Multi-Cast Channels with Hierarchical Flow Jonathan Ponniah San - - PowerPoint PPT Presentation
Multi-Cast Channels with Hierarchical Flow Jonathan Ponniah San - - PowerPoint PPT Presentation
Multi-Cast Channels with Hierarchical Flow Jonathan Ponniah San Jose State University Liang-Liang Xie University of Waterloo ISIT 2020 Outline Previous Work The One-Relay Channel Flow Decomposition Main Result
Outline
- Previous Work
- The One-Relay Channel
- Flow Decomposition
- Main Result
- Overview of Proof
- Conclusion
2
Timeline
3
One-Source Multi-Relay Channel Yassaee and Aref, 2008 One-Source Multi-Relay Channel Xie and Kumar, 2005 Noisy Network Coding Kim and El Gamal., 2011 Multi-Source Multi-Relay Multi-Cast Channels Xie and Kumar, 2007 Multiple-Access Relay Channel Sankar and Kramer, 2007 On Optimal Compressions Wu and Xie., 2013 Short-Length Noisy Network Coding Hou and Kramer, 2016 On Compress-Forward Schemes Ponniah, 2019 Flow Decomposition Ponniah, 2019 Capacity Theorems for the Relay Chanel El Gamal and Cover, 1973 Compress-Forward Decode-Forward
Timeline
4
One-Source Multi-Relay Channel Yassaee and Aref, 2008 One-Source Multi-Relay Channel Xie and Kumar, 2005 Noisy Network Coding Kim and El Gamal., 2011 Multi-Source Multi-Relay Multi-Cast Channels Xie and Kumar, 2007 Multiple-Access Relay Channel Sankar and Kramer, 2007 On Optimal Compressions Wu and Xie., 2013 Short-Length Noisy Network Coding Hou and Kramer, 2016 On Compress-Forward Schemes Ponniah, 2019 Flow Decomposition Ponniah and Xie, 2019 Capacity Theorems for the Relay Chanel El Gamal and Cover, 1973 Compress-Forward Decode-Forward Backward Decoding
Timeline
5
One-Source Multi-Relay Channel Yassaee and Aref, 2008 One-Source Multi-Relay Channel Xie and Kumar, 2005 Noisy Network Coding Kim and El Gamal., 2011 Multi-Source Multi-Relay Multi-Cast Channels Xie and Kumar, 2007 Multiple-Access Relay Channel Sankar and Kramer, 2007 On Optimal Compressions Wu and Xie., 2013 Short-Length Noisy Network Coding Hou and Kramer, 2016 On Compress-Forward Schemes Ponniah, 2019 Flow Decomposition Ponniah and Xie, 2019 Capacity Theorems for the Relay Chanel El Gamal and Cover, 1973 Compress-Forward Decode-Forward Regular Decoding
The One-Relay Channel
Theorem: For some the following rate is achievable: p(x1)p(x2)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Source Relay Destination 1 2 3 R < min{I(X1; Y2|X2), I(X1X2; Y3)}.
