SlideShare a Scribd company logo
1 of 65
Download to read offline
CISS 2014, Princeton NJ 1
Exact Repair Problems with Multiple
Sources
Jayant Apte*, Congduan Li,
John MacLaren Walsh, Steven Weber
ECE Dept. Drexel University
CISS 2014, Princeton NJ 2
Outline
● Problem Definition
● Computer assisted proofs: General Structure
● Polyhedral bounds on
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 3
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 4
(n,k,d) Exact Repair with multiple
sources
CISS 2014, Princeton NJ 5
(n,k,d) Exact Repair with multiple
sources
CISS 2014, Princeton NJ 6
2-source (3,2,2) exact
repair problem
CISS 2014, Princeton NJ 7
2-source (3,2,2) exact
repair problem
2 sources
CISS 2014, Princeton NJ 8
2-source (3,2,2) exact
repair problem
3 encoding
functions
CISS 2014, Princeton NJ 9
2-source (3,2,2) exact
repair problem
3 storage
random
variables
CISS 2014, Princeton NJ 10
2-source (3,2,2) exact
repair problem
3 decoders
with different
demands
CISS 2014, Princeton NJ 11
2-source (3,2,2) exact
repair problem
6 repair
encoding
functions
CISS 2014, Princeton NJ 12
2-source (3,2,2) exact
repair problem
3 repair
decoding
functions
CISS 2014, Princeton NJ 13
2-source (3,2,2) exact
repair problem
Total 11 random variables
CISS 2014, Princeton NJ 14
Implicit characterization
of rate region(Yan et al.)
CISS 2014, Princeton NJ 15
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 16
Motivation
Sources
Decoder
Demands
SoftwareNetwork
CISS 2014, Princeton NJ 17
Motivation
Software
Sources
Decoder
Demands
Network
Rate Region
and
optimal codes
CISS 2014, Princeton NJ 18
Software for computer
assisted proofs
CISS 2014, Princeton NJ 19
Computer assisted converse
CISS 2014, Princeton NJ 20
Computer assisted converse
Inequalities obtained as an
implication of linear Shannon-type,
non-Shannon-type, non-linear
non-Shannon type inequalities and
network constraints
CISS 2014, Princeton NJ 21
Computer assisted converse
CISS 2014, Princeton NJ 22
Computer assisted achievability
CISS 2014, Princeton NJ 23
Software for computer
assisted proofs
CISS 2014, Princeton NJ 24
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 25
● Closure of set of all 'entropic' vectors
arising from N-variable probability
distributions
3-D rendition of
CISS 2014, Princeton NJ 26
● Closure of set of all 'entropic' vectors
arising from N-variable probability
distributions
● Each entropic vector is formed by
stacking entropies of subsets of N
random variables
3-D rendition of
CISS 2014, Princeton NJ 27
● Closure of set of all 'entropic' vectors
arising from N-variable probability
distributions
● Each entropic vector is formed by
stacking entropies of subsets of N
random variables
● Cone:
3-D rendition of
CISS 2014, Princeton NJ 28
● Cannot be expressed as intersection
of finite number of linear inequalities
for N>3
● For N=4, existence of single nonlinear
● non-Shannon inequality(necessary and
sufficient) is known [Liu & Walsh 2014]
● Additionally, several hundred linear
non-Shannon inequalities are known
[DFZ 2011, Csirmaz 2013]
3-D rendition of
CISS 2014, Princeton NJ 29
CISS 2014, Princeton NJ 30
CISS 2014, Princeton NJ 31
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
– Shannon (Outer) bound
● Polyhedral computation interpretation of rate
region computation
● A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 32
Shannon Outer Bound
CISS 2014, Princeton NJ 33
Shannon Outer Bound
CISS 2014, Princeton NJ 34
Shannon Outer Bound
CISS 2014, Princeton NJ 35
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
– Shannon (Outer) bound
– (Representable) Matroid (Inner) bound(s)
● Polyhedral computation interpretation of rate region
computation
● A projection technique for computing achievable rate
region
CISS 2014, Princeton NJ 36
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 37
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 38
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 39
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 40
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 41
(Representable) Matroid Inner bound(s)
CISS 2014, Princeton NJ 42
(Representable) Matroid Inner Bound(s)
