Multi-Cast Channels with Hierarchical Flow Jonathan Ponniah San - - PowerPoint PPT Presentation

multi cast channels with hierarchical flow
SMART_READER_LITE
LIVE PREVIEW

Multi-Cast Channels with Hierarchical Flow Jonathan Ponniah San - - PowerPoint PPT Presentation

Multi-Cast Channels with Hierarchical Flow Jonathan Ponniah San Jose State University Liang-Liang Xie University of Waterloo ISIT 2020 Outline Previous Work The One-Relay Channel Flow Decomposition Main Result


slide-1
SLIDE 1

Multi-Cast Channels with Hierarchical Flow

Jonathan Ponniah San Jose State University Liang-Liang Xie University of Waterloo ISIT 2020

slide-2
SLIDE 2

Outline

  • Previous Work
  • The One-Relay Channel
  • Flow Decomposition
  • Main Result
  • Overview of Proof
  • Conclusion

2

slide-3
SLIDE 3

Timeline

3

One-Source Multi-Relay Channel Yassaee and Aref, 2008 One-Source Multi-Relay Channel Xie and Kumar, 2005 Noisy Network Coding Kim and El Gamal., 2011 Multi-Source Multi-Relay Multi-Cast Channels Xie and Kumar, 2007 Multiple-Access Relay Channel Sankar and Kramer, 2007 On Optimal Compressions Wu and Xie., 2013 Short-Length Noisy Network Coding Hou and Kramer, 2016 On Compress-Forward Schemes Ponniah, 2019 Flow Decomposition Ponniah, 2019 Capacity Theorems for the Relay Chanel El Gamal and Cover, 1973 Compress-Forward Decode-Forward

slide-4
SLIDE 4

Timeline

4

One-Source Multi-Relay Channel Yassaee and Aref, 2008 One-Source Multi-Relay Channel Xie and Kumar, 2005 Noisy Network Coding Kim and El Gamal., 2011 Multi-Source Multi-Relay Multi-Cast Channels Xie and Kumar, 2007 Multiple-Access Relay Channel Sankar and Kramer, 2007 On Optimal Compressions Wu and Xie., 2013 Short-Length Noisy Network Coding Hou and Kramer, 2016 On Compress-Forward Schemes Ponniah, 2019 Flow Decomposition Ponniah and Xie, 2019 Capacity Theorems for the Relay Chanel El Gamal and Cover, 1973 Compress-Forward Decode-Forward Backward Decoding

slide-5
SLIDE 5

Timeline

5

One-Source Multi-Relay Channel Yassaee and Aref, 2008 One-Source Multi-Relay Channel Xie and Kumar, 2005 Noisy Network Coding Kim and El Gamal., 2011 Multi-Source Multi-Relay Multi-Cast Channels Xie and Kumar, 2007 Multiple-Access Relay Channel Sankar and Kramer, 2007 On Optimal Compressions Wu and Xie., 2013 Short-Length Noisy Network Coding Hou and Kramer, 2016 On Compress-Forward Schemes Ponniah, 2019 Flow Decomposition Ponniah and Xie, 2019 Capacity Theorems for the Relay Chanel El Gamal and Cover, 1973 Compress-Forward Decode-Forward Regular Decoding

slide-6
SLIDE 6

The One-Relay Channel

Theorem: For some the following rate is achievable: p(x1)p(x2)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Source Relay Destination 1 2 3 R < min{I(X1; Y2|X2), I(X1X2; Y3)}.

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>
slide-7
SLIDE 7

Probability of Error:

Decode-Forward

Encoding:

  • In block b the source encodes:
  • In block b the relay encodes:

m(b) ∈ {1, . . . , 2nR}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Codebook Generation: p(x1)p(x2)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Channel Usage: Regular Decoding:

  • In block b the relay decodes:
  • In block b the destination decodes:

m(b)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

divided into B blocks of n channel uses

  • Goes to zero at the relay if:
  • Goes to zero at the destination:

R < I(X1; Y2|X2)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

R < I(X2; Y3) + I(X1; Y3|X2) = I(X2X3; Y3)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>
slide-8
SLIDE 8

Probability of Error:

