• Keine Ergebnisse gefunden

Designing codes for storage allocation

N/A
N/A
Protected

Academic year: 2022

Aktie "Designing codes for storage allocation"

Copied!
30
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

SASCHA KURZ

ABSTRACT. Service rates for storage allocation were considered in [11]. In this notes we consider the de- sign of good or optimal codes with respect to this metric. The cases of two files is completely and the case of three files is partially resolved, see also [8] where a subset of these results are presented in a more compact way.

Keywords:distributed storage; linear codes; service rates of codes

1. PRELIMINARIES

Suppose there arekfilesf1, . . . , fkwith request ratesλ1, . . . , λk. The service rate regionS(G, µ)⊆ Rk≥0 is defined as the set of all request vectors λthat can be served by a coded storage system with generator matrixG∈Fk×nq and service rateµ. In the following we assumeµ=1, i.e.,µi = 1for all i∈[n], where[n] ={1, . . . , n}for each integern, and abbreviateS(G,1)asS(G). In order to be more precise we need to introduce more notation. A linear codeC of dimensionkoverFq can be described by a generator matrix G ∈ Fk×nq . Note that there are usually generator matrices that span the same linear code, i.e., whenever the row span of two matricesGandG0coincides, the span the same code.

Another representation of a linear codeCoverFqis a multisetGof points inPG(k−1, q), where a point is a1-dimensional subspace ofFkq. In what follows, we restrict ourselves to the binary fieldF2, which allows us to simplify the notation a bit. First we associate the points ofPG(k−1,2)with the non-zero vectors inFk2, then we interpret each such vectorv as the binary expansion of a corresponding integer 1 ≤i ≤ l := 2k −1. We denote the vector corresponding to the integeri ∈ [l]byvi. As examples, the vectorv4 = (1,0,0)corresponds to the integer4and the vectorv3 = (0,1,1)corresponds to the integer3. In order to uniquely characterize a multiset of pointsGinPG(k−1,2)we use multiplicities ni ∈N, wherei∈[l], counting the number of occurrences of the vectorviinFk2\{0}, wherei∈[l], in the generator matrixG. So, we haveP

i∈[l]ni =n. The notion of a multiset of pointsGfactors out the symmetry of column permutations of corresponding generator matricesG. Due to the correspondence between a generator matrixGand a multiset of pointsG we also writeS(G)instead ofS(G)for the service rate region and remark that we will directly defineS(G)later on.

A recovery setY for filefi, wherei ∈[k], is a subset ofS ⊆ [l]such that the spanh{vj|j∈S}i contains theith unit vectorei. We call a recovery setSreduced forithere does not exists a proper subset S0 (Swithei∈ h{vj|j ∈S0}i. Forq= 2and a reduced recovery setSthere is no need to specify the indexiof the file that is recovered sinceP

j∈Svj=ei. However, inF3the set{e1+e2,e1+ 2e2}spans a2-dimensional subspace containing bothe1ande2, while none of these two unit vectors is contained in the span of a proper subset. Since we assumeq= 2, we will mostly speak just of a recovery set without specifyingi. ByYiwe denote the set of all reduced recovery sets for filefi, wherei ∈[k]. Fork = 3 andi= 2we have

Y2=n

{2},{4,6},{1,3},{5,7},{1,4,7}o , which corresponds to

n{(0,1,0)},{(1,0,0),(1,1,0)},{(0,0,1),(0,1,1)},{(1,0,1),(1,1,1)},{(0,0,1),(1,0,0),(1,0,1)}o .

1

(2)

We remark that the maximum cardinality of a reduced recovery set isk, which can indeed be attained.

