Rate $\frac{1}{3}$ Index Coding: Forbidden and Feasible Configurations
نویسندگان
چکیده
Linear index coding can be formulated as an interference alignment problem, in which precoding vectors of the minimum possible length are to be assigned to the messages in such a way that the precoding vector of a demand (at some receiver) is independent of the space of the interference (non sideinformation) precoding vectors. An index code has rate 1 l if the assigned vectors are of length l. In this paper, we introduce the notion of strictly rate 1 L message subsets which must necessarily be allocated precoding vectors from a strictly L-dimensional space (L = 1, 2, 3) in any rate 1 3 code. We develop a general necessary condition for rate 1 3 feasibility using intersections of strictly rate 1 L message subsets. We apply the necessary condition to show that the presence of certain interference configurations makes the index coding problem rate 1 3 infeasible. We also obtain a class of index coding problems, containing certain interference configurations, which are rate 1 3 feasible based on the idea of contractions of an index coding problem. Our necessary conditions for rate 1 3 feasibility and the class of rate 1 3 feasible problems obtained subsume all such known results for rate 1 3 index coding.
منابع مشابه
On the harmonic index of bicyclic graphs
The harmonic index of a graph $G$, denoted by $H(G)$, is defined asthe sum of weights $2/[d(u)+d(v)]$ over all edges $uv$ of $G$, where$d(u)$ denotes the degree of a vertex $u$. Hu and Zhou [Y. Hu and X. Zhou, WSEAS Trans. Math. {bf 12} (2013) 716--726] proved that for any bicyclic graph $G$ of order $ngeq 4$, $H(G)le frac{n}{2}-frac{1}{15}$ and characterize all extremal bicyclic graphs.In this...
متن کاملForbidden configurations and repeated induction
Over this summer, I had the great privilege of working with Dr. Richard Anstee and Ph.D. student Miguel Raggi in the problem area of forbidden configurations, a topic in extremal set theory. The induction arguments employed in our research were similar to those used by Steven Karp, Dr. Anstee’s 2008 USRA student [2]. It is convenient to use the language of matrix theory and sets for forbidden c...
متن کاملSmall Forbidden Configurations II
The present paper continues the work begun by Anstee, Griggs and Sali on small forbidden configurations. In the notation of (0,1)-matrices, we consider a (0,1)-matrix F (the forbidden configuration), an m × n (0,1)-matrix A with no repeated columns which has no submatrix which is a row and column permutation of F , and seek bounds on n in terms of m and F . We give new exact bounds for some 2× ...
متن کاملThe Borsuk-Ulam Theorem
For simplicity, we adopt the following rules: a, b, x, y, z, X, Y , Z denote sets, n denotes a natural number, i denotes an integer, r, r1, r2, r3, s denote real numbers, c, c1, c2 denote complex numbers, and p denotes a point of En T. Let us observe that every element of IQ is irrational. Next we state a number of propositions: (1) If 0 ≤ r and 0 ≤ s and r2 = s2, then r = s. (2) If frac r ≥ fr...
متن کاملبررسی میزان صحت کدگذاری در بیمارستانهای آموزشی دانشگاه علوم پزشکی و خدمات بهداشتی درمانی شیراز
The research was intended to determine the rate of coding accuracy in the training hospitals of Shiraz University of Medical Sciences and Health Treatment Services in 1995 (1374), and it was performed through a descriptive-analytic method. In the research, 400 medical records were selected based on stratified sampling method from among records of the patients having been discharged from hospita...
متن کامل