SlideShare a Scribd company logo
CISS 2014, Princeton NJ 1
Exact Repair Problems with Multiple
Sources
Jayant Apte*, Congduan Li,
John MacLaren Walsh, Steven Weber
ECE Dept. Drexel University
CISS 2014, Princeton NJ 2
Outline
● Problem Definition
● Computer assisted proofs: General Structure
● Polyhedral bounds on
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 3
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 4
(n,k,d) Exact Repair with multiple
sources
CISS 2014, Princeton NJ 5
(n,k,d) Exact Repair with multiple
sources
CISS 2014, Princeton NJ 6
2-source (3,2,2) exact
repair problem
CISS 2014, Princeton NJ 7
2-source (3,2,2) exact
repair problem
2 sources
CISS 2014, Princeton NJ 8
2-source (3,2,2) exact
repair problem
3 encoding
functions
CISS 2014, Princeton NJ 9
2-source (3,2,2) exact
repair problem
3 storage
random
variables
CISS 2014, Princeton NJ 10
2-source (3,2,2) exact
repair problem
3 decoders
with different
demands
CISS 2014, Princeton NJ 11
2-source (3,2,2) exact
repair problem
6 repair
encoding
functions
CISS 2014, Princeton NJ 12
2-source (3,2,2) exact
repair problem
3 repair
decoding
functions
CISS 2014, Princeton NJ 13
2-source (3,2,2) exact
repair problem
Total 11 random variables
CISS 2014, Princeton NJ 14
Implicit characterization
of rate region(Yan et al.)
CISS 2014, Princeton NJ 15
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 16
Motivation
Sources
Decoder
Demands
SoftwareNetwork
CISS 2014, Princeton NJ 17
Motivation
Software
Sources
Decoder
Demands
Network
Rate Region
and
optimal codes
CISS 2014, Princeton NJ 18
Software for computer
assisted proofs
CISS 2014, Princeton NJ 19
Computer assisted converse
CISS 2014, Princeton NJ 20
Computer assisted converse
Inequalities obtained as an
implication of linear Shannon-type,
non-Shannon-type, non-linear
non-Shannon type inequalities and
network constraints
CISS 2014, Princeton NJ 21
Computer assisted converse
CISS 2014, Princeton NJ 22
Computer assisted achievability
CISS 2014, Princeton NJ 23
Software for computer
assisted proofs
CISS 2014, Princeton NJ 24
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 25
● Closure of set of all 'entropic' vectors
arising from N-variable probability
distributions
3-D rendition of
CISS 2014, Princeton NJ 26
● Closure of set of all 'entropic' vectors
arising from N-variable probability
distributions
● Each entropic vector is formed by
stacking entropies of subsets of N
random variables
3-D rendition of
CISS 2014, Princeton NJ 27
● Closure of set of all 'entropic' vectors
arising from N-variable probability
distributions
● Each entropic vector is formed by
stacking entropies of subsets of N
random variables
● Cone:
3-D rendition of
CISS 2014, Princeton NJ 28
● Cannot be expressed as intersection
of finite number of linear inequalities
for N>3
● For N=4, existence of single nonlinear
● non-Shannon inequality(necessary and
sufficient) is known [Liu & Walsh 2014]
● Additionally, several hundred linear
non-Shannon inequalities are known
[DFZ 2011, Csirmaz 2013]
3-D rendition of
CISS 2014, Princeton NJ 29
CISS 2014, Princeton NJ 30
CISS 2014, Princeton NJ 31
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
– Shannon (Outer) bound
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 32
Shannon Outer Bound
CISS 2014, Princeton NJ 33
Shannon Outer Bound
CISS 2014, Princeton NJ 34
Shannon Outer Bound
CISS 2014, Princeton NJ 35
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
– Shannon (Outer) bound
– (Representable) Matroid (Inner) bound(s)
● Polyhedral computation interpretation of rate region
computation
● A projection technique for computing achievable rate
region
CISS 2014, Princeton NJ 36
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 37
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 38
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 39
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 40
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 41
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 42
(Representable) Matroid Inner Bound(s)
