SlideShare a Scribd company logo
1 of 38
Download to read offline
Multicasting in
Linear Deterministic Relay Network
by Matrix Completion
Tasuku Soma
Univ. of Tokyo
1 / 20
1 Linear Deterministic Relay Network (LDRN)
2 Unicast Algorithm
3 Mixed Matrix Completion
4 Algorithm
5 Conclusion
2 / 20
Linear Deterministic Relay Network (LDRN)
A model for wireless communication [Avestimehr–Diggavi–Tse’07]
3 / 20
Linear Deterministic Relay Network (LDRN)
A model for wireless communication [Avestimehr–Diggavi–Tse’07]
• Signals are represented by elements of a finite field F
• Signals are sent to several nodes (Broadcast)
3 / 20
Linear Deterministic Relay Network (LDRN)
A model for wireless communication [Avestimehr–Diggavi–Tse’07]
• Signals are represented by elements of a finite field F
• Signals are sent to several nodes (Broadcast)
3 / 20
Linear Deterministic Relay Network (LDRN)
A model for wireless communication [Avestimehr–Diggavi–Tse’07]
• Signals are represented by elements of a finite field F
• Signals are sent to several nodes (Broadcast)
• Superposition is modeled as addition in F.
3 / 20
Linear Deterministic Relay Network (LDRN)
A model for wireless communication [Avestimehr–Diggavi–Tse’07]
• Signals are represented by elements of a finite field F
• Signals are sent to several nodes (Broadcast)
• Superposition is modeled as addition in F.
3 / 20
Multicasting in LDRN
• intermediate nodes can perform a linear coding
• |F| > # of sinks
4 / 20
Multicasting in LDRN
• intermediate nodes can perform a linear coding
• |F| > # of sinks
4 / 20
Previous Work
Randomized Algorithm (|F| is large):
Theorem (Avestimehr-Diggavi-Tse ’07)
Random conding is a solution w.h.p.
Deterministic Algorithm (|F| > d):
Theorem (Yazdi–Savari ’13)
A Deterministic algorithm for multicast in LDRN which runs in
O(dq((nr)3
log(nr)+n2
r4
)) time.
d: # sinks, n: max # nodes in each layer, q: # layers,
r: capacity of node
5 / 20
Our Result
Deterministic Algorithm (|F| > d):
Theorem
A deterministic algorithm for multicast in LDRN which runs in
O(dq((nr)3
log(nr)) time.
d: # sinks, n: max # nodes in each layer, q: # layers,
r: capacity of node
• Faster when n = o(r)
• Complexity matches: current best complexity of unicast×d
6 / 20
Technical Contribution
Yazdi-Savari’s algorithm:
Step 1
Solve unicasts by Goemans–
Iwata–Zenklusen’s algorithm
Step 2
Determine linear encoding
of nodes one by one.
7 / 20
Technical Contribution
Yazdi-Savari’s algorithm:
Step 1
Solve unicasts by Goemans–
Iwata–Zenklusen’s algorithm
Step 2
Determine linear encoding
of nodes one by one.
Our algorithm:
Step 1
Solve unicasts by Goemans–
Iwata–Zenklusen’s algorithm
Step 2
Determine linear encoding
of layer at once
by matrix completion
7 / 20
1 Linear Deterministic Relay Network (LDRN)
2 Unicast Algorithm
3 Mixed Matrix Completion
4 Algorithm
5 Conclusion
8 / 20
Unicast in LDRN
One-to-one communication
9 / 20
Unicast in LDRN
One-to-one communication
• Goemans-Iwata-Zenklusen’s algorithm:
... the current fastest algorithm for unicast
9 / 20
s–t flow
1 For each node, # of inputs in F = # of outputs in F.
2 Linear maps between layers corresponding to F are nonsingular.
3 At the last layer, F is contained in the outputs of t.
10 / 20
s–t flow
one for each
1 For each node, # of inputs in F = # of outputs in F.
2 Linear maps between layers corresponding to F are nonsingular.
3 At the last layer, F is contained in the outputs of t.
10 / 20
s–t flow
[ x
y ] → [ x
y ] [ x
y ] → [ x
x+y ] [ x
y ] → [ x
y ]
1 For each node, # of inputs in F = # of outputs in F.
2 Linear maps between layers corresponding to F are nonsingular.
3 At the last layer, F is contained in the outputs of t.
10 / 20
s–t flow
1 For each node, # of inputs in F = # of outputs in F.
2 Linear maps between layers corresponding to F are nonsingular.
3 At the last layer, F is contained in the outputs of t.
10 / 20
s–t flow
Theorem (Goemans–Iwata–Zenklusen ’12)
In LDRN, s–t flow can be found in O(q(nr)3
log(nr)) time.
10 / 20