Given a multiset of pointsGinPG(k−1,2), described by the multiplicitiesnj, the service rate region S(G)is the set of all vectorsλ∈Rk≥0for which there existsαi,Y, satisfying the following constraints:

X

Y∈Yi

αi,Yi, for alli∈[k], (1a)

k

X

i=1

X

Y∈Yi:j∈Y

αi,Y ≤nj, for allj∈[l], (1b)

αi,Y ∈R≥0, for alli∈[k], Y ∈ Yi. (1c)

The constraints (1a) guarantee that the demands for all files are served, and constraints (1b) ensure that no node receives requests at a rate in excess of its service rate.

As noted before, forq = 2, each reduced recovery set uniquely characterizes the file it recovers. In other words theYiare pairwise disjoint and form a partition ofY :=∪i∈[k]Yi. With this we can simplify the above characterization, i.e., the service rate regionS(G)is the set of all vectorsλ∈Rk≥0for which there existsαY, satisfying the following constraints:

X

Y∈Yi

αY ≥λi, for alli∈[k], (2a)

X

Y∈Y:j∈Y

αY ≤nj, for allj∈[l], (2b)

αY ∈R≥0, for allY ∈ Y. (2c)

Note that constraint (2a) looks like a relaxation of constraint (1a), while it does not matter for the defini- tion ofS(G)if we use “=” or “≥”.

After these preparations we can come to the main questions of this paper. For each (bounded) subset R ⊂Rk≥0we can ask for the minimum numbern(R)of servers such that there exists a generator matrix G∈Fk×n2 withR ⊆ S(G)(or alternatively, such that there exists a multiset of pointsGinPG(k−1,2) withR ⊆ S(G)). So, we ask for lower bounds forn(R)and constructive upper bounds forn(R), i.e., the construction of good codes. Note that we can haveS(G)6=S(G0)orS(G)6=S(G0)even ifG,G0 orG,G0 generate the same linear codeC, so that we have to speak of the construction of good generator matrices or good multisets of points, in order to be more precise.

Before we give integer linear programming (ILP) formulations for the determination ofn(R)we first study a few structural properties.

Lemma 1.1. We haven(R) =n(conv(R)), whereconv(R)is the convex hull ofR.

Proof. It suffices to observe that the service rate regionS(G)of every generator matrixG ∈ Fk×n2 is

convex.

The relation x ≤ y, i.e., xi ≤ yi for all 1 ≤ i ≤ k, forms a poset in Rk≥0 with the unique minimal element 0. In that context, the lower set S↓ of a subset S ⊆ Rk≥0 is defined via S↓:=

x∈Rk≥0| ∃y∈S:x≤y . As an example we consider the setS = conv({(0,0),(1,2),(2,1)}) ⊂ R2≥0, which is a triangle with area32. Here, the corresponding lower set

S↓= conv({(0,0),(0,2),(2,0),(1,2),(2,1)}) is a pentagon with area72.

Lemma 1.2. We haven(R) =n(R↓), whereR↓is the lower set ofR.

(3)

Proof. It suffices to observe that the service rate regionS(G)of every generator matrixG∈Fk×n2 is its

own lower set, i.e.,S(G) =S(G)↓.

Taken the above two observations into account, we want to parameterize a large class of reasonable subsetsR ⊂Rk≥0by a functionT: 2{1,...,k}→Nthat maps the subsets of{1, . . . , k}to integers, where T(∅) = 0.

Definition 1.3. LetT: 2{1,...,k}→NwithT(∅) = 0. With this, we set R(T) :=

(

λ∈Rk≥0|X

i∈S

λi≤T(S)∀∅ 6=S⊆ {1, . . . , k}

)

and abbreviaten(R(T)))asn(T).

By construction R(T)is a polytope, i.e., a bounded polyhedron, which especially is convex, see e.g. [7] for more details. Moreover,R(T)↓=R(T), i.e.,R(T)is its own lower set. In some cases we can modify values of the functionTwithout changingR(T).

