SlideShare a Scribd company logo
1 of 65
Download to read offline
CISS 2014, Princeton NJ 1
Exact Repair Problems with Multiple
Sources
Jayant Apte*, Congduan Li,
John MacLaren Walsh, Steven Weber
ECE Dept. Drexel University
CISS 2014, Princeton NJ 2
Outline
● Problem Definition
● Computer assisted proofs: General Structure
● Polyhedral bounds on
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 3
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 4
(n,k,d) Exact Repair with multiple
sources
CISS 2014, Princeton NJ 5
(n,k,d) Exact Repair with multiple
sources
CISS 2014, Princeton NJ 6
2-source (3,2,2) exact
repair problem
CISS 2014, Princeton NJ 7
2-source (3,2,2) exact
repair problem
2 sources
CISS 2014, Princeton NJ 8
2-source (3,2,2) exact
repair problem
3 encoding
functions
CISS 2014, Princeton NJ 9
2-source (3,2,2) exact
repair problem
3 storage
random
variables
CISS 2014, Princeton NJ 10
2-source (3,2,2) exact
repair problem
3 decoders
with different
demands
CISS 2014, Princeton NJ 11
2-source (3,2,2) exact
repair problem
6 repair
encoding
functions
CISS 2014, Princeton NJ 12
2-source (3,2,2) exact
repair problem
3 repair
decoding
functions
CISS 2014, Princeton NJ 13
2-source (3,2,2) exact
repair problem
Total 11 random variables
CISS 2014, Princeton NJ 14
Implicit characterization
of rate region(Yan et al.)
CISS 2014, Princeton NJ 15
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 16
Motivation
Sources
Decoder
Demands
SoftwareNetwork
CISS 2014, Princeton NJ 17
Motivation
Software
Sources
Decoder
Demands
Network
Rate Region
and
optimal codes
CISS 2014, Princeton NJ 18
Software for computer
assisted proofs
CISS 2014, Princeton NJ 19
Computer assisted converse
CISS 2014, Princeton NJ 20
Computer assisted converse
Inequalities obtained as an
implication of linear Shannon-type,
non-Shannon-type, non-linear
non-Shannon type inequalities and
network constraints
CISS 2014, Princeton NJ 21
Computer assisted converse
CISS 2014, Princeton NJ 22
Computer assisted achievability
CISS 2014, Princeton NJ 23
Software for computer
assisted proofs
CISS 2014, Princeton NJ 24
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 25
● Closure of set of all 'entropic' vectors
arising from N-variable probability
distributions
3-D rendition of
CISS 2014, Princeton NJ 26
● Closure of set of all 'entropic' vectors
arising from N-variable probability
distributions
● Each entropic vector is formed by
stacking entropies of subsets of N
random variables
3-D rendition of
CISS 2014, Princeton NJ 27
● Closure of set of all 'entropic' vectors
arising from N-variable probability
distributions
● Each entropic vector is formed by
stacking entropies of subsets of N
random variables
● Cone:
3-D rendition of
CISS 2014, Princeton NJ 28
● Cannot be expressed as intersection
of finite number of linear inequalities
for N>3
● For N=4, existence of single nonlinear
● non-Shannon inequality(necessary and
sufficient) is known [Liu & Walsh 2014]
● Additionally, several hundred linear
non-Shannon inequalities are known
[DFZ 2011, Csirmaz 2013]
3-D rendition of
CISS 2014, Princeton NJ 29
CISS 2014, Princeton NJ 30
CISS 2014, Princeton NJ 31
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
– Shannon (Outer) bound
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 32
Shannon Outer Bound
CISS 2014, Princeton NJ 33
Shannon Outer Bound
CISS 2014, Princeton NJ 34
Shannon Outer Bound
CISS 2014, Princeton NJ 35
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
– Shannon (Outer) bound
– (Representable) Matroid (Inner) bound(s)
● Polyhedral computation interpretation of rate region
computation
● A projection technique for computing achievable rate
region
CISS 2014, Princeton NJ 36
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 37
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 38
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 39
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 40
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 41
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 42
(Representable) Matroid Inner Bound(s)