1 Linear Deterministic Relay Network (LDRN)
2 Unicast Algorithm
3 Mixed Matrix Completion
4 Algorithm
5 Conclusion
11 / 20
Mixed Matrix Completion
Mixed Matrix: Matrix containing indeterminates
s.t. each indeterminate appears only once.
Example
A =
1 + x1 2 + x2
x3 0
=
1 2
0 0
+
x1 x2
x3 0
12 / 20
Mixed Matrix Completion
Mixed Matrix: Matrix containing indeterminates
s.t. each indeterminate appears only once.
Example
A =
1 + x1 2 + x2
x3 0
=
1 2
0 0
+
x1 x2
x3 0
Mixed Matrix Completion: Find values for indeterminates of mixed matrix
so that the rank of resulting matrix is maximized
Example
F = Q
A =
1 + x1 2 + x2
x3 0
−→ A =
2 2
1 0
(x1 := 1, x2 := 0, x3 := 1)
12 / 20
Simultaneous Mixed Matrix Completion
Simultaneous Mixed Matrix Completion
F: Field
Input Collection A of mixed matrices (over F)
Find Value assignment αi ∈ F for each indeterminate xi
maximizing the rank of every matrix in A
13 / 20
Simultaneous Mixed Matrix Completion
Simultaneous Mixed Matrix Completion
F: Field
Input Collection A of mixed matrices (over F)
Find Value assignment αi ∈ F for each indeterminate xi
maximizing the rank of every matrix in A
Example
A =
x1 1
0 x2
,
1 + x1 0
1 x3
→
1 1
0 1
,
2 0
1 1
if F = F3
13 / 20
Simultaneous Mixed Matrix Completion
Simultaneous Mixed Matrix Completion
F: Field
Input Collection A of mixed matrices (over F)
Find Value assignment αi ∈ F for each indeterminate xi
maximizing the rank of every matrix in A
Example
A =
x1 1
0 x2
,
1 + x1 0
1 x3
→
1 1
0 1
,
2 0
1 1
if F = F3
→ No solution if F = F2
13 / 20
Simultaneous Mixed Matrix Completion
Simultaneous Mixed Matrix Completion
F: Field
Input Collection A of mixed matrices (over F)
Find Value assignment αi ∈ F for each indeterminate xi
maximizing the rank of every matrix in A
Example
A =
x1 1
0 x2
,
1 + x1 0
1 x3
→
1 1
0 1
,
2 0
1 1
if F = F3
→ No solution if F = F2
Theorem (Harvey-Karger-Murota ’05)
If |F| > |A|, the simultaneous mixed matrix completion always has a
solution, which can be found in polytime.
13 / 20
1 Linear Deterministic Relay Network (LDRN)
2 Unicast Algorithm
3 Mixed Matrix Completion
4 Algorithm
5 Conclusion
14 / 20
Algorithm
Algorithm
1. for each t ∈ T :
2. Find s–t flow Ft Goemans–Iwata–Zenklusen
3. for i = 1, . . . , q :
4. Determine the linear encoding Xi of the i-th layer
Matrix Completion
5. return X1, . . . , Xq
15 / 20
Algorithm
w: message vector
vi: the input vector of the i-th layer
Determine Xi so that the linear map
At : w → (subvector of vi corresponding to Ft )
is nonsingular for each sink t ∈ T.
16 / 20
Algorithm
w: message vector
vi: the input vector of the i-th layer
Determine Xi so that the linear map
At : w → (subvector of vi corresponding to Ft )
is nonsingular for each sink t ∈ T.
16 / 20
Algorithm
vi+1 = MiXivi = MiXiPiw. Thus At = Mi[Ft ]XiPi
(Mi[Ft ]: Ft -row submatrix of Mi)
17 / 20
Algorithm
vi+1 = MiXivi = MiXiPiw. Thus At = Mi[Ft ]XiPi
(Mi[Ft ]: Ft -row submatrix of Mi)
Determine Xi so that the matrix Mi[Ft ]XiPi is nonsingular for each sink t.
17 / 20
Algorithm
Mi[Ft ]XiPi is NOT a mixed matrix ... BUT
Lemma
Mi[Ft ]XiPi is nonsingular ⇐⇒ a mixed matrix
I O Pi
Xi I O
O Mi[Ft ] O
is nonsingular
18 / 20
Algorithm
Mi[Ft ]XiPi is NOT a mixed matrix ... BUT
Lemma
Mi[Ft ]XiPi is nonsingular ⇐⇒ a mixed matrix
I O Pi
Xi I O
O Mi[Ft ] O
is nonsingular
We can find Xi s.t.
I O Pi
Xi I O
O Mi[Ft ] O
is nonsingular for each t by simultaneous
mixed matrix completion !
Theorem
If |F| > d, multicast problem in LDRN can be solved in O(dq(nr)3
log(nr))
time.
d: # sinks, n: max # nodes in each layer, q: # layers,
r: capacity of node
18 / 20
1 Linear Deterministic Relay Network (LDRN)
2 Unicast Algorithm
3 Mixed Matrix Completion
4 Algorithm
5 Conclusion
19 / 20
Conclusion
• Deterministic algorithm for multicast in LDRN using matrix
completion
• Faster than the previous algorithm when n = o(r)
• Complexity matches (current best complexity of unicast)×d
d: # sinks, n: max # nodes in each layer, q: # layers,
r: capacity of node
20 / 20