Lemma 1.4. LetT: 2{1,...,k} → NwithT(∅) = 0and letT0 be given by the following algorithm:

foreachS⊆ {1, . . . , k}do T0(S)←T(S)

end for

changed←true whilechanged=truedo

changed←false foreachS⊆ {1, . . . , k}do

foreach∅ 6=U (Sdo

ifT0(S)> T0(U) +T0(S\U)then T0(S)←T0(U) +T0(S\U) changed←true

end if end for

foreachS(V ⊆ {1, . . . , k}do ifT0(S)> T0(V)then

T0(S)←T0(V) changed←true end if

end for end for end while

Then, we haveR(T) = R(T0). Moreover, if we apply the algorithm again onT0 and obtainT00, then T0=T00.

Proof. After the first initializing loop we obviously haveR(T) =R(T0). Now we consider a single step whereT0(S)is replaced by eitherT0(U)+T0(S\U)orT0(V). Inductively we know that eachλ∈ R(T0) satisfiesP

i∈S0λi ≤T0(S0)for allS0 ⊆ {1, . . . , k}. Since this especially holds forS0=U,S0=S\U, andS0 =V we also have

X

i∈S

λi≤T0(U) +T0(S\U)

(4)

and

X

i∈S

λi λ≥0≤ X

i∈V

λi≤T0(V).

So, after each replacement we still haveR(T) =R(T0).

In order to show that the algorithm terminates let

ε= min{T(U)−T(V)| ∅ ⊆U, V ⊆ {1, . . . , k}, T(U)−T(V)}.

By induction over the number of replacements we can easily show that ε ≤ min{T0(U)−T0(V) |

∅ ⊆U, V ⊆ {1, . . . , k}, T0(U)−T0(V)}at each time after the initialization loop. Thus, every replace- ment reduces the value ofP

S⊆{1,...,}T0(S)by at leastε, so that the algorithm terminates after at least P

S⊆{1,...,}T(S)

/ε+ 1iterations of the while loop.

Since in the last iteration of the while loop non of the if-conditions were true, this is also the case if

we apply the algorithm again.

We remark that the functionT0 constructed by the algorithm of Lemma 1.4 is subadditive, i.e., we haveT0(U) +T0(V) ≥T0(U ∪V)(sinceT0 is non-negative it is no necessary to restrict to the cases whereU ∩V = ∅), and monotone, i.e., we haveT0(U) ≤ T0(V)for all∅ ⊆ U ⊆ V ⊆ {1, . . . , k}.

Indeed, the proof of the following characterization is easy:

Lemma 1.5. A functionT: 2{1,...,k}→N, withT(∅) = 0, satisfiesT0=T, whereT0is the result of the algorithm of Lemma 1.4 applied toT, iffT is monotone and subadditive.

As an example we remark that a function fork= 1each functionT: 2{1,...,k} →Nis monotone and subadditive, while fork= 2the conditions can be summarized to

max{T({1}), T({2})} ≤ T({1,2}) ≤ T({1}) +T({2}). (3) Definition 1.6. LetR ⊆Rk≥0be a subset that cannot be enlarged by building the lower set, i.e.R↓=R.

Then, we say that a finite setS ⊆Rk≥0is a generating set ofRifconv(S)↓=R. Moreover, we callS minimal if no proper subset ofSis a generating set ofR.

As an example we consider the functionT: 2{1,2}→Ngiven byT(∅) = 0,T({1}) =T({2}) = 2, andT({1,2}) = 3. Here, a generating set ofR(T)is given by{(1,2),(1,2)}. Actually, the generating set ofR(T)is always unique, sinceR(T)is a polytope that can be written asR(T) = conv(V), where V is the set of vertices of the polytope, which is the unique minimal set withR(T) = conv(V). We obtain a generating set ofRfromV be removing allv∈V such there is a differentv0∈V withv≤v0.

Before we study bounds forn(R(T)), we give ILP formulations for the determination ofn(R).

