Secure Index Coding: Existence and Construction

Size: px
Start display at page:

Download "Secure Index Coding: Existence and Construction"

Transcription

1 Secure Index Codng: Exstence and Constructon Lawrence Ong 1, Badr N. Vellamb 2, Phee Lep Yeoh 3, Jörg Klewer 2, and Jnhong Yuan 4 1 The Unversty of Newcastle, Australa; 2 New Jersey Insttute of Technology, USA; 3 Unversty of Melbourne, Australa; 4 Unversty of New South Wales, Australa arxv: v1 [cs.it] 2 Feb 2016 Abstract We nvestgate the constructon of secure ndex codes for a sender transmttng to multple recevers wth sde nformaton n the presence of an eavesdropper. We derve a suffcent and necessary condton for the exstence of ndex codes that are secure aganst an eavesdropper wth access to any subset of messages of cardnalty t, for any fxed t. In contrast to secure network codng, we show that random keys are not useful for three classes of ndex-codng nstances. I. INTRODUCTION In classcal or non-secure ndex-codng problems, a sender transmts multple messages to multple recevers through a common noseless broadcast medum, where each recever has a pror knowledge of a subset of messages [1] [5]. In ths work, we consder secure ndex codng, where n addton to the classcal ndex-codng setup, there s an eavesdropper who has access to one message subset from an arbtrary collecton of message subsets. A secure ndex code must satsfy all recevers decodng requrements, whle ensurng that the eavesdropper cannot decode the messages t cannot access. A. Contrbutons of ths paper and related work Exstence of secure ndex codes: Secure ndex codng was frst studed by Dau, Skachek, and Chee [6]. The authors derved condtons that any gven lnear code (of a gven message alphabet sze) must satsfy to smultaneously meet the recevers decodng requrements as well as be secure aganst an eavesdropper wth access to a message subset. In contrast to the code-centrc results by Dau et al., we obtan problem-centrc results. We derve a suffcent and necessary condton for the exstence of both lnear and non-lnear secure ndex codes over all fnte-feld alphabets for any ndex-codng problem where the eavesdropper can access any message subset of cardnalty t. Also, we show how to construct such codes f they exst, and nvestgate ther optmalty. Random keys: Next, we nvestgate the role of random keys for secure ndex codng, whch s motvated by () an equvalence between non-secure ndex codng and non-secure network codng [7], [8]; and () the usefulness of random keys n secure network codng [9], where t was shown that there exst randomsed secure network codes for nstances where no determnstc secure network code exsts. We prove that random keys are not useful for secure ndex codng under the followng three condtons: () the eavesdropper has access to any t messages, () the sender s Ths work s supported by the Australan Research Councl grants FT , DE , and DP , and US Natonal Scence Foundaton grants CNS and CCF encodng functon s lnear, or () the eavesdropper has access to only one message subset. The observaton that random keys are useful for secure lnear network codng [9], but not for secure lnear ndex codng, suggests that the equvalence between ndex codng and network codng may no longer hold under securty constrants. Note that, n ths work, random keys are generated by the sender, and are a pror unknown to the recevers and the eavesdropper. Ths s dfferent from the setup for secure ndex codng consdered by Mojahedan, Gohar, and Aref [10], where the keys are pre-shared among the sender and the recevers through addtonal channels not accessble by the eavesdropper. Secure vs classcal ndex codng: Fnally, we hghlght a sgnfcant dfference between classcal and secure ndex codng. In classcal ndex codng, unwanted messages are not useful and can be removed from the system. In secure ndex codng, unwanted messages may be used as secret keys between the sender and the recevers to construct secure ndex codes. II. PROBLEM DEFINITION AND NOTATION A classcal ndex-codng nstance conssts of a sngle sender and multple recevers [n] {1, 2,..., n}. The sender has m messages X = [X 1 X 2 X m ], where X for each [m] s ndependent and unformly dstrbuted over a fnte feld F q wth q elements. For a subset of ntegers I = { 1, 2,..., I } where 1 < 2 < < I, let X I [X 1 X 2 X I ]. Each recever [n] has a pror knowledge of X K for some K [m], and needs to decode X W for some W [m] \ K. The sender s to encode X and broadcast the coded symbols to all recevers so that each recever [n] uses the messages X K t already knows to decode X W. Wthout loss of generalty, we may assume W for all [n], snce recevers not wantng any message can be expunged from the problem. A secure ndex-codng nstance has, n addton, an eavesdropper who has access to X A, where A s any one member of A, where A s a non-empty collecton of subsets of [m]. The eavesdropper cannot smultaneously access messages from more than one member of A. The set A contans the possble subsets of ndces of compromsed messages. Whle the sender s aware of A, t s oblvous to the exact subset of ndces the eavesdropper knows. The sender s am s to desgn a code protectng each ndvdual message X j, j A c [m]\a, from beng decoded by the eavesdropper havng access to the ndex code and X A. Formally, we have the followng: Defnton 1 (Determnstc secure ndex code): For a secure ndex-codng nstance descrbed by I = ((K, W ) n =1, A), a determnstc secure ndex code conssts of the followng:

2 Sender s encodng functon f : Fq m Fq, l and For each [n], decodng functon g : Fq l F q K correspondng to recever, such that F W q (Decodablty) each recever [n] can decode the messages t wants,.e., g (f(x), X K ) = X W, and (Securty) for any A A, an eavesdropper accessng X A has no nformaton about any sngle message n A c,.e., H(X f(x), X A ) = H(X ) for all A c. Alternately, an ndex code (f, (g ) n =1 ) that meets the condtons n Defnton 1 s sad to be secure aganst an eavesdropper who has access to any message subset n A. Sometmes, t may be possble for the sender to use random keys (say Y ) along wth the messages X durng the encodng process to ensure securty aganst the eavesdropper. For such settngs, we have the followng noton of secure ndex codes: Defnton 2 (Randomsed secure ndex code): Let Y be a random varable takng values n a fnte alphabet Y, wth some probablty mass functon p Y (y). Y s known only to the sender, and unknown to all the recevers and the eavesdropper. A randomsed secure ndex code s the same as a determnstc ndex code wth the encodng functon at the sender replaced by f : Fq m Y Fq. l As such, the decodablty condton s g (f(x, Y ), X K ) = X W, and the securty condton H(X f(x, Y ), X A ) = H(X ). Randomsed secure ndex codes nclude determnstc secure ndex codes as a specal case by settng the key to be a constant. Defnton 3 (Lnear ndex code): A randomsed ndex code s lnear f and only f the key s Y = [Y 1 Y 2 Y k ], where each Y s ndependently and unformly dstrbuted over F q, and the encodng functon can be expressed as f(x, Y ) = XG + Y G, (1) where G and G are fxed matrces over F q of sze m l and k l, respectvely, that are known to all partes (the sender, the recevers, and the eavesdropper). Smlarly, a determnstc ndex code s lnear f and only f t can be expressed as f(x) = XG. Remark 1: In ths paper, we consder 1-block weakly-secure ndex codes [6], n the sense that the eavesdropper has no nformaton about any sngle message that t does not know, but t may gan some nformaton about X A c. Remark 2: If A = {[m]}, we have a classcal ndex-codng nstance wthout any securty constrant. We say that a secure ndex code exsts for an ndex-codng nstance I f there exsts a secure (determnstc or randomsed) secure ndex code for some q; we say that no secure ndex code exsts for I f there exsts nether determnstc nor randomsed secure ndex code for any q. As we wll see later, a secure ndex code may or may not exst dependng on A. For a gven secure ndex-codng nstance I, suppose that secure ndex codes exst. Then, the optmal ndex codelength s defned to be s(i) = nf mn l. (2) q f,g III. FUNDAMENTAL PROPERTIES We begn wth the followng counterntutve proposton: Proposton 1: An ndex code secure aganst an eavesdropper who knows a set B [m] may not be secure aganst an eavesdropper who knows A B. Proof: Example 1 below proves ths clam. Example 1: Suppose that there are four recevers, where each recever [4] wants x,.e., W = {}; K 1 = {2}, K 2 = {1}, K 3 = {4}, K 4 = {3}. Consder two eavesdroppers: The frst eavesdropper has access to A 1 = {{3, 4}}; the second eavesdropper has access to A 2 = {{3}}. Clearly, the (determnstc) ndex code C = f(x) = (X 1 + X 2, X 3 + X 4 ), where + denotes addton of the fnte feld F q, s secure aganst the frst eavesdropper, because H(X C, X 3, X 4 ) = H(X ) for all {1, 2}. However, the code s not secure aganst the second eavesdropper because t can decode X 4. Proposton 1 s n contrast to secure network codng [9], where a network code that s strongly secure aganst an eavesdropper who knows a set of lnks, say B, s also secure aganst an eavesdropper who knows a subset of the lnks A B. The dfference s due to more securty constrants for an eavesdropper (n ndex codng) who knows fewer messages. Proposton 2: Consder a secure ndex-codng nstance I = ((K, W ) n =1, A). If there exst A A and [n] such that A [m], K A, and W A c. Then, no determnstc or randomsed secure ndex code exsts. Proof: Pck any j W A c. Any ndex code C = f(x) or C = f(x, K) for I must satsfy H(X j C, X A ) H(X j C, X K ) = 0. Snce H(X j C, X A ) = 0 < H(X j ) = log 2 q, no ndex code s secure. IV. EXISTENCE OF SECURE INDEX CODES In ths secton, we present a necessary and suffcent condton for the exstence of secure ndex codes, and ther constructon. Furthermore, we derve optmal secure ndex codes for some nstances. We begn by defnng a specfc class of eavesdroppers. Defnton 4: For a gven (K, W ) n =1, we say that an ndex code s secure aganst an eavesdropper wth t-level access, for some t {0, 1,..., m 1}, f and only f t s a secure ndex code for ((K, W ) n =1, {A [m] : A = t}). Lemma 1: Any (determnstc or randomsed) ndex code secure aganst an eavesdropper wth t-level access s also secure aganst an eavesdropper wth t -level access, for all t < t. Proof: Consder an eavesdropper wth t-level access, who has access to any member n A = {A [m] : A = t}. An ndex code that s secure aganst ths eavesdropper must satsfy H(X C, X A ) = H(X ), for all A A and all A c, (3) where C denotes the code output. Consder an eavesdropper wth access level t t 1, who has access to an A A = {B [m] : B = t }. Pck an [m] \ A = A c. Snce, t + 1 t m 1, we can always fnd some A A such that A A and A /. We have H(X ) (a) = H(X C, X A ) (b) H(X C, X A ) (c) H(X ),