CISS 2014, Princeton NJ 43
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
– Shannon (Outer) bound
– Matroid (Inner) bound(s)
– Subspace (Inner) bounds
● Polyhedral computation interpretation of rate region
computation
● A projection technique for computing achievable rate region
CISS 2014, Princeton NJ 44
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 45
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 46
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 47
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 48
Subspace Inner Bound(s)
CISS 2014, Princeton NJ 49
Software for computer
assisted proofs
CISS 2014, Princeton NJ 50
Polyhedral bounds on rate region
● Using polyhedral inner/outer bound on yields
polyhedral inner/outer bounds on rate region
● Lemma 1: Inner bounds on rate region
computed using or are achievable
using linear codes
CISS 2014, Princeton NJ 51
Outline
● Problem Definition
● Computer assisted proofs: General structure
● Polyhedral bounds on
– Shannon (Outer) bound
– Matroid (Inner) bound(s)
– Subspace (Inner) bounds
● Polyhedral computation interpretation of rate region
computation
● A projection technique for computing achievable rate region
CISS 2014, Princeton NJ 52
Network Coding constraints
CISS 2014, Princeton NJ 53
Network Coding constraints
● Consider a type 1 or type 2 constraint H
● In general, computing extreme rays of given H and
extreme rays of is equivalent to an iteration of Double
Description Method of polyhedral representation conversion
● Lemma 2 [Li et al. 2013]: An extreme ray of is an extreme
ray of if it is contained in the hyperplane corresponding
to H
● Hence, simple membership check suffices to find extreme rays of
CISS 2014, Princeton NJ 54
Software for computer
assisted proofs
CISS 2014, Princeton NJ 55
Rate constraints
Storage Bandwidth
CISS 2014, Princeton NJ 56
Rate constraints
Repair Bandwidth
Storage Bandwidth
CISS 2014, Princeton NJ 57
A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 58
A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 59
A projection technique for computing
achievable rate region
CISS 2014, Princeton NJ 60
Polyhedral projection via chm
● chm is an implementation of polyhedral projection
algorithm called Convex Hull Method by Jayant Apte*
● chmlib v0.x is available at:
http://www.ece.drexel.edu/walsh/aspitrg/software.html
● Rational arithmetic using FLINT: Fast Library for
Number Theory
● Rational LP solver based on qsopt
CISS 2014, Princeton NJ 61
Polyhedral projection via chm
● Has been used for
– The current work
– Computer assisted converse proofs of rate regions of Multilevel
Diversity Coding Systems(a special case of multi-source network
coding)
– Finding non-Shannon Information Inequalities via Generalized
Copy Lemma of Csirmaz
● Can be used for
– Finding necessary conditions for non-contexuality of small
marginal scenarios(Quantum Information)
CISS 2014, Princeton NJ 62
Results
SoftwareNetwork
CISS 2014, Princeton NJ 63
Rate region for H(S1)=1 and
H(S2)=1
CISS 2014, Princeton NJ 64
Rate region for H(S1)=1 and
H(S2)=2
CISS 2014, Princeton NJ 65
References
● X. Yan, R.W. Yeung, and Zhen Zhang. An implicit characterization of the achievable rate region for acyclic
multisource multisink network coding. Information Theory, IEEE Transactions on, 58(9):5625–5639, 2012.
● Dougherty, Randall, Chris Freiling, and Kenneth Zeger. "Non-Shannon information inequalities in four
random variables." arXiv preprint arXiv:1104.3602 (2011).
● Csirmaz, László. "Information inequalities for four variables." CEU (2013).
● Yunshu Liu and John M. Walsh, "Only One Nonlinear Non-Shannon Inequality is Necessary for Four
Variables", submitted to IEEE Int. Symp. Information Theory (ISIT2014)
● Congduan Li, J. Apte, J.M. Walsh, and S. Weber. A new computational approach for determining rate regions
and optimal codes for coded networks. In Network Coding (NetCod), 2013 International Symposium on,
pages 1–6, 2013.
● Congduan Li, John MacLaren Walsh, Steven Weber. Matroid bounds on the region of entropic vectors. In
51th Annual Allerton Conference on Communication, Control and Computing, October 2013.