CISS 2014, Princeton NJ 43
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
– Shannon (Outer) bound
– Matroid (Inner) bound(s)
– Subspace (Inner) bounds
● Polyhedral computation interpretation of rate region
computation
● A projection technique for computing achievable rate region
CISS 2014, Princeton NJ 44
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 45
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 46
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 47
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 48
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 49
Software for computer
assisted proofs
CISS 2014, Princeton NJ 50
Polyhedral bounds on rate region
● Using polyhedral inner/outer bound on yields
polyhedral inner/outer bounds on rate region
● Lemma 1: Inner bounds on rate region
computed using or are achievable
using linear codes
CISS 2014, Princeton NJ 51
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
– Shannon (Outer) bound
– Matroid (Inner) bound(s)
– Subspace (Inner) bounds
● Polyhedral computation interpretation of rate region
computation
● A projection technique for computing achievable rate region
CISS 2014, Princeton NJ 52
Network Coding constraints
CISS 2014, Princeton NJ 53
Network Coding constraints
● Consider a type 1 or type 2 constraint H
● In general, computing extreme rays of given H and
extreme rays of is equivalent to an iteration of Double
Description Method of polyhedral representation conversion
● Lemma 2 [Li et al. 2013]: An extreme ray of is an extreme
ray of if it is contained in the hyperplane corresponding
to H
● Hence, simple membership check suffices to find extreme rays of
CISS 2014, Princeton NJ 54
Software for computer
assisted proofs
CISS 2014, Princeton NJ 55
Rate constraints
Storage Bandwidth
CISS 2014, Princeton NJ 56
Rate constraints
Repair Bandwidth
Storage Bandwidth
CISS 2014, Princeton NJ 57
A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 58
A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 59
A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 60
Polyhedral projection via chm
● chm is an implementation of polyhedral projection
algorithm called Convex Hull Method by Jayant Apte*
● chmlib v0.x is available at:
http://www.ece.drexel.edu/walsh/aspitrg/software.html
● Rational arithmetic using FLINT: Fast Library for
Number Theory
● Rational LP solver based on qsopt
CISS 2014, Princeton NJ 61
Polyhedral projection via chm
● Has been used for
– The current work
– Computer assisted converse proofs of rate regions of Multilevel
Diversity Coding Systems(a special case of multi-source network
coding)
– Finding non-Shannon Information Inequalities via Generalized
Copy Lemma of Csirmaz
● Can be used for
– Finding necessary conditions for non-contexuality of small
marginal scenarios(Quantum Information)
CISS 2014, Princeton NJ 62
Results
SoftwareNetwork
CISS 2014, Princeton NJ 63
Rate region for H(S1)=1 and
H(S2)=1
CISS 2014, Princeton NJ 64
Rate region for H(S1)=1 and
H(S2)=2
CISS 2014, Princeton NJ 65
References
● X. Yan, R.W. Yeung, and Zhen Zhang. An implicit characterization of the achievable rate region for acyclic
multisource multisink network coding. Information Theory, IEEE Transactions on, 58(9):5625–5639, 2012.
● Dougherty, Randall, Chris Freiling, and Kenneth Zeger. "Non-Shannon information inequalities in four
random variables." arXiv preprint arXiv:1104.3602 (2011).
● Csirmaz, László. "Information inequalities for four variables." CEU (2013).
● Yunshu Liu and John M. Walsh, "Only One Nonlinear Non-Shannon Inequality is Necessary for Four
Variables", submitted to IEEE Int. Symp. Information Theory (ISIT2014)
● Congduan Li, J. Apte, J.M. Walsh, and S. Weber. A new computational approach for determining rate regions
and optimal codes for coded networks. In Network Coding (NetCod), 2013 International Symposium on,
pages 1–6, 2013.
● Congduan Li, John MacLaren Walsh, Steven Weber. Matroid bounds on the region of entropic vectors. In
51th Annual Allerton Conference on Communication, Control and Computing, October 2013.

