Secure Index Coding: Existence and Construction
|
|
- Dominick Palmer
- 6 years ago
- Views:
Transcription
1 Secure Index Codng: Exstence and Constructon Lawrence Ong 1, Badr N. Vellamb 2, Phee Lep Yeoh 3, Jörg Klewer 2, and Jnhong Yuan 4 1 The Unversty of Newcastle, Australa; 2 New Jersey Insttute of Technology, USA; 3 Unversty of Melbourne, Australa; 4 Unversty of New South Wales, Australa arxv: v1 [cs.it] 2 Feb 2016 Abstract We nvestgate the constructon of secure ndex codes for a sender transmttng to multple recevers wth sde nformaton n the presence of an eavesdropper. We derve a suffcent and necessary condton for the exstence of ndex codes that are secure aganst an eavesdropper wth access to any subset of messages of cardnalty t, for any fxed t. In contrast to secure network codng, we show that random keys are not useful for three classes of ndex-codng nstances. I. INTRODUCTION In classcal or non-secure ndex-codng problems, a sender transmts multple messages to multple recevers through a common noseless broadcast medum, where each recever has a pror knowledge of a subset of messages [1] [5]. In ths work, we consder secure ndex codng, where n addton to the classcal ndex-codng setup, there s an eavesdropper who has access to one message subset from an arbtrary collecton of message subsets. A secure ndex code must satsfy all recevers decodng requrements, whle ensurng that the eavesdropper cannot decode the messages t cannot access. A. Contrbutons of ths paper and related work Exstence of secure ndex codes: Secure ndex codng was frst studed by Dau, Skachek, and Chee [6]. The authors derved condtons that any gven lnear code (of a gven message alphabet sze) must satsfy to smultaneously meet the recevers decodng requrements as well as be secure aganst an eavesdropper wth access to a message subset. In contrast to the code-centrc results by Dau et al., we obtan problem-centrc results. We derve a suffcent and necessary condton for the exstence of both lnear and non-lnear secure ndex codes over all fnte-feld alphabets for any ndex-codng problem where the eavesdropper can access any message subset of cardnalty t. Also, we show how to construct such codes f they exst, and nvestgate ther optmalty. Random keys: Next, we nvestgate the role of random keys for secure ndex codng, whch s motvated by () an equvalence between non-secure ndex codng and non-secure network codng [7], [8]; and () the usefulness of random keys n secure network codng [9], where t was shown that there exst randomsed secure network codes for nstances where no determnstc secure network code exsts. We prove that random keys are not useful for secure ndex codng under the followng three condtons: () the eavesdropper has access to any t messages, () the sender s Ths work s supported by the Australan Research Councl grants FT , DE , and DP , and US Natonal Scence Foundaton grants CNS and CCF encodng functon s lnear, or () the eavesdropper has access to only one message subset. The observaton that random keys are useful for secure lnear network codng [9], but not for secure lnear ndex codng, suggests that the equvalence between ndex codng and network codng may no longer hold under securty constrants. Note that, n ths work, random keys are generated by the sender, and are a pror unknown to the recevers and the eavesdropper. Ths s dfferent from the setup for secure ndex codng consdered by Mojahedan, Gohar, and Aref [10], where the keys are pre-shared among the sender and the recevers through addtonal channels not accessble by the eavesdropper. Secure vs classcal ndex codng: Fnally, we hghlght a sgnfcant dfference between classcal and secure ndex codng. In classcal ndex codng, unwanted messages are not useful and can be removed from the system. In secure ndex codng, unwanted messages may be used as secret keys between the sender and the recevers to construct secure ndex codes. II. PROBLEM DEFINITION AND NOTATION A classcal ndex-codng nstance conssts of a sngle sender and multple recevers [n] {1, 2,..., n}. The sender has m messages X = [X 1 X 2 X m ], where X for each [m] s ndependent and unformly dstrbuted over a fnte feld F q wth q elements. For a subset of ntegers I = { 1, 2,..., I } where 1 < 2 < < I, let X I [X 1 X 2 X I ]. Each recever [n] has a pror knowledge of X K for some K [m], and needs to decode X W for some W [m] \ K. The sender s to encode X and broadcast the coded symbols to all recevers so that each recever [n] uses the messages X K t already knows to decode X W. Wthout loss of generalty, we may assume W for all [n], snce recevers not wantng any message can be expunged from the problem. A secure ndex-codng nstance has, n addton, an eavesdropper who has access to X A, where A s any one member of A, where A s a non-empty collecton of subsets of [m]. The eavesdropper cannot smultaneously access messages from more than one member of A. The set A contans the possble subsets of ndces of compromsed messages. Whle the sender s aware of A, t s oblvous to the exact subset of ndces the eavesdropper knows. The sender s am s to desgn a code protectng each ndvdual message X j, j A c [m]\a, from beng decoded by the eavesdropper havng access to the ndex code and X A. Formally, we have the followng: Defnton 1 (Determnstc secure ndex code): For a secure ndex-codng nstance descrbed by I = ((K, W ) n =1, A), a determnstc secure ndex code conssts of the followng:
2 Sender s encodng functon f : Fq m Fq, l and For each [n], decodng functon g : Fq l F q K correspondng to recever, such that F W q (Decodablty) each recever [n] can decode the messages t wants,.e., g (f(x), X K ) = X W, and (Securty) for any A A, an eavesdropper accessng X A has no nformaton about any sngle message n A c,.e., H(X f(x), X A ) = H(X ) for all A c. Alternately, an ndex code (f, (g ) n =1 ) that meets the condtons n Defnton 1 s sad to be secure aganst an eavesdropper who has access to any message subset n A. Sometmes, t may be possble for the sender to use random keys (say Y ) along wth the messages X durng the encodng process to ensure securty aganst the eavesdropper. For such settngs, we have the followng noton of secure ndex codes: Defnton 2 (Randomsed secure ndex code): Let Y be a random varable takng values n a fnte alphabet Y, wth some probablty mass functon p Y (y). Y s known only to the sender, and unknown to all the recevers and the eavesdropper. A randomsed secure ndex code s the same as a determnstc ndex code wth the encodng functon at the sender replaced by f : Fq m Y Fq. l As such, the decodablty condton s g (f(x, Y ), X K ) = X W, and the securty condton H(X f(x, Y ), X A ) = H(X ). Randomsed secure ndex codes nclude determnstc secure ndex codes as a specal case by settng the key to be a constant. Defnton 3 (Lnear ndex code): A randomsed ndex code s lnear f and only f the key s Y = [Y 1 Y 2 Y k ], where each Y s ndependently and unformly dstrbuted over F q, and the encodng functon can be expressed as f(x, Y ) = XG + Y G, (1) where G and G are fxed matrces over F q of sze m l and k l, respectvely, that are known to all partes (the sender, the recevers, and the eavesdropper). Smlarly, a determnstc ndex code s lnear f and only f t can be expressed as f(x) = XG. Remark 1: In ths paper, we consder 1-block weakly-secure ndex codes [6], n the sense that the eavesdropper has no nformaton about any sngle message that t does not know, but t may gan some nformaton about X A c. Remark 2: If A = {[m]}, we have a classcal ndex-codng nstance wthout any securty constrant. We say that a secure ndex code exsts for an ndex-codng nstance I f there exsts a secure (determnstc or randomsed) secure ndex code for some q; we say that no secure ndex code exsts for I f there exsts nether determnstc nor randomsed secure ndex code for any q. As we wll see later, a secure ndex code may or may not exst dependng on A. For a gven secure ndex-codng nstance I, suppose that secure ndex codes exst. Then, the optmal ndex codelength s defned to be s(i) = nf mn l. (2) q f,g III. FUNDAMENTAL PROPERTIES We begn wth the followng counterntutve proposton: Proposton 1: An ndex code secure aganst an eavesdropper who knows a set B [m] may not be secure aganst an eavesdropper who knows A B. Proof: Example 1 below proves ths clam. Example 1: Suppose that there are four recevers, where each recever [4] wants x,.e., W = {}; K 1 = {2}, K 2 = {1}, K 3 = {4}, K 4 = {3}. Consder two eavesdroppers: The frst eavesdropper has access to A 1 = {{3, 4}}; the second eavesdropper has access to A 2 = {{3}}. Clearly, the (determnstc) ndex code C = f(x) = (X 1 + X 2, X 3 + X 4 ), where + denotes addton of the fnte feld F q, s secure aganst the frst eavesdropper, because H(X C, X 3, X 4 ) = H(X ) for all {1, 2}. However, the code s not secure aganst the second eavesdropper because t can decode X 4. Proposton 1 s n contrast to secure network codng [9], where a network code that s strongly secure aganst an eavesdropper who knows a set of lnks, say B, s also secure aganst an eavesdropper who knows a subset of the lnks A B. The dfference s due to more securty constrants for an eavesdropper (n ndex codng) who knows fewer messages. Proposton 2: Consder a secure ndex-codng nstance I = ((K, W ) n =1, A). If there exst A A and [n] such that A [m], K A, and W A c. Then, no determnstc or randomsed secure ndex code exsts. Proof: Pck any j W A c. Any ndex code C = f(x) or C = f(x, K) for I must satsfy H(X j C, X A ) H(X j C, X K ) = 0. Snce H(X j C, X A ) = 0 < H(X j ) = log 2 q, no ndex code s secure. IV. EXISTENCE OF SECURE INDEX CODES In ths secton, we present a necessary and suffcent condton for the exstence of secure ndex codes, and ther constructon. Furthermore, we derve optmal secure ndex codes for some nstances. We begn by defnng a specfc class of eavesdroppers. Defnton 4: For a gven (K, W ) n =1, we say that an ndex code s secure aganst an eavesdropper wth t-level access, for some t {0, 1,..., m 1}, f and only f t s a secure ndex code for ((K, W ) n =1, {A [m] : A = t}). Lemma 1: Any (determnstc or randomsed) ndex code secure aganst an eavesdropper wth t-level access s also secure aganst an eavesdropper wth t -level access, for all t < t. Proof: Consder an eavesdropper wth t-level access, who has access to any member n A = {A [m] : A = t}. An ndex code that s secure aganst ths eavesdropper must satsfy H(X C, X A ) = H(X ), for all A A and all A c, (3) where C denotes the code output. Consder an eavesdropper wth access level t t 1, who has access to an A A = {B [m] : B = t }. Pck an [m] \ A = A c. Snce, t + 1 t m 1, we can always fnd some A A such that A A and A /. We have H(X ) (a) = H(X C, X A ) (b) H(X C, X A ) (c) H(X ),
3 where (a) follows from (3), and (b) (c) follow snce condtonng cannot ncrease entropy. Snce the choces of A and are arbtrary, we must have H(X C, X A ) = H(X ), for all A A and all A c. Thus, the ndex code s also secure aganst an eavesdropper wth t -level access. Remark 3: Lemma 1 generalses the result by Dau et al. [6, Theorem 4.9] that pertans specfcally to determnstc, lnear ndex codes to any (randomsed or determnstc, lnear or non-lnear) ndex code. Remark 4: Although Proposton 1 states that an ndex code secure aganst an eavesdropper knowng A may not be secure aganst an eavesdropper knowng A A, any ndex code that s secure aganst an eavesdropper wth t-level access s also secure aganst an eavesdropper wth access level t < t. A. A necessary and suffcent condton for the exstence of secure ndex codes, and ther constructon We now present a necessary and suffcent condton for the exstence of secure ndex codes. Theorem 1: Consder a secure ndex-codng nstance ((K, W ) n =1, A) wth A = {A [m] : A = t} for some t < m,.e., the eavesdropper has t-level access. Secure ndex codes exst f and only f t K mn 1, (4) where K mn mn [n] K. Furthermore, determnstc lnear secure ndex codes exst f (4) s satsfed. Proof: We frst prove the converse (the only f part). Suppose that t K mn. By defnton, there exsts a recever, say, wth K = K mn, and W. Let j W, meanng that K [m] \ {j}. Snce K mn t m 1, we can always fnd some A A such that K A [m] \ {j}. From Proposton 2, we conclude that no secure ndex code exsts. Next, we prove the forward part. Let x be a realsaton of X, and x be a realsaton of X. Consder a lnear ndex code of length l = m K mn, formed by c = xg = x g, (5) [m] where G s an m l matrx over F q, and g Fq l s the -th row of G. Let G be the transpose of the generatng matrx of a maxmum-dstance-separable (MDS) code, whch always exsts for a suffcently large q. For any such code, t follows that any l rows of G are lnearly ndependent. (Decodng) Recever [n] forms c x k g k = x j g j. (6) k K j [m]\k Snce [m] \ K = m K m K mn = l, t follows that {g j : j [m] \ K } must be lnearly ndependent. So, havng c and knowng {x k : k K }, recever can decode x [m]\k from (6). As, W [m] \ K, recever can decode all messages that t wants. (Securty) Denote the Hammng dstance between two vectors a = [a 1 a 2 a m ] Fq m and b = [b 1 b 2 b m ] Fq m by d(a, b) { [m] : a b }, the mnmum dstance of a vector space S by d(s) = mn {a,b S:a b} d(a, b), and