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Probability of Error:
Decode-Forward
Encoding:
- In block b the source encodes:
- In block b the relay encodes:
m(b) ∈ {1, . . . , 2nR}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Codebook Generation: p(x1)p(x2)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Channel Usage: Regular Decoding:
- In block b the relay decodes:
- In block b the destination decodes:
m(b)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>divided into B blocks of n channel uses
- Goes to zero at the relay if:
- Goes to zero at the destination:
R < I(X1; Y2|X2)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>R < I(X2; Y3) + I(X1; Y3|X2) = I(X2X3; Y3)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Probability of Error:
Decode-Forward
Encoding:
- In block b the source encodes:
- In block b the relay encodes:
m(b) ∈ {1, . . . , 2nR}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Codebook Generation: p(x1)p(x2)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Channel Usage: Regular Decoding:
- In block b the relay decodes:
- In block b the destination decodes:
m(b)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>divided into B blocks of n channel uses
- Goes to zero at the relay if:
- Goes to zero at the destination:
R < I(X1; Y2|X2)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>R < I(X2; Y3) + I(X1; Y3|X2) = I(X2X3; Y3)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>encoding delay
Probability of Error:
Decode-Forward
Encoding:
- In block b the source encodes:
- In block b the relay encodes:
m(b) ∈ {1, . . . , 2nR}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Codebook Generation: p(x1)p(x2)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Channel Usage: Regular Decoding:
- In block b the relay decodes:
- In block b the destination decodes:
m(b)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>divided into B blocks of n channel uses
- Goes to zero at the relay if:
- Goes to zero at the destination:
R < I(X1; Y2|X2)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>R < I(X2; Y3) + I(X1; Y3|X2) = I(X2X3; Y3)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Probability of Error:
Decode-Forward
Encoding:
- In block b the source encodes:
- In block b the relay encodes:
m(b) ∈ {1, . . . , 2nR}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Codebook Generation: p(x1)p(x2)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Channel Usage: Regular Decoding:
- In block b the relay decodes:
- In block b the destination decodes:
m(b)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>divided into B blocks of n channel uses