More Related Content

Viewers also liked

The Maker Movement and Tomorrow's Education in Engineering
The Maker Movement and Tomorrow's Education in EngineeringThe Maker Movement and Tomorrow's Education in Engineering
The Maker Movement and Tomorrow's Education in Engineering
mikegreenberg
 
Claims (speech 104)
Claims (speech 104) Claims (speech 104)
Claims (speech 104)
jenyx2
 

Viewers also liked (17)

Jayant chm
Jayant chmJayant chm
Jayant chm
 
The Maker Movement and Tomorrow's Education in Engineering
The Maker Movement and Tomorrow's Education in EngineeringThe Maker Movement and Tomorrow's Education in Engineering
The Maker Movement and Tomorrow's Education in Engineering
 
Gestione nella vita religiosa
Gestione nella vita religiosaGestione nella vita religiosa
Gestione nella vita religiosa
 
Jayant lrs
Jayant lrsJayant lrs
Jayant lrs
 
Immaculate and assumption
Immaculate and assumptionImmaculate and assumption
Immaculate and assumption
 
Entropic Inequalities and marginal problems (Fritz and Chavez)
Entropic Inequalities and marginal problems (Fritz and Chavez) Entropic Inequalities and marginal problems (Fritz and Chavez)
Entropic Inequalities and marginal problems (Fritz and Chavez)
 
Latex Workshop Tutorial
Latex Workshop TutorialLatex Workshop Tutorial
Latex Workshop Tutorial
 
Candidacy Exam Talk
Candidacy Exam TalkCandidacy Exam Talk
Candidacy Exam Talk
 
Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)Network Coding for Distributed Storage Systems(Group Meeting Talk)
Network Coding for Distributed Storage Systems(Group Meeting Talk)
 
Espiritualidade sustentabilidade na laudato si
Espiritualidade sustentabilidade na laudato siEspiritualidade sustentabilidade na laudato si
Espiritualidade sustentabilidade na laudato si
 
Bitcoin for Noobs
Bitcoin for NoobsBitcoin for Noobs
Bitcoin for Noobs
 
Como aplicar a Laudato Si e vivenciar sua espiritualidade
Como aplicar a Laudato Si e vivenciar sua espiritualidadeComo aplicar a Laudato Si e vivenciar sua espiritualidade
Como aplicar a Laudato Si e vivenciar sua espiritualidade
 
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)
Modelos de gestión al servicio de la educación evangelizadora (alfonso murad)
 
Secretaria paroquial à luz da Evangelii Gaudium
Secretaria paroquial à luz da Evangelii GaudiumSecretaria paroquial à luz da Evangelii Gaudium
Secretaria paroquial à luz da Evangelii Gaudium
 
Esperanças e caminhos da vida consagrada em tempos de francisco
Esperanças e caminhos da vida consagrada em tempos de franciscoEsperanças e caminhos da vida consagrada em tempos de francisco
Esperanças e caminhos da vida consagrada em tempos de francisco
 
Um novo começo com maria
Um novo começo com mariaUm novo começo com maria
Um novo começo com maria
 
Claims (speech 104)
Claims (speech 104) Claims (speech 104)
Claims (speech 104)
 

Similar to Exact Repair problems with multiple sources: CISS 2014

powerpoint feb
powerpoint febpowerpoint feb
powerpoint feb
imu409
 
The impact of visual saliency prediction in image classification
The impact of visual saliency prediction in image classificationThe impact of visual saliency prediction in image classification
The impact of visual saliency prediction in image classification
Universitat Politècnica de Catalunya
 
Google and SRI talk September 2016
Google and SRI talk September 2016Google and SRI talk September 2016
Google and SRI talk September 2016
Hagai Aronowitz
 

Similar to Exact Repair problems with multiple sources: CISS 2014 (20)

Learning Convolutional Neural Networks for Graphs
Learning Convolutional Neural Networks for GraphsLearning Convolutional Neural Networks for Graphs
Learning Convolutional Neural Networks for Graphs
 
