Network Coding for Computing: Cut-Set Bounds

作者: K Zeger , R Appuswamy , N Karamchandani , M Franceschetti

DOI: 10.1109/TIT.2010.2095070

关键词:

摘要: The following network computing problem is considered. Source nodes in a directed acyclic generate independent messages and single receiver node computes target function f of the messages. objective to maximize average number times can be computed per usage, i.e., “computing capacity”. coding for single-receiver special case which all source must reproduced at receiver. For with receiver, routing known achieve capacity by achieving min-cut upper bound. We extend definition show that still an bound on maximum achievable rate tight (using coding) any multi-edge tree networks. It also linear functions network. study bound's tightness different classes functions. In particular, we give lower terms Steiner packing symmetric certain networks functions, less than arbitrarily small fraction

参考文章(49)
Abbas El Gamal, Reliable Communication of Highly Distributed Information Springer, New York, NY. pp. 60- 62 ,(1987) , 10.1007/978-1-4612-4808-8_14
Douglas Brent West, Introduction to Graph Theory ,(1995)
Robert D. Kleinberg, April Rasala Lehman, Nicholas J. Harvey, Comparing Network Coding with Multicommodity Flow for the k-pairs Communication Problem ,(2004)
Raymond W. Yeung, A First Course in Information Theory ,(2002)
Mohammad R. Salavatipour, Kamal Jain, Mohammad Mahdian, Packing Steiner trees symposium on discrete algorithms. pp. 266- 274 ,(2003) , 10.5555/644108.644154
Robert Kleinberg, April Rasala Lehman, Kamal Jain, Micah Adler, Nicholas J. A. Harvey, On the capacity of information networks symposium on discrete algorithms. pp. 241- 250 ,(2006) , 10.5555/1109557.1109585
Andrew Chi-Chih Yao, Some complexity questions related to distributive computing(Preliminary Report) symposium on the theory of computing. pp. 209- 213 ,(1979) , 10.1145/800135.804414
April Rasala Lehman, Eric Lehman, Complexity classification of network information flow problems symposium on discrete algorithms. pp. 142- 150 ,(2004) , 10.5555/982792.982814
J. Korner, K. Marton, How to encode the modulo-two sum of binary sources (Corresp.) IEEE Transactions on Information Theory. ,vol. 25, pp. 219- 221 ,(1979) , 10.1109/TIT.1979.1056022
H. Yamamoto, Wyner - Ziv theory for a general function of the correlated sources (Corresp.) IEEE Transactions on Information Theory. ,vol. 28, pp. 803- 807 ,(1982) , 10.1109/TIT.1982.1056560