More Related Content

What's hot

Cheatsheet supervised-learning
Cheatsheet supervised-learningCheatsheet supervised-learning
Cheatsheet supervised-learningSteve Nouri
 
Cheatsheet unsupervised-learning
Cheatsheet unsupervised-learningCheatsheet unsupervised-learning
Cheatsheet unsupervised-learningSteve Nouri
 
Seismic data processing lecture 3
Seismic data processing lecture 3Seismic data processing lecture 3
Seismic data processing lecture 3Amin khalil
 
ACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems ReviewACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems ReviewRoman Elizarov
 
ACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems ReviewACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems ReviewRoman Elizarov
 
ACM ICPC 2015 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2015 NEERC (Northeastern European Regional Contest) Problems ReviewACM ICPC 2015 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2015 NEERC (Northeastern European Regional Contest) Problems ReviewRoman Elizarov
 
Branch and bound technique
Branch and bound techniqueBranch and bound technique
Branch and bound techniqueishmecse13
 
PRML Reading Chapter 11 - Sampling Method
PRML Reading Chapter 11 - Sampling MethodPRML Reading Chapter 11 - Sampling Method
PRML Reading Chapter 11 - Sampling MethodHa Phuong
 
Pseudo and Quasi Random Number Generation
Pseudo and Quasi Random Number GenerationPseudo and Quasi Random Number Generation
Pseudo and Quasi Random Number GenerationAshwin Rao
 
Cheatsheet convolutional-neural-networks
Cheatsheet convolutional-neural-networksCheatsheet convolutional-neural-networks
Cheatsheet convolutional-neural-networksSteve Nouri
 
inverse z-transform ppt
inverse z-transform pptinverse z-transform ppt
inverse z-transform pptmihir jain
 

What's hot (20)

Cheatsheet supervised-learning
Cheatsheet supervised-learningCheatsheet supervised-learning
Cheatsheet supervised-learning
 
Branch and bound
Branch and boundBranch and bound
Branch and bound
 
Signals Processing Homework Help
Signals Processing Homework HelpSignals Processing Homework Help
Signals Processing Homework Help
 
Asymptotic Notation
Asymptotic NotationAsymptotic Notation
Asymptotic Notation
 
Cheatsheet unsupervised-learning
Cheatsheet unsupervised-learningCheatsheet unsupervised-learning
Cheatsheet unsupervised-learning
 
DFT and IDFT Matlab Code
DFT and IDFT Matlab CodeDFT and IDFT Matlab Code
DFT and IDFT Matlab Code
 
Seismic data processing lecture 3
Seismic data processing lecture 3Seismic data processing lecture 3
Seismic data processing lecture 3
 
Teknik Simulasi
Teknik SimulasiTeknik Simulasi
Teknik Simulasi
 
Distributed ADMM
Distributed ADMMDistributed ADMM
Distributed ADMM
 
Matlab Assignment Help
Matlab Assignment HelpMatlab Assignment Help
Matlab Assignment Help
 
ACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems ReviewACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2013 NEERC (Northeastern European Regional Contest) Problems Review
 
ACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems ReviewACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2012 NEERC (Northeastern European Regional Contest) Problems Review
 
ACM ICPC 2015 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2015 NEERC (Northeastern European Regional Contest) Problems ReviewACM ICPC 2015 NEERC (Northeastern European Regional Contest) Problems Review
ACM ICPC 2015 NEERC (Northeastern European Regional Contest) Problems Review
 
Branch and bound technique
Branch and bound techniqueBranch and bound technique
Branch and bound technique
 