Deep Learning Tomography
Deep Learning TomographyDeep Learning Tomography
Deep Learning Tomography
 
powerpoint feb
powerpoint febpowerpoint feb
powerpoint feb
 
Large Scale Image Retrieval 2022.pdf
Large Scale Image Retrieval 2022.pdfLarge Scale Image Retrieval 2022.pdf
Large Scale Image Retrieval 2022.pdf
 
ICFHR'18-DataAug.pptx
ICFHR'18-DataAug.pptxICFHR'18-DataAug.pptx
ICFHR'18-DataAug.pptx
 
SPICE-MATEX @ DAC15
SPICE-MATEX @ DAC15SPICE-MATEX @ DAC15
SPICE-MATEX @ DAC15
 
Segmenting Medical MRI via Recurrent Decoding Cell
Segmenting Medical MRI via Recurrent Decoding CellSegmenting Medical MRI via Recurrent Decoding Cell
Segmenting Medical MRI via Recurrent Decoding Cell
 
The impact of visual saliency prediction in image classification
The impact of visual saliency prediction in image classificationThe impact of visual saliency prediction in image classification
The impact of visual saliency prediction in image classification
 
Multidimensional RNN
Multidimensional RNNMultidimensional RNN
Multidimensional RNN
 
Google and SRI talk September 2016
Google and SRI talk September 2016Google and SRI talk September 2016
Google and SRI talk September 2016
 
More investment in Research and Development for better Education in the future?
More investment in Research and Development for better Education in the future?More investment in Research and Development for better Education in the future?
More investment in Research and Development for better Education in the future?
 
Detection & Recognition of Text.pdf
Detection & Recognition of Text.pdfDetection & Recognition of Text.pdf
Detection & Recognition of Text.pdf
 
India presentation final
India presentation finalIndia presentation final
India presentation final
 
Aerial detection part3
Aerial detection part3Aerial detection part3
Aerial detection part3
 
Biometric presentation attack detection
Biometric presentation attack detectionBiometric presentation attack detection
Biometric presentation attack detection
 
[Term project] Junction-point process
[Term project] Junction-point process[Term project] Junction-point process
[Term project] Junction-point process
 
CSC446: Pattern Recognition (LN7)
CSC446: Pattern Recognition (LN7)CSC446: Pattern Recognition (LN7)
CSC446: Pattern Recognition (LN7)
 
Image Processing Background Elimination in Video Editting
Image Processing Background Elimination in Video EdittingImage Processing Background Elimination in Video Editting
Image Processing Background Elimination in Video Editting
 
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018
Towards Set Learning and Prediction - Laura Leal-Taixe - UPC Barcelona 2018
 
Coupled Layer-wise Graph Convolution for Transportation Demand Prediction
Coupled Layer-wise Graph Convolution for Transportation Demand PredictionCoupled Layer-wise Graph Convolution for Transportation Demand Prediction
Coupled Layer-wise Graph Convolution for Transportation Demand Prediction
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Recently uploaded (20)

WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot ModelMcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Mcleodganj Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 