- Goes to zero at the relay if:
- Goes to zero at the destination:
R < I(X1; Y2|X2)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>R < I(X2; Y3) + I(X1; Y3|X2) = I(X2X3; Y3)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Decode-Forward
Encoding:
- In block b the source encodes:
- In block b the relay encodes:
m(b) ∈ {1, . . . , 2nR}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Regular Decoding:
- In block b the relay decodes:
- In block b the destination decodes:
m(b)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Source Relay Destination 1 2 3 “Decoding Phase”
}
Decode-Forward
Encoding:
- In block b the source encodes:
- In block b the relay encodes:
m(b) ∈ {1, . . . , 2nR}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Regular Decoding:
- In block b the relay decodes:
- In block b the destination decodes:
m(b)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Source Relay Destination 1 2 3 “Encoding Phase”
}
Flow Decomposition
Encoding:
- In block b the source encodes:
- In block b the relay encodes:
m(b) ∈ {1, . . . , 2nR}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Regular Decoding:
- In block b the relay decodes:
- In block b the destination decodes:
m(b)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>1 2 3
1
“Flow”
Flow Decomposition
Encoding:
- In block b the source encodes:
- In block b the relay encodes:
m(b) ∈ {1, . . . , 2nR}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Regular Decoding:
- In block b the relay decodes:
- In block b the destination decodes:
m(b)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>m(b − 1)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>1 2 3 “Layered Partition”
1
1 “Flow”
Flow
1 2 3 4 5 6 7 8
15
2 2 15 15 44 44 44
f(1) = 1
2
− → {2, 3}
15
− → {4}
44
− → {5, 6, 7}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>A Flow Set
16
1 2 3 4 5 6 7 8
2 2 15 15 44 44 44
F = {f(1), f(2), f(3), . . . , f(N)}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>A Cut-Set Interpretation of the DF Region
1 2 3 4 5 6 7
RS < I(XF (S); Y |X ˜
F (S))
∀S ⊆ S
<latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">ACMnicbVBNTxsxEPVC+QpfAY69WI2QwiXaRSBAcIiEhNqegDQlI1WXmeSWNi7iz2LFJn9T1z6R3qohHpoq175ETgh/LxJEvP781oZl6cSWHQ9x+8qekPM7Nz8wulxaXldXy2vqFSXPNoclTmepWzAxIkUATBUpoZRqYiVcxtfHI/yFrQRafINhxl0FOsnoic4QydF5a/nkW0UR1+qrcieVBtbxeHVnaMhCtkFe1KMpK1wYDLGwe4qVYS9VDMpaSM0eWwA4caGnLl/EZUrfs0fg74lwYRUyASnUflH2E15riBLpkx7cDPsGOZRsElFKUwN+DmXrM+tB1NmALTseObC7rplC51y7iXIB2r/3dYpowZqthVKoYD89obie957Rx7+x0rkixHSPjzoF4uKaZ0FCDtCg0c5dARxrVwu1I+YJpxdDGXAjB65PfkuZ27aAWnO1U6vVJGvPkI/lEqiQge6ROPpNT0iSc3JOf5Df543fnl/vX/PpVPepGeDvID3+ATlearA</latexit><latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">ACMnicbVBNTxsxEPVC+QpfAY69WI2QwiXaRSBAcIiEhNqegDQlI1WXmeSWNi7iz2LFJn9T1z6R3qohHpoq175ETgh/LxJEvP781oZl6cSWHQ9x+8qekPM7Nz8wulxaXldXy2vqFSXPNoclTmepWzAxIkUATBUpoZRqYiVcxtfHI/yFrQRafINhxl0FOsnoic4QydF5a/nkW0UR1+qrcieVBtbxeHVnaMhCtkFe1KMpK1wYDLGwe4qVYS9VDMpaSM0eWwA4caGnLl/EZUrfs0fg74lwYRUyASnUflH2E15riBLpkx7cDPsGOZRsElFKUwN+DmXrM+tB1NmALTseObC7rplC51y7iXIB2r/3dYpowZqthVKoYD89obie957Rx7+x0rkixHSPjzoF4uKaZ0FCDtCg0c5dARxrVwu1I+YJpxdDGXAjB65PfkuZ27aAWnO1U6vVJGvPkI/lEqiQge6ROPpNT0iSc3JOf5Df543fnl/vX/PpVPepGeDvID3+ATlearA</latexit><latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">ACMnicbVBNTxsxEPVC+QpfAY69WI2QwiXaRSBAcIiEhNqegDQlI1WXmeSWNi7iz2LFJn9T1z6R3qohHpoq175ETgh/LxJEvP781oZl6cSWHQ9x+8qekPM7Nz8wulxaXldXy2vqFSXPNoclTmepWzAxIkUATBUpoZRqYiVcxtfHI/yFrQRafINhxl0FOsnoic4QydF5a/nkW0UR1+qrcieVBtbxeHVnaMhCtkFe1KMpK1wYDLGwe4qVYS9VDMpaSM0eWwA4caGnLl/EZUrfs0fg74lwYRUyASnUflH2E15riBLpkx7cDPsGOZRsElFKUwN+DmXrM+tB1NmALTseObC7rplC51y7iXIB2r/3dYpowZqthVKoYD89obie957Rx7+x0rkixHSPjzoF4uKaZ0FCDtCg0c5dARxrVwu1I+YJpxdDGXAjB65PfkuZ27aAWnO1U6vVJGvPkI/lEqiQge6ROPpNT0iSc3JOf5Df543fnl/vX/PpVPepGeDvID3+ATlearA</latexit><latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">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</latexit>F({1}) = {1, 2, 3, 4, 5, 6, 7}
<latexit sha1_base64="5CMo7sFYwHN71xdrN9WfcBGOlAI=">ACAnicbVDLSsNAFJ34rPUVdaebwSJUCWp1epCKAjisoKxhSaUyXTSDp08mJkIJQTc+CtuXKi49Svc+TdO2y09cDlHs65l5l7vJhRIU3zW1tYXFpeWS2sFdc3Nre29Z3dexElHBMbRyzibQ8JwmhIbEklI+2YExR4jLS84dXYbz0QLmgU3slRTNwA9UPqU4ykr6/nXZS0nO75UzagaJ0bNODXOjLqTdfWSWTEngPEykJ5Gh29S+nF+EkIKHEDAnRscxYuinikmJGsqKTCBIjPER90lE0RAERbjq5IYNHSulBP+KqQgkn6u+NFAVCjAJPTQZIDsSsNxb/8zqJ9M/dlIZxIkmIpw/5CYMyguNAYI9ygiUbKYIwp+qvEA8QR1iq2IoqBGv25HliVysXFeu2Vmo08jQK4AcgjKwQB0wA1oAhtg8AiewSt40560F+1d+5iOLmj5zh74A+3zB2h4lFo=</latexit><latexit sha1_base64="5CMo7sFYwHN71xdrN9WfcBGOlAI=">ACAnicbVDLSsNAFJ34rPUVdaebwSJUCWp1epCKAjisoKxhSaUyXTSDp08mJkIJQTc+CtuXKi49Svc+TdO2y09cDlHs65l5l7vJhRIU3zW1tYXFpeWS2sFdc3Nre29Z3dexElHBMbRyzibQ8JwmhIbEklI+2YExR4jLS84dXYbz0QLmgU3slRTNwA9UPqU4ykr6/nXZS0nO75UzagaJ0bNODXOjLqTdfWSWTEngPEykJ5Gh29S+nF+EkIKHEDAnRscxYuinikmJGsqKTCBIjPER90lE0RAERbjq5IYNHSulBP+KqQgkn6u+NFAVCjAJPTQZIDsSsNxb/8zqJ9M/dlIZxIkmIpw/5CYMyguNAYI9ygiUbKYIwp+qvEA8QR1iq2IoqBGv25HliVysXFeu2Vmo08jQK4AcgjKwQB0wA1oAhtg8AiewSt40560F+1d+5iOLmj5zh74A+3zB2h4lFo=</latexit><latexit