More Related Content

Viewers also liked

The Maker Movement and Tomorrow's Education in Engineering
The Maker Movement and Tomorrow's Education in EngineeringThe Maker Movement and Tomorrow's Education in Engineering
The Maker Movement and Tomorrow's Education in Engineeringmikegreenberg
 
Immaculate and assumption
Immaculate and assumptionImmaculate and assumption
Immaculate and assumption
Afonso Murad (FAJE)
 
Entropic Inequalities and marginal problems (Fritz and Chavez)
Entropic Inequalities and marginal problems (Fritz and Chavez) Entropic Inequalities and marginal problems (Fritz and Chavez)
Entropic Inequalities and marginal problems (Fritz and Chavez)
Jayant Apte, PhD
 
Latex Workshop Tutorial
Latex Workshop TutorialLatex Workshop Tutorial
Latex Workshop Tutorial
Jayant Apte, PhD
 
Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)
Jayant Apte, PhD
 
Espiritualidade sustentabilidade na laudato si
Espiritualidade sustentabilidade na laudato siEspiritualidade sustentabilidade na laudato si
Espiritualidade sustentabilidade na laudato si
Afonso Murad (FAJE)
 
Bitcoin for Noobs
Bitcoin for NoobsBitcoin for Noobs
Bitcoin for Noobs
mikegreenberg
 
Como aplicar a Laudato Si e vivenciar sua espiritualidade
Como aplicar a Laudato Si e vivenciar sua espiritualidadeComo aplicar a Laudato Si e vivenciar sua espiritualidade
Como aplicar a Laudato Si e vivenciar sua espiritualidade
Afonso Murad (FAJE)
 
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)
Afonso Murad (FAJE)
 
Secretaria paroquial à luz da Evangelii Gaudium
Secretaria paroquial à luz da Evangelii GaudiumSecretaria paroquial à luz da Evangelii Gaudium
Secretaria paroquial à luz da Evangelii Gaudium
Afonso Murad (FAJE)
 
Esperanças e caminhos da vida consagrada em tempos de francisco
Esperanças e caminhos da vida consagrada em tempos de franciscoEsperanças e caminhos da vida consagrada em tempos de francisco
Esperanças e caminhos da vida consagrada em tempos de francisco
Afonso Murad (FAJE)
 
Um novo começo com maria
Um novo começo com mariaUm novo começo com maria
Um novo começo com maria
Afonso Murad (FAJE)
 
Claims (speech 104)
Claims (speech 104) Claims (speech 104)
Claims (speech 104) jenyx2
 

Viewers also liked (17)

Jayant chm
Jayant chmJayant chm
Jayant chm
 
The Maker Movement and Tomorrow's Education in Engineering
The Maker Movement and Tomorrow's Education in EngineeringThe Maker Movement and Tomorrow's Education in Engineering
The Maker Movement and Tomorrow's Education in Engineering
 
Gestione nella vita religiosa
Gestione nella vita religiosaGestione nella vita religiosa
Gestione nella vita religiosa
 
Jayant lrs
Jayant lrsJayant lrs
Jayant lrs
 
Immaculate and assumption
Immaculate and assumptionImmaculate and assumption
Immaculate and assumption
 
Entropic Inequalities and marginal problems (Fritz and Chavez)
Entropic Inequalities and marginal problems (Fritz and Chavez) Entropic Inequalities and marginal problems (Fritz and Chavez)
Entropic Inequalities and marginal problems (Fritz and Chavez)
 
Latex Workshop Tutorial
Latex Workshop TutorialLatex Workshop Tutorial
Latex Workshop Tutorial
 
Candidacy Exam Talk
Candidacy Exam TalkCandidacy Exam Talk
Candidacy Exam Talk
 
Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)
 
Espiritualidade sustentabilidade na laudato si
Espiritualidade sustentabilidade na laudato siEspiritualidade sustentabilidade na laudato si
Espiritualidade sustentabilidade na laudato si
 
Bitcoin for Noobs
Bitcoin for NoobsBitcoin for Noobs
Bitcoin for Noobs
 
Como aplicar a Laudato Si e vivenciar sua espiritualidade
Como aplicar a Laudato Si e vivenciar sua espiritualidadeComo aplicar a Laudato Si e vivenciar sua espiritualidade
Como aplicar a Laudato Si e vivenciar sua espiritualidade
 
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)
 
Secretaria paroquial à luz da Evangelii Gaudium
Secretaria paroquial à luz da Evangelii GaudiumSecretaria paroquial à luz da Evangelii Gaudium
Secretaria paroquial à luz da Evangelii Gaudium
 