the vector space spanned by the columns of G (each of length m) by colsp(g). Dau et al. [6] showed the lnear ndex code of the form (5) s secure aganst an eavesdropper wth access level d(colsp(g)) 2. Note that G T s the generator matrx of an MDS code (m, l, d) whose codewords are vectors n rowsp(g T ) (.e., the row space of G T ). The mnmum dstance of ths MDS code equals d = d(rowsp(g T )) = d(colsp(g)) = m l + 1. Invokng Lemma 1, we see that the ndex code (5) s secure aganst an eavesdropper wth access level up to (m l + 1) 2 = K mn 1. Some remarks are now n order. Remark 5: MDS codes are also used n the partal-clquecover codng scheme [1] and ts tme-shared verson [4], and the local-chromatc-number codng scheme [11] for uncast ndex codng, where K = {} for all recevers [n]. Remark 6: Note that recever cooperaton can ncrease the securty level. Suppose that we let two recevers, say and j, cooperate, n the sense that they share ther sde nformaton. Ths s equvalent to a new secure ndex-codng nstance where everythng remans the same except that both recevers and j now know K K j. Dong ths can only ncrease K mn, and wth a hgher K mn, we can construct ndex codes that are secure aganst eavesdroppers wth (up to) a hgher access level. Remark 7: Theorem 1 s also vald f we extend the securty constrant n Defnton 1 to b-block securty (defned by Dau et al. [6]), where for any A A, an eavesdropper who knows X A must have no nformaton about any b 1 messages he does not know,.e., H(X B C, X A ) = H(X B ), for all B A c wth B = b. In ths case, a necessary and suffcent condton for the exstence of secure ndex codes s t K mn b. Corollary 1.1: Determnstc lnear secure ndex codes exst for a secure ndex-codng nstance ((K, W ) n =1, A) f A max K mn 1, (7) where we defne A max max A A A. Proof: Proof follows from Theorem 1 and Lemma 1. Intutvely, Corollary 1.1 says that we can always fnd secure ndex codes f the eavesdropper can access fewer messages than each of the recevers. However, unlke Theorem 1, we do not have a converse for Corollary 1.1. Ths s because even f an eavesdropper can access (numercally) more messages than some recevers, we may stll be able to construct a secure ndex code, dependng on the set of messages the eavesdropper has access to. Here s an example supportng ths clam: Example 2: Consder a secure ndex-codng nstance wth m = n = 3, K 1 = {2}, K 2 = {1}, K 3 = {1, 2}, W 1 = {1}, W 2 = {2}, W 3 = {3}, A = {{3}}. Although A max = K mn = 1, the ndex code (X 1 + X 2, X 1 + X 2 + X 3 ) s secure. B. Optmalty of secure ndex codes From the constructon of the secure ndex codes n Theorem 1, we have the followng: Corollary 1.2: For a secure ndex-codng nstance I where A max K mn 1, the optmal secure ndex codelength s upper-bounded as s(i) m K mn. (8)
4 The upper bound achevable by determnstc lnear ndex codes. Proof: See the proof of Theorem 1. We say that a recever wth K W = [m] has complementary message requests. In other words, ths recever wants all messages that t does not know. Proposton 3: Consder a secure ndex-codng nstance I where A mn K mn 1. If any recever knowng K mn messages has complementary message requests, then s(i) = m K mn. (9) Proof: Wthout loss of generalty, let recever 1 be the recever wth the mnmum knowledge and has complementary message requests. Ths means K 1 = K mn. It follows from Corollary 1.2 that s(i) m K mn. For any ndex code C, we must have that H(X W1 C, X K1 ) = 0. Thus, m log 2 q = H(X K1, X W1 ) H(C, X K1, X W1 ) = H(C, X K1 ) + H(X W1 C, X K1 ) = H(C, X K1 ) H(C) + H(X K1 ) = H(C) + K mn log 2 q. For any ndex code C F l q, we must have H(C) log 2 q l, gvng l m K mn. So, s(i) = nf l m K mn. Snce the lower and upper bounds match, we have Proposton 3. V. SECURE INDEX CODING VS CLASSICAL INDEX CODING We can represent a secure ndex-codng nstance ((G, K ) n =1, A) by a drected bpartte graph D = (U, M, E), smlar to that by Neely, Tehran, and Zhang [12]. Here, U and M are ndependent vertex sets, where each arc (.e., drected edge) n E connects a vertex n U to a vertex n M. We further partton U nto two dsjont sets: R = {r 1, r 2,..., r n } representng the n recevers, and V = {v 1, v 2,..., v A } representng the possble sets of messages to whch the eavesdropper have access. The set M = [m] represents the message ndces. The arc set E s defned as follows: There s an arc from r R to j M f and only f recever knows the message x j,.e., x j K. There s an arc from j M to r R f and only f recever wants the message x j,.e., x j W. For each A A, we have a unque v V such that N + D (v ) = A, where N + D (v ) {j M : (v j) E} s the out-neghbourhood of v. For a gven secure ndex-codng nstance D, f we gnore the securty constrant, the subgraph nduced by (R, M), denoted as D[R M], s n fact the bpartte graph used by Neely et al. [12] to represent the classcal ndex-codng nstance. Proposton 4: Consder a secure ndex-codng nstance ((G, K ) n =1, A), where A {[m]}. Let D = ((R, V), M, E) be ts representaton. If (C1) D[R M] s acyclc, or equvalently, D s acyclc, and (C2) every message s wanted by some recever,.e., for each [m], we have x W j for some j [n], then no secure ndex code exsts. Proof: For the classcal ndex-codng nstance D[R M] (whch mples condton C2), Neely et al. [12, Appendx A] have shown that f condton C1 s true, one can obtan all messages from any ndex code, even wthout usng sde nformaton. Snce any secure ndex code for D, denoted by C, s an ndex code for D[R M], we have H(X [m] C) = 0. Therefore, for any A [m] and any [m] \ A, H(X C, X A ) H(X [m] C) = 0 < H(X ). (11) Snce A {[m]}, there exsts some A [m]. It follows from (11) that no ndex code can be secure. Condton C2 n Proposton 4 that every message s wanted by some recever s mplct n classcal ndex codng. Ths s because removng messages not wanted by any recever wll change nether the ndex code nor the optmal ndex codelength. However, removng ths type of messages may affect secure ndex codng, because these messages can act as pre-shared secret keys to protect the ndex code aganst the eavesdropper. The followng example llustrates ths dea. Example 3: Consder the followng secure ndex-codng nstance: 1 r 1 2 The message X 2 s not wanted by any recever. If we remove t from the setup, by nvokng Proposton 4, we conclude that there s no secure ndex code. However, keepng X 2 n the system, by nvokng Corollary 1.1, a secure ndex code exsts. Indeed, the ndex code C = X 1 + X 2 s secure. Here, X 2 acts as a secret key between the sender and recever 1 to protect message X 1 aganst the eavesdropper. VI. RANDOM KEYS FOR SECURE