PRML Reading Chapter 11 - Sampling Method
PRML Reading Chapter 11 - Sampling MethodPRML Reading Chapter 11 - Sampling Method
PRML Reading Chapter 11 - Sampling Method
 
Randomized algorithms ver 1.0
Randomized algorithms ver 1.0Randomized algorithms ver 1.0
Randomized algorithms ver 1.0
 
5.1 greedy
5.1 greedy5.1 greedy
5.1 greedy
 
Pseudo and Quasi Random Number Generation
Pseudo and Quasi Random Number GenerationPseudo and Quasi Random Number Generation
Pseudo and Quasi Random Number Generation
 
Cheatsheet convolutional-neural-networks
Cheatsheet convolutional-neural-networksCheatsheet convolutional-neural-networks
Cheatsheet convolutional-neural-networks
 
inverse z-transform ppt
inverse z-transform pptinverse z-transform ppt
inverse z-transform ppt
 

Viewers also liked

Fast Deterministic Algorithms for Matrix Completion Problems
Fast Deterministic Algorithms for Matrix Completion ProblemsFast Deterministic Algorithms for Matrix Completion Problems
Fast Deterministic Algorithms for Matrix Completion ProblemsTasuku Soma
 
行列補完を用いた無線マルチキャスト符号構成アルゴリズム
行列補完を用いた無線マルチキャスト符号構成アルゴリズム行列補完を用いた無線マルチキャスト符号構成アルゴリズム
行列補完を用いた無線マルチキャスト符号構成アルゴリズムTasuku Soma
 
整数格子点上の劣モジュラ被覆に対する高速アルゴリズム
整数格子点上の劣モジュラ被覆に対する高速アルゴリズム整数格子点上の劣モジュラ被覆に対する高速アルゴリズム
整数格子点上の劣モジュラ被覆に対する高速アルゴリズムTasuku Soma
 
計算情報学研究室 (数理情報学第7研究室)
計算情報学研究室  (数理情報学第7研究室) 計算情報学研究室  (数理情報学第7研究室)
計算情報学研究室 (数理情報学第7研究室) Tasuku Soma
 
非制約最小二乗密度比推定法 uLSIF を用いた外れ値検出
非制約最小二乗密度比推定法 uLSIF を用いた外れ値検出非制約最小二乗密度比推定法 uLSIF を用いた外れ値検出
非制約最小二乗密度比推定法 uLSIF を用いた外れ値検出hoxo_m
 
脆弱性スキャナVulsのAWS環境への融合
脆弱性スキャナVulsのAWS環境への融合脆弱性スキャナVulsのAWS環境への融合
脆弱性スキャナVulsのAWS環境への融合Takayuki Ushida
 
Config rulesを1年ほど使い続けて分かったこと
Config rulesを1年ほど使い続けて分かったことConfig rulesを1年ほど使い続けて分かったこと
Config rulesを1年ほど使い続けて分かったことqtomonari
 
Pythonによる非同期プログラミング入門
Pythonによる非同期プログラミング入門Pythonによる非同期プログラミング入門
Pythonによる非同期プログラミング入門Hironori Sekine
 
QAアーキテクチャの設計による 説明責任の高いテスト・品質保証
QAアーキテクチャの設計による説明責任の高いテスト・品質保証QAアーキテクチャの設計による説明責任の高いテスト・品質保証
QAアーキテクチャの設計による 説明責任の高いテスト・品質保証Yasuharu Nishi
 
Pythonによるwebアプリケーション入門 - Django編-
Pythonによるwebアプリケーション入門 - Django編- Pythonによるwebアプリケーション入門 - Django編-
Pythonによるwebアプリケーション入門 - Django編- Hironori Sekine
 
0528 kanntigai ui_ux
0528 kanntigai ui_ux0528 kanntigai ui_ux
0528 kanntigai ui_uxSaori Matsui
 
女子の心をつかむUIデザインポイント - MERY編 -
女子の心をつかむUIデザインポイント - MERY編 -女子の心をつかむUIデザインポイント - MERY編 -
女子の心をつかむUIデザインポイント - MERY編 -Shoko Tanaka
 

Viewers also liked (13)

Fast Deterministic Algorithms for Matrix Completion Problems
Fast Deterministic Algorithms for Matrix Completion ProblemsFast Deterministic Algorithms for Matrix Completion Problems
Fast Deterministic Algorithms for Matrix Completion Problems
 
