS 268: IP Multicast Routing

CS 268: IP Multicast Routing Motivtion CS 268: IP Multicst Routing Ion Stoic April 5, 2004 Mny pplictions requires one-to-mny communiction - E.g., video/udio conferencing, news dissemintion, file updtes, etc. Using unicst to replicte

More information

Transparent neutral-element elimination in MPI reduction operations

Transparent neutral-element elimination in MPI reduction operations Trnsprent neutrl-element elimintion in MPI reduction opertions Jesper Lrsson Träff Deprtment of Scientific Computing University of Vienn Disclimer Exploiting repetition nd sprsity in input for reducing

More information

1.5 Extrema and the Mean Value Theorem

1.5 Extrema and the Mean Value Theorem .5 Extrem nd the Men Vlue Theorem.5. Mximum nd Minimum Vlues Definition.5. (Glol Mximum). Let f : D! R e function with domin D. Then f hs n glol mximum vlue t point c, iff(c) f(x) for ll x D. The vlue

More information

Typing with Weird Keyboards Notes

Typing with Weird Keyboards Notes Typing with Weird Keyords Notes Ykov Berchenko-Kogn August 25, 2012 Astrct Consider lnguge with n lphet consisting of just four letters,,,, nd. There is spelling rule tht sys tht whenever you see n next

More information

Distributed Systems Principles and Paradigms

Distributed Systems Principles and Paradigms Distriuted Systems Principles nd Prdigms Chpter 11 (version April 7, 2008) Mrten vn Steen Vrije Universiteit Amsterdm, Fculty of Science Dept. Mthemtics nd Computer Science Room R4.20. Tel: (020) 598 7784

More information

Simrad ES80. Software Release Note Introduction

Simrad ES80. Software Release Note Introduction Simrd ES80 Softwre Relese 1.3.0 Introduction This document descries the chnges introduced with the new softwre version. Product: ES80 Softwre version: 1.3.0 This softwre controls ll functionlity in the

More information

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the

this grammar generates the following language: Because this symbol will also be used in a later step, it receives the LR() nlysis Drwcks of LR(). Look-hed symols s eplined efore, concerning LR(), it is possile to consult the net set to determine, in the reduction sttes, for which symols it would e possile to perform reductions.

More information

Introduction to Algebra

Introduction to Algebra INTRODUCTORY ALGEBRA Mini-Leture 1.1 Introdution to Alger Evlute lgeri expressions y sustitution. Trnslte phrses to lgeri expressions. 1. Evlute the expressions when =, =, nd = 6. ) d) 5 10. Trnslte eh

More information

Algorithm Design (5) Text Search

Algorithm Design (5) Text Search Algorithm Design (5) Text Serch Tkshi Chikym School of Engineering The University of Tokyo Text Serch Find sustring tht mtches the given key string in text dt of lrge mount Key string: chr x[m] Text Dt:

More information

Definition of Regular Expression

Definition of Regular Expression Definition of Regulr Expression After the definition of the string nd lnguges, we re redy to descrie regulr expressions, the nottion we shll use to define the clss of lnguges known s regulr sets. Recll

More information

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining

EECS150 - Digital Design Lecture 23 - High-level Design and Optimization 3, Parallelism and Pipelining EECS150 - Digitl Design Lecture 23 - High-level Design nd Optimiztion 3, Prllelism nd Pipelining Nov 12, 2002 John Wwrzynek Fll 2002 EECS150 - Lec23-HL3 Pge 1 Prllelism Prllelism is the ct of doing more

More information

Unit 5 Vocabulary. A function is a special relationship where each input has a single output.