INDEX CODING We saw n Example 3 that usng messages not wanted by any recever as keys may be necessary to ensure securty. One wonders f generatng random keys unknown to the recevers and the eavesdropper can help n secure ndex codng. In the followng three scenaros, we show that random keys are not useful n the sense that randomsed secure ndex codes exst f and only f determnstc secure ndex codes also exst. A. Eavesdroppers wth t-level access From Theorem 1, t follows that usng random keys does not provde greater securty aganst an eavesdropper wth t-level access, for any t < m. B. Lnear ndex codes The followng result consders secure ndex codng aganst a more general eavesdropper who can access any one member of an arbtrary A and proves that f we restrct the secure ndex codes to be lnear, random keys are not useful. Theorem 2: Gven an ndex codng nstance ((K, W ) n =1, A) and l N, randomsed secure lnear ndex codes of codelength l exst for the nstance f and only f determnstc secure lnear ndex codes of codelength l also exst for the nstance. Proof: We only need to prove the only f drecton of the clam. Any randomsed lnear ndex code can be expressed as C = XG + Y G. Snce each recever recovers ts ntended v 1
5 messages, for each recever [n] and each j W, there exst an l 1 vector D,j and a K 1 vector E,j such that X j = CD,j + X K E,j. (12) Let V be defned as the nullspace of G,.e., V = Null( G) {A F l q : GA = 0}. (13) Note that V s a vector space. From (12), t follows that D,j V for any [n] and j W, snce X j X K E,j = CD,j = XGD,j + Y GD,j, (14) whch can hold only f GD,j = 0 for any [n] and j W. Now, let A 1,..., Aˆl be a bass for V. Note that ˆl l, snce V F l q. If the sender communcates Ĉ [Ĉ1 Ĉ2 Ĉˆl], where Ĉ = CA, [ˆl], then each recever wll stll be able to recover ts ntended messages, snce for any [m] and j W, X j X K E,j = CD,j s a lnear combnaton of Ĉ 1,..., Ĉˆl. Furthermore, for any A A and any j A c, H(X j ) H(X j X A, Ĉ) H(X j X A, C) = H(X j ), (15) where the second nequalty follows snce Ĉ s a functon of C. Hence, the new code Ĉ s also secure. The proof s then complete by notng that Ĉ s a determnstc ndex code. C. Eavesdroppers havng access to only one message subset Lastly, we consder the class of secure ndex-codng nstances where the eavesdropper can access only one message subset. Proposton 5: Gven an ndex-codng nstance I = ((K, W ) n =1, A) wth A = 1, randomsed secure ndex codes exst for the nstance f and only f determnstc secure ndex codes also exst for the nstance. Proof: Note that we only need to consder ndex-codng nstances where for each recever [n], ether (Type 1) K W A; (Type 2) K \ A and W \ A ; or (Type 3) K \ A and W A. Otherwse, accordng to Proposton 2, no (determnstc or randomsed) secure ndex code exsts. Let recevers {1, 2,..., n } be of Type 2, and the rest Type 1 or 3, for some 0 n n. Consder another ndex-codng nstance where we consder only messages X A c and recevers of Type 2 n I, denoted as I = ((K, W )n =1, A ), where A = { }, K = (K A c ), and W = (W A c ), for all [n ]. By the defnton of Type-2 recever, K 1 for all [n ]. For I, as A max = 0 and K mn 1, by nvokng Corollary 1.1, we see that there exsts a determnstc secure ndex code, say, C = f (X A c). Ths means that there exsts a functon g (C, X K ) = X W for each [n ], and H(X C ) = H(X ) for each A c. We now show that C = [X A C ] s a secure ndex code for I. For any recever of Type 1 or 3, ts decodng requrement s fulflled from observng X A, because W A. Any recever of Type 2 gets X W A by observng X A, and X W A c = X W from g, snce t knows X K X K. Fnally, H(X C, X A ) = H(X C, X A ) (a) = H(X C ) = H(X ), for all A c, snce (a) follows from the ndependence of (X, C ) and X A. Hence, C s a determnstc secure ndex code for I. So, for any I wth A = 1, ether no (determnstc or randomsed) secure ndex codes exst, or we can always fnd a determnstc secure ndex code. D. Dscusson: Index-codng network-codng equvalence Non-secure ndex- and non-secure network-codng problems are equvalent n the sense that for any non-secure networkcodng nstance, there s an equvalent non-secure ndex-codng nstance (and vce versa). Thus, a soluton for one nstance can be translated to a soluton for the other [7], [8]. Random keys are sometmes essental n guaranteeng securty n secure network codng. For example, consder a setup by Ca and Yeung [9] wth () a source havng two lnks to a recever, and () an eavesdropper who can lsten to any one lnk. Securty s only possble usng a random key, K, by sendng K on a lnk and K + X on the other, where X s the message. Here, the network code s lnear, and the eavesdropper has access level one (t can access any one lnk). Snce we have shown that random keys are not useful for ndex codng for eavesdroppers wth t-level access, and for lnear code ndex codes, ths example suggests a lack of equvalence between secure ndex codng and secure network codng. The transformaton from non-secure network to non-secure ndex codng s not applcable n the presence of securty constrants because the transformaton maps messages on outgong lnks n the network-codng nstance to ndependent messages requested by the recevers n the ndex-codng nstance, and messages on ncomng lnks to ther sde nformaton, whch nclude the keys on lnks leavng the source. So, n the (mapped) ndex-codng nstance, keys are gven to some recevers as sde nformaton, whch cannot be ncorporated nto a secure ndexcodng nstance wth random keys. REFERENCES [1] Y. Brk and T. Kol, Codng on demand by an nformed source (ISCOD) for effcent broadcast of dfferent supplemental data to cachng clents, IEEE Trans. Inf. Theory, 52 (6), pp , June [2] Z. Bar-Yossef, Y. Brk, T. S. Jayram, and T. Kol, Index codng wth sde nformaton, IEEE Trans. Inf. Theory, 57 (3), pp , Mar [3] A. Blasak, R. Klenberg, and E. Lubetzky, Broadcastng wth sde nformaton: Boundng and approxmatng the broadcast rate, IEEE Trans. Inf. Theory, 59 (9), pp , Sept [4] H. Yu and M. J. Neely, Dualty codes and the ntegralty gap bound for ndex codng, IEEE Trans. Inf. Theory, 60 (11), pp , Nov [5] F. Arbabjolfae, B. Bandemer, Y.-H. Km, E. Şaşoğlu, and L. Wang, On the capacty regon for ndex codng, n Proc. ISIT, 2013, pp [6] S. H. Dau, V. Skachek, and Y. M. Chee, On the securty of ndex codng wth sde nformaton, IEEE Trans. Inf. Theory, 58 (6), pp , June [7] S. El Rouayheb, A. Sprntson, and C. Georghades, On the ndex codng problem and ts relaton to network codng and matrod theory, IEEE Trans. Inf. Theory, 56 (7), pp , July [8] M. Effros, S. El Rouayheb, and M. Langberg, An equvalence between network codng and ndex codng, IEEE Trans. Inf. Theory, 61 (5), pp , May [9] N. Ca and R. W. Yeung, Secure network codng on wretap network, IEEE Trans. Inf. Theory, 57 (1), pp , Jan [10] M. M. Mojahedan, A. Gohar, and M. R. Aref, Perfectly secure ndex codng, n Proc. ISIT, 2015, pp [11] K. Shanmugam, A. G. Dmaks, and M. Langberg, Local graph colorng and ndex codng, n Proc. ISIT, 2013, pp [12] M. J. Neely, A. S. Tehran, and Z. Zhang, Dynamc ndex codng for wreless broadcast networks, n Proc. INFOCOM, 2012, pp