Esperanças e caminhos da vida consagrada em tempos de francisco
Esperanças e caminhos da vida consagrada em tempos de franciscoEsperanças e caminhos da vida consagrada em tempos de francisco
Esperanças e caminhos da vida consagrada em tempos de francisco
 
Um novo começo com maria
Um novo começo com mariaUm novo começo com maria
Um novo começo com maria
 
Claims (speech 104)
Claims (speech 104) Claims (speech 104)
Claims (speech 104)
 

Similar to Exact Repair problems with multiple sources: CISS 2014

Learning Convolutional Neural Networks for Graphs
Learning Convolutional Neural Networks for GraphsLearning Convolutional Neural Networks for Graphs
Learning Convolutional Neural Networks for Graphs
Mathias Niepert
 
Deep Learning Tomography
Deep Learning TomographyDeep Learning Tomography
Deep Learning Tomography
Amir Adler
 
powerpoint feb
powerpoint febpowerpoint feb
powerpoint febimu409
 
Large Scale Image Retrieval 2022.pdf
Large Scale Image Retrieval 2022.pdfLarge Scale Image Retrieval 2022.pdf
Large Scale Image Retrieval 2022.pdf
SamuCerezo
 
ICFHR'18-DataAug.pptx
ICFHR'18-DataAug.pptxICFHR'18-DataAug.pptx
ICFHR'18-DataAug.pptx
KartikDutta10
 
SPICE-MATEX @ DAC15
SPICE-MATEX @ DAC15SPICE-MATEX @ DAC15
SPICE-MATEX @ DAC15
Hao Zhuang
 
Segmenting Medical MRI via Recurrent Decoding Cell
Segmenting Medical MRI via Recurrent Decoding CellSegmenting Medical MRI via Recurrent Decoding Cell
Segmenting Medical MRI via Recurrent Decoding Cell
Seunghyun Hwang
 
The impact of visual saliency prediction in image classification
The impact of visual saliency prediction in image classificationThe impact of visual saliency prediction in image classification
The impact of visual saliency prediction in image classification
Universitat Politècnica de Catalunya
 
Multidimensional RNN
Multidimensional RNNMultidimensional RNN
Multidimensional RNN
Grigory Sapunov
 
Google and SRI talk September 2016
Google and SRI talk September 2016Google and SRI talk September 2016
Google and SRI talk September 2016Hagai Aronowitz
 
More investment in Research and Development for better Education in the future?
More investment in Research and Development for better Education in the future?More investment in Research and Development for better Education in the future?
More investment in Research and Development for better Education in the future?
Dhafer Malouche
 
Detection & Recognition of Text.pdf
Detection & Recognition of Text.pdfDetection & Recognition of Text.pdf
Detection & Recognition of Text.pdf
nisarggandhewar1
 
India presentation final
India presentation finalIndia presentation final
India presentation final
caki2
 
Aerial detection part3
Aerial detection part3Aerial detection part3
Aerial detection part3
ssuser456ad6
 
Biometric presentation attack detection
Biometric presentation attack detectionBiometric presentation attack detection
Biometric presentation attack detection
Gautam Saxena
 
[Term project] Junction-point process
[Term project] Junction-point process[Term project] Junction-point process
[Term project] Junction-point process
Kyunghoon Kim
 
CSC446: Pattern Recognition (LN7)
CSC446: Pattern Recognition (LN7)CSC446: Pattern Recognition (LN7)
CSC446: Pattern Recognition (LN7)
Mostafa G. M. Mostafa
 
Image Processing Background Elimination in Video Editting
Image Processing Background Elimination in Video EdittingImage Processing Background Elimination in Video Editting
Image Processing Background Elimination in Video Editting
Tushar Tank
 
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018
Universitat Politècnica de Catalunya
 
Coupled Layer-wise Graph Convolution for Transportation Demand Prediction
Coupled Layer-wise Graph Convolution for Transportation Demand PredictionCoupled Layer-wise Graph Convolution for Transportation Demand Prediction
Coupled Layer-wise Graph Convolution for Transportation Demand Prediction
ivaderivader
 