3 where (a) follows from (3), and (b) (c) follow snce condtonng cannot ncrease entropy. Snce the choces of A and are arbtrary, we must have H(X C, X A ) = H(X ), for all A A and all A c. Thus, the ndex code s also secure aganst an eavesdropper wth t -level access. Remark 3: Lemma 1 generalses the result by Dau et al. [6, Theorem 4.9] that pertans specfcally to determnstc, lnear ndex codes to any (randomsed or determnstc, lnear or non-lnear) ndex code. Remark 4: Although Proposton 1 states that an ndex code secure aganst an eavesdropper knowng A may not be secure aganst an eavesdropper knowng A A, any ndex code that s secure aganst an eavesdropper wth t-level access s also secure aganst an eavesdropper wth access level t < t. A. A necessary and suffcent condton for the exstence of secure ndex codes, and ther constructon We now present a necessary and suffcent condton for the exstence of secure ndex codes. Theorem 1: Consder a secure ndex-codng nstance ((K, W ) n =1, A) wth A = {A [m] : A = t} for some t < m,.e., the eavesdropper has t-level access. Secure ndex codes exst f and only f t K mn 1, (4) where K mn mn [n] K. Furthermore, determnstc lnear secure ndex codes exst f (4) s satsfed. Proof: We frst prove the converse (the only f part). Suppose that t K mn. By defnton, there exsts a recever, say, wth K = K mn, and W. Let j W, meanng that K [m] \ {j}. Snce K mn t m 1, we can always fnd some A A such that K A [m] \ {j}. From Proposton 2, we conclude that no secure ndex code exsts. Next, we prove the forward part. Let x be a realsaton of X, and x be a realsaton of X. Consder a lnear ndex code of length l = m K mn, formed by c = xg = x g, (5) [m] where G s an m l matrx over F q, and g Fq l s the -th row of G. Let G be the transpose of the generatng matrx of a maxmum-dstance-separable (MDS) code, whch always exsts for a suffcently large q. For any such code, t follows that any l rows of G are lnearly ndependent. (Decodng) Recever [n] forms c x k g k = x j g j. (6) k K j [m]\k Snce [m] \ K = m K m K mn = l, t follows that {g j : j [m] \ K } must be lnearly ndependent. So, havng c and knowng {x k : k K }, recever can decode x [m]\k from (6). As, W [m] \ K, recever can decode all messages that t wants. (Securty) Denote the Hammng dstance between two vectors a = [a 1 a 2 a m ] Fq m and b = [b 1 b 2 b m ] Fq m by d(a, b) { [m] : a b }, the mnmum dstance of a vector space S by d(s) = mn {a,b S:a b} d(a, b), and the vector space spanned by the columns of G (each of length m) by colsp(g). Dau et al. [6] showed the lnear ndex code of the form (5) s secure aganst an eavesdropper wth access level d(colsp(g)) 2. Note that G T s the generator matrx of an MDS code (m, l, d) whose codewords are vectors n rowsp(g T ) (.e., the row space of G T ). The mnmum dstance of ths MDS code equals d = d(rowsp(g T )) = d(colsp(g)) = m l + 1. Invokng Lemma 1, we see that the ndex code (5) s secure aganst an eavesdropper wth access level up to (m l + 1) 2 = K mn 1. Some remarks are now n order. Remark 5: MDS codes are also used n the partal-clquecover codng scheme [1] and ts tme-shared verson [4], and the local-chromatc-number codng scheme [11] for uncast ndex codng, where K = {} for all recevers [n]. Remark 6: Note that recever cooperaton can ncrease the securty level. Suppose that we let two recevers, say and j, cooperate, n the sense that they share ther sde nformaton. Ths s equvalent to a new secure ndex-codng nstance where everythng remans the same except that both recevers and j now know K K j. Dong ths can only ncrease K mn, and wth a hgher K mn, we can construct ndex codes that are secure aganst eavesdroppers wth (up to) a hgher access level. Remark 7: Theorem 1 s also vald f we extend the securty constrant n Defnton 1 to b-block securty (defned by Dau et al. [6]), where for any A A, an eavesdropper who knows X A must have no nformaton about any b 1 messages he does not know,.e., H(X B C, X A ) = H(X B ), for all B A c wth B = b. In ths case, a necessary and suffcent condton for the exstence of secure ndex codes s t K mn b. Corollary 1.1: Determnstc lnear secure ndex codes exst for a secure ndex-codng nstance ((K, W ) n =1, A) f A max K mn 1, (7) where we defne A max max A A A. Proof: Proof follows from Theorem 1 and Lemma 1. Intutvely, Corollary 1.1 says that we can always fnd secure ndex codes f the eavesdropper can access fewer messages than each of the recevers. However, unlke Theorem 1, we do not have a converse for Corollary 1.1. Ths s because even f an eavesdropper can access (numercally) more messages than some recevers, we may stll be able to construct a secure ndex code, dependng on the set of messages the eavesdropper has access to. Here s an example supportng ths clam: Example 2: Consder a secure ndex-codng nstance wth m = n = 3, K 1 = {2}, K 2 = {1}, K 3 = {1, 2}, W 1 = {1}, W 2 = {2}, W 3 = {3}, A = {{3}}. Although A max = K mn = 1, the ndex code (X 1 + X 2, X 1 + X 2 + X 3 ) s secure. B. Optmalty of secure ndex codes From the constructon of the secure ndex codes n Theorem 1, we have the followng: Corollary 1.2: For a secure ndex-codng nstance I where A max K mn 1, the optmal secure ndex codelength s upper-bounded as s(i) m K mn. (8)