Secure Index Coding: Existence and Construction
Secure Index Codng: Exstence and Constructon Lawrence Ong 1, Badr N. Vellamb 2, Phee Lep Yeoh 3, Jörg Klewer 2, and Jnhong Yuan 4 1 The Unversty of Newcastle, Australa; 2 New Jersey Insttute of Technology,
More informationFor instance, ; the five basic number-sets are increasingly more n A B & B A A = B (1)
Secton 1.2 Subsets and the Boolean operatons on sets If every element of the set A s an element of the set B, we say that A s a subset of B, or that A s contaned n B, or that B contans A, and we wrte A
More informationPrivate Information Retrieval (PIR)
2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market
More informationCompiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz
Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster
More informationAn Optimal Algorithm for Prufer Codes *
J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,
More informationParallelism for Nested Loops with Non-uniform and Flow Dependences
Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr
More information6.854 Advanced Algorithms Petar Maymounkov Problem Set 11 (November 23, 2005) With: Benjamin Rossman, Oren Weimann, and Pouya Kheradpour
6.854 Advanced Algorthms Petar Maymounkov Problem Set 11 (November 23, 2005) Wth: Benjamn Rossman, Oren Wemann, and Pouya Kheradpour Problem 1. We reduce vertex cover to MAX-SAT wth weghts, such that the
More informationAn Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices
Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal
More informationThe Greedy Method. Outline and Reading. Change Money Problem. Greedy Algorithms. Applications of the Greedy Strategy. The Greedy Method Technique
//00 :0 AM Outlne and Readng The Greedy Method The Greedy Method Technque (secton.) Fractonal Knapsack Problem (secton..) Task Schedulng (secton..) Mnmum Spannng Trees (secton.) Change Money Problem Greedy
More informationNetwork Coding as a Dynamical System
Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.
More informationCHAPTER 2 DECOMPOSITION OF GRAPHS
CHAPTER DECOMPOSITION OF GRAPHS. INTRODUCTION A graph H s called a Supersubdvson of a graph G f H s obtaned from G by replacng every edge uv of G by a bpartte graph,m (m may vary for each edge by dentfyng
More informationModule Management Tool in Software Development Organizations
Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,
More informationGSLM Operations Research II Fall 13/14
GSLM 58 Operatons Research II Fall /4 6. Separable Programmng Consder a general NLP mn f(x) s.t. g j (x) b j j =. m. Defnton 6.. The NLP s a separable program f ts objectve functon and all constrants are
More informationReport on On-line Graph Coloring
2003 Fall Semester Comp 670K Onlne Algorthm Report on LO Yuet Me (00086365) cndylo@ust.hk Abstract Onlne algorthm deals wth data that has no future nformaton. Lots of examples demonstrate that onlne algorthm
More informationThe Erdős Pósa property for vertex- and edge-disjoint odd cycles in graphs on orientable surfaces
Dscrete Mathematcs 307 (2007) 764 768 www.elsever.com/locate/dsc Note The Erdős Pósa property for vertex- and edge-dsjont odd cycles n graphs on orentable surfaces Ken-Ich Kawarabayash a, Atsuhro Nakamoto
More informationData Representation in Digital Design, a Single Conversion Equation and a Formal Languages Approach
Data Representaton n Dgtal Desgn, a Sngle Converson Equaton and a Formal Languages Approach Hassan Farhat Unversty of Nebraska at Omaha Abstract- In the study of data representaton n dgtal desgn and computer
More informationRamsey numbers of cubes versus cliques
Ramsey numbers of cubes versus clques Davd Conlon Jacob Fox Choongbum Lee Benny Sudakov Abstract The cube graph Q n s the skeleton of the n-dmensonal cube. It s an n-regular graph on 2 n vertces. The Ramsey
More informationA NOTE ON FUZZY CLOSURE OF A FUZZY SET
(JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,
More informationAn Approach in Coloring Semi-Regular Tilings on the Hyperbolic Plane
An Approach n Colorng Sem-Regular Tlngs on the Hyperbolc Plane Ma Louse Antonette N De Las Peñas, mlp@mathscmathadmueduph Glenn R Lago, glago@yahoocom Math Department, Ateneo de Manla Unversty, Loyola
More information5 The Primal-Dual Method
5 The Prmal-Dual Method Orgnally desgned as a method for solvng lnear programs, where t reduces weghted optmzaton problems to smpler combnatoral ones, the prmal-dual method (PDM) has receved much attenton
More informationTree Spanners for Bipartite Graphs and Probe Interval Graphs 1
Algorthmca (2007) 47: 27 51 DOI: 10.1007/s00453-006-1209-y Algorthmca 2006 Sprnger Scence+Busness Meda, Inc. Tree Spanners for Bpartte Graphs and Probe Interval Graphs 1 Andreas Brandstädt, 2 Feodor F.
More informationA mathematical programming approach to the analysis, design and scheduling of offshore oilfields
17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and
More information1 Introducton Gven a graph G = (V; E), a non-negatve cost on each edge n E, and a set of vertces Z V, the mnmum Stener problem s to nd a mnmum cost su
Stener Problems on Drected Acyclc Graphs Tsan-sheng Hsu y, Kuo-Hu Tsa yz, Da-We Wang yz and D. T. Lee? September 1, 1995 Abstract In ths paper, we consder two varatons of the mnmum-cost Stener problem
More informationKent State University CS 4/ Design and Analysis of Algorithms. Dept. of Math & Computer Science LECT-16. Dynamic Programming
CS 4/560 Desgn and Analyss of Algorthms Kent State Unversty Dept. of Math & Computer Scence LECT-6 Dynamc Programmng 2 Dynamc Programmng Dynamc Programmng, lke the dvde-and-conquer method, solves problems
More informationLecture 5: Probability Distributions. Random Variables
Lecture 5: Probablty Dstrbutons Random Varables Probablty Dstrbutons Dscrete Random Varables Contnuous Random Varables and ther Dstrbutons Dscrete Jont Dstrbutons Contnuous Jont Dstrbutons Independent
More informationAnalysis of Continuous Beams in General
Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,
More informationS1 Note. Basis functions.