Similar to Exact Repair problems with multiple sources: CISS 2014 (20)

Learning Convolutional Neural Networks for Graphs
Learning Convolutional Neural Networks for GraphsLearning Convolutional Neural Networks for Graphs
Learning Convolutional Neural Networks for Graphs
 
Deep Learning Tomography
Deep Learning TomographyDeep Learning Tomography
Deep Learning Tomography
 
powerpoint feb
powerpoint febpowerpoint feb
powerpoint feb
 
Large Scale Image Retrieval 2022.pdf
Large Scale Image Retrieval 2022.pdfLarge Scale Image Retrieval 2022.pdf
Large Scale Image Retrieval 2022.pdf
 
ICFHR'18-DataAug.pptx
ICFHR'18-DataAug.pptxICFHR'18-DataAug.pptx
ICFHR'18-DataAug.pptx
 
SPICE-MATEX @ DAC15
SPICE-MATEX @ DAC15SPICE-MATEX @ DAC15
SPICE-MATEX @ DAC15
 
Segmenting Medical MRI via Recurrent Decoding Cell
Segmenting Medical MRI via Recurrent Decoding CellSegmenting Medical MRI via Recurrent Decoding Cell
Segmenting Medical MRI via Recurrent Decoding Cell
 
The impact of visual saliency prediction in image classification
The impact of visual saliency prediction in image classificationThe impact of visual saliency prediction in image classification
The impact of visual saliency prediction in image classification
 
Multidimensional RNN
Multidimensional RNNMultidimensional RNN
Multidimensional RNN
 
Google and SRI talk September 2016
Google and SRI talk September 2016Google and SRI talk September 2016
Google and SRI talk September 2016
 
More investment in Research and Development for better Education in the future?
More investment in Research and Development for better Education in the future?More investment in Research and Development for better Education in the future?
More investment in Research and Development for better Education in the future?
 
Detection & Recognition of Text.pdf
Detection & Recognition of Text.pdfDetection & Recognition of Text.pdf
Detection & Recognition of Text.pdf
 
India presentation final
India presentation finalIndia presentation final
India presentation final
 
Aerial detection part3
Aerial detection part3Aerial detection part3
Aerial detection part3
 
Biometric presentation attack detection
Biometric presentation attack detectionBiometric presentation attack detection
Biometric presentation attack detection
 
[Term project] Junction-point process
[Term project] Junction-point process[Term project] Junction-point process
[Term project] Junction-point process
 
CSC446: Pattern Recognition (LN7)
CSC446: Pattern Recognition (LN7)CSC446: Pattern Recognition (LN7)
CSC446: Pattern Recognition (LN7)
 
Image Processing Background Elimination in Video Editting
Image Processing Background Elimination in Video EdittingImage Processing Background Elimination in Video Editting
Image Processing Background Elimination in Video Editting
 
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018
 
Coupled Layer-wise Graph Convolution for Transportation Demand Prediction
Coupled Layer-wise Graph Convolution for Transportation Demand PredictionCoupled Layer-wise Graph Convolution for Transportation Demand Prediction
Coupled Layer-wise Graph Convolution for Transportation Demand Prediction
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
Elena Simperl
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
Product School
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 