4 The upper bound achevable by determnstc lnear ndex codes. Proof: See the proof of Theorem 1. We say that a recever wth K W = [m] has complementary message requests. In other words, ths recever wants all messages that t does not know. Proposton 3: Consder a secure ndex-codng nstance I where A mn K mn 1. If any recever knowng K mn messages has complementary message requests, then s(i) = m K mn. (9) Proof: Wthout loss of generalty, let recever 1 be the recever wth the mnmum knowledge and has complementary message requests. Ths means K 1 = K mn. It follows from Corollary 1.2 that s(i) m K mn. For any ndex code C, we must have that H(X W1 C, X K1 ) = 0. Thus, m log 2 q = H(X K1, X W1 ) H(C, X K1, X W1 ) = H(C, X K1 ) + H(X W1 C, X K1 ) = H(C, X K1 ) H(C) + H(X K1 ) = H(C) + K mn log 2 q. For any ndex code C F l q, we must have H(C) log 2 q l, gvng l m K mn. So, s(i) = nf l m K mn. Snce the lower and upper bounds match, we have Proposton 3. V. SECURE INDEX CODING VS CLASSICAL INDEX CODING We can represent a secure ndex-codng nstance ((G, K ) n =1, A) by a drected bpartte graph D = (U, M, E), smlar to that by Neely, Tehran, and Zhang [12]. Here, U and M are ndependent vertex sets, where each arc (.e., drected edge) n E connects a vertex n U to a vertex n M. We further partton U nto two dsjont sets: R = {r 1, r 2,..., r n } representng the n recevers, and V = {v 1, v 2,..., v A } representng the possble sets of messages to whch the eavesdropper have access. The set M = [m] represents the message ndces. The arc set E s defned as follows: There s an arc from r R to j M f and only f recever knows the message x j,.e., x j K. There s an arc from j M to r R f and only f recever wants the message x j,.e., x j W. For each A A, we have a unque v V such that N + D (v ) = A, where N + D (v ) {j M : (v j) E} s the out-neghbourhood of v. For a gven secure ndex-codng nstance D, f we gnore the securty constrant, the subgraph nduced by (R, M), denoted as D[R M], s n fact the bpartte graph used by Neely et al. [12] to represent the classcal ndex-codng nstance. Proposton 4: Consder a secure ndex-codng nstance ((G, K ) n =1, A), where A {[m]}. Let D = ((R, V), M, E) be ts representaton. If (C1) D[R M] s acyclc, or equvalently, D s acyclc, and (C2) every message s wanted by some recever,.e., for each [m], we have x W j for some j [n], then no secure ndex code exsts. Proof: For the classcal ndex-codng nstance D[R M] (whch mples condton C2), Neely et al. [12, Appendx A] have shown that f condton C1 s true, one can obtan all messages from any ndex code, even wthout usng sde nformaton. Snce any secure ndex code for D, denoted by C, s an ndex code for D[R M], we have H(X [m] C) = 0. Therefore, for any A [m] and any [m] \ A, H(X C, X A ) H(X [m] C) = 0 < H(X ). (11) Snce A {[m]}, there exsts some A [m]. It follows from (11) that no ndex code can be secure. Condton C2 n Proposton 4 that every message s wanted by some recever s mplct n classcal ndex codng. Ths s because removng messages not wanted by any recever wll change nether the ndex code nor the optmal ndex codelength. However, removng ths type of messages may affect secure ndex codng, because these messages can act as pre-shared secret keys to protect the ndex code aganst the eavesdropper. The followng example llustrates ths dea. Example 3: Consder the followng secure ndex-codng nstance: 1 r 1 2 The message X 2 s not wanted by any recever. If we remove t from the setup, by nvokng Proposton 4, we conclude that there s no secure ndex code. However, keepng X 2 n the system, by nvokng Corollary 1.1, a secure ndex code exsts. Indeed, the ndex code C = X 1 + X 2 s secure. Here, X 2 acts as a secret key between the sender and recever 1 to protect message X 1 aganst the eavesdropper. VI. RANDOM KEYS FOR SECURE INDEX CODING We saw n Example 3 that usng messages not wanted by any recever as keys may be necessary to ensure securty. One wonders f generatng random keys unknown to the recevers and the eavesdropper can help n secure ndex codng. In the followng three scenaros, we show that random keys are not useful n the sense that randomsed secure ndex codes exst f and only f determnstc secure ndex codes also exst. A. Eavesdroppers wth t-level access From Theorem 1, t follows that usng random keys does not provde greater securty aganst an eavesdropper wth t-level access, for any t < m. B. Lnear ndex codes The followng result consders secure ndex codng aganst a more general eavesdropper who can access any one member of an arbtrary A and proves that f we restrct the secure ndex codes to be lnear, random keys are not useful. Theorem 2: Gven an ndex codng nstance ((K, W ) n =1, A) and l N, randomsed secure lnear ndex codes of codelength l exst for the nstance f and only f determnstc secure lnear ndex codes of codelength l also exst for the nstance. Proof: We only need to prove the only f drecton of the clam. Any randomsed lnear ndex code can be expressed as C = XG + Y G. Snce each recever recovers ts ntended v 1