CISS 2014, Princeton NJ 43
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
– Shannon (Outer) bound
– Matroid (Inner) bound(s)
– Subspace (Inner) bounds
● Polyhedral computation interpretation of rate region
computation
● A projection technique for computing achievable rate region
CISS 2014, Princeton NJ 44
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 45
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 46
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 47
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 48
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 49
Software for computer
assisted proofs
CISS 2014, Princeton NJ 50
Polyhedral bounds on rate region
● Using polyhedral inner/outer bound on yields
polyhedral inner/outer bounds on rate region
● Lemma 1: Inner bounds on rate region
computed using or are achievable
using linear codes
CISS 2014, Princeton NJ 51
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
– Shannon (Outer) bound
– Matroid (Inner) bound(s)
– Subspace (Inner) bounds
● Polyhedral computation interpretation of rate region
computation
● A projection technique for computing achievable rate region
CISS 2014, Princeton NJ 52
Network Coding constraints
CISS 2014, Princeton NJ 53
Network Coding constraints
● Consider a type 1 or type 2 constraint H
● In general, computing extreme rays of given H and
extreme rays of is equivalent to an iteration of Double
Description Method of polyhedral representation conversion
● Lemma 2 [Li et al. 2013]: An extreme ray of is an extreme
ray of if it is contained in the hyperplane corresponding
to H
● Hence, simple membership check suffices to find extreme rays of
CISS 2014, Princeton NJ 54
Software for computer
assisted proofs
CISS 2014, Princeton NJ 55
Rate constraints
Storage Bandwidth
CISS 2014, Princeton NJ 56
Rate constraints
Repair Bandwidth
Storage Bandwidth
CISS 2014, Princeton NJ 57
A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 58
A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 59
A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 60
Polyhedral projection via chm
● chm is an implementation of polyhedral projection
algorithm called Convex Hull Method by Jayant Apte*
● chmlib v0.x is available at:
http://www.ece.drexel.edu/walsh/aspitrg/software.html
● Rational arithmetic using FLINT: Fast Library for
Number Theory
● Rational LP solver based on qsopt
CISS 2014, Princeton NJ 61
Polyhedral projection via chm
● Has been used for
– The current work
– Computer assisted converse proofs of rate regions of Multilevel
Diversity Coding Systems(a special case of multi-source network
coding)
– Finding non-Shannon Information Inequalities via Generalized
Copy Lemma of Csirmaz
● Can be used for
– Finding necessary conditions for non-contexuality of small
marginal scenarios(Quantum Information)
CISS 2014, Princeton NJ 62
Results
SoftwareNetwork
CISS 2014, Princeton NJ 63
Rate region for H(S1)=1 and
H(S2)=1
CISS 2014, Princeton NJ 64
Rate region for H(S1)=1 and
H(S2)=2
CISS 2014, Princeton NJ 65
References
● X. Yan, R.W. Yeung, and Zhen Zhang. An implicit characterization of the achievable rate region for acyclic
multisource multisink network coding. Information Theory, IEEE Transactions on, 58(9):5625–5639, 2012.
● Dougherty, Randall, Chris Freiling, and Kenneth Zeger. "Non-Shannon information inequalities in four
random variables." arXiv preprint arXiv:1104.3602 (2011).
● Csirmaz, László. "Information inequalities for four variables." CEU (2013).
● Yunshu Liu and John M. Walsh, "Only One Nonlinear Non-Shannon Inequality is Necessary for Four
Variables", submitted to IEEE Int. Symp. Information Theory (ISIT2014)
● Congduan Li, J. Apte, J.M. Walsh, and S. Weber. A new computational approach for determining rate regions
and optimal codes for coded networks. In Network Coding (NetCod), 2013 International Symposium on,
pages 1–6, 2013.
● Congduan Li, John MacLaren Walsh, Steven Weber. Matroid bounds on the region of entropic vectors. In
51th Annual Allerton Conference on Communication, Control and Computing, October 2013.