S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type
More informationNon-Split Restrained Dominating Set of an Interval Graph Using an Algorithm
Internatonal Journal of Advancements n Research & Technology, Volume, Issue, July- ISS - on-splt Restraned Domnatng Set of an Interval Graph Usng an Algorthm ABSTRACT Dr.A.Sudhakaraah *, E. Gnana Deepka,
More informationb * -Open Sets in Bispaces
Internatonal Journal of Mathematcs and Statstcs Inventon (IJMSI) E-ISSN: 2321 4767 P-ISSN: 2321-4759 wwwjmsorg Volume 4 Issue 6 August 2016 PP- 39-43 b * -Open Sets n Bspaces Amar Kumar Banerjee 1 and
More informationProblem Set 3 Solutions
Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,
More informationHermite Splines in Lie Groups as Products of Geodesics
Hermte Splnes n Le Groups as Products of Geodescs Ethan Eade Updated May 28, 2017 1 Introducton 1.1 Goal Ths document defnes a curve n the Le group G parametrzed by tme and by structural parameters n the
More informationArray transposition in CUDA shared memory
Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some
More informationthe nber of vertces n the graph. spannng tree T beng part of a par of maxmally dstant trees s called extremal. Extremal trees are useful n the mxed an
On Central Spannng Trees of a Graph S. Bezrukov Unverstat-GH Paderborn FB Mathematk/Informatk Furstenallee 11 D{33102 Paderborn F. Kaderal, W. Poguntke FernUnverstat Hagen LG Kommunkatonssysteme Bergscher
More informationDistortion-Memory Tradeoffs in Cache-Aided Wireless Video Delivery
Dstorton-Memory Tradeoffs n Cache-Aded Wreless Vdeo Delvery P. Hassanzadeh, E. Erkp, J. Llorca, A. Tulno arxv:1511.03932v1 [cs.it] 12 Nov 2015 Abstract Moble network operators are consderng cachng as one
More informationMore on the Linear k-arboricity of Regular Graphs R. E. L. Aldred Department of Mathematics and Statistics University of Otago P.O. Box 56, Dunedin Ne
More on the Lnear k-arborcty of Regular Graphs R E L Aldred Department of Mathematcs and Statstcs Unversty of Otago PO Box 56, Dunedn New Zealand Ncholas C Wormald Department of Mathematcs Unversty of
More informationCMPS 10 Introduction to Computer Science Lecture Notes
CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not
More informationAll-Pairs Shortest Paths. Approximate All-Pairs shortest paths Approximate distance oracles Spanners and Emulators. Uri Zwick Tel Aviv University
Approxmate All-Pars shortest paths Approxmate dstance oracles Spanners and Emulators Ur Zwck Tel Avv Unversty Summer School on Shortest Paths (PATH05 DIKU, Unversty of Copenhagen All-Pars Shortest Paths
More informationQoS-aware routing for heterogeneous layered unicast transmissions in wireless mesh networks with cooperative network coding
Tarno et al. EURASIP Journal on Wreless Communcatons and Networkng 214, 214:81 http://wcn.euraspournals.com/content/214/1/81 RESEARCH Open Access QoS-aware routng for heterogeneous layered uncast transmssons
More informationUNIT 2 : INEQUALITIES AND CONVEX SETS
UNT 2 : NEQUALTES AND CONVEX SETS ' Structure 2. ntroducton Objectves, nequaltes and ther Graphs Convex Sets and ther Geometry Noton of Convex Sets Extreme Ponts of Convex Set Hyper Planes and Half Spaces
More informationNETWORKS of dynamical systems appear in a variety of
Necessary and Suffcent Topologcal Condtons for Identfablty of Dynamcal Networks Henk J. van Waarde, Petro Tes, and M. Kanat Camlbel arxv:807.09v [math.oc] 2 Jul 208 Abstract Ths paper deals wth dynamcal
More informationMath Homotopy Theory Additional notes
Math 527 - Homotopy Theory Addtonal notes Martn Frankland February 4, 2013 The category Top s not Cartesan closed. problem. In these notes, we explan how to remedy that 1 Compactly generated spaces Ths
More informationSum of Linear and Fractional Multiobjective Programming Problem under Fuzzy Rules Constraints
Australan Journal of Basc and Appled Scences, 2(4): 1204-1208, 2008 ISSN 1991-8178 Sum of Lnear and Fractonal Multobjectve Programmng Problem under Fuzzy Rules Constrants 1 2 Sanjay Jan and Kalash Lachhwan
More informationImproving Low Density Parity Check Codes Over the Erasure Channel. The Nelder Mead Downhill Simplex Method. Scott Stransky
Improvng Low Densty Party Check Codes Over the Erasure Channel The Nelder Mead Downhll Smplex Method Scott Stransky Programmng n conjuncton wth: Bors Cukalovc 18.413 Fnal Project Sprng 2004 Page 1 Abstract
More informationConstructing Minimum Connected Dominating Set: Algorithmic approach
Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected
More informationChapter 6 Programmng the fnte element method Inow turn to the man subject of ths book: The mplementaton of the fnte element algorthm n computer programs. In order to make my dscusson as straghtforward
More informationRelated-Mode Attacks on CTR Encryption Mode
Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory
More informationOn Some Entertaining Applications of the Concept of Set in Computer Science Course
On Some Entertanng Applcatons of the Concept of Set n Computer Scence Course Krasmr Yordzhev *, Hrstna Kostadnova ** * Assocate Professor Krasmr Yordzhev, Ph.D., Faculty of Mathematcs and Natural Scences,
More information2x x l. Module 3: Element Properties Lecture 4: Lagrange and Serendipity Elements
Module 3: Element Propertes Lecture : Lagrange and Serendpty Elements 5 In last lecture note, the nterpolaton functons are derved on the bass of assumed polynomal from Pascal s trangle for the fled varable.