Proposition 1.7. Let

λ(1), . . . , λ(m) be a generating set ofR, i.e., we assume that R↓= R. Then, n(R)coincides with the optimal target value of

min X

j∈[l]

nj

X

Y∈Y:j∈Y

αiY ≤nj ∀j∈[l],∀i∈[m]

X

Y∈Yj

αiY ≥λ(i)j ∀i∈[m], j∈[k]

nj ∈N ∀j∈[l]

αiY ∈R≥0 ∀i∈[m],∀Y ∈ Y,

(5)

Proof. Let the multiset of pointsGbe uniquely characterized by the integer multiplicitiesnj,j ∈[l]. The stated ILP formulation minimizes the code sizen=P

j∈[l]nj and ensures thatλ[(i)]∈ S(G)by using

the characterization (2a)–(2c) for eachi∈[m].

The drawback of the ILP formulation of Proposition 1.7 is that#Y grows doubly exponential, i.e.,

#Ygets quite large, even for moderate values ofk.

Example 1.8. Forq= 2,k= 2consider the desired service rate region R=

1, λ2)∈R2≥0 : λ1≤2, λ2≤2, λ12≤3 . and generating set

λ(1), λ(2) of cardinalitym= 2, whereλ(1)= (2,1)andλ(2) = (1,2). The possible columns of a generator matrixG, i.e., the non-zero vectors inF22are

v1= (0,1), v2= (1,0),andv3= (1,1).

The recovery sets are given by

Y1=n

{2},{1,3}o . and

Y2=n

{1},{2,3}o

With this, the ILP of Proposition 1.7 for the determination ofn(R)is:

minn1+n2+n3

α1{1}1{1,3}≤n1 α1{2,3}{2}1 ≤n2

α1{2,3}1{1,3}≤n3

α2{1}2{1,3}≤n1

α2{2,3}{2}2 ≤n2

α2{2,3}2{1,3}≤n3 α1{2}1{1,3}≥2 α1{1}1{2,3}≥1 α2{2}2{1,3}≥1 α2{1}2{2,3}≥2 n1, n2, n3∈N

αi{1}, αi{2,3}, αi{2}, α{1,3}i ∈R≥0 ∀i∈[2]

An optimal solution is given byn1= 2,n2= 2, andn3= 0, i.e., a code of lengthn= 4with generator matrix

1 1 0 0 0 0 1 1

.

Optimal multipliers for the recovery sets are given byα{1}1 = 2,α1{2,3} = 0,α1{2} = 1,α1{1,3}= 0and α2{1} = 1,α2{2,3} = 0,α2{2} = 2,α2{1,3} = 0. For the optimal multiset of points there are two further possibilities:(n1, n2, n3) = (2,1,1)and(n1, n2, n3) = (1,2,1).

(6)

If we only want to obtain an easier to computer lower bound forn(R), then we can consider the LP relaxation of the ILP of Proposition 1.7:

min X

j∈[l]

nj

nj− X

Y∈Y:j∈Y

αiY ≥0 ∀j∈[l],∀i∈[m]

X

Y∈Yj

αiY ≥λ(i)j ∀i∈[m], j∈[k]

nj ∈R≥0 ∀j∈[l]

αiY ∈R≥0 ∀i∈[m],∀Y ∈ Y, The LP relaxation of the ILP in Example 1.8 is given by

minn1+n2+n3 n1−α1{1}−α1{1,3}≥0 n2−α1{2,3}−α1{2}≥0 n3−α{2,3}1 −α1{1,3}≥0 n1−α2{1}−α2{1,3}≥0 n2−α2{2,3}−α2{2}≥0 n3−α{2,3}2 −α2{1,3}≥0 α1{2}1{1,3}≥2 α1{1}1{2,3}≥1 α2{2}2{1,3}≥1 α2{1}2{2,3}≥2 n1, n2, n3∈R≥0

αi{1}, αi{2,3}, αi{2}, αi{1,3}∈R≥0 ∀i∈[2]

and has the unique optimal solutionn1 = 32,n2 = 32, andn3 = 12 with optimal multipliersα1{1} = 32, α1{2,3} = 12{2}1 = 1,α1{1,3} = 0andα2{1} = 1,α2{2,3} = 0,α2{2} = 322{1,3} = 12 for the recovery sets. The optimal target valuen=n1 +n2+n3= 72 can be rounded to4taking into account that the length of the code has to be an integer.