Exact Repair problems with multiple sources: CISS 2014

  • 1. CISS 2014, Princeton NJ 1 Exact Repair Problems with Multiple Sources Jayant Apte*, Congduan Li, John MacLaren Walsh, Steven Weber ECE Dept. Drexel University
  • 2. CISS 2014, Princeton NJ 2 Outline ● Problem Definition ● Computer assisted proofs: General Structure ● Polyhedral bounds on ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 3. CISS 2014, Princeton NJ 3 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 4. CISS 2014, Princeton NJ 4 (n,k,d) Exact Repair with multiple sources
  • 5. CISS 2014, Princeton NJ 5 (n,k,d) Exact Repair with multiple sources
  • 6. CISS 2014, Princeton NJ 6 2-source (3,2,2) exact repair problem
  • 7. CISS 2014, Princeton NJ 7 2-source (3,2,2) exact repair problem 2 sources
  • 8. CISS 2014, Princeton NJ 8 2-source (3,2,2) exact repair problem 3 encoding functions
  • 9. CISS 2014, Princeton NJ 9 2-source (3,2,2) exact repair problem 3 storage random variables
  • 10. CISS 2014, Princeton NJ 10 2-source (3,2,2) exact repair problem 3 decoders with different demands
  • 11. CISS 2014, Princeton NJ 11 2-source (3,2,2) exact repair problem 6 repair encoding functions
  • 12. CISS 2014, Princeton NJ 12 2-source (3,2,2) exact repair problem 3 repair decoding functions
  • 13. CISS 2014, Princeton NJ 13 2-source (3,2,2) exact repair problem Total 11 random variables
  • 14. CISS 2014, Princeton NJ 14 Implicit characterization of rate region(Yan et al.)
  • 15. CISS 2014, Princeton NJ 15 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 16. CISS 2014, Princeton NJ 16 Motivation Sources Decoder Demands SoftwareNetwork
  • 17. CISS 2014, Princeton NJ 17 Motivation Software Sources Decoder Demands Network Rate Region and optimal codes
  • 18. CISS 2014, Princeton NJ 18 Software for computer assisted proofs
  • 19. CISS 2014, Princeton NJ 19 Computer assisted converse
  • 20. CISS 2014, Princeton NJ 20 Computer assisted converse Inequalities obtained as an implication of linear Shannon-type, non-Shannon-type, non-linear non-Shannon type inequalities and network constraints
  • 21. CISS 2014, Princeton NJ 21 Computer assisted converse
  • 22. CISS 2014, Princeton NJ 22 Computer assisted achievability
  • 23. CISS 2014, Princeton NJ 23 Software for computer assisted proofs
  • 24. CISS 2014, Princeton NJ 24 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 25. CISS 2014, Princeton NJ 25 ● Closure of set of all 'entropic' vectors arising from N-variable probability distributions 3-D rendition of
  • 26. CISS 2014, Princeton NJ 26 ● Closure of set of all 'entropic' vectors arising from N-variable probability distributions ● Each entropic vector is formed by stacking entropies of subsets of N random variables 3-D rendition of
  • 27. CISS 2014, Princeton NJ 27 ● Closure of set of all 'entropic' vectors arising from N-variable probability distributions ● Each entropic vector is formed by stacking entropies of subsets of N random variables ● Cone: 3-D rendition of
  • 28. CISS 2014, Princeton NJ 28 ● Cannot be expressed as intersection of finite number of linear inequalities for N>3 ● For N=4, existence of single nonlinear ● non-Shannon inequality(necessary and sufficient) is known [Liu & Walsh 2014] ● Additionally, several hundred linear non-Shannon inequalities are known [DFZ 2011, Csirmaz 2013] 3-D rendition of
  • 31. CISS 2014, Princeton NJ 31 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on – Shannon (Outer) bound ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 32. CISS 2014, Princeton NJ 32 Shannon Outer Bound
  • 33. CISS 2014, Princeton NJ 33 Shannon Outer Bound
  • 34. CISS 2014, Princeton NJ 34 Shannon Outer Bound
  • 35. CISS 2014, Princeton NJ 35 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on – Shannon (Outer) bound – (Representable) Matroid (Inner) bound(s) ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 36. CISS 2014, Princeton NJ 36 (Representable) Matroid Inner bound(s)
  • 37. CISS 2014, Princeton NJ 37 (Representable) Matroid Inner bound(s)
  • 38. CISS 2014, Princeton NJ 38 (Representable) Matroid Inner bound(s)
  • 39. CISS 2014, Princeton NJ 39 (Representable) Matroid Inner bound(s)
  • 40. CISS 2014, Princeton NJ 40 (Representable) Matroid Inner bound(s)
  • 41. CISS 2014, Princeton NJ 41 (Representable) Matroid Inner bound(s)