More information3. CR parameters and Multi-Objective Fitness Function
3 CR parameters and Mult-objectve Ftness Functon 41 3. CR parameters and Mult-Objectve Ftness Functon 3.1. Introducton Cogntve rados dynamcally confgure the wreless communcaton system, whch takes beneft
More informationOn Maximizing the Lifetime of Delay-Sensitive Wireless Sensor Networks with Anycast
On Maxmzng the Lfetme of Delay-Senstve Wreless Sensor Networks wth Anycast Joohwan Km, Xaojun Ln, Ness B. Shroff, and Prasun Snha School of Electrcal and Computer Engneerng, Purdue Unversty Departments
More informationVISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES
UbCC 2011, Volume 6, 5002981-x manuscrpts OPEN ACCES UbCC Journal ISSN 1992-8424 www.ubcc.org VISUAL SELECTION OF SURFACE FEATURES DURING THEIR GEOMETRIC SIMULATION WITH THE HELP OF COMPUTER TECHNOLOGIES
More informationMinimum Cost Optimization of Multicast Wireless Networks with Network Coding
Mnmum Cost Optmzaton of Multcast Wreless Networks wth Network Codng Chengyu Xong and Xaohua L Department of ECE, State Unversty of New York at Bnghamton, Bnghamton, NY 13902 Emal: {cxong1, xl}@bnghamton.edu
More informationGeneralized Interlinked Cycle Cover for Index Coding
Generalized Interlinked Cycle Cover for Index Coding Chandra Thapa, Lawrence Ong, and Sarah J. Johnson School of Electrical Engineering and Computer Science, The University of Newcastle, Newcastle, Australia
More informationCommunication-Minimal Partitioning and Data Alignment for Af"ne Nested Loops
Communcaton-Mnmal Parttonng and Data Algnment for Af"ne Nested Loops HYUK-JAE LEE 1 AND JOSÉ A. B. FORTES 2 1 Department of Computer Scence, Lousana Tech Unversty, Ruston, LA 71272, USA 2 School of Electrcal
More informationON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE
Yordzhev K., Kostadnova H. Інформаційні технології в освіті ON SOME ENTERTAINING APPLICATIONS OF THE CONCEPT OF SET IN COMPUTER SCIENCE COURSE Yordzhev K., Kostadnova H. Some aspects of programmng educaton
More informationTPL-Aware Displacement-driven Detailed Placement Refinement with Coloring Constraints
TPL-ware Dsplacement-drven Detaled Placement Refnement wth Colorng Constrants Tao Ln Iowa State Unversty tln@astate.edu Chrs Chu Iowa State Unversty cnchu@astate.edu BSTRCT To mnmze the effect of process
More informationSolving two-person zero-sum game by Matlab
Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by
More informationIntra-Parametric Analysis of a Fuzzy MOLP
Intra-Parametrc Analyss of a Fuzzy MOLP a MIAO-LING WANG a Department of Industral Engneerng and Management a Mnghsn Insttute of Technology and Hsnchu Tawan, ROC b HSIAO-FAN WANG b Insttute of Industral
More informationCS 534: Computer Vision Model Fitting
CS 534: Computer Vson Model Fttng Sprng 004 Ahmed Elgammal Dept of Computer Scence CS 534 Model Fttng - 1 Outlnes Model fttng s mportant Least-squares fttng Maxmum lkelhood estmaton MAP estmaton Robust
More informationSpatially Coupled Repeat-Accumulate Coded Cooperation
Spatally Coupled Repeat-Accumulate Coded Cooperaton Naok Takesh and Ko Ishbash Advanced Wreless Communcaton Research Center (AWCC) The Unversty of Electro-Communcatons, 1-5-1 Chofugaoka, Chofu-sh, Tokyo
More informationLecture #15 Lecture Notes
Lecture #15 Lecture Notes The ocean water column s very much a 3-D spatal entt and we need to represent that structure n an economcal way to deal wth t n calculatons. We wll dscuss one way to do so, emprcal
More informationClustering on antimatroids and convex geometries
Clusterng on antmatrods and convex geometres YULIA KEMPNER 1, ILYA MUCNIK 2 1 Department of Computer cence olon Academc Insttute of Technology 52 Golomb tr., P.O. Box 305, olon 58102 IRAEL 2 Department
More informationCovering Pairs in Directed Acyclic Graphs
Advance Access publcaton on 5 November 2014 c The Brtsh Computer Socety 2014. All rghts reserved. For Permssons, please emal: ournals.permssons@oup.com do:10.1093/comnl/bxu116 Coverng Pars n Drected Acyclc
More informationAnalysis of Collaborative Distributed Admission Control in x Networks
1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,
More information1 Introducton Effcent and speedy recovery of electrc power networks followng a major outage, caused by a dsaster such as extreme weather or equpment f
Effcent Recovery from Power Outage (Extended Summary) Sudpto Guha Λ Anna Moss y Joseph (Seff) Naor z Baruch Scheber x Abstract We study problems that are motvated by the real-lfe problem of effcent recovery
More informationTN348: Openlab Module - Colocalization
TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages
More informationAPPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT
3. - 5. 5., Brno, Czech Republc, EU APPLICATION OF MULTIVARIATE LOSS FUNCTION FOR ASSESSMENT OF THE QUALITY OF TECHNOLOGICAL PROCESS MANAGEMENT Abstract Josef TOŠENOVSKÝ ) Lenka MONSPORTOVÁ ) Flp TOŠENOVSKÝ
More informationA Binarization Algorithm specialized on Document Images and Photos
A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a
More informationVirtual Machine Migration based on Trust Measurement of Computer Node
Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on
More informationEXTENDED BIC CRITERION FOR MODEL SELECTION
IDIAP RESEARCH REPORT EXTEDED BIC CRITERIO FOR ODEL SELECTIO Itshak Lapdot Andrew orrs IDIAP-RR-0-4 Dalle olle Insttute for Perceptual Artfcal Intellgence P.O.Box 59 artgny Valas Swtzerland phone +4 7
More informationCordial and 3-Equitable Labeling for Some Star Related Graphs
Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,
More informationLoad-Balanced Anycast Routing
Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance
More informationSLAM Summer School 2006 Practical 2: SLAM using Monocular Vision
SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,
More informationALEKSANDROV URYSOHN COMPACTNESS CRITERION ON INTUITIONISTIC FUZZY S * STRUCTURE SPACE
mercan Journal of Mathematcs and cences Vol. 5, No., (January-December, 206) Copyrght Mnd Reader Publcatons IN No: 2250-302 www.journalshub.com LEKNDROV URYOHN COMPCTNE CRITERION ON INTUITIONITIC FUZZY
More informationOptimal Fault-Tolerant Routing in Hypercubes Using Extended Safety Vectors
Optmal Fault-Tolerant Routng n Hypercubes Usng Extended Safety Vectors Je Wu Department of Computer Scence and Engneerng Florda Atlantc Unversty Boca Raton, FL 3343 Feng Gao, Zhongcheng L, and Ynghua Mn
More informationThe Codesign Challenge
ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.