5 messages, for each recever [n] and each j W, there exst an l 1 vector D,j and a K 1 vector E,j such that X j = CD,j + X K E,j. (12) Let V be defned as the nullspace of G,.e., V = Null( G) {A F l q : GA = 0}. (13) Note that V s a vector space. From (12), t follows that D,j V for any [n] and j W, snce X j X K E,j = CD,j = XGD,j + Y GD,j, (14) whch can hold only f GD,j = 0 for any [n] and j W. Now, let A 1,..., Aˆl be a bass for V. Note that ˆl l, snce V F l q. If the sender communcates Ĉ [Ĉ1 Ĉ2 Ĉˆl], where Ĉ = CA, [ˆl], then each recever wll stll be able to recover ts ntended messages, snce for any [m] and j W, X j X K E,j = CD,j s a lnear combnaton of Ĉ 1,..., Ĉˆl. Furthermore, for any A A and any j A c, H(X j ) H(X j X A, Ĉ) H(X j X A, C) = H(X j ), (15) where the second nequalty follows snce Ĉ s a functon of C. Hence, the new code Ĉ s also secure. The proof s then complete by notng that Ĉ s a determnstc ndex code. C. Eavesdroppers havng access to only one message subset Lastly, we consder the class of secure ndex-codng nstances where the eavesdropper can access only one message subset. Proposton 5: Gven an ndex-codng nstance I = ((K, W ) n =1, A) wth A = 1, randomsed secure ndex codes exst for the nstance f and only f determnstc secure ndex codes also exst for the nstance. Proof: Note that we only need to consder ndex-codng nstances where for each recever [n], ether (Type 1) K W A; (Type 2) K \ A and W \ A ; or (Type 3) K \ A and W A. Otherwse, accordng to Proposton 2, no (determnstc or randomsed) secure ndex code exsts. Let recevers {1, 2,..., n } be of Type 2, and the rest Type 1 or 3, for some 0 n n. Consder another ndex-codng nstance where we consder only messages X A c and recevers of Type 2 n I, denoted as I = ((K, W )n =1, A ), where A = { }, K = (K A c ), and W = (W A c ), for all [n ]. By the defnton of Type-2 recever, K 1 for all [n ]. For I, as A max = 0 and K mn 1, by nvokng Corollary 1.1, we see that there exsts a determnstc secure ndex code, say, C = f (X A c). Ths means that there exsts a functon g (C, X K ) = X W for each [n ], and H(X C ) = H(X ) for each A c. We now show that C = [X A C ] s a secure ndex code for I. For any recever of Type 1 or 3, ts decodng requrement s fulflled from observng X A, because W A. Any recever of Type 2 gets X W A by observng X A, and X W A c = X W from g, snce t knows X K X K. Fnally, H(X C, X A ) = H(X C, X A ) (a) = H(X C ) = H(X ), for all A c, snce (a) follows from the ndependence of (X, C ) and X A. Hence, C s a determnstc secure ndex code for I. So, for any I wth A = 1, ether no (determnstc or randomsed) secure ndex codes exst, or we can always fnd a determnstc secure ndex code. D. Dscusson: Index-codng network-codng equvalence Non-secure ndex- and non-secure network-codng problems are equvalent n the sense that for any non-secure networkcodng nstance, there s an equvalent non-secure ndex-codng nstance (and vce versa). Thus, a soluton for one nstance can be translated to a soluton for the other [7], [8]. Random keys are sometmes essental n guaranteeng securty n secure network codng. For example, consder a setup by Ca and Yeung [9] wth () a source havng two lnks to a recever, and () an eavesdropper who can lsten to any one lnk. Securty s only possble usng a random key, K, by sendng K on a lnk and K + X on the other, where X s the message. Here, the network code s lnear, and the eavesdropper has access level one (t can access any one lnk). Snce we have shown that random keys are not useful for ndex codng for eavesdroppers wth t-level access, and for lnear code ndex codes, ths example suggests a lack of equvalence between secure ndex codng and secure network codng. The transformaton from non-secure network to non-secure ndex codng s not applcable n the presence of securty constrants because the transformaton maps messages on outgong lnks n the network-codng nstance to ndependent messages requested by the recevers n the ndex-codng nstance, and messages on ncomng lnks to ther sde nformaton, whch nclude the keys on lnks leavng the source. So, n the (mapped) ndex-codng nstance, keys are gven to some recevers as sde nformaton, whch cannot be ncorporated nto a secure ndexcodng nstance wth random keys. REFERENCES [1] Y. Brk and T. Kol, Codng on demand by an nformed source (ISCOD) for effcent broadcast of dfferent supplemental data to cachng clents, IEEE Trans. Inf. Theory, 52 (6), pp , June [2] Z. Bar-Yossef, Y. Brk, T. S. Jayram, and T. Kol, Index codng wth sde nformaton, IEEE Trans. Inf. Theory, 57 (3), pp , Mar [3] A. Blasak, R. Klenberg, and E. Lubetzky, Broadcastng wth sde nformaton: Boundng and approxmatng the broadcast rate, IEEE Trans. Inf. Theory, 59 (9), pp , Sept [4] H. Yu and M. J. Neely, Dualty codes and the ntegralty gap bound for ndex codng, IEEE Trans. Inf. Theory, 60 (11), pp , Nov [5] F. Arbabjolfae, B. Bandemer, Y.-H. Km, E. Şaşoğlu, and L. Wang, On the capacty regon for ndex codng, n Proc. ISIT, 2013, pp [6] S. H. Dau, V. Skachek, and Y. M. Chee, On the securty of ndex codng wth sde nformaton, IEEE Trans. Inf. Theory, 58 (6), pp , June [7] S. El Rouayheb, A. Sprntson, and C. Georghades, On the ndex codng problem and ts relaton to network codng and matrod theory, IEEE Trans. Inf. Theory, 56 (7), pp , July [8] M. Effros, S. El Rouayheb, and M. Langberg, An equvalence between network codng and ndex codng, IEEE Trans. Inf. Theory, 61 (5), pp , May [9] N. Ca and R. W. Yeung, Secure network codng on wretap network, IEEE Trans. Inf. Theory, 57 (1), pp , Jan [10] M. M. Mojahedan, A. Gohar, and M. R. Aref, Perfectly secure ndex codng, n Proc. ISIT, 2015, pp [11] K. Shanmugam, A. G. Dmaks, and M. Langberg, Local graph colorng and ndex codng, n Proc. ISIT, 2013, pp [12] M. J. Neely, A. S. Tehran, and Z. Zhang, Dynamc ndex codng for wreless broadcast networks, n Proc. INFOCOM, 2012, pp

Secure Index Coding: Existence and Construction

Secure Index Coding: Existence and Construction Secure Index Codng: Exstence and Constructon Lawrence Ong 1, Badr N. Vellamb 2, Phee Lep Yeoh 3, Jörg Klewer 2, and Jnhong Yuan 4 1 The Unversty of Newcastle, Australa; 2 New Jersey Insttute of Technology,

More information

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)

For instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1) Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour

6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour 6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique

The Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique //00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

CHAPTER 2 DECOMPOSITION OF GRAPHS

CHAPTER 2 DECOMPOSITION OF GRAPHS CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

GSLM Operations Research II Fall 13/14

GSLM Operations Research II Fall 13/14 GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are