As mentioned before, the ILP formulation of Proposition 1.7 underlies a massive combinatorial ex- plosion. To be more precise, the number of variables grows exponentially and the number of constraints grows doubly exponentially.

Lemma 1.9. LetG∈ Fk×nq be the generator matrix of an[n, k]q codeCandGbe the corresponding multiset of points of cardinalityndescribed by point multiplicitiesnj. If

λ(1), . . . λ(m) is a generating set ofR, then we have

X

vj∈PG(k−1,2)\H

nj ≥max

 X

s∈E(H)

λ(i)s |1≤i≤m

, (4)

whereHis a hyperplane ofPG(k−1,2)and

E(H) ={h∈[k]|eh∈ h{v/ |v∈ H}i}

(7)

is the set of indiceshsuch that the hyperplaneHdoes not contain the unit vector eh, i.e., eh lies in PG(k−1,2)\ H.

Proof. Let1≤i≤mbe an arbitrary index. From the ILP of Proposition 1.7 we conclude X

Y∈Ys

αiY ≥λ(i)s (5)

for eachs∈ E(H)and

nj ≥ X

Y∈Y:j∈Y

αiY

αiY≥0

≥ X

s0∈E(H)

X

Y∈Ys0:j∈Y

αiY (6)

for eachj ∈[l]withvj∈PG(k−1,2)\ H. Thus, we have X

vj∈PG(k−1,2)\H

nj ≥ X

vj∈PG(k−1,2)\H

X

s∈E(H)

X

Y∈Ys:j∈Y

αiY = X

s∈E(H)

X

vj∈PG(k−1,2)\H

X

Y∈Ys:j∈Y

αYi . The unit vectorseswith indexsinE(H)are not contained in the chosen hyperplaneH, so that for each Y ∈ Yswiths∈ E(H)there exists an indexj ∈[l]withj∈Y andvj ∈PG(k−1,2)\ H. Thus, we conclude

X

vj∈PG(k−1,2)\H

nj ≥ X

s∈E(H)

X

Y∈Ys

αiY ≥ X

s∈E(H)

λ(i)s

from Inequality (5).

Corollary 1.10. If

λ(1), . . . , λ(m) is a generating set ofR, thenn(R)is lower bounded by the optimal target value of

min X

j∈[l]

nj

X

vj∈PG(k−1,2)\H

nj ≥max

 X

s∈E(H)

λ(i)s |1≤i≤m

∀hyperplanesHof PG(k−1,2)

nj ∈N ∀j∈[l].

Note that the ILP of Corollary 1.10 contains exactly2k −1constraints and (integer) variables. So we have obtained a, with respect to Proposition 1.7, smaller formulation for the determination ofn(R).

However, we only obtained a lower bound on n(R). Indeed, from the context of private information retrieval (PIR) codes, see [9], we know that the optimal target value of the ILP of Corollary 1.10 can differ fromn(R), i.e., it can be strictly smaller.

Example 1.11. Forλ= (3,4,5)the ILP of Corollary 1.10 reads n4+n5+n6+n7 ≥ 3, n2+n3+n6+n7 ≥ 4, n1+n3+n5+n7 ≥ 5, n2+n3+n4+n5 ≥ 7, n1+n3+n4+n6 ≥ 8, n1+n2+n5+n6 ≥ 9, n1+n2+n4+n7 ≥ 12.