Exact Repair problems with multiple sources: CISS 2014

  • 1. CISS 2014, Princeton NJ 1 Exact Repair Problems with Multiple Sources Jayant Apte*, Congduan Li, John MacLaren Walsh, Steven Weber ECE Dept. Drexel University
  • 2. CISS 2014, Princeton NJ 2 Outline ● Problem Definition ● Computer assisted proofs: General Structure ● Polyhedral bounds on ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 3. CISS 2014, Princeton NJ 3 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 4. CISS 2014, Princeton NJ 4 (n,k,d) Exact Repair with multiple sources
  • 5. CISS 2014, Princeton NJ 5 (n,k,d) Exact Repair with multiple sources
  • 6. CISS 2014, Princeton NJ 6 2-source (3,2,2) exact repair problem
  • 7. CISS 2014, Princeton NJ 7 2-source (3,2,2) exact repair problem 2 sources
  • 8. CISS 2014, Princeton NJ 8 2-source (3,2,2) exact repair problem 3 encoding functions
  • 9. CISS 2014, Princeton NJ 9 2-source (3,2,2) exact repair problem 3 storage random variables
  • 10. CISS 2014, Princeton NJ 10 2-source (3,2,2) exact repair problem 3 decoders with different demands
  • 11. CISS 2014, Princeton NJ 11 2-source (3,2,2) exact repair problem 6 repair encoding functions
  • 12. CISS 2014, Princeton NJ 12 2-source (3,2,2) exact repair problem 3 repair decoding functions
  • 13. CISS 2014, Princeton NJ 13 2-source (3,2,2) exact repair problem Total 11 random variables
  • 14. CISS 2014, Princeton NJ 14 Implicit characterization of rate region(Yan et al.)
  • 15. CISS 2014, Princeton NJ 15 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 16. CISS 2014, Princeton NJ 16 Motivation Sources Decoder Demands SoftwareNetwork
  • 17. CISS 2014, Princeton NJ 17 Motivation Software Sources Decoder Demands Network Rate Region and optimal codes
  • 18. CISS 2014, Princeton NJ 18 Software for computer assisted proofs
  • 19. CISS 2014, Princeton NJ 19 Computer assisted converse
  • 20. CISS 2014, Princeton NJ 20 Computer assisted converse Inequalities obtained as an implication of linear Shannon-type, non-Shannon-type, non-linear non-Shannon type inequalities and network constraints
  • 21. CISS 2014, Princeton NJ 21 Computer assisted converse
  • 22. CISS 2014, Princeton NJ 22 Computer assisted achievability
  • 23. CISS 2014, Princeton NJ 23 Software for computer assisted proofs
  • 24. CISS 2014, Princeton NJ 24 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 25. CISS 2014, Princeton NJ 25 ● Closure of set of all 'entropic' vectors arising from N-variable probability distributions 3-D rendition of
  • 26. CISS 2014, Princeton NJ 26 ● Closure of set of all 'entropic' vectors arising from N-variable probability distributions ● Each entropic vector is formed by stacking entropies of subsets of N random variables 3-D rendition of
  • 27. CISS 2014, Princeton NJ 27 ● Closure of set of all 'entropic' vectors arising from N-variable probability distributions ● Each entropic vector is formed by stacking entropies of subsets of N random variables ● Cone: 3-D rendition of
  • 28. CISS 2014, Princeton NJ 28 ● Cannot be expressed as intersection of finite number of linear inequalities for N>3 ● For N=4, existence of single nonlinear ● non-Shannon inequality(necessary and sufficient) is known [Liu & Walsh 2014] ● Additionally, several hundred linear non-Shannon inequalities are known [DFZ 2011, Csirmaz 2013] 3-D rendition of
  • 31. CISS 2014, Princeton NJ 31 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on – Shannon (Outer) bound ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 32. CISS 2014, Princeton NJ 32 Shannon Outer Bound
  • 33. CISS 2014, Princeton NJ 33 Shannon Outer Bound
  • 34. CISS 2014, Princeton NJ 34 Shannon Outer Bound
  • 35. CISS 2014, Princeton NJ 35 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on – Shannon (Outer) bound – (Representable) Matroid (Inner) bound(s) ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 36. CISS 2014, Princeton NJ 36 (Representable) Matroid Inner bound(s)
  • 37. CISS 2014, Princeton NJ 37 (Representable) Matroid Inner bound(s)
  • 38. CISS 2014, Princeton NJ 38 (Representable) Matroid Inner bound(s)
  • 39. CISS 2014, Princeton NJ 39 (Representable) Matroid Inner bound(s)
  • 40. CISS 2014, Princeton NJ 40 (Representable) Matroid Inner bound(s)