More information

Report on On-line Graph Coloring

Report on On-line Graph Coloring 2003 Fall Semester Comp 670K Onlne Algorthm Report on LO Yuet Me (00086365) cndylo@ust.hk Abstract Onlne algorthm deals wth data that has no future nformaton. Lots of examples demonstrate that onlne algorthm

More information

The Erdős Pósa property for vertex- and edge-disjoint odd cycles in graphs on orientable surfaces

The Erdős Pósa property for vertex- and edge-disjoint odd cycles in graphs on orientable surfaces Dscrete Mathematcs 307 (2007) 764 768 www.elsever.com/locate/dsc Note The Erdős Pósa property for vertex- and edge-dsjont odd cycles n graphs on orentable surfaces Ken-Ich Kawarabayash a, Atsuhro Nakamoto

More information

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach

Data Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer

More information

Ramsey numbers of cubes versus cliques

Ramsey numbers of cubes versus cliques Ramsey numbers of cubes versus clques Davd Conlon Jacob Fox Choongbum Lee Benny Sudakov Abstract The cube graph Q n s the skeleton of the n-dmensonal cube. It s an n-regular graph on 2 n vertces. The Ramsey

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

An Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane

An Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane An Approach n Colorng Sem-Regular Tlngs on the Hyperbolc Plane Ma Louse Antonette N De Las Peñas, mlp@mathscmathadmueduph Glenn R Lago, glago@yahoocom Math Department, Ateneo de Manla Unversty, Loyola

More information

5 The Primal-Dual Method

5 The Primal-Dual Method 5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton

More information

Tree Spanners for Bipartite Graphs and Probe Interval Graphs 1

Tree Spanners for Bipartite Graphs and Probe Interval Graphs 1 Algorthmca (2007) 47: 27 51 DOI: 10.1007/s00453-006-1209-y Algorthmca 2006 Sprnger Scence+Busness Meda, Inc. Tree Spanners for Bpartte Graphs and Probe Interval Graphs 1 Andreas Brandstädt, 2 Feodor F.

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

1 Introducton Gven a graph G = (V; E), a non-negatve cost on each edge n E, and a set of vertces Z V, the mnmum Stener problem s to nd a mnmum cost su

1 Introducton Gven a graph G = (V; E), a non-negatve cost on each edge n E, and a set of vertces Z V, the mnmum Stener problem s to nd a mnmum cost su Stener Problems on Drected Acyclc Graphs Tsan-sheng Hsu y, Kuo-Hu Tsa yz, Da-We Wang yz and D. T. Lee? September 1, 1995 Abstract In ths paper, we consder two varatons of the mnmum-cost Stener problem

More information

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming

Kent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems

More information

Lecture 5: Probability Distributions. Random Variables

Lecture 5: Probability Distributions. Random Variables Lecture 5: Probablty Dstrbutons Random Varables Probablty Dstrbutons Dscrete Random Varables Contnuous Random Varables and ther Dstrbutons Dscrete Jont Dstrbutons Contnuous Jont Dstrbutons Independent

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm

Non-Split Restrained Dominating Set of an Interval Graph Using an Algorithm Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,

More information

b * -Open Sets in Bispaces

b * -Open Sets in Bispaces Internatonal Journal of Mathematcs and Statstcs Inventon (IJMSI) E-ISSN: 2321 4767 P-ISSN: 2321-4759 wwwjmsorg Volume 4 Issue 6 August 2016 PP- 39-43 b * -Open Sets n Bspaces Amar Kumar Banerjee 1 and

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Hermite Splines in Lie Groups as Products of Geodesics

Hermite Splines in Lie Groups as Products of Geodesics Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

the nber of vertces n the graph. spannng tree T beng part of a par of maxmally dstant trees s called extremal. Extremal trees are useful n the mxed an

the nber of vertces n the graph. spannng tree T beng part of a par of maxmally dstant trees s called extremal. Extremal trees are useful n the mxed an On Central Spannng Trees of a Graph S. Bezrukov Unverstat-GH Paderborn FB Mathematk/Informatk Furstenallee 11 D{33102 Paderborn F. Kaderal, W. Poguntke FernUnverstat Hagen LG Kommunkatonssysteme Bergscher

More information

Distortion-Memory Tradeoffs in Cache-Aided Wireless Video Delivery

Distortion-Memory Tradeoffs in Cache-Aided Wireless Video Delivery Dstorton-Memory Tradeoffs n Cache-Aded Wreless Vdeo Delvery P. Hassanzadeh, E. Erkp, J. Llorca, A. Tulno arxv:1511.03932v1 [cs.it] 12 Nov 2015 Abstract Moble network operators are consderng cachng as one

More information

More on the Linear k-arboricity of Regular Graphs R. E. L. Aldred Department of Mathematics and Statistics University of Otago P.O. Box 56, Dunedin Ne

More on the Linear k-arboricity of Regular Graphs R. E. L. Aldred Department of Mathematics and Statistics University of Otago P.O. Box 56, Dunedin Ne More on the Lnear k-arborcty of Regular Graphs R E L Aldred Department of Mathematcs and Statstcs Unversty of Otago PO Box 56, Dunedn New Zealand Ncholas C Wormald Department of Mathematcs Unversty of

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

All-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University

All-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University Approxmate All-Pars shortest paths Approxmate dstance oracles Spanners and Emulators Ur Zwck Tel Avv Unversty Summer School on Shortest Paths (PATH05 DIKU, Unversty of Copenhagen All-Pars Shortest Paths

More information

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding

QoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons

More information

UNIT 2 : INEQUALITIES AND CONVEX SETS

UNIT 2 : INEQUALITIES AND CONVEX SETS UNT 2 : NEQUALTES AND CONVEX SETS ' Structure 2. ntroducton Objectves, nequaltes and ther Graphs Convex Sets and ther Geometry Noton of Convex Sets Extreme Ponts of Convex Set Hyper Planes and Half Spaces