sha1_base64="5CMo7sFYwHN71xdrN9WfcBGOlAI=">ACAnicbVDLSsNAFJ34rPUVdaebwSJUCWp1epCKAjisoKxhSaUyXTSDp08mJkIJQTc+CtuXKi49Svc+TdO2y09cDlHs65l5l7vJhRIU3zW1tYXFpeWS2sFdc3Nre29Z3dexElHBMbRyzibQ8JwmhIbEklI+2YExR4jLS84dXYbz0QLmgU3slRTNwA9UPqU4ykr6/nXZS0nO75UzagaJ0bNODXOjLqTdfWSWTEngPEykJ5Gh29S+nF+EkIKHEDAnRscxYuinikmJGsqKTCBIjPER90lE0RAERbjq5IYNHSulBP+KqQgkn6u+NFAVCjAJPTQZIDsSsNxb/8zqJ9M/dlIZxIkmIpw/5CYMyguNAYI9ygiUbKYIwp+qvEA8QR1iq2IoqBGv25HliVysXFeu2Vmo08jQK4AcgjKwQB0wA1oAhtg8AiewSt40560F+1d+5iOLmj5zh74A+3zB2h4lFo=</latexit><latexit sha1_base64="5CMo7sFYwHN71xdrN9WfcBGOlAI=">ACAnicbVDLSsNAFJ34rPUVdaebwSJUCWp1epCKAjisoKxhSaUyXTSDp08mJkIJQTc+CtuXKi49Svc+TdO2y09cDlHs65l5l7vJhRIU3zW1tYXFpeWS2sFdc3Nre29Z3dexElHBMbRyzibQ8JwmhIbEklI+2YExR4jLS84dXYbz0QLmgU3slRTNwA9UPqU4ykr6/nXZS0nO75UzagaJ0bNODXOjLqTdfWSWTEngPEykJ5Gh29S+nF+EkIKHEDAnRscxYuinikmJGsqKTCBIjPER90lE0RAERbjq5IYNHSulBP+KqQgkn6u+NFAVCjAJPTQZIDsSsNxb/8zqJ9M/dlIZxIkmIpw/5CYMyguNAYI9ygiUbKYIwp+qvEA8QR1iq2IoqBGv25HliVysXFeu2Vmo08jQK4AcgjKwQB0wA1oAhtg8AiewSt40560F+1d+5iOLmj5zh74A+3zB2h4lFo=</latexit>“super-source”
17
1 2 3 4 5 6 7 9 10 11 12 13 14
F({5, 12}) = {5, 6, 7, 10, 12, 13, 14}
<latexit sha1_base64="XHUtZ+zoZoEdxw/1bUADIE8MNfo=">ACXicbZDLSsNAFIYnXmu9RV26iRahQiZWq0uhIgLisYW2hCmUyn7dDJhZmJUELWbnwVNy5U3PoG7nwbJ20W2vrDwMd/zuHM+b2IUSEt61tbWFxaXlktrBXNza3tvWd3XsRxhwTG4cs5G0PCcJoQGxJSPtiBPke4y0vNFVm89EC5oGNzJcURcHw0C2qcYSWV19YPrspOcmrDqpMeXGZ2ZdRNayjDhiQlrTtrVS1bFmsiYB5hDCeRqdvUvpxfi2CeBxAwJ0YFWJN0EcUkxI2nRiQWJEB6hAekoDJBPhJtMTkmNI+X0jH7I1QukMXF/TyTIF2Lse6rTR3IoZmuZ+V+tE8v+uZvQIolCfB0UT9mhgyNLBejRznBko0VIMyp+quBh4gjLFV6RUCnD15Huxq5aICb2ulRiNPowD2wSEoAwjqoAFuQBPYAINH8AxewZv2pL1o79rHtHVBy2f2wB9pnz+gkJX2</latexit><latexit sha1_base64="XHUtZ+zoZoEdxw/1bUADIE8MNfo=">ACXicbZDLSsNAFIYnXmu9RV26iRahQiZWq0uhIgLisYW2hCmUyn7dDJhZmJUELWbnwVNy5U3PoG7nwbJ20W2vrDwMd/zuHM+b2IUSEt61tbWFxaXlktrBXNza3tvWd3XsRxhwTG4cs5G0PCcJoQGxJSPtiBPke4y0vNFVm89EC5oGNzJcURcHw0C2qcYSWV19YPrspOcmrDqpMeXGZ2ZdRNayjDhiQlrTtrVS1bFmsiYB5hDCeRqdvUvpxfi2CeBxAwJ0YFWJN0EcUkxI2nRiQWJEB6hAekoDJBPhJtMTkmNI+X0jH7I1QukMXF/TyTIF2Lse6rTR3IoZmuZ+V+tE8v+uZvQIolCfB0UT9mhgyNLBejRznBko0VIMyp+quBh4gjLFV6RUCnD15Huxq5aICb2ulRiNPowD2wSEoAwjqoAFuQBPYAINH8AxewZv2pL1o79rHtHVBy2f2wB9pnz+gkJX2</latexit><latexit sha1_base64="XHUtZ+zoZoEdxw/1bUADIE8MNfo=">ACXicbZDLSsNAFIYnXmu9RV26iRahQiZWq0uhIgLisYW2hCmUyn7dDJhZmJUELWbnwVNy5U3PoG7nwbJ20W2vrDwMd/zuHM+b2IUSEt61tbWFxaXlktrBXNza3tvWd3XsRxhwTG4cs5G0PCcJoQGxJSPtiBPke4y0vNFVm89EC5oGNzJcURcHw0C2qcYSWV19YPrspOcmrDqpMeXGZ2ZdRNayjDhiQlrTtrVS1bFmsiYB5hDCeRqdvUvpxfi2CeBxAwJ0YFWJN0EcUkxI2nRiQWJEB6hAekoDJBPhJtMTkmNI+X0jH7I1QukMXF/TyTIF2Lse6rTR3IoZmuZ+V+tE8v+uZvQIolCfB0UT9mhgyNLBejRznBko0VIMyp+quBh4gjLFV6RUCnD15Huxq5aICb2ulRiNPowD2wSEoAwjqoAFuQBPYAINH8AxewZv2pL1o79rHtHVBy2f2wB9pnz+gkJX2</latexit><latexit