More Related Content

Viewers also liked

The Maker Movement and Tomorrow's Education in Engineering
The Maker Movement and Tomorrow's Education in EngineeringThe Maker Movement and Tomorrow's Education in Engineering
The Maker Movement and Tomorrow's Education in Engineeringmikegreenberg
 
Entropic Inequalities and marginal problems (Fritz and Chavez)
Entropic Inequalities and marginal problems (Fritz and Chavez) Entropic Inequalities and marginal problems (Fritz and Chavez)
Entropic Inequalities and marginal problems (Fritz and Chavez) Jayant Apte, PhD
 
Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)Jayant Apte, PhD
 
Espiritualidade sustentabilidade na laudato si
Espiritualidade sustentabilidade na laudato siEspiritualidade sustentabilidade na laudato si
Espiritualidade sustentabilidade na laudato siAfonso Murad (FAJE)
 
Como aplicar a Laudato Si e vivenciar sua espiritualidade
Como aplicar a Laudato Si e vivenciar sua espiritualidadeComo aplicar a Laudato Si e vivenciar sua espiritualidade
Como aplicar a Laudato Si e vivenciar sua espiritualidadeAfonso Murad (FAJE)
 
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)Afonso Murad (FAJE)
 
Secretaria paroquial à luz da Evangelii Gaudium
Secretaria paroquial à luz da Evangelii GaudiumSecretaria paroquial à luz da Evangelii Gaudium
Secretaria paroquial à luz da Evangelii GaudiumAfonso Murad (FAJE)
 
Esperanças e caminhos da vida consagrada em tempos de francisco
Esperanças e caminhos da vida consagrada em tempos de franciscoEsperanças e caminhos da vida consagrada em tempos de francisco
Esperanças e caminhos da vida consagrada em tempos de franciscoAfonso Murad (FAJE)
 
Claims (speech 104)
Claims (speech 104) Claims (speech 104)
Claims (speech 104) jenyx2
 

Viewers also liked (17)

Jayant chm
Jayant chmJayant chm
Jayant chm
 
The Maker Movement and Tomorrow's Education in Engineering
The Maker Movement and Tomorrow's Education in EngineeringThe Maker Movement and Tomorrow's Education in Engineering
The Maker Movement and Tomorrow's Education in Engineering
 
Gestione nella vita religiosa
Gestione nella vita religiosaGestione nella vita religiosa
Gestione nella vita religiosa
 
Jayant lrs
Jayant lrsJayant lrs
Jayant lrs
 
Immaculate and assumption
Immaculate and assumptionImmaculate and assumption
Immaculate and assumption
 
Entropic Inequalities and marginal problems (Fritz and Chavez)
Entropic Inequalities and marginal problems (Fritz and Chavez) Entropic Inequalities and marginal problems (Fritz and Chavez)
Entropic Inequalities and marginal problems (Fritz and Chavez)
 
Latex Workshop Tutorial
Latex Workshop TutorialLatex Workshop Tutorial
Latex Workshop Tutorial
 
Candidacy Exam Talk
Candidacy Exam TalkCandidacy Exam Talk
Candidacy Exam Talk
 
Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)
 
Espiritualidade sustentabilidade na laudato si
Espiritualidade sustentabilidade na laudato siEspiritualidade sustentabilidade na laudato si
Espiritualidade sustentabilidade na laudato si
 
Bitcoin for Noobs
Bitcoin for NoobsBitcoin for Noobs
Bitcoin for Noobs
 
Como aplicar a Laudato Si e vivenciar sua espiritualidade
Como aplicar a Laudato Si e vivenciar sua espiritualidadeComo aplicar a Laudato Si e vivenciar sua espiritualidade
Como aplicar a Laudato Si e vivenciar sua espiritualidade
 
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)
 
Secretaria paroquial à luz da Evangelii Gaudium
Secretaria paroquial à luz da Evangelii GaudiumSecretaria paroquial à luz da Evangelii Gaudium
Secretaria paroquial à luz da Evangelii Gaudium
 