Decode-Forward

Encoding:

  • In block b the source encodes:
  • In block b the relay encodes:

m(b) ∈ {1, . . . , 2nR}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Codebook Generation: p(x1)p(x2)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Channel Usage: Regular Decoding:

  • In block b the relay decodes:
  • In block b the destination decodes:

m(b)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

divided into B blocks of n channel uses

  • Goes to zero at the relay if:
  • Goes to zero at the destination:

R < I(X1; Y2|X2)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

R < I(X2; Y3) + I(X1; Y3|X2) = I(X2X3; Y3)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

encoding delay

slide-9
SLIDE 9

Probability of Error:

Decode-Forward

Encoding:

  • In block b the source encodes:
  • In block b the relay encodes:

m(b) ∈ {1, . . . , 2nR}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Codebook Generation: p(x1)p(x2)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Channel Usage: Regular Decoding:

  • In block b the relay decodes:
  • In block b the destination decodes:

m(b)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

divided into B blocks of n channel uses

  • Goes to zero at the relay if:
  • Goes to zero at the destination:

R < I(X1; Y2|X2)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

R < I(X2; Y3) + I(X1; Y3|X2) = I(X2X3; Y3)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>
slide-10
SLIDE 10

Probability of Error:

Decode-Forward

Encoding:

  • In block b the source encodes:
  • In block b the relay encodes:

m(b) ∈ {1, . . . , 2nR}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Codebook Generation: p(x1)p(x2)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Channel Usage: Regular Decoding:

  • In block b the relay decodes:
  • In block b the destination decodes:

m(b)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

divided into B blocks of n channel uses

  • Goes to zero at the relay if:
  • Goes to zero at the destination:

R < I(X1; Y2|X2)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

R < I(X2; Y3) + I(X1; Y3|X2) = I(X2X3; Y3)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>
slide-11
SLIDE 11

Decode-Forward

Encoding:

  • In block b the source encodes:
  • In block b the relay encodes:

m(b) ∈ {1, . . . , 2nR}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Regular Decoding:

  • In block b the relay decodes:
  • In block b the destination decodes:

m(b)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Source Relay Destination 1 2 3 “Decoding Phase”

}

slide-12
SLIDE 12

Decode-Forward

Encoding:

  • In block b the source encodes:
  • In block b the relay encodes:

m(b) ∈ {1, . . . , 2nR}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Regular Decoding:

  • In block b the relay decodes:
  • In block b the destination decodes:

m(b)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Source Relay Destination 1 2 3 “Encoding Phase”

}

slide-13
SLIDE 13

Flow Decomposition

Encoding:

  • In block b the source encodes:
  • In block b the relay encodes:

m(b) ∈ {1, . . . , 2nR}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Regular Decoding:

  • In block b the relay decodes:
  • In block b the destination decodes:

m(b)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

1 2 3

1

“Flow”

slide-14
SLIDE 14

Flow Decomposition

Encoding:

  • In block b the source encodes:
  • In block b the relay encodes:

m(b) ∈ {1, . . . , 2nR}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Regular Decoding:

  • In block b the relay decodes:
  • In block b the destination decodes:

m(b)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

m(b − 1)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

1 2 3 “Layered Partition”

1

1 “Flow”

slide-15
SLIDE 15

Flow

1 2 3 4 5 6 7 8

15

2 2 15 15 44 44 44

f(1) = 1

2

− → {2, 3}

15

− → {4}

44

− → {5, 6, 7}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>
slide-16
SLIDE 16

A Flow Set

16

1 2 3 4 5 6 7 8

2 2 15 15 44 44 44

F = {f(1), f(2), f(3), . . . , f(N)}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>
slide-17
SLIDE 17

A Cut-Set Interpretation of the DF Region

1 2 3 4 5 6 7

RS < I(XF (S); Y |X ˜

F (S))

∀S ⊆ S

<latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">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</latexit><latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">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</latexit><latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">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</latexit><latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">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</latexit>