sha1_base64="XHUtZ+zoZoEdxw/1bUADIE8MNfo=">ACXicbZDLSsNAFIYnXmu9RV26iRahQiZWq0uhIgLisYW2hCmUyn7dDJhZmJUELWbnwVNy5U3PoG7nwbJ20W2vrDwMd/zuHM+b2IUSEt61tbWFxaXlktrBXNza3tvWd3XsRxhwTG4cs5G0PCcJoQGxJSPtiBPke4y0vNFVm89EC5oGNzJcURcHw0C2qcYSWV19YPrspOcmrDqpMeXGZ2ZdRNayjDhiQlrTtrVS1bFmsiYB5hDCeRqdvUvpxfi2CeBxAwJ0YFWJN0EcUkxI2nRiQWJEB6hAekoDJBPhJtMTkmNI+X0jH7I1QukMXF/TyTIF2Lse6rTR3IoZmuZ+V+tE8v+uZvQIolCfB0UT9mhgyNLBejRznBko0VIMyp+quBh4gjLFV6RUCnD15Huxq5aICb2ulRiNPowD2wSEoAwjqoAFuQBPYAINH8AxewZv2pL1o79rHtHVBy2f2wB9pnz+gkJX2</latexit>“super-source”
18
A Cut-Set Interpretation of the DF Region
RS < I(XF (S); Y |X ˜
F (S))
∀S ⊆ S
<latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">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</latexit><latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">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</latexit><latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">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</latexit><latexit sha1_base64="yBEAKXQSQ7LwAEFekFH6SzthBog=">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</latexit>Layered Partitions
Layer 0 Layer 1 Layer 5 Layer 8
19
Layered Partitions
Layer 0 Layer 2 Layer 2097 Layer 768902305486 Layer 19 Layer 3
20
Hierarchical Flow
21
F = {f(1), f(2), f(3), . . . , f(N)}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Main Result
For any hierarchical flow set and rate vector in the DF region:
F R
22
Theorem 1 (i) There exists a set of causal flow decompositions (ii) There exists an algorithm that finds in
{(F, Li) : i ∈ N}
<latexit sha1_base64="2kuJk2/p4h+dnMNt25oNk3LhX5g=">ACD3icbVDLSsNAFJ3UV62vqEs3g0WpICWRg9cFARxIVLBPqAJZTKdtEMnkzAzEUrIH7jxV9y4UMStW3f+jdM0C60euNzDOfcyc48XMSqVZX0Zhbn5hcWl4nJpZXVtfcPc3GrJMBaYNHIQtHxkCSMctJUVDHSiQRBgcdI2xtdTPz2PRGShvxOjSPiBmjAqU8xUlrqmftOUkcz4eX6WHWr9NeQtODM+pQnjgYMXiTOmnPLFtVKwP8S+yclEGORs/8dPohjgPCFWZIyq5tRcpNkFAUM5KWnFiSCOERGpCuphwFRLpJdk8K97TSh34odHEFM/XnRoICKceBpycDpIZy1puI/3ndWPknbkJ5FCvC8fQhP2ZQhXASDuxTQbBiY0QFlT/FeIhEgrHWFJh2DPnvyXtI6qdq16elsr18/zOIpgB+yCrDBMaiDK9ATYDBA3gCL+DVeDSejTfjfTpaMPKdbfALxsc31x2b7A=</latexit>{(F, Li) : i ∈ N}
<latexit sha1_base64="2kuJk2/p4h+dnMNt25oNk3LhX5g=">ACD3icbVDLSsNAFJ3UV62vqEs3g0WpICWRg9cFARxIVLBPqAJZTKdtEMnkzAzEUrIH7jxV9y4UMStW3f+jdM0C60euNzDOfcyc48XMSqVZX0Zhbn5hcWl4nJpZXVtfcPc3GrJMBaYNHIQtHxkCSMctJUVDHSiQRBgcdI2xtdTPz2PRGShvxOjSPiBmjAqU8xUlrqmftOUkcz4eX6WHWr9NeQtODM+pQnjgYMXiTOmnPLFtVKwP8S+yclEGORs/8dPohjgPCFWZIyq5tRcpNkFAUM5KWnFiSCOERGpCuphwFRLpJdk8K97TSh34odHEFM/XnRoICKceBpycDpIZy1puI/3ndWPknbkJ5FCvC8fQhP2ZQhXASDuxTQbBiY0QFlT/FeIhEgrHWFJh2DPnvyXtI6qdq16elsr18/zOIpgB+yCrDBMaiDK9ATYDBA3gCL+DVeDSejTfjfTpaMPKdbfALxsc31x2b7A=</latexit>that achieve ;
R
time.