Unit 5 Vocabulary. A function is a special relationship where each input has a single output. MODULE 3 Terms Definition Picture/Exmple/Nottion 1 Function Nottion Function nottion is n efficient nd effective wy to write functions of ll types. This nottion llows you to identify the input vlue with

More information

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table

LR Parsing, Part 2. Constructing Parse Tables. Need to Automatically Construct LR Parse Tables: Action and GOTO Table TDDD55 Compilers nd Interpreters TDDB44 Compiler Construction LR Prsing, Prt 2 Constructing Prse Tles Prse tle construction Grmmr conflict hndling Ctegories of LR Grmmrs nd Prsers Peter Fritzson, Christoph

More information

PARALLEL AND DISTRIBUTED COMPUTING

PARALLEL AND DISTRIBUTED COMPUTING PARALLEL AND DISTRIBUTED COMPUTING 2009/2010 1 st Semester Teste Jnury 9, 2010 Durtion: 2h00 - No extr mteril llowed. This includes notes, scrtch pper, clcultor, etc. - Give your nswers in the ville spce

More information

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation

Representation of Numbers. Number Representation. Representation of Numbers. 32-bit Unsigned Integers 3/24/2014. Fixed point Integer Representation Representtion of Numbers Number Representtion Computer represent ll numbers, other thn integers nd some frctions with imprecision. Numbers re stored in some pproximtion which cn be represented by fixed

More information

A Sparse Grid Representation for Dynamic Three-Dimensional Worlds

A Sparse Grid Representation for Dynamic Three-Dimensional Worlds A Sprse Grid Representtion for Dynmic Three-Dimensionl Worlds Nthn R. Sturtevnt Deprtment of Computer Science University of Denver Denver, CO, 80208 sturtevnt@cs.du.edu Astrct Grid representtions offer

More information

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network

Revisiting the notion of Origin-Destination Traffic Matrix of the Hosts that are attached to a Switched Local Area Network Interntionl Journl of Distributed nd Prllel Systems (IJDPS) Vol., No.6, November 0 Revisiting the notion of Origin-Destintion Trffic Mtrix of the Hosts tht re ttched to Switched Locl Are Network Mondy

More information

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES

GENERATING ORTHOIMAGES FOR CLOSE-RANGE OBJECTS BY AUTOMATICALLY DETECTING BREAKLINES GENEATING OTHOIMAGES FO CLOSE-ANGE OBJECTS BY AUTOMATICALLY DETECTING BEAKLINES Efstrtios Stylinidis 1, Lzros Sechidis 1, Petros Ptis 1, Spiros Sptls 2 Aristotle University of Thessloniki 1 Deprtment of

More information

Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration

Rethinking Virtual Network Embedding: Substrate Support for Path Splitting and Migration Rethinking Virtul Network Emedding: Sustrte Support for Pth Splitting nd Migrtion Minln Yu, Yung Yi, Jennifer Rexford, Mung Ching Computer Science, Princeton University, Emil: {minlnyu,jrex}@cs.princeton.edu

More information

Dr. D.M. Akbar Hussain

Dr. D.M. Akbar Hussain Dr. D.M. Akr Hussin Lexicl Anlysis. Bsic Ide: Red the source code nd generte tokens, it is similr wht humns will do to red in; just tking on the input nd reking it down in pieces. Ech token is sequence

More information

An Expressive Hybrid Model for the Composition of Cardinal Directions

An Expressive Hybrid Model for the Composition of Cardinal Directions An Expressive Hyrid Model for the Composition of Crdinl Directions Ah Lin Kor nd Brndon Bennett School of Computing, University of Leeds, Leeds LS2 9JT, UK e-mil:{lin,brndon}@comp.leeds.c.uk Astrct In

More information

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association

9 4. CISC - Curriculum & Instruction Steering Committee. California County Superintendents Educational Services Association 9. CISC - Curriculum & Instruction Steering Committee The Winning EQUATION A HIGH QUALITY MATHEMATICS PROFESSIONAL DEVELOPMENT PROGRAM FOR TEACHERS IN GRADES THROUGH ALGEBRA II STRAND: NUMBER SENSE: Rtionl

More information

The Basic Properties of the Integral

The Basic Properties of the Integral The Bsic Properties of the Integrl When we compute the derivtive of complicted function, like + sin, we usull use differentition rules, like d [f()+g()] d f()+ d g(), to reduce the computtion d d d to

More information

Agilent Mass Hunter Software

Agilent Mass Hunter Software Agilent Mss Hunter Softwre Quick Strt Guide Use this guide to get strted with the Mss Hunter softwre. Wht is Mss Hunter Softwre? Mss Hunter is n integrl prt of Agilent TOF softwre (version A.02.00). Mss