F({1}) = {1, 2, 3, 4, 5, 6, 7}

<latexit sha1_base64="5CMo7sFYwHN71xdrN9WfcBGOlAI=">ACAnicbVDLSsNAFJ34rPUVdaebwSJUCWp1epCKAjisoKxhSaUyXTSDp08mJkIJQTc+CtuXKi49Svc+TdO2y09cDlHs65l5l7vJhRIU3zW1tYXFpeWS2sFdc3Nre29Z3dexElHBMbRyzibQ8JwmhIbEklI+2YExR4jLS84dXYbz0QLmgU3slRTNwA9UPqU4ykr6/nXZS0nO75UzagaJ0bNODXOjLqTdfWSWTEngPEykJ5Gh29S+nF+EkIKHEDAnRscxYuinikmJGsqKTCBIjPER90lE0RAERbjq5IYNHSulBP+KqQgkn6u+NFAVCjAJPTQZIDsSsNxb/8zqJ9M/dlIZxIkmIpw/5CYMyguNAYI9ygiUbKYIwp+qvEA8QR1iq2IoqBGv25HliVysXFeu2Vmo08jQK4AcgjKwQB0wA1oAhtg8AiewSt40560F+1d+5iOLmj5zh74A+3zB2h4lFo=</latexit><latexit sha1_base64="5CMo7sFYwHN71xdrN9WfcBGOlAI=">ACAnicbVDLSsNAFJ34rPUVdaebwSJUCWp1epCKAjisoKxhSaUyXTSDp08mJkIJQTc+CtuXKi49Svc+TdO2y09cDlHs65l5l7vJhRIU3zW1tYXFpeWS2sFdc3Nre29Z3dexElHBMbRyzibQ8JwmhIbEklI+2YExR4jLS84dXYbz0QLmgU3slRTNwA9UPqU4ykr6/nXZS0nO75UzagaJ0bNODXOjLqTdfWSWTEngPEykJ5Gh29S+nF+EkIKHEDAnRscxYuinikmJGsqKTCBIjPER90lE0RAERbjq5IYNHSulBP+KqQgkn6u+NFAVCjAJPTQZIDsSsNxb/8zqJ9M/dlIZxIkmIpw/5CYMyguNAYI9ygiUbKYIwp+qvEA8QR1iq2IoqBGv25HliVysXFeu2Vmo08jQK4AcgjKwQB0wA1oAhtg8AiewSt40560F+1d+5iOLmj5zh74A+3zB2h4lFo=</latexit><latexit sha1_base64="5CMo7sFYwHN71xdrN9WfcBGOlAI=">ACAnicbVDLSsNAFJ34rPUVdaebwSJUCWp1epCKAjisoKxhSaUyXTSDp08mJkIJQTc+CtuXKi49Svc+TdO2y09cDlHs65l5l7vJhRIU3zW1tYXFpeWS2sFdc3Nre29Z3dexElHBMbRyzibQ8JwmhIbEklI+2YExR4jLS84dXYbz0QLmgU3slRTNwA9UPqU4ykr6/nXZS0nO75UzagaJ0bNODXOjLqTdfWSWTEngPEykJ5Gh29S+nF+EkIKHEDAnRscxYuinikmJGsqKTCBIjPER90lE0RAERbjq5IYNHSulBP+KqQgkn6u+NFAVCjAJPTQZIDsSsNxb/8zqJ9M/dlIZxIkmIpw/5CYMyguNAYI9ygiUbKYIwp+qvEA8QR1iq2IoqBGv25HliVysXFeu2Vmo08jQK4AcgjKwQB0wA1oAhtg8AiewSt40560F+1d+5iOLmj5zh74A+3zB2h4lFo=</latexit><latexit sha1_base64="5CMo7sFYwHN71xdrN9WfcBGOlAI=">ACAnicbVDLSsNAFJ34rPUVdaebwSJUCWp1epCKAjisoKxhSaUyXTSDp08mJkIJQTc+CtuXKi49Svc+TdO2y09cDlHs65l5l7vJhRIU3zW1tYXFpeWS2sFdc3Nre29Z3dexElHBMbRyzibQ8JwmhIbEklI+2YExR4jLS84dXYbz0QLmgU3slRTNwA9UPqU4ykr6/nXZS0nO75UzagaJ0bNODXOjLqTdfWSWTEngPEykJ5Gh29S+nF+EkIKHEDAnRscxYuinikmJGsqKTCBIjPER90lE0RAERbjq5IYNHSulBP+KqQgkn6u+NFAVCjAJPTQZIDsSsNxb/8zqJ9M/dlIZxIkmIpw/5CYMyguNAYI9ygiUbKYIwp+qvEA8QR1iq2IoqBGv25HliVysXFeu2Vmo08jQK4AcgjKwQB0wA1oAhtg8AiewSt40560F+1d+5iOLmj5zh74A+3zB2h4lFo=</latexit>