P(N)EXP(S)
<latexit sha1_base64="hwzt1PWB4J3JSs+wt/UXEg30jvk=">ACD3icbZDLSgMxFIYz9VbrbdSlm2BR2k2ZkYIKLgoiuJK9gJtKZk04ZmLiRnxDLMG7jxVdy4UMStW3e+jWk7iLb+EPj5zjmcnN8JBVdgWV9GZmFxaXklu5pbW9/Y3DK3d+oqiCRlNRqIQDYdopjgPqsB8GaoWTEcwRrOMPzcb1x6TigX8Lo5B1PNL3ucspAY265mEb2D3E1aQtykR+CopTslF84fdJMWumbdK1kR43tipyaNU1a752e4FNPKYD1QpVq2FUInJhI4FSzJtSPFQkKHpM9a2vrEY6oT+5J8IEmPewGUj8f8IT+noiJp9TIc3SnR2CgZmtj+F+tFYF70om5H0bAfDpd5EYCQ4DH4eAel4yCGlDqOT6r5gOiCQUdIQ5HYI9e/K8qR+V7HLp9Lqcr5ylcWTRHtpHBWSjY1RBl6iKaoiB/SEXtCr8Wg8G2/G+7Q1Y6Qzu+iPjI9vQ9qcJw=</latexit>Main Result
R1
<latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit>R2
<latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit>The MARC DF Region
23
R1
<latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit>R2
<latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit>Layered Partition #1
24
Main Result
R1
<latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit>R2
<latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit>Layered Partition #2
25
Main Result
Main Result
R1
<latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit><latexit sha1_base64="HotScLSIGav4RP89D482ylif5c=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0lEqN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/u5N+1Xa27dnYOsEq8gNSjQ6le/eoOEZTFKwTVu5qQlyqgxnAqeVXqYxpWxMh9i1VNIYdZDPj52SM6sMSJQoW9KQufp7Iqex1pM4tJ0xNSO97M3E/7xuZqKrIOcyzQxKtlgUZYKYhMw+JwOukBkxsYQyxe2thI2oszYfCo2BG/5VXiX9Sv697dZa3ZLNIowmcwjl40IAm3EILfGDA4Rle4c2Rzovz7nwsWktOMXMf+B8/gACfI5Y</latexit>R2
<latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit><latexit sha1_base64="bZb+PWO9MlS1f85uJ2+jJK+pfc=">AB63icbVBNS8NAEJ3Ur1q/qh69LBbBU0mKoN4KXjxWMbQhrLZTtqlm03Y3Qgl9Dd48aDi1T/kzX/jts1BWx8MPN6bYWZemAqujet+O6W19Y3NrfJ2ZWd3b/+genj0qJNMfRZIhLVCalGwSX6huBnVQhjUOB7XB8M/PbT6g0T+SDmaQYxHQoecQZNVby7/t5Y9qv1ty6OwdZJV5BalCg1a9+9QYJy2KUhgmqdzUxPkVBnOBE4rvUxjStmYDrFrqaQx6iCfHzslZ1YZkChRtqQhc/X3RE5jrSdxaDtjakZ62ZuJ/3ndzERXQc5lmhmUbLEoygQxCZl9TgZcITNiYglitbCRtRZmx+VRsCN7y6vEb9Sv697dRa3ZLNIowmcwjl4cAlNuIUW+MCAwzO8wpsjnRfn3flYtJacYuY/sD5/AEAI5Z</latexit>Layered Partition #3
26
Overview of Proof
Encoding:
- In block b node i generates the message:
- In block b node i encodes the index:
mi(b) ∈ {1, . . . , 2nRi}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>where is the index assigned to the vector: w(b) ∈ {1, . . . , 2n P
s:i∈f(s) Ri}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>w(b)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>w(b) = (w1, w2, . . . , wN)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>and ws = ( ms(b − ks,i) i ∈ f(s) “1” i / ∈ f(s)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Overview of Proof
Encoding:
- In block b node i generates the message:
- In block b node i encodes the index:
mi(b) ∈ {1, . . . , 2nRi}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>where is the index assigned to the vector: w(b) ∈ {1, . . . , 2n P
s:i∈f(s) Ri}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>w(b)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>w(b) = (w1, w2, . . . , wN)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>and ws = ( ms(b − ks,i) i ∈ f(s) “1” i / ∈ f(s)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>encoding delay index “Index Coding with Encoding Delays”
Overview of Proof
Regular Decoding:
- Given the destination derives the “virtual” flows:
- For any and , let:
L = {L1, . . . , L|L|}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{v(s) : s ∈ S}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>S ⊆ S
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>0 ≤ l ≤ |L| − 1
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Al(S) := {i ∈ v(s) : s ∈ S} ∩ Ll ˜ Al(S) := {∪l
q=0Lq} \ Al(S)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>- The destination finds the message vector that satisfies the
following typicality checks for : ˆ m(b) := ( ˆ m1, . . . , ˆ mN)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>0 ≤ l ≤ |L| − 1
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>({xi( ˆ w(b − l)) : i ∈ Al(S)}, {Xi(b − l) : i ∈ ˜ Al(S)}, Yd(b − l)) ∈ T (n)
✏
(XAl(S)∪ ˜
Al(S), Yd)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Overview of Proof
Regular Decoding:
- Given the destination derives the “virtual” flows:
- For any and , let:
L = {L1, . . . , L|L|}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{v(s) : s ∈ S}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>S ⊆ S
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>0 ≤ l ≤ |L| − 1