More information

NETWORKS of dynamical systems appear in a variety of

NETWORKS of dynamical systems appear in a variety of Necessary and Suffcent Topologcal Condtons for Identfablty of Dynamcal Networks Henk J. van Waarde, Petro Tes, and M. Kanat Camlbel arxv:807.09v [math.oc] 2 Jul 208 Abstract Ths paper deals wth dynamcal

More information

Math Homotopy Theory Additional notes

Math Homotopy Theory Additional notes Math 527 - Homotopy Theory Addtonal notes Martn Frankland February 4, 2013 The category Top s not Cartesan closed. problem. In these notes, we explan how to remedy that 1 Compactly generated spaces Ths

More information

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints

Sum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan

More information

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky

Improving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

Chapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

On Some Entertaining Applications of the Concept of Set in Computer Science Course

On Some Entertaining Applications of the Concept of Set in Computer Science Course On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,

More information

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements

2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.

More information

3. CR parameters and Multi-Objective Fitness Function

3. CR parameters and Multi-Objective Fitness Function 3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft

More information

On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast

On Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast On Maxmzng the Lfetme of Delay-Senstve Wreless Sensor Networks wth Anycast Joohwan Km, Xaojun Ln, Ness B. Shroff, and Prasun Snha School of Electrcal and Computer Engneerng, Purdue Unversty Departments

More information

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES

More information

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding

Minimum Cost Optimization of Multicast Wireless Networks with Network Coding Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu

More information

Generalized Interlinked Cycle Cover for Index Coding

Generalized Interlinked Cycle Cover for Index Coding Generalized Interlinked Cycle Cover for Index Coding Chandra Thapa, Lawrence Ong, and Sarah J. Johnson School of Electrical Engineering and Computer Science, The University of Newcastle, Newcastle, Australia

More information

Communication-Minimal Partitioning and Data Alignment for Af"ne Nested Loops

Communication-Minimal Partitioning and Data Alignment for Afne Nested Loops Communcaton-Mnmal Parttonng and Data Algnment for Af"ne Nested Loops HYUK-JAE LEE 1 AND JOSÉ A. B. FORTES 2 1 Department of Computer Scence, Lousana Tech Unversty, Ruston, LA 71272, USA 2 School of Electrcal

More information

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE

ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton

More information

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints

TPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints TPL-ware Dsplacement-drven Detaled Placement Refnement wth Colorng Constrants Tao Ln Iowa State Unversty tln@astate.edu Chrs Chu Iowa State Unversty cnchu@astate.edu BSTRCT To mnmze the effect of process

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

Intra-Parametric Analysis of a Fuzzy MOLP

Intra-Parametric Analysis of a Fuzzy MOLP Intra-Parametrc Analyss of a Fuzzy MOLP a MIAO-LING WANG a Department of Industral Engneerng and Management a Mnghsn Insttute of Technology and Hsnchu Tawan, ROC b HSIAO-FAN WANG b Insttute of Industral

More information

CS 534: Computer Vision Model Fitting

CS 534: Computer Vision Model Fitting CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust

More information

Spatially Coupled Repeat-Accumulate Coded Cooperation

Spatially Coupled Repeat-Accumulate Coded Cooperation Spatally Coupled Repeat-Accumulate Coded Cooperaton Naok Takesh and Ko Ishbash Advanced Wreless Communcaton Research Center (AWCC) The Unversty of Electro-Communcatons, 1-5-1 Chofugaoka, Chofu-sh, Tokyo

More information

Lecture #15 Lecture Notes

Lecture #15 Lecture Notes Lecture #15 Lecture Notes The ocean water column s very much a 3-D spatal entt and we need to represent that structure n an economcal way to deal wth t n calculatons. We wll dscuss one way to do so, emprcal

More information

Clustering on antimatroids and convex geometries

Clustering on antimatroids and convex geometries Clusterng on antmatrods and convex geometres YULIA KEMPNER 1, ILYA MUCNIK 2 1 Department of Computer cence olon Academc Insttute of Technology 52 Golomb tr., P.O. Box 305, olon 58102 IRAEL 2 Department

More information

Covering Pairs in Directed Acyclic Graphs

Covering Pairs in Directed Acyclic Graphs Advance Access publcaton on 5 November 2014 c The Brtsh Computer Socety 2014. All rghts reserved. For Permssons, please emal: ournals.permssons@oup.com do:10.1093/comnl/bxu116 Coverng Pars n Drected Acyclc

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

1 Introducton Effcent and speedy recovery of electrc power networks followng a major outage, caused by a dsaster such as extreme weather or equpment f

1 Introducton Effcent and speedy recovery of electrc power networks followng a major outage, caused by a dsaster such as extreme weather or equpment f Effcent Recovery from Power Outage (Extended Summary) Sudpto Guha Λ Anna Moss y Joseph (Seff) Naor z Baruch Scheber x Abstract We study problems that are motvated by the real-lfe problem of effcent recovery

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT

APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT 3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

EXTENDED BIC CRITERION FOR MODEL SELECTION

EXTENDED BIC CRITERION FOR MODEL SELECTION IDIAP RESEARCH REPORT EXTEDED BIC CRITERIO FOR ODEL SELECTIO Itshak Lapdot Andrew orrs IDIAP-RR-0-4 Dalle olle Insttute for Perceptual Artfcal Intellgence P.O.Box 59 artgny Valas Swtzerland phone +4 7