Beamertemplete
BeamertempleteBeamertemplete
Beamertemplete
 
行列補完を用いた無線マルチキャスト符号構成アルゴリズム
行列補完を用いた無線マルチキャスト符号構成アルゴリズム行列補完を用いた無線マルチキャスト符号構成アルゴリズム
行列補完を用いた無線マルチキャスト符号構成アルゴリズム
 
整数格子点上の劣モジュラ被覆に対する高速アルゴリズム
整数格子点上の劣モジュラ被覆に対する高速アルゴリズム整数格子点上の劣モジュラ被覆に対する高速アルゴリズム
整数格子点上の劣モジュラ被覆に対する高速アルゴリズム
 
計算情報学研究室 (数理情報学第7研究室)
計算情報学研究室  (数理情報学第7研究室) 計算情報学研究室  (数理情報学第7研究室)
計算情報学研究室 (数理情報学第7研究室)
 
非制約最小二乗密度比推定法 uLSIF を用いた外れ値検出
非制約最小二乗密度比推定法 uLSIF を用いた外れ値検出非制約最小二乗密度比推定法 uLSIF を用いた外れ値検出
非制約最小二乗密度比推定法 uLSIF を用いた外れ値検出
 
脆弱性スキャナVulsのAWS環境への融合
脆弱性スキャナVulsのAWS環境への融合脆弱性スキャナVulsのAWS環境への融合
脆弱性スキャナVulsのAWS環境への融合
 
Config rulesを1年ほど使い続けて分かったこと
Config rulesを1年ほど使い続けて分かったことConfig rulesを1年ほど使い続けて分かったこと
Config rulesを1年ほど使い続けて分かったこと
 
Pythonによる非同期プログラミング入門
Pythonによる非同期プログラミング入門Pythonによる非同期プログラミング入門
Pythonによる非同期プログラミング入門
 
QAアーキテクチャの設計による 説明責任の高いテスト・品質保証
QAアーキテクチャの設計による説明責任の高いテスト・品質保証QAアーキテクチャの設計による説明責任の高いテスト・品質保証
QAアーキテクチャの設計による 説明責任の高いテスト・品質保証
 
Pythonによるwebアプリケーション入門 - Django編-
Pythonによるwebアプリケーション入門 - Django編- Pythonによるwebアプリケーション入門 - Django編-
Pythonによるwebアプリケーション入門 - Django編-
 
0528 kanntigai ui_ux
0528 kanntigai ui_ux0528 kanntigai ui_ux
0528 kanntigai ui_ux
 
女子の心をつかむUIデザインポイント - MERY編 -
女子の心をつかむUIデザインポイント - MERY編 -女子の心をつかむUIデザインポイント - MERY編 -
女子の心をつかむUIデザインポイント - MERY編 -
 

Similar to Multicasting in Linear Deterministic Relay Network by Matrix Completion

Relay Vehicle Formations for Optimizing Communication Quality in Robot Networks
Relay Vehicle Formations for Optimizing Communication Quality in Robot NetworksRelay Vehicle Formations for Optimizing Communication Quality in Robot Networks
Relay Vehicle Formations for Optimizing Communication Quality in Robot NetworksMd Mahbubur Rahman
 
Programmable PN Sequence Generators
Programmable PN Sequence GeneratorsProgrammable PN Sequence Generators
Programmable PN Sequence GeneratorsRajesh Singh
 
Ist module 3
Ist module 3Ist module 3
Ist module 3Vijaya79
 
Lecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptLecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptWahyuAde4
 
Synchronization Issues in OFDM Systems
Synchronization Issues in OFDM SystemsSynchronization Issues in OFDM Systems
Synchronization Issues in OFDM SystemsDeeptanu Datta
 
conference_poster_4
conference_poster_4conference_poster_4
conference_poster_4Jiayi Jiang
 
EC8553 Discrete time signal processing
EC8553 Discrete time signal processing EC8553 Discrete time signal processing
EC8553 Discrete time signal processing ssuser2797e4
 
Weight enumerators of block codes and the mc williams
Weight  enumerators of block codes and  the mc williamsWeight  enumerators of block codes and  the mc williams
Weight enumerators of block codes and the mc williamsMadhumita Tamhane
 
The Fast Fourier Transform (FFT)
The Fast Fourier Transform (FFT)The Fast Fourier Transform (FFT)
The Fast Fourier Transform (FFT)Oka Danil
 
Transport and routing on coupled spatial networks
Transport and routing on coupled spatial networksTransport and routing on coupled spatial networks
Transport and routing on coupled spatial networksrichardgmorris
 
Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...Ryutaroh Matsumoto
 
Multi-Carrier Transmission over Mobile Radio Channels.ppt
Multi-Carrier Transmission over Mobile Radio Channels.pptMulti-Carrier Transmission over Mobile Radio Channels.ppt
Multi-Carrier Transmission over Mobile Radio Channels.pptStefan Oprea
 
Conditional Random Fields
Conditional Random FieldsConditional Random Fields
Conditional Random Fieldslswing
 

Similar to Multicasting in Linear Deterministic Relay Network by Matrix Completion (20)

Kanal wireless dan propagasi
Kanal wireless dan propagasiKanal wireless dan propagasi
Kanal wireless dan propagasi
 
Relay Vehicle Formations for Optimizing Communication Quality in Robot Networks
Relay Vehicle Formations for Optimizing Communication Quality in Robot NetworksRelay Vehicle Formations for Optimizing Communication Quality in Robot Networks
Relay Vehicle Formations for Optimizing Communication Quality in Robot Networks
 
Programmable PN Sequence Generators
Programmable PN Sequence GeneratorsProgrammable PN Sequence Generators
Programmable PN Sequence Generators
 
Ist module 3
Ist module 3Ist module 3
Ist module 3
 
Lecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.pptLecture_10_Parallel_Algorithms_Part_II.ppt
Lecture_10_Parallel_Algorithms_Part_II.ppt
 
Synchronization Issues in OFDM Systems
Synchronization Issues in OFDM SystemsSynchronization Issues in OFDM Systems
Synchronization Issues in OFDM Systems
 
ECE 565 FInal Project
ECE 565 FInal ProjectECE 565 FInal Project
ECE 565 FInal Project
 
conference_poster_4
conference_poster_4conference_poster_4
conference_poster_4
 
Signal Processing Homework Help
Signal Processing Homework HelpSignal Processing Homework Help
Signal Processing Homework Help
 
EC8553 Discrete time signal processing
EC8553 Discrete time signal processing EC8553 Discrete time signal processing
EC8553 Discrete time signal processing
 
Weight enumerators of block codes and the mc williams
Weight  enumerators of block codes and  the mc williamsWeight  enumerators of block codes and  the mc williams
Weight enumerators of block codes and the mc williams
 
Ofdm
OfdmOfdm
Ofdm
 
Nt lecture skm-iiit-bh
Nt lecture skm-iiit-bhNt lecture skm-iiit-bh
Nt lecture skm-iiit-bh
 
The Fast Fourier Transform (FFT)
The Fast Fourier Transform (FFT)The Fast Fourier Transform (FFT)
The Fast Fourier Transform (FFT)
 
Optimisation random graph presentation
Optimisation random graph presentationOptimisation random graph presentation
Optimisation random graph presentation
 
OFDM Basics.ppt
OFDM Basics.pptOFDM Basics.ppt
OFDM Basics.ppt
 
Transport and routing on coupled spatial networks
Transport and routing on coupled spatial networksTransport and routing on coupled spatial networks
Transport and routing on coupled spatial networks
 
Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...Relation between Information Leakage and Combinatorial Quantities of Linear C...
Relation between Information Leakage and Combinatorial Quantities of Linear C...
 
Multi-Carrier Transmission over Mobile Radio Channels.ppt
Multi-Carrier Transmission over Mobile Radio Channels.pptMulti-Carrier Transmission over Mobile Radio Channels.ppt
Multi-Carrier Transmission over Mobile Radio Channels.ppt
 
Conditional Random Fields
Conditional Random FieldsConditional Random Fields
Conditional Random Fields
 

Recently uploaded

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 

Recently uploaded (20)

Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 

Multicasting in Linear Deterministic Relay Network by Matrix Completion

  • 1. Multicasting in Linear Deterministic Relay Network by Matrix Completion Tasuku Soma Univ. of Tokyo 1 / 20
  • 2. 1 Linear Deterministic Relay Network (LDRN) 2 Unicast Algorithm 3 Mixed Matrix Completion 4 Algorithm 5 Conclusion 2 / 20
  • 3. Linear Deterministic Relay Network (LDRN) A model for wireless communication [Avestimehr–Diggavi–Tse’07] 3 / 20
  • 4. Linear Deterministic Relay Network (LDRN) A model for wireless communication [Avestimehr–Diggavi–Tse’07] • Signals are represented by elements of a finite field F • Signals are sent to several nodes (Broadcast) 3 / 20
  • 5. Linear Deterministic Relay Network (LDRN) A model for wireless communication [Avestimehr–Diggavi–Tse’07] • Signals are represented by elements of a finite field F • Signals are sent to several nodes (Broadcast) 3 / 20
  • 6. Linear Deterministic Relay Network (LDRN) A model for wireless communication [Avestimehr–Diggavi–Tse’07] • Signals are represented by elements of a finite field F • Signals are sent to several nodes (Broadcast) • Superposition is modeled as addition in F. 3 / 20
  • 7. Linear Deterministic Relay Network (LDRN) A model for wireless communication [Avestimehr–Diggavi–Tse’07] • Signals are represented by elements of a finite field F • Signals are sent to several nodes (Broadcast) • Superposition is modeled as addition in F. 3 / 20
  • 8. Multicasting in LDRN • intermediate nodes can perform a linear coding • |F| > # of sinks 4 / 20
  • 9. Multicasting in LDRN • intermediate nodes can perform a linear coding • |F| > # of sinks 4 / 20
  • 10. Previous Work Randomized Algorithm (|F| is large): Theorem (Avestimehr-Diggavi-Tse ’07) Random conding is a solution w.h.p. Deterministic Algorithm (|F| > d): Theorem (Yazdi–Savari ’13) A Deterministic algorithm for multicast in LDRN which runs in O(dq((nr)3 log(nr)+n2 r4 )) time. d: # sinks, n: max # nodes in each layer, q: # layers, r: capacity of node 5 / 20
  • 11. Our Result Deterministic Algorithm (|F| > d): Theorem A deterministic algorithm for multicast in LDRN which runs in O(dq((nr)3 log(nr)) time. d: # sinks, n: max # nodes in each layer, q: # layers, r: capacity of node • Faster when n = o(r) • Complexity matches: current best complexity of unicast×d 6 / 20
  • 12. Technical Contribution Yazdi-Savari’s algorithm: Step 1 Solve unicasts by Goemans– Iwata–Zenklusen’s algorithm Step 2 Determine linear encoding of nodes one by one. 7 / 20
  • 13. Technical Contribution Yazdi-Savari’s algorithm: Step 1 Solve unicasts by Goemans– Iwata–Zenklusen’s algorithm Step 2 Determine linear encoding of nodes one by one. Our algorithm: Step 1 Solve unicasts by Goemans– Iwata–Zenklusen’s algorithm Step 2 Determine linear encoding of layer at once by matrix completion 7 / 20
  • 14. 1 Linear Deterministic Relay Network (LDRN) 2 Unicast Algorithm 3 Mixed Matrix Completion 4 Algorithm 5 Conclusion 8 / 20
  • 15. Unicast in LDRN One-to-one communication 9 / 20
  • 16. Unicast in LDRN One-to-one communication • Goemans-Iwata-Zenklusen’s algorithm: ... the current fastest algorithm for unicast 9 / 20
  • 17. s–t flow 1 For each node, # of inputs in F = # of outputs in F. 2 Linear maps between layers corresponding to F are nonsingular. 3 At the last layer, F is contained in the outputs of t. 10 / 20
  • 18. s–t flow one for each 1 For each node, # of inputs in F = # of outputs in F. 2 Linear maps between layers corresponding to F are nonsingular. 3 At the last layer, F is contained in the outputs of t. 10 / 20
  • 19. s–t flow [ x y ] → [ x y ] [ x y ] → [ x x+y ] [ x y ] → [ x y ] 1 For each node, # of inputs in F = # of outputs in F. 2 Linear maps between layers corresponding to F are nonsingular. 3 At the last layer, F is contained in the outputs of t. 10 / 20
  • 20. s–t flow 1 For each node, # of inputs in F = # of outputs in F. 2 Linear maps between layers corresponding to F are nonsingular. 3 At the last layer, F is contained in the outputs of t. 10 / 20
  • 21. s–t flow Theorem (Goemans–Iwata–Zenklusen ’12) In LDRN, s–t flow can be found in O(q(nr)3 log(nr)) time. 10 / 20