Esperanças e caminhos da vida consagrada em tempos de francisco
Esperanças e caminhos da vida consagrada em tempos de franciscoEsperanças e caminhos da vida consagrada em tempos de francisco
Esperanças e caminhos da vida consagrada em tempos de francisco
 
Um novo começo com maria
Um novo começo com mariaUm novo começo com maria
Um novo começo com maria
 
Claims (speech 104)
Claims (speech 104) Claims (speech 104)
Claims (speech 104)
 

Similar to Exact Repair problems with multiple sources: CISS 2014

Learning Convolutional Neural Networks for Graphs
Learning Convolutional Neural Networks for GraphsLearning Convolutional Neural Networks for Graphs
Learning Convolutional Neural Networks for GraphsMathias Niepert
 
Deep Learning Tomography
Deep Learning TomographyDeep Learning Tomography
Deep Learning TomographyAmir Adler
 
powerpoint feb
powerpoint febpowerpoint feb
powerpoint febimu409
 
Large Scale Image Retrieval 2022.pdf
Large Scale Image Retrieval 2022.pdfLarge Scale Image Retrieval 2022.pdf
Large Scale Image Retrieval 2022.pdfSamuCerezo
 
ICFHR'18-DataAug.pptx
ICFHR'18-DataAug.pptxICFHR'18-DataAug.pptx
ICFHR'18-DataAug.pptxKartikDutta10
 
SPICE-MATEX @ DAC15
SPICE-MATEX @ DAC15SPICE-MATEX @ DAC15
SPICE-MATEX @ DAC15Hao Zhuang
 
Segmenting Medical MRI via Recurrent Decoding Cell
Segmenting Medical MRI via Recurrent Decoding CellSegmenting Medical MRI via Recurrent Decoding Cell
Segmenting Medical MRI via Recurrent Decoding CellSeunghyun Hwang
 
Google and SRI talk September 2016
Google and SRI talk September 2016Google and SRI talk September 2016
Google and SRI talk September 2016Hagai Aronowitz
 
More investment in Research and Development for better Education in the future?
More investment in Research and Development for better Education in the future?More investment in Research and Development for better Education in the future?
More investment in Research and Development for better Education in the future?Dhafer Malouche
 
Detection & Recognition of Text.pdf
Detection & Recognition of Text.pdfDetection & Recognition of Text.pdf
Detection & Recognition of Text.pdfnisarggandhewar1
 
India presentation final
India presentation finalIndia presentation final
India presentation finalcaki2
 
Aerial detection part3
Aerial detection part3Aerial detection part3
Aerial detection part3ssuser456ad6
 
Biometric presentation attack detection
Biometric presentation attack detectionBiometric presentation attack detection
Biometric presentation attack detectionGautam Saxena
 
[Term project] Junction-point process
[Term project] Junction-point process[Term project] Junction-point process
[Term project] Junction-point processKyunghoon Kim
 
Image Processing Background Elimination in Video Editting
Image Processing Background Elimination in Video EdittingImage Processing Background Elimination in Video Editting
Image Processing Background Elimination in Video EdittingTushar Tank
 
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018Universitat Politècnica de Catalunya
 
Coupled Layer-wise Graph Convolution for Transportation Demand Prediction
Coupled Layer-wise Graph Convolution for Transportation Demand PredictionCoupled Layer-wise Graph Convolution for Transportation Demand Prediction
Coupled Layer-wise Graph Convolution for Transportation Demand Predictionivaderivader
 

Similar to Exact Repair problems with multiple sources: CISS 2014 (20)

Learning Convolutional Neural Networks for Graphs
Learning Convolutional Neural Networks for GraphsLearning Convolutional Neural Networks for Graphs
Learning Convolutional Neural Networks for Graphs
 
Deep Learning Tomography
Deep Learning TomographyDeep Learning Tomography
Deep Learning Tomography
 
powerpoint feb
powerpoint febpowerpoint feb
powerpoint feb
 
Large Scale Image Retrieval 2022.pdf
Large Scale Image Retrieval 2022.pdfLarge Scale Image Retrieval 2022.pdf
Large Scale Image Retrieval 2022.pdf
 