  • 42. CISS 2014, Princeton NJ 42 (Representable) Matroid Inner Bound(s)
  • 43. CISS 2014, Princeton NJ 43 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on – Shannon (Outer) bound – Matroid (Inner) bound(s) – Subspace (Inner) bounds ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 44. CISS 2014, Princeton NJ 44 Subspace Inner Bound(s)
  • 45. CISS 2014, Princeton NJ 45 Subspace Inner Bound(s)
  • 46. CISS 2014, Princeton NJ 46 Subspace Inner Bound(s)
  • 47. CISS 2014, Princeton NJ 47 Subspace Inner Bound(s)
  • 48. CISS 2014, Princeton NJ 48 Subspace Inner Bound(s)
  • 49. CISS 2014, Princeton NJ 49 Software for computer assisted proofs
  • 50. CISS 2014, Princeton NJ 50 Polyhedral bounds on rate region ● Using polyhedral inner/outer bound on yields polyhedral inner/outer bounds on rate region ● Lemma 1: Inner bounds on rate region computed using or are achievable using linear codes
  • 51. CISS 2014, Princeton NJ 51 Outline ● Problem Definition ● Computer assisted proofs: General structure ● Polyhedral bounds on – Shannon (Outer) bound – Matroid (Inner) bound(s) – Subspace (Inner) bounds ● Polyhedral computation interpretation of rate region computation ● A projection technique for computing achievable rate region
  • 52. CISS 2014, Princeton NJ 52 Network Coding constraints
  • 53. CISS 2014, Princeton NJ 53 Network Coding constraints ● Consider a type 1 or type 2 constraint H ● In general, computing extreme rays of given H and extreme rays of is equivalent to an iteration of Double Description Method of polyhedral representation conversion ● Lemma 2 [Li et al. 2013]: An extreme ray of is an extreme ray of if it is contained in the hyperplane corresponding to H ● Hence, simple membership check suffices to find extreme rays of
  • 54. CISS 2014, Princeton NJ 54 Software for computer assisted proofs
  • 55. CISS 2014, Princeton NJ 55 Rate constraints Storage Bandwidth
  • 56. CISS 2014, Princeton NJ 56 Rate constraints Repair Bandwidth Storage Bandwidth
  • 57. CISS 2014, Princeton NJ 57 A projection technique for computing achievable rate region
  • 58. CISS 2014, Princeton NJ 58 A projection technique for computing achievable rate region
  • 59. CISS 2014, Princeton NJ 59 A projection technique for computing achievable rate region
  • 60. CISS 2014, Princeton NJ 60 Polyhedral projection via chm ● chm is an implementation of polyhedral projection algorithm called Convex Hull Method by Jayant Apte* ● chmlib v0.x is available at: http://www.ece.drexel.edu/walsh/aspitrg/software.html ● Rational arithmetic using FLINT: Fast Library for Number Theory ● Rational LP solver based on qsopt
  • 61. CISS 2014, Princeton NJ 61 Polyhedral projection via chm ● Has been used for – The current work – Computer assisted converse proofs of rate regions of Multilevel Diversity Coding Systems(a special case of multi-source network coding) – Finding non-Shannon Information Inequalities via Generalized Copy Lemma of Csirmaz ● Can be used for – Finding necessary conditions for non-contexuality of small marginal scenarios(Quantum Information)
  • 62. CISS 2014, Princeton NJ 62 Results SoftwareNetwork
  • 63. CISS 2014, Princeton NJ 63 Rate region for H(S1)=1 and H(S2)=1
  • 64. CISS 2014, Princeton NJ 64 Rate region for H(S1)=1 and H(S2)=2
  • 65. CISS 2014, Princeton NJ 65 References ● X. Yan, R.W. Yeung, and Zhen Zhang. An implicit characterization of the achievable rate region for acyclic multisource multisink network coding. Information Theory, IEEE Transactions on, 58(9):5625–5639, 2012. ● Dougherty, Randall, Chris Freiling, and Kenneth Zeger. "Non-Shannon information inequalities in four random variables." arXiv preprint arXiv:1104.3602 (2011). ● Csirmaz, László. "Information inequalities for four variables." CEU (2013). ● Yunshu Liu and John M. Walsh, "Only One Nonlinear Non-Shannon Inequality is Necessary for Four Variables", submitted to IEEE Int. Symp. Information Theory (ISIT2014) ● Congduan Li, J. Apte, J.M. Walsh, and S. Weber. A new computational approach for determining rate regions and optimal codes for coded networks. In Network Coding (NetCod), 2013 International Symposium on, pages 1–6, 2013. ● Congduan Li, John MacLaren Walsh, Steven Weber. Matroid bounds on the region of entropic vectors. In 51th Annual Allerton Conference on Communication, Control and Computing, October 2013.