  • 22. 1 Linear Deterministic Relay Network (LDRN) 2 Unicast Algorithm 3 Mixed Matrix Completion 4 Algorithm 5 Conclusion 11 / 20
  • 23. Mixed Matrix Completion Mixed Matrix: Matrix containing indeterminates s.t. each indeterminate appears only once. Example A = 1 + x1 2 + x2 x3 0 = 1 2 0 0 + x1 x2 x3 0 12 / 20
  • 24. Mixed Matrix Completion Mixed Matrix: Matrix containing indeterminates s.t. each indeterminate appears only once. Example A = 1 + x1 2 + x2 x3 0 = 1 2 0 0 + x1 x2 x3 0 Mixed Matrix Completion: Find values for indeterminates of mixed matrix so that the rank of resulting matrix is maximized Example F = Q A = 1 + x1 2 + x2 x3 0 −→ A = 2 2 1 0 (x1 := 1, x2 := 0, x3 := 1) 12 / 20
  • 25. Simultaneous Mixed Matrix Completion Simultaneous Mixed Matrix Completion F: Field Input Collection A of mixed matrices (over F) Find Value assignment αi ∈ F for each indeterminate xi maximizing the rank of every matrix in A 13 / 20
  • 26. Simultaneous Mixed Matrix Completion Simultaneous Mixed Matrix Completion F: Field Input Collection A of mixed matrices (over F) Find Value assignment αi ∈ F for each indeterminate xi maximizing the rank of every matrix in A Example A = x1 1 0 x2 , 1 + x1 0 1 x3 → 1 1 0 1 , 2 0 1 1 if F = F3 13 / 20
  • 27. Simultaneous Mixed Matrix Completion Simultaneous Mixed Matrix Completion F: Field Input Collection A of mixed matrices (over F) Find Value assignment αi ∈ F for each indeterminate xi maximizing the rank of every matrix in A Example A = x1 1 0 x2 , 1 + x1 0 1 x3 → 1 1 0 1 , 2 0 1 1 if F = F3 → No solution if F = F2 13 / 20
  • 28. Simultaneous Mixed Matrix Completion Simultaneous Mixed Matrix Completion F: Field Input Collection A of mixed matrices (over F) Find Value assignment αi ∈ F for each indeterminate xi maximizing the rank of every matrix in A Example A = x1 1 0 x2 , 1 + x1 0 1 x3 → 1 1 0 1 , 2 0 1 1 if F = F3 → No solution if F = F2 Theorem (Harvey-Karger-Murota ’05) If |F| > |A|, the simultaneous mixed matrix completion always has a solution, which can be found in polytime. 13 / 20
  • 29. 1 Linear Deterministic Relay Network (LDRN) 2 Unicast Algorithm 3 Mixed Matrix Completion 4 Algorithm 5 Conclusion 14 / 20
  • 30. Algorithm Algorithm 1. for each t ∈ T : 2. Find s–t flow Ft Goemans–Iwata–Zenklusen 3. for i = 1, . . . , q : 4. Determine the linear encoding Xi of the i-th layer Matrix Completion 5. return X1, . . . , Xq 15 / 20
  • 31. Algorithm w: message vector vi: the input vector of the i-th layer Determine Xi so that the linear map At : w → (subvector of vi corresponding to Ft ) is nonsingular for each sink t ∈ T. 16 / 20
  • 32. Algorithm w: message vector vi: the input vector of the i-th layer Determine Xi so that the linear map At : w → (subvector of vi corresponding to Ft ) is nonsingular for each sink t ∈ T. 16 / 20
  • 33. Algorithm vi+1 = MiXivi = MiXiPiw. Thus At = Mi[Ft ]XiPi (Mi[Ft ]: Ft -row submatrix of Mi) 17 / 20
  • 34. Algorithm vi+1 = MiXivi = MiXiPiw. Thus At = Mi[Ft ]XiPi (Mi[Ft ]: Ft -row submatrix of Mi) Determine Xi so that the matrix Mi[Ft ]XiPi is nonsingular for each sink t. 17 / 20
  • 35. Algorithm Mi[Ft ]XiPi is NOT a mixed matrix ... BUT Lemma Mi[Ft ]XiPi is nonsingular ⇐⇒ a mixed matrix I O Pi Xi I O O Mi[Ft ] O is nonsingular 18 / 20
  • 36. Algorithm Mi[Ft ]XiPi is NOT a mixed matrix ... BUT Lemma Mi[Ft ]XiPi is nonsingular ⇐⇒ a mixed matrix I O Pi Xi I O O Mi[Ft ] O is nonsingular We can find Xi s.t. I O Pi Xi I O O Mi[Ft ] O is nonsingular for each t by simultaneous mixed matrix completion ! Theorem If |F| > d, multicast problem in LDRN can be solved in O(dq(nr)3 log(nr)) time. d: # sinks, n: max # nodes in each layer, q: # layers, r: capacity of node 18 / 20
  • 37. 1 Linear Deterministic Relay Network (LDRN) 2 Unicast Algorithm 3 Mixed Matrix Completion 4 Algorithm 5 Conclusion 19 / 20
  • 38. Conclusion • Deterministic algorithm for multicast in LDRN using matrix completion • Faster than the previous algorithm when n = o(r) • Complexity matches (current best complexity of unicast)×d d: # sinks, n: max # nodes in each layer, q: # layers, r: capacity of node 20 / 20