More information

Mobile IP route optimization method for a carrier-scale IP network

Mobile IP route optimization method for a carrier-scale IP network Moile IP route optimiztion method for crrier-scle IP network Tkeshi Ihr, Hiroyuki Ohnishi, nd Ysushi Tkgi NTT Network Service Systems Lortories 3-9-11 Midori-cho, Musshino-shi, Tokyo 180-8585, Jpn Phone:

More information

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv

Compression Outline :Algorithms in the Real World. Lempel-Ziv Algorithms. LZ77: Sliding Window Lempel-Ziv Compression Outline 15-853:Algorithms in the Rel World Dt Compression III Introduction: Lossy vs. Lossless, Benchmrks, Informtion Theory: Entropy, etc. Proility Coding: Huffmn + Arithmetic Coding Applictions

More information

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork

MA1008. Calculus and Linear Algebra for Engineers. Course Notes for Section B. Stephen Wills. Department of Mathematics. University College Cork MA1008 Clculus nd Liner Algebr for Engineers Course Notes for Section B Stephen Wills Deprtment of Mthemtics University College Cork s.wills@ucc.ie http://euclid.ucc.ie/pges/stff/wills/teching/m1008/ma1008.html

More information

LECT-10, S-1 FP2P08, Javed I.

LECT-10, S-1 FP2P08, Javed I. A Course on Foundtions of Peer-to-Peer Systems & Applictions LECT-10, S-1 CS /799 Foundtion of Peer-to-Peer Applictions & Systems Kent Stte University Dept. of Computer Science www.cs.kent.edu/~jved/clss-p2p08

More information

CSCI 446: Artificial Intelligence

CSCI 446: Artificial Intelligence CSCI 446: Artificil Intelligence Serch Instructor: Michele Vn Dyne [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.]

More information

8.2 Areas in the Plane

8.2 Areas in the Plane 39 Chpter 8 Applictions of Definite Integrls 8. Ares in the Plne Wht ou will lern out... Are Between Curves Are Enclosed Intersecting Curves Boundries with Chnging Functions Integrting with Respect to

More information

12-B FRACTIONS AND DECIMALS

12-B FRACTIONS AND DECIMALS -B Frctions nd Decimls. () If ll four integers were negtive, their product would be positive, nd so could not equl one of them. If ll four integers were positive, their product would be much greter thn

More information

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism

Efficient K-NN Search in Polyphonic Music Databases Using a Lower Bounding Mechanism Efficient K-NN Serch in Polyphonic Music Dtses Using Lower Bounding Mechnism Ning-Hn Liu Deprtment of Computer Science Ntionl Tsing Hu University Hsinchu,Tiwn 300, R.O.C 886-3-575679 nhliou@yhoo.com.tw

More information

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits

Systems I. Logic Design I. Topics Digital logic Logic gates Simple combinational logic circuits Systems I Logic Design I Topics Digitl logic Logic gtes Simple comintionl logic circuits Simple C sttement.. C = + ; Wht pieces of hrdwre do you think you might need? Storge - for vlues,, C Computtion

More information

Position Heaps: A Simple and Dynamic Text Indexing Data Structure

Position Heaps: A Simple and Dynamic Text Indexing Data Structure Position Heps: A Simple nd Dynmic Text Indexing Dt Structure Andrzej Ehrenfeucht, Ross M. McConnell, Niss Osheim, Sung-Whn Woo Dept. of Computer Science, 40 UCB, University of Colordo t Boulder, Boulder,

More information

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search

Today. Search Problems. Uninformed Search Methods. Depth-First Search Breadth-First Search Uniform-Cost Search Uninformed Serch [These slides were creted by Dn Klein nd Pieter Abbeel for CS188 Intro to AI t UC Berkeley. All CS188 mterils re vilble t http://i.berkeley.edu.] Tody Serch Problems Uninformed Serch Methods

More information

The Complexity of Nonrepetitive Coloring

The Complexity of Nonrepetitive Coloring The Complexity of Nonrepetitive Coloring Dániel Mrx Deprtment of Computer Science nd Informtion Theory Budpest University of Technology nd Econonomics Budpest H-1521, Hungry dmrx@cs.me.hu Mrcus Schefer