“super-source”

17

slide-18
SLIDE 18

1 2 3 4 5 6 7 9 10 11 12 13 14

F({5, 12}) = {5, 6, 7, 10, 12, 13, 14}

<latexit sha1_base64="XHUtZ+zoZoEdxw/1bUADIE8MNfo=">ACXicbZDLSsNAFIYnXmu9RV26iRahQiZWq0uhIgLisYW2hCmUyn7dDJhZmJUELWbnwVNy5U3PoG7nwbJ20W2vrDwMd/zuHM+b2IUSEt61tbWFxaXlktrBXNza3tvWd3XsRxhwTG4cs5G0PCcJoQGxJSPtiBPke4y0vNFVm89EC5oGNzJcURcHw0C2qcYSWV19YPrspOcmrDqpMeXGZ2ZdRNayjDhiQlrTtrVS1bFmsiYB5hDCeRqdvUvpxfi2CeBxAwJ0YFWJN0EcUkxI2nRiQWJEB6hAekoDJBPhJtMTkmNI+X0jH7I1QukMXF/TyTIF2Lse6rTR3IoZmuZ+V+tE8v+uZvQIolCfB0UT9mhgyNLBejRznBko0VIMyp+quBh4gjLFV6RUCnD15Huxq5aICb2ulRiNPowD2wSEoAwjqoAFuQBPYAINH8AxewZv2pL1o79rHtHVBy2f2wB9pnz+gkJX2</latexit><latexit sha1_base64="XHUtZ+zoZoEdxw/1bUADIE8MNfo=">ACXicbZDLSsNAFIYnXmu9RV26iRahQiZWq0uhIgLisYW2hCmUyn7dDJhZmJUELWbnwVNy5U3PoG7nwbJ20W2vrDwMd/zuHM+b2IUSEt61tbWFxaXlktrBXNza3tvWd3XsRxhwTG4cs5G0PCcJoQGxJSPtiBPke4y0vNFVm89EC5oGNzJcURcHw0C2qcYSWV19YPrspOcmrDqpMeXGZ2ZdRNayjDhiQlrTtrVS1bFmsiYB5hDCeRqdvUvpxfi2CeBxAwJ0YFWJN0EcUkxI2nRiQWJEB6hAekoDJBPhJtMTkmNI+X0jH7I1QukMXF/TyTIF2Lse6rTR3IoZmuZ+V+tE8v+uZvQIolCfB0UT9mhgyNLBejRznBko0VIMyp+quBh4gjLFV6RUCnD15Huxq5aICb2ulRiNPowD2wSEoAwjqoAFuQBPYAINH8AxewZv2pL1o79rHtHVBy2f2wB9pnz+gkJX2</latexit><latexit sha1_base64="XHUtZ+zoZoEdxw/1bUADIE8MNfo=">ACXicbZDLSsNAFIYnXmu9RV26iRahQiZWq0uhIgLisYW2hCmUyn7dDJhZmJUELWbnwVNy5U3PoG7nwbJ20W2vrDwMd/zuHM+b2IUSEt61tbWFxaXlktrBXNza3tvWd3XsRxhwTG4cs5G0PCcJoQGxJSPtiBPke4y0vNFVm89EC5oGNzJcURcHw0C2qcYSWV19YPrspOcmrDqpMeXGZ2ZdRNayjDhiQlrTtrVS1bFmsiYB5hDCeRqdvUvpxfi2CeBxAwJ0YFWJN0EcUkxI2nRiQWJEB6hAekoDJBPhJtMTkmNI+X0jH7I1QukMXF/TyTIF2Lse6rTR3IoZmuZ+V+tE8v+uZvQIolCfB0UT9mhgyNLBejRznBko0VIMyp+quBh4gjLFV6RUCnD15Huxq5aICb2ulRiNPowD2wSEoAwjqoAFuQBPYAINH8AxewZv2pL1o79rHtHVBy2f2wB9pnz+gkJX2</latexit><latexit sha1_base64="XHUtZ+zoZoEdxw/1bUADIE8MNfo=">ACXicbZDLSsNAFIYnXmu9RV26iRahQiZWq0uhIgLisYW2hCmUyn7dDJhZmJUELWbnwVNy5U3PoG7nwbJ20W2vrDwMd/zuHM+b2IUSEt61tbWFxaXlktrBXNza3tvWd3XsRxhwTG4cs5G0PCcJoQGxJSPtiBPke4y0vNFVm89EC5oGNzJcURcHw0C2qcYSWV19YPrspOcmrDqpMeXGZ2ZdRNayjDhiQlrTtrVS1bFmsiYB5hDCeRqdvUvpxfi2CeBxAwJ0YFWJN0EcUkxI2nRiQWJEB6hAekoDJBPhJtMTkmNI+X0jH7I1QukMXF/TyTIF2Lse6rTR3IoZmuZ+V+tE8v+uZvQIolCfB0UT9mhgyNLBejRznBko0VIMyp+quBh4gjLFV6RUCnD15Huxq5aICb2ulRiNPowD2wSEoAwjqoAFuQBPYAINH8AxewZv2pL1o79rHtHVBy2f2wB9pnz+gkJX2</latexit>