  • 41. CISS 2014, Princeton NJ 41 (Representable) Matroid Inner bound(s)
  • 42. CISS 2014, Princeton NJ 42 (Representable) Matroid Inner Bound(s)
  • 43. CISS 2014, Princeton NJ 43 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on – Shannon (Outer) bound – Matroid (Inner) bound(s) – Subspace (Inner) bounds ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 44. CISS 2014, Princeton NJ 44 Subspace Inner Bound(s)
  • 45. CISS 2014, Princeton NJ 45 Subspace Inner Bound(s)
  • 46. CISS 2014, Princeton NJ 46 Subspace Inner Bound(s)
  • 47. CISS 2014, Princeton NJ 47 Subspace Inner Bound(s)
  • 48. CISS 2014, Princeton NJ 48 Subspace Inner Bound(s)
  • 49. CISS 2014, Princeton NJ 49 Software for computer assisted proofs
  • 50. CISS 2014, Princeton NJ 50 Polyhedral bounds on rate region ● Using polyhedral inner/outer bound on yields polyhedral inner/outer bounds on rate region ● Lemma 1: Inner bounds on rate region computed using or are achievable using linear codes
  • 51. CISS 2014, Princeton NJ 51 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on – Shannon (Outer) bound – Matroid (Inner) bound(s) – Subspace (Inner) bounds ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 52. CISS 2014, Princeton NJ 52 Network Coding constraints
  • 53. CISS 2014, Princeton NJ 53 Network Coding constraints ● Consider a type 1 or type 2 constraint H ● In general, computing extreme rays of given H and extreme rays of is equivalent to an iteration of Double Description Method of polyhedral representation conversion ● Lemma 2 [Li et al. 2013]: An extreme ray of is an extreme ray of if it is contained in the hyperplane corresponding to H ● Hence, simple membership check suffices to find extreme rays of
  • 54. CISS 2014, Princeton NJ 54 Software for computer assisted proofs
  • 55. CISS 2014, Princeton NJ 55 Rate constraints Storage Bandwidth
  • 56. CISS 2014, Princeton NJ 56 Rate constraints Repair Bandwidth Storage Bandwidth
  • 57. CISS 2014, Princeton NJ 57 A projection technique for computing achievable rate region
  • 58. CISS 2014, Princeton NJ 58 A projection technique for computing achievable rate region
  • 59. CISS 2014, Princeton NJ 59 A projection technique for computing achievable rate region
  • 60. CISS 2014, Princeton NJ 60 Polyhedral projection via chm ● chm is an implementation of polyhedral projection algorithm called Convex Hull Method by Jayant Apte* ● chmlib v0.x is available at: http://www.ece.drexel.edu/walsh/aspitrg/software.html ● Rational arithmetic using FLINT: Fast Library for Number Theory ● Rational LP solver based on qsopt
  • 61. CISS 2014, Princeton NJ 61 Polyhedral projection via chm ● Has been used for – The current work – Computer assisted converse proofs of rate regions of Multilevel Diversity Coding Systems(a special case of multi-source network coding) – Finding non-Shannon Information Inequalities via Generalized Copy Lemma of Csirmaz ● Can be used for – Finding necessary conditions for non-contexuality of small marginal scenarios(Quantum Information)
  • 62. CISS 2014, Princeton NJ 62 Results SoftwareNetwork
  • 63. CISS 2014, Princeton NJ 63 Rate region for H(S1)=1 and H(S2)=1
  • 64. CISS 2014, Princeton NJ 64 Rate region for H(S1)=1 and H(S2)=2
  • 65. CISS 2014, Princeton NJ 65 References ● X. Yan, R.W. Yeung, and Zhen Zhang. An implicit characterization of the achievable rate region for acyclic multisource multisink network coding. Information Theory, IEEE Transactions on, 58(9):5625–5639, 2012. ● Dougherty, Randall, Chris Freiling, and Kenneth Zeger. "Non-Shannon information inequalities in four random variables." arXiv preprint arXiv:1104.3602 (2011). ● Csirmaz, László. "Information inequalities for four variables." CEU (2013). ● Yunshu Liu and John M. Walsh, "Only One Nonlinear Non-Shannon Inequality is Necessary for Four Variables", submitted to IEEE Int. Symp. Information Theory (ISIT2014) ● Congduan Li, J. Apte, J.M. Walsh, and S. Weber. A new computational approach for determining rate regions and optimal codes for coded networks. In Network Coding (NetCod), 2013 International Symposium on, pages 1–6, 2013. ● Congduan Li, John MacLaren Walsh, Steven Weber. Matroid bounds on the region of entropic vectors. In 51th Annual Allerton Conference on Communication, Control and Computing, October 2013.