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

ALEKSANDROV URYSOHN COMPACTNESS CRITERION ON INTUITIONISTIC FUZZY S * STRUCTURE SPACE

ALEKSANDROV URYSOHN COMPACTNESS CRITERION ON INTUITIONISTIC FUZZY S * STRUCTURE SPACE mercan Journal of Mathematcs and cences Vol. 5, No., (January-December, 206) Copyrght Mnd Reader Publcatons IN No: 2250-302 www.journalshub.com LEKNDROV URYOHN COMPCTNE CRITERION ON INTUITIONITIC FUZZY

More information

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors

Optimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Greedy Technique - Definition

Greedy Technique - Definition Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:

More information

Polyhedral Compilation Foundations

Polyhedral Compilation Foundations Polyhedral Complaton Foundatons Lous-Noël Pouchet pouchet@cse.oho-state.edu Dept. of Computer Scence and Engneerng, the Oho State Unversty Feb 8, 200 888., Class # Introducton: Polyhedral Complaton Foundatons

More information

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe

CSCI 104 Sorting Algorithms. Mark Redekopp David Kempe CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal

More information

Loop-Free Multipath Routing Using Generalized Diffusing Computations

Loop-Free Multipath Routing Using Generalized Diffusing Computations 1 Loop-Free Multpath Routng Usng Generalzed Dffusng Computatons Wllam T. Zaumen J.J. Garca-Luna-Aceves Sun Mcrosystems, Inc. Computer Engneerng Department 901 San Antono Avenue School of Engneerng Palo

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

The Multi-Sender Multicast Index Coding

The Multi-Sender Multicast Index Coding The Multi-Sender Multicast Index Coding Lawrence Ong The University of Newcastle, Australia Email: lawrence.ong@cantab.net Fabian Lim Massachusetts Institute of Technology, USA Email: flim@mit.edu Chin

More information

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR

SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR Judth Aronow Rchard Jarvnen Independent Consultant Dept of Math/Stat 559 Frost Wnona State Unversty Beaumont, TX 7776 Wnona, MN 55987 aronowju@hal.lamar.edu

More information

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme

A Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme Mathematcal and Computatonal Applcatons Artcle A Fve-Pont Subdvson Scheme wth Two Parameters and a Four-Pont Shape-Preservng Scheme Jeqng Tan,2, Bo Wang, * and Jun Sh School of Mathematcs, Hefe Unversty

More information

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure

Bridges and cut-vertices of Intuitionistic Fuzzy Graph Structure Internatonal Journal of Engneerng, Scence and Mathematcs (UGC Approved) Journal Homepage: http://www.jesm.co.n, Emal: jesmj@gmal.com Double-Blnd Peer Revewed Refereed Open Access Internatonal Journal -

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Distributed Degree Splitting, Edge Coloring, and Orientations

Distributed Degree Splitting, Edge Coloring, and Orientations Abstract Dstrbuted Degree Splttng, Edge Colorng, and Orentatons Mohsen Ghaffar MIT ghaffar@mt.edu We study a famly of closely-related dstrbuted graph problems, whch we call degree splttng, where roughly

More information

Approximating Clique and Biclique Problems*

Approximating Clique and Biclique Problems* Ž. JOURNAL OF ALGORITHMS 9, 17400 1998 ARTICLE NO. AL980964 Approxmatng Clque and Bclque Problems* Dort S. Hochbaum Department of Industral Engneerng and Operatons Research and Walter A. Haas School of

More information

Space-Optimal, Wait-Free Real-Time Synchronization

Space-Optimal, Wait-Free Real-Time Synchronization 1 Space-Optmal, Wat-Free Real-Tme Synchronzaton Hyeonjoong Cho, Bnoy Ravndran ECE Dept., Vrgna Tech Blacksburg, VA 24061, USA {hjcho,bnoy}@vt.edu E. Douglas Jensen The MITRE Corporaton Bedford, MA 01730,

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

AMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain

AMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain AMath 483/583 Lecture 21 May 13, 2011 Today: OpenMP and MPI versons of Jacob teraton Gauss-Sedel and SOR teratve methods Next week: More MPI Debuggng and totalvew GPU computng Read: Class notes and references

More information

Performance Evaluation of Information Retrieval Systems

Performance Evaluation of Information Retrieval Systems Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Lecture 4: Principal components

Lecture 4: Principal components /3/6 Lecture 4: Prncpal components 3..6 Multvarate lnear regresson MLR s optmal for the estmaton data...but poor for handlng collnear data Covarance matrx s not nvertble (large condton number) Robustness

More information

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar

CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vdyanagar Faculty Name: Am D. Trved Class: SYBCA Subject: US03CBCA03 (Advanced Data & Fle Structure) *UNIT 1 (ARRAYS AND TREES) **INTRODUCTION TO ARRAYS If we want

More information

Transaction-Consistent Global Checkpoints in a Distributed Database System

Transaction-Consistent Global Checkpoints in a Distributed Database System Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback

More information

LP Decoding. Martin J. Wainwright. Electrical Engineering and Computer Science UC Berkeley, CA,

LP Decoding. Martin J. Wainwright. Electrical Engineering and Computer Science UC Berkeley, CA, Jon Feldman LP Decodng Industral Engneerng and Operatons Research Columba Unversty, New York, NY, 10027 jonfeld@eor.columba.edu Martn J. Wanwrght Electrcal Engneerng and Computer Scence UC Berkeley, CA,

More information

Optimal Workload-based Weighted Wavelet Synopses

Optimal Workload-based Weighted Wavelet Synopses Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,

More information

A Geometric Approach for Multi-Degree Spline

A Geometric Approach for Multi-Degree Spline L X, Huang ZJ, Lu Z. A geometrc approach for mult-degree splne. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 27(4): 84 850 July 202. DOI 0.007/s390-02-268-2 A Geometrc Approach for Mult-Degree Splne Xn L

More information

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT

DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,

More information