More informationGreedy Technique - Definition
Greedy Technque Greedy Technque - Defnton The greedy method s a general algorthm desgn paradgm, bult on the follong elements: confguratons: dfferent choces, collectons, or values to fnd objectve functon:
More informationPolyhedral Compilation Foundations
Polyhedral Complaton Foundatons Lous-Noël Pouchet pouchet@cse.oho-state.edu Dept. of Computer Scence and Engneerng, the Oho State Unversty Feb 8, 200 888., Class # Introducton: Polyhedral Complaton Foundatons
More informationCSCI 104 Sorting Algorithms. Mark Redekopp David Kempe
CSCI 104 Sortng Algorthms Mark Redekopp Davd Kempe Algorthm Effcency SORTING 2 Sortng If we have an unordered lst, sequental search becomes our only choce If we wll perform a lot of searches t may be benefcal
More informationLoop-Free Multipath Routing Using Generalized Diffusing Computations
1 Loop-Free Multpath Routng Usng Generalzed Dffusng Computatons Wllam T. Zaumen J.J. Garca-Luna-Aceves Sun Mcrosystems, Inc. Computer Engneerng Department 901 San Antono Avenue School of Engneerng Palo
More informationComplex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.
Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal
More informationThe Multi-Sender Multicast Index Coding
The Multi-Sender Multicast Index Coding Lawrence Ong The University of Newcastle, Australia Email: lawrence.ong@cantab.net Fabian Lim Massachusetts Institute of Technology, USA Email: flim@mit.edu Chin
More informationSENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR
SENSITIVITY ANALYSIS IN LINEAR PROGRAMMING USING A CALCULATOR Judth Aronow Rchard Jarvnen Independent Consultant Dept of Math/Stat 559 Frost Wnona State Unversty Beaumont, TX 7776 Wnona, MN 55987 aronowju@hal.lamar.edu
More informationA Five-Point Subdivision Scheme with Two Parameters and a Four-Point Shape-Preserving Scheme
Mathematcal and Computatonal Applcatons Artcle A Fve-Pont Subdvson Scheme wth Two Parameters and a Four-Pont Shape-Preservng Scheme Jeqng Tan,2, Bo Wang, * and Jun Sh School of Mathematcs, Hefe Unversty
More informationBridges and cut-vertices of Intuitionistic Fuzzy Graph Structure
Internatonal Journal of Engneerng, Scence and Mathematcs (UGC Approved) Journal Homepage: http://www.jesm.co.n, Emal: jesmj@gmal.com Double-Blnd Peer Revewed Refereed Open Access Internatonal Journal -
More informationA MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS
Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung
More informationDistributed Degree Splitting, Edge Coloring, and Orientations
Abstract Dstrbuted Degree Splttng, Edge Colorng, and Orentatons Mohsen Ghaffar MIT ghaffar@mt.edu We study a famly of closely-related dstrbuted graph problems, whch we call degree splttng, where roughly
More informationApproximating Clique and Biclique Problems*
Ž. JOURNAL OF ALGORITHMS 9, 17400 1998 ARTICLE NO. AL980964 Approxmatng Clque and Bclque Problems* Dort S. Hochbaum Department of Industral Engneerng and Operatons Research and Walter A. Haas School of
More informationSpace-Optimal, Wait-Free Real-Time Synchronization
1 Space-Optmal, Wat-Free Real-Tme Synchronzaton Hyeonjoong Cho, Bnoy Ravndran ECE Dept., Vrgna Tech Blacksburg, VA 24061, USA {hjcho,bnoy}@vt.edu E. Douglas Jensen The MITRE Corporaton Bedford, MA 01730,
More informationA Topology-aware Random Walk
A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble
More informationAMath 483/583 Lecture 21 May 13, Notes: Notes: Jacobi iteration. Notes: Jacobi with OpenMP coarse grain
AMath 483/583 Lecture 21 May 13, 2011 Today: OpenMP and MPI versons of Jacob teraton Gauss-Sedel and SOR teratve methods Next week: More MPI Debuggng and totalvew GPU computng Read: Class notes and references
More informationPerformance Evaluation of Information Retrieval Systems
Why System Evaluaton? Performance Evaluaton of Informaton Retreval Systems Many sldes n ths secton are adapted from Prof. Joydeep Ghosh (UT ECE) who n turn adapted them from Prof. Dk Lee (Unv. of Scence
More informationProblem Definitions and Evaluation Criteria for Computational Expensive Optimization
Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty
More informationLecture 4: Principal components
/3/6 Lecture 4: Prncpal components 3..6 Multvarate lnear regresson MLR s optmal for the estmaton data...but poor for handlng collnear data Covarance matrx s not nvertble (large condton number) Robustness
More informationCHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vidyanagar
CHARUTAR VIDYA MANDAL S SEMCOM Vallabh Vdyanagar Faculty Name: Am D. Trved Class: SYBCA Subject: US03CBCA03 (Advanced Data & Fle Structure) *UNIT 1 (ARRAYS AND TREES) **INTRODUCTION TO ARRAYS If we want
More informationTransaction-Consistent Global Checkpoints in a Distributed Database System
Proceedngs of the World Congress on Engneerng 2008 Vol I Transacton-Consstent Global Checkponts n a Dstrbuted Database System Jang Wu, D. Manvannan and Bhavan Thurasngham Abstract Checkpontng and rollback
More informationLP Decoding. Martin J. Wainwright. Electrical Engineering and Computer Science UC Berkeley, CA,
Jon Feldman LP Decodng Industral Engneerng and Operatons Research Columba Unversty, New York, NY, 10027 jonfeld@eor.columba.edu Martn J. Wanwrght Electrcal Engneerng and Computer Scence UC Berkeley, CA,
More informationOptimal Workload-based Weighted Wavelet Synopses
Optmal Workload-based Weghted Wavelet Synopses Yoss Matas School of Computer Scence Tel Avv Unversty Tel Avv 69978, Israel matas@tau.ac.l Danel Urel School of Computer Scence Tel Avv Unversty Tel Avv 69978,
More informationA Geometric Approach for Multi-Degree Spline
L X, Huang ZJ, Lu Z. A geometrc approach for mult-degree splne. JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY 27(4): 84 850 July 202. DOI 0.007/s390-02-268-2 A Geometrc Approach for Mult-Degree Splne Xn L
More informationDESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT
DESIGNING TRANSMISSION SCHEDULES FOR WIRELESS AD HOC NETWORKS TO MAXIMIZE NETWORK THROUGHPUT Bran J. Wolf, Joseph L. Hammond, and Harlan B. Russell Dept. of Electrcal and Computer Engneerng, Clemson Unversty,
More information