“super-source”

18

A Cut-Set Interpretation of the DF Region

RS < I(XF (S); Y |X ˜

F (S))

∀S ⊆ S

<latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">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</latexit><latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">ACMnicbVBNTxsxEPVC+QpfAY69WI2QwiXaRSBAcIiEhNqegDQlI1WXmeSWNi7iz2LFJn9T1z6R3qohHpoq175ETgh/LxJEvP781oZl6cSWHQ9x+8qekPM7Nz8wulxaXldXy2vqFSXPNoclTmepWzAxIkUATBUpoZRqYiVcxtfHI/yFrQRafINhxl0FOsnoic4QydF5a/nkW0UR1+qrcieVBtbxeHVnaMhCtkFe1KMpK1wYDLGwe4qVYS9VDMpaSM0eWwA4caGnLl/EZUrfs0fg74lwYRUyASnUflH2E15riBLpkx7cDPsGOZRsElFKUwN+DmXrM+tB1NmALTseObC7rplC51y7iXIB2r/3dYpowZqthVKoYD89obie957Rx7+x0rkixHSPjzoF4uKaZ0FCDtCg0c5dARxrVwu1I+YJpxdDGXAjB65PfkuZ27aAWnO1U6vVJGvPkI/lEqiQge6ROPpNT0iSc3JOf5Df543fnl/vX/PpVPepGeDvID3+ATlearA</latexit><latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">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</latexit><latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">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</latexit>
slide-19
SLIDE 19

Layered Partitions

Layer 0 Layer 1 Layer 5 Layer 8

19

slide-20
SLIDE 20

Layered Partitions

Layer 0 Layer 2 Layer 2097 Layer 768902305486 Layer 19 Layer 3

20

slide-21
SLIDE 21

Hierarchical Flow

21

F = {f(1), f(2), f(3), . . . , f(N)}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>
slide-22
SLIDE 22

Main Result

For any hierarchical flow set and rate vector in the DF region:

F R

22

Theorem 1 (i) There exists a set of causal flow decompositions (ii) There exists an algorithm that finds in