An integral solution is e.g. given byn5 = 7, n6 = 8,n7 = 12, andni = 0 for the remainingi ∈ {1,2,3,4}. IfGis the multiset of points inPG(3−1,2)that is uniquely described by theni, then we haveλ ∈ S(G). We havev5 = (1,0,1),v6 = (1,1,0), and v7 = (1,1,1), so that the only usable

(8)

recovery set fore1is given by{5,6,7}, fore2we only can use{5,7}, and fore3the only possibility is {6,7}. Taking these recovery sets with multiplicities3,4, and5uses all available servers and is indeed the unique solution of the ILP of Proposition 1.7.

Lemma 1.12. Let {λ} be a generating set of R ⊆ R2≥0 and nbe an integral solution of the ILP of Corollary 1.10. Ifλ∈R2≥0andGis the multiset corresponding ton, thenλ∈ S(G), i.e., there exists a feasible choice ofαY satisfying (2a)-(2c).

Proof. The constraints of the ILP of Corollary 1.10 read n2+n3 ≥ λ1, n1+n3 ≥ λ2, n1+n2 ≥ λ12 and the recovery sets are given by

Y1 = n

{2},{1,3}o , Y2 = n

{1},{2,3}o . Setting

α{2} = min{n2, λ1}, α{1} = min{n1, λ2}, α{1,3} = max{0, λ1−n2}, α{2,3} = max{0, λ2−n1} we have

α{2}{1,3} = λ1, α{1}{2,3} = λ2, α{1}{1,3} ≤ n1, α{2}{2,3} ≤ n2, and α{1,3}{2,3} ≤ n3.

Only the latter inequality needs a short case analysis. Ifn2 ≥λ1andn1≥λ2, thenα{1,3}{2,3} = 0≤n3. Sincen1+n2≥λ12we cannot haven2< λ1andn1< λ2. So, let us assumen2< λ1and n1≥λ2. Then,α{2,3} = 0,α{1}2{2}=n2{1,3}1−n2, andα{1,3}{2,3}1−n2, which is at mostn3due ton2+n3≥λ1. The other casen2≥λ1andn1< λ2follows analogously.

In order to apply Corollary 1.10 to Example 1.8 we writeH={j∈[k]|vj∈ H}for each hyperplane Hand obtain:

H1={e2}, H1={1} ⇒ n2+n3≥2, H2={e1}, H2={2} ⇒ n1+n3≥2, H3={e1+e2}, H1={3} ⇒ n1+n2≥3.

Summing up all three inequalities and dividing by two yieldsn=n1+n2+n372, sot thatn≥4. As 3.5is the optimal target value of the LP relaxation of the ILP from Proposition 1.7, it also has to be the optimal target value of the LP relaxation of the ILP from Corollary 1.10. Again the optimal ILP solutions are given by

(n1, n2, n3)∈n

(2,2,0),(2,1,1),(1,2,1)o ,

where all corresponding generator matricesGindeed achieve a service rate regionS(G)⊇ R.

(9)

Let us consider another example in order to illustrate that solving the LP relaxation and uprounding the target value can yield a weaker bound than solving the corresponding ILP.

Example 1.13. Forq= 2,k= 3consider the desired service rate regionR=R(T), whereT(∅) = 0 andT(S) = #S+ 1for∅ 6=S ⊆[3], i.e.,

R=

1, λ2, λ2)∈R3≥0 : λ1≤2, λ2≤2, λ3≤2, λ12≤3, λ13≤3, λ23≤3, λ123≤4 . A generating set

λ(1), λ(2), λ(3) orRof cardinalitym= 3is given byλ(1)= (2,1,1),λ(2)= (1,2,1), andλ(3)= (1,1,2). The possible columns of a generator matrixG, i.e., the non-zero vectors inF32are v1= (0,0,1), v2= (0,1,0), v3= (0,1,1), v4= (1,0,0), v5= (1,0,1), v6= (1,1,0), andv7= (1,1,1).