ICFHR'18-DataAug.pptx
ICFHR'18-DataAug.pptxICFHR'18-DataAug.pptx
ICFHR'18-DataAug.pptx
 
SPICE-MATEX @ DAC15
SPICE-MATEX @ DAC15SPICE-MATEX @ DAC15
SPICE-MATEX @ DAC15
 
Segmenting Medical MRI via Recurrent Decoding Cell
Segmenting Medical MRI via Recurrent Decoding CellSegmenting Medical MRI via Recurrent Decoding Cell
Segmenting Medical MRI via Recurrent Decoding Cell
 
The impact of visual saliency prediction in image classification
The impact of visual saliency prediction in image classificationThe impact of visual saliency prediction in image classification
The impact of visual saliency prediction in image classification
 
Multidimensional RNN
Multidimensional RNNMultidimensional RNN
Multidimensional RNN
 
Google and SRI talk September 2016
Google and SRI talk September 2016Google and SRI talk September 2016
Google and SRI talk September 2016
 
More investment in Research and Development for better Education in the future?
More investment in Research and Development for better Education in the future?More investment in Research and Development for better Education in the future?
More investment in Research and Development for better Education in the future?
 
Detection & Recognition of Text.pdf
Detection & Recognition of Text.pdfDetection & Recognition of Text.pdf
Detection & Recognition of Text.pdf
 
India presentation final
India presentation finalIndia presentation final
India presentation final
 
Aerial detection part3
Aerial detection part3Aerial detection part3
Aerial detection part3
 
Biometric presentation attack detection
Biometric presentation attack detectionBiometric presentation attack detection
Biometric presentation attack detection
 
[Term project] Junction-point process
[Term project] Junction-point process[Term project] Junction-point process
[Term project] Junction-point process
 
CSC446: Pattern Recognition (LN7)
CSC446: Pattern Recognition (LN7)CSC446: Pattern Recognition (LN7)
CSC446: Pattern Recognition (LN7)
 
Image Processing Background Elimination in Video Editting
Image Processing Background Elimination in Video EdittingImage Processing Background Elimination in Video Editting
Image Processing Background Elimination in Video Editting
 
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018
 
Coupled Layer-wise Graph Convolution for Transportation Demand Prediction
Coupled Layer-wise Graph Convolution for Transportation Demand PredictionCoupled Layer-wise Graph Convolution for Transportation Demand Prediction
Coupled Layer-wise Graph Convolution for Transportation Demand Prediction
 

Recently uploaded

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfhans926745
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 

Recently uploaded (20)

Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 

Exact Repair problems with multiple sources: CISS 2014

  • 1. CISS 2014, Princeton NJ 1 Exact Repair Problems with Multiple Sources Jayant Apte*, Congduan Li, John MacLaren Walsh, Steven Weber ECE Dept. Drexel University
  • 2. CISS 2014, Princeton NJ 2 Outline ● Problem Definition ● Computer assisted proofs: General Structure ● Polyhedral bounds on ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 3. CISS 2014, Princeton NJ 3 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 4. CISS 2014, Princeton NJ 4 (n,k,d) Exact Repair with multiple sources
  • 5. CISS 2014, Princeton NJ 5 (n,k,d) Exact Repair with multiple sources
  • 6. CISS 2014, Princeton NJ 6 2-source (3,2,2) exact repair problem
  • 7. CISS 2014, Princeton NJ 7 2-source (3,2,2) exact repair problem 2 sources
  • 8. CISS 2014, Princeton NJ 8 2-source (3,2,2) exact repair problem 3 encoding functions
  • 9. CISS 2014, Princeton NJ 9 2-source (3,2,2) exact repair problem 3 storage random variables
  • 10. CISS 2014, Princeton NJ 10 2-source (3,2,2) exact repair problem 3 decoders with different demands
  • 11. CISS 2014, Princeton NJ 11 2-source (3,2,2) exact repair problem 6 repair encoding functions
  • 12. CISS 2014, Princeton NJ 12 2-source (3,2,2) exact repair problem 3 repair decoding functions
  • 13. CISS 2014, Princeton NJ 13 2-source (3,2,2) exact repair problem Total 11 random variables
  • 14. CISS 2014, Princeton NJ 14 Implicit characterization of rate region(Yan et al.)
  • 15. CISS 2014, Princeton NJ 15 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 16. CISS 2014, Princeton NJ 16 Motivation Sources Decoder Demands SoftwareNetwork
  • 17. CISS 2014, Princeton NJ 17 Motivation Software Sources Decoder Demands Network Rate Region and optimal codes
  • 18. CISS 2014, Princeton NJ 18 Software for computer assisted proofs
  • 19. CISS 2014, Princeton NJ 19 Computer assisted converse
  • 20. CISS 2014, Princeton NJ 20 Computer assisted converse Inequalities obtained as an implication of linear Shannon-type, non-Shannon-type, non-linear non-Shannon type inequalities and network constraints
  • 21. CISS 2014, Princeton NJ 21 Computer assisted converse
  • 22. CISS 2014, Princeton NJ 22 Computer assisted achievability
  • 23. CISS 2014, Princeton NJ 23 Software for computer assisted proofs
  • 24. CISS 2014, Princeton NJ 24 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 25. CISS 2014, Princeton NJ 25 ● Closure of set of all 'entropic' vectors arising from N-variable probability distributions 3-D rendition of
  • 26. CISS 2014, Princeton NJ 26 ● Closure of set of all 'entropic' vectors arising from N-variable probability distributions ● Each entropic vector is formed by stacking entropies of subsets of N random variables 3-D rendition of
  • 27. CISS 2014, Princeton NJ 27 ● Closure of set of all 'entropic' vectors arising from N-variable probability distributions ● Each entropic vector is formed by stacking entropies of subsets of N random variables ● Cone: 3-D rendition of
  • 28. CISS 2014, Princeton NJ 28 ● Cannot be expressed as intersection of finite number of linear inequalities for N>3 ● For N=4, existence of single nonlinear ● non-Shannon inequality(necessary and sufficient) is known [Liu & Walsh 2014] ● Additionally, several hundred linear non-Shannon inequalities are known [DFZ 2011, Csirmaz 2013] 3-D rendition of
  • 31. CISS 2014, Princeton NJ 31 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on – Shannon (Outer) bound ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 32. CISS 2014, Princeton NJ 32 Shannon Outer Bound
  • 33. CISS 2014, Princeton NJ 33 Shannon Outer Bound
  • 34. CISS 2014, Princeton NJ 34 Shannon Outer Bound
  • 35. CISS 2014, Princeton NJ 35 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on – Shannon (Outer) bound – (Representable) Matroid (Inner) bound(s) ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 36. CISS 2014, Princeton NJ 36 (Representable) Matroid Inner bound(s)
  • 37. CISS 2014, Princeton NJ 37 (Representable) Matroid Inner bound(s)
  • 38. CISS 2014, Princeton NJ 38 (Representable) Matroid Inner bound(s)
  • 39. CISS 2014, Princeton NJ 39 (Representable) Matroid Inner bound(s)
  • 40. CISS 2014, Princeton NJ 40 (Representable) Matroid Inner bound(s)