{(F, Li) : i ∈ N}

<latexit sha1_base64="2kuJk2/p4h+dnMNt25oNk3LhX5g=">ACD3icbVDLSsNAFJ3UV62vqEs3g0WpICWRg9cFARxIVLBPqAJZTKdtEMnkzAzEUrIH7jxV9y4UMStW3f+jdM0C60euNzDOfcyc48XMSqVZX0Zhbn5hcWl4nJpZXVtfcPc3GrJMBaYNHIQtHxkCSMctJUVDHSiQRBgcdI2xtdTPz2PRGShvxOjSPiBmjAqU8xUlrqmftOUkcz4eX6WHWr9NeQtODM+pQnjgYMXiTOmnPLFtVKwP8S+yclEGORs/8dPohjgPCFWZIyq5tRcpNkFAUM5KWnFiSCOERGpCuphwFRLpJdk8K97TSh34odHEFM/XnRoICKceBpycDpIZy1puI/3ndWPknbkJ5FCvC8fQhP2ZQhXASDuxTQbBiY0QFlT/FeIhEgrHWFJh2DPnvyXtI6qdq16elsr18/zOIpgB+yCrDBMaiDK9ATYDBA3gCL+DVeDSejTfjfTpaMPKdbfALxsc31x2b7A=</latexit>

{(F, Li) : i ∈ N}

<latexit sha1_base64="2kuJk2/p4h+dnMNt25oNk3LhX5g=">ACD3icbVDLSsNAFJ3UV62vqEs3g0WpICWRg9cFARxIVLBPqAJZTKdtEMnkzAzEUrIH7jxV9y4UMStW3f+jdM0C60euNzDOfcyc48XMSqVZX0Zhbn5hcWl4nJpZXVtfcPc3GrJMBaYNHIQtHxkCSMctJUVDHSiQRBgcdI2xtdTPz2PRGShvxOjSPiBmjAqU8xUlrqmftOUkcz4eX6WHWr9NeQtODM+pQnjgYMXiTOmnPLFtVKwP8S+yclEGORs/8dPohjgPCFWZIyq5tRcpNkFAUM5KWnFiSCOERGpCuphwFRLpJdk8K97TSh34odHEFM/XnRoICKceBpycDpIZy1puI/3ndWPknbkJ5FCvC8fQhP2ZQhXASDuxTQbBiY0QFlT/FeIhEgrHWFJh2DPnvyXtI6qdq16elsr18/zOIpgB+yCrDBMaiDK9ATYDBA3gCL+DVeDSejTfjfTpaMPKdbfALxsc31x2b7A=</latexit>

that achieve ;

R

time.

P(N)EXP(S)

<latexit sha1_base64="hwzt1PWB4J3JSs+wt/UXEg30jvk=">ACD3icbZDLSgMxFIYz9VbrbdSlm2BR2k2ZkYIKLgoiuJK9gJtKZk04ZmLiRnxDLMG7jxVdy4UMStW3e+jWk7iLb+EPj5zjmcnN8JBVdgWV9GZmFxaXklu5pbW9/Y3DK3d+oqiCRlNRqIQDYdopjgPqsB8GaoWTEcwRrOMPzcb1x6TigX8Lo5B1PNL3ucspAY265mEb2D3E1aQtykR+CopTslF84fdJMWumbdK1kR43tipyaNU1a752e4FNPKYD1QpVq2FUInJhI4FSzJtSPFQkKHpM9a2vrEY6oT+5J8IEmPewGUj8f8IT+noiJp9TIc3SnR2CgZmtj+F+tFYF70om5H0bAfDpd5EYCQ4DH4eAel4yCGlDqOT6r5gOiCQUdIQ5HYI9e/K8qR+V7HLp9Lqcr5ylcWTRHtpHBWSjY1RBl6iKaoiB/SEXtCr8Wg8G2/G+7Q1Y6Qzu+iPjI9vQ9qcJw=</latexit>
slide-23
SLIDE 23

Main Result

R1

<latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit>

R2

<latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit>

The MARC DF Region

23

slide-24
SLIDE 24

R1

<latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit>

R2

<latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit>

Layered Partition #1

24

Main Result

slide-25
SLIDE 25

R1

<latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit>

R2

<latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit>

Layered Partition #2

25

Main Result

slide-26
SLIDE 26

Main Result

R1

<latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit>

R2

<latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit>

Layered Partition #3

26

slide-27
SLIDE 27

Overview of Proof

Encoding:

  • In block b node i generates the message:
  • In block b node i encodes the index:

mi(b) ∈ {1, . . . , 2nRi}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

where is the index assigned to the vector: w(b) ∈ {1, . . . , 2n P

s:i∈f(s) Ri}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

w(b)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

w(b) = (w1, w2, . . . , wN)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

and ws = ( ms(b − ks,i) i ∈ f(s) “1” i / ∈ f(s)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>
slide-28
SLIDE 28

Overview of Proof

Encoding:

  • In block b node i generates the message:
  • In block b node i encodes the index:

mi(b) ∈ {1, . . . , 2nRi}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

where is the index assigned to the vector: w(b) ∈ {1, . . . , 2n P

s:i∈f(s) Ri}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

w(b)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

w(b) = (w1, w2, . . . , wN)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

and ws = ( ms(b − ks,i) i ∈ f(s) “1” i / ∈ f(s)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

encoding delay index “Index Coding with Encoding Delays”

slide-29
SLIDE 29

Overview of Proof

Regular Decoding:

  • Given the destination derives the “virtual” flows:
  • For any and , let:

L = {L1, . . . , L|L|}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{v(s) : s ∈ S}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

S ⊆ S

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

0 ≤ l ≤ |L| − 1

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Al(S) := {i ∈ v(s) : s ∈ S} ∩ Ll ˜ Al(S) := {∪l

q=0Lq} \ Al(S)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>
  • The destination finds the message vector that satisfies the

following typicality checks for : ˆ m(b) := ( ˆ m1, . . . , ˆ mN)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

0 ≤ l ≤ |L| − 1

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

({xi( ˆ w(b − l)) : i ∈ Al(S)}, {Xi(b − l) : i ∈ ˜ Al(S)}, Yd(b − l)) ∈ T (n)

(XAl(S)∪ ˜

Al(S), Yd)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>
slide-30
SLIDE 30

Overview of Proof

Regular Decoding:

  • Given the destination derives the “virtual” flows:
  • For any and , let:

L = {L1, . . . , L|L|}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{v(s) : s ∈ S}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

S ⊆ S

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

0 ≤ l ≤ |L| − 1

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

Al(S) := {i ∈ v(s) : s ∈ S} ∩ Ll ˜ Al(S) := {∪l

q=0Lq} \ Al(S)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>
  • The destination finds the message vector that satisfies the

following typicality checks for : ˆ m(b) := ( ˆ m1, . . . , ˆ mN)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

0 ≤ l ≤ |L| − 1

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

({xi( ˆ w(b − l)) : i ∈ Al(S)}, {Xi(b − l) : i ∈ ˜ Al(S)}, Yd(b − l)) ∈ T (n)

(XAl(S)∪ ˜

Al(S), Yd)

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

“typicality checks generated from layered partitions”

slide-31
SLIDE 31

Overview of Proof

{1}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L1

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L2

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L3

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L4

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L11

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L5

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L7

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L8

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L6

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L12

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L13

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L10

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L9

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>
slide-32
SLIDE 32

Overview of Proof

{1}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L1

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L2

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L3

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L4

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L11

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L5

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L7

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L8

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L6

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L12

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L13

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L10

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L9

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

regular decoding scheme

slide-33
SLIDE 33

Overview of Proof

{1}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L1

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L2

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L3

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L4

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L11

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L5

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L7

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L8

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L6

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L12

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L13

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L10

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L9

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

regular decoding scheme The DF Region (3-user MARC)

slide-34
SLIDE 34

Overview of Proof

{1}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{1, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

{2, 3}

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L1

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L2

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L3

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L4

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L11

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L5

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L7

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L8

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L6

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L12

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L13

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L10

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

L9

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

R

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

regular decoding scheme L1 = shift(L12, {1, 3})

<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>

The DF Region (3-user MARC)

slide-35
SLIDE 35

Conclusion

  • Regular decoding schemes collectively achieve the DF region for multi-cast

channels with hierarchical flow

  • Future work: computability
  • Under what conditions is a rate-vector achievable by decode-forward

schemes?

  • All-cast channels with arbitrary flow

35

slide-36
SLIDE 36

Thanks!

36

jonathan.ponniah@sjsu.edu