More information

Section 10.4 Hyperbolas

Section 10.4 Hyperbolas 66 Section 10.4 Hyperbols Objective : Definition of hyperbol & hyperbols centered t (0, 0). The third type of conic we will study is the hyperbol. It is defined in the sme mnner tht we defined the prbol

More information

An Algorithm for Enumerating All Maximal Tree Patterns Without Duplication Using Succinct Data Structure

An Algorithm for Enumerating All Maximal Tree Patterns Without Duplication Using Succinct Data Structure , Mrch 12-14, 2014, Hong Kong An Algorithm for Enumerting All Mximl Tree Ptterns Without Dupliction Using Succinct Dt Structure Yuko ITOKAWA, Tomoyuki UCHIDA nd Motoki SANO Astrct In order to extrct structured

More information

On Approximating Restricted Cycle Covers

On Approximating Restricted Cycle Covers On Approximting Restricted Cycle Covers Bodo Mnthey Universität zu Lüeck, Institut für Theoretische Informtik Rtzeurger Allee 160, 23538 Lüeck, Germny mnthey@tcs.uni-lueeck.de Astrct. A cycle cover of

More information

UT1553B BCRT True Dual-port Memory Interface

UT1553B BCRT True Dual-port Memory Interface UTMC APPICATION NOTE UT553B BCRT True Dul-port Memory Interfce INTRODUCTION The UTMC UT553B BCRT is monolithic CMOS integrted circuit tht provides comprehensive MI-STD- 553B Bus Controller nd Remote Terminl

More information

OUTPUT DELIVERY SYSTEM

OUTPUT DELIVERY SYSTEM Differences in ODS formtting for HTML with Proc Print nd Proc Report Lur L. M. Thornton, USDA-ARS, Animl Improvement Progrms Lortory, Beltsville, MD ABSTRACT While Proc Print is terrific tool for dt checking

More information

The Complexity of Nonrepetitive Coloring

The Complexity of Nonrepetitive Coloring The Complexity of Nonrepetitive Coloring Dániel Mrx Institut für Informtik Humoldt-Universitt zu Berlin dmrx@informtik.hu-erlin.de Mrcus Schefer Deprtment of Computer Science DePul University mschefer@cs.depul.edu

More information

ASTs, Regex, Parsing, and Pretty Printing

ASTs, Regex, Parsing, and Pretty Printing ASTs, Regex, Prsing, nd Pretty Printing CS 2112 Fll 2016 1 Algeric Expressions To strt, consider integer rithmetic. Suppose we hve the following 1. The lphet we will use is the digits {0, 1, 2, 3, 4, 5,

More information

Inference of node replacement graph grammars

Inference of node replacement graph grammars Glley Proof 22/6/27; :6 File: id293.tex; BOKCTP/Hin p. Intelligent Dt Anlysis (27) 24 IOS Press Inference of node replcement grph grmmrs Jcek P. Kukluk, Lwrence B. Holder nd Dine J. Cook Deprtment of Computer

More information

Digital Signal Processing: A Hardware-Based Approach

Digital Signal Processing: A Hardware-Based Approach Digitl Signl Processing: A Hrdwre-Bsed Approch Roert Esposito Electricl nd Computer Engineering Temple University troduction Teching Digitl Signl Processing (DSP) hs included the utilition of simultion

More information

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES

SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES SOME EXAMPLES OF SUBDIVISION OF SMALL CATEGORIES MARCELLO DELGADO Abstrct. The purpose of this pper is to build up the bsic conceptul frmework nd underlying motivtions tht will llow us to understnd ctegoricl

More information

Outline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST

Outline. Introduction Suffix Trees (ST) Building STs in linear time: Ukkonen s algorithm Applications of ST Suffi Trees Outline Introduction Suffi Trees (ST) Building STs in liner time: Ukkonen s lgorithm Applictions of ST 2 3 Introduction Sustrings String is ny sequence of chrcters. Sustring of string S is

More information

Misrepresentation of Preferences

Misrepresentation of Preferences Misrepresenttion of Preferences Gicomo Bonnno Deprtment of Economics, University of Cliforni, Dvis, USA gfbonnno@ucdvis.edu Socil choice functions Arrow s theorem sys tht it is not possible to extrct from

More information