  • 41. CISS 2014, Princeton NJ 41 (Representable) Matroid Inner bound(s)
  • 42. CISS 2014, Princeton NJ 42 (Representable) Matroid Inner Bound(s)
  • 43. CISS 2014, Princeton NJ 43 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on – Shannon (Outer) bound – Matroid (Inner) bound(s) – Subspace (Inner) bounds ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 44. CISS 2014, Princeton NJ 44 Subspace Inner Bound(s)
  • 45. CISS 2014, Princeton NJ 45 Subspace Inner Bound(s)
  • 46. CISS 2014, Princeton NJ 46 Subspace Inner Bound(s)
  • 47. CISS 2014, Princeton NJ 47 Subspace Inner Bound(s)
  • 48. CISS 2014, Princeton NJ 48 Subspace Inner Bound(s)
  • 49. CISS 2014, Princeton NJ 49 Software for computer assisted proofs
  • 50. CISS 2014, Princeton NJ 50 Polyhedral bounds on rate region ● Using polyhedral inner/outer bound on yields polyhedral inner/outer bounds on rate region ● Lemma 1: Inner bounds on rate region computed using or are achievable using linear codes
  • 51. CISS 2014, Princeton NJ 51 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on – Shannon (Outer) bound – Matroid (Inner) bound(s) – Subspace (Inner) bounds ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 52. CISS 2014, Princeton NJ 52 Network Coding constraints
  • 53. CISS 2014, Princeton NJ 53 Network Coding constraints ● Consider a type 1 or type 2 constraint H ● In general, computing extreme rays of given H and extreme rays of is equivalent to an iteration of Double Description Method of polyhedral representation conversion ● Lemma 2 [Li et al. 2013]: An extreme ray of is an extreme ray of if it is contained in the hyperplane corresponding to H ● Hence, simple membership check suffices to find extreme rays of
  • 54. CISS 2014, Princeton NJ 54 Software for computer assisted proofs
  • 55. CISS 2014, Princeton NJ 55 Rate constraints Storage Bandwidth
  • 56. CISS 2014, Princeton NJ 56 Rate constraints Repair Bandwidth Storage Bandwidth
  • 57. CISS 2014, Princeton NJ 57 A projection technique for computing achievable rate region
  • 58. CISS 2014, Princeton NJ 58 A projection technique for computing achievable rate region
  • 59. CISS 2014, Princeton NJ 59 A projection technique for computing achievable rate region
  • 60. CISS 2014, Princeton NJ 60 Polyhedral projection via chm ● chm is an implementation of polyhedral projection algorithm called Convex Hull Method by Jayant Apte* ● chmlib v0.x is available at: http://www.ece.drexel.edu/walsh/aspitrg/software.html ● Rational arithmetic using FLINT: Fast Library for Number Theory ● Rational LP solver based on qsopt
  • 61. CISS 2014, Princeton NJ 61 Polyhedral projection via chm ● Has been used for – The current work – Computer assisted converse proofs of rate regions of Multilevel Diversity Coding Systems(a special case of multi-source network coding) – Finding non-Shannon Information Inequalities via Generalized Copy Lemma of Csirmaz ● Can be used for – Finding necessary conditions for non-contexuality of small marginal scenarios(Quantum Information)
  • 62. CISS 2014, Princeton NJ 62 Results SoftwareNetwork
  • 63. CISS 2014, Princeton NJ 63 Rate region for H(S1)=1 and H(S2)=1
  • 64. CISS 2014, Princeton NJ 64 Rate region for H(S1)=1 and H(S2)=2
  • 65. CISS 2014, Princeton NJ 65 References ● X. Yan, R.W. Yeung, and Zhen Zhang. An implicit characterization of the achievable rate region for acyclic multisource multisink network coding. Information Theory, IEEE Transactions on, 58(9):5625–5639, 2012. ● Dougherty, Randall, Chris Freiling, and Kenneth Zeger. "Non-Shannon information inequalities in four random variables." arXiv preprint arXiv:1104.3602 (2011). ● Csirmaz, László. "Information inequalities for four variables." CEU (2013). ● Yunshu Liu and John M. Walsh, "Only One Nonlinear Non-Shannon Inequality is Necessary for Four Variables", submitted to IEEE Int. Symp. Information Theory (ISIT2014) ● Congduan Li, J. Apte, J.M. Walsh, and S. Weber. A new computational approach for determining rate regions and optimal codes for coded networks. In Network Coding (NetCod), 2013 International Symposium on, pages 1–6, 2013. ● Congduan Li, John MacLaren Walsh, Steven Weber. Matroid bounds on the region of entropic vectors. In 51th Annual Allerton Conference on Communication, Control and Computing, October 2013.