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Al(S) := {i ∈ v(s) : s ∈ S} ∩ Ll ˜ Al(S) := {∪l
q=0Lq} \ Al(S)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>- The destination finds the message vector that satisfies the
following typicality checks for : ˆ m(b) := ( ˆ m1, . . . , ˆ mN)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>0 ≤ l ≤ |L| − 1
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>({xi( ˆ w(b − l)) : i ∈ Al(S)}, {Xi(b − l) : i ∈ ˜ Al(S)}, Yd(b − l)) ∈ T (n)
✏
(XAl(S)∪ ˜
Al(S), Yd)
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>“typicality checks generated from layered partitions”
Overview of Proof
{1}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L1
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L2
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L3
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L4
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L11
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L5
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L7
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L8
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L6
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L12
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L13
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L10
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L9
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>Overview of Proof
{1}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L1
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L2
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L3
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L4
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L11
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L5
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L7
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L8
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L6
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L12
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L13
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L10
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L9
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>regular decoding scheme
Overview of Proof
{1}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L1
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L2
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L3
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L4
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L11
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L5
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L7
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L8
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L6
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L12
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L13
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L10
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L9
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>regular decoding scheme The DF Region (3-user MARC)
Overview of Proof
{1}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{1, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>{2, 3}
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L1
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L2
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L3
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L4
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L11
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L5
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L7
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L8
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L6
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L12
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L13
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L10
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>L9
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>R
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>regular decoding scheme L1 = shift(L12, {1, 3})
<latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit><latexit sha1_base64="(nul)">(nul)</latexit>The DF Region (3-user MARC)
Conclusion
- Regular decoding schemes collectively achieve the DF region for multi-cast
channels with hierarchical flow
- Future work: computability
- Under what conditions is a rate-vector achievable by decode-forward
schemes?
- All-cast channels with arbitrary flow
35
Thanks!
36