In order to write down the inequalities from Lemma 1.9 we describe a hyperplaneHas a set of vectors (x1, x2, x3)∈F32\ {0}satisfying a certain constraintP3

i=1cixi, where(c1, c2, c3)∈F32\ {0}:

H1: x1= 0 ⇒ e1∈ H/ 1 ⇒ n4+n5+n6+n7≥2 = max(λ(1)1 , λ(2)1 , λ(3)1 ) (7) H2: x2= 0 ⇒ e2∈ H/ 2 ⇒ n2+n3+n6+n7≥2 = max(λ(1)2 , λ(2)2 , λ(3)2 ) (8) H3: x3= 0 ⇒ e3∈ H/ 3 ⇒ n1+n3+n5+n7≥2 = max(λ(1)3 , λ(2)3 , λ(3)3 ) (9) H4: x1+x2= 0 ⇒ e1,e2∈ H/ 4 ⇒ n2+n3+n4+n5≥3 = max X

j=1,2

λ(i)j :i∈[3]

(10) H5: x1+x3= 0 ⇒ e1,e3∈ H/ 5 ⇒ n1+n3+n4+n6≥3 = max X

j=1,3

λ(i)j :i∈[3]

(11) H6: x2+x3= 0 ⇒ e2,e3∈ H/ 6 ⇒ n1+n2+n5+n6≥3 = max X

j=2,3

λ(i)j :i∈[3]

(12) H7:x1+x2+x3= 0 ⇒ e1,e2,e3∈ H/ 7 ⇒ n1+n2+n4+n7≥4 = max X

j=[3]

λ(i)j :i∈[3]

(13)

Summing up inequalities (7)-(13) and dividing by four givesn≥19

4

= 5. Indeed, the LP relaxation of the ILP from Corollary 1.10 has an optimal solutionn1=n2=n4= 54,n3=n5=n6=n7= 14 with target value 194. Next we will shown ≥6for the ILP and assume that there exists an integral solution withn = 5. Summing the inequalities over all hyperplanesHi containingv1 = e3, i.e., (7), (8), and (10), and dividing by two givesP

j∈[l]\{1}nj ≥ 3.5, so thatn1 ≤ 1. By symmetry, we also conclude n2, n4 ≤ 1. Summing the inequalities over all hyperplanesHinot containingv1 = e3, i.e., (9), (11), (12), and (13), and dividing by two gives2n1+P

j∈[l]\{1}nj ≥6, so thatn1 ≥1. Thus,n1 = 1and, by symmetry, alson2 = n4 = 1. Summing inequalities (10)-(12), plugging in the known values, and dividing by two givesn3+n5+n6 ≥ 1.5, so thatn7 ≤ 0.5, i.e.,n7 = 0. However, this contradicts Inequality (13).

An integral solution forn= 6can indeed be attained byn1=n2=n4= 2,n3=n5=n6=n7= 0.

It can be easily checked that the corresponding generator matrix

G=

1 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1

.

satisfiesS(G)⊇ R.

In Proposition 2.14 we will give a general result that directly yieldsn(R)≥6for Example 1.13.

(10)

2. BOUNDS FORn(T)

LetT: 2[2]→Nbe monotone, subadditive, and satisfyT(∅) = 0, i.e., by Inequality (3) max{T({1}), T({2})} ≤ T({1,2}) ≤ T({1}) +T({2}).

The corresponding generating sets ofR(T)can be easily described:

Lemma 2.1. IfT: 2[2]→Nis monotone, subadditive, and satisfiesT(∅) = 0, then a generating set of R(T)is given by

S =n

T({1}), T({1,2})−T({1}) ,

T({1,2})−T({2}), T({2})o .

Proof. First, we check that each λ ∈ S satisfies the constraints λ1 ≤ T({1}), λ2 ≤ T({2}), and λ12≤T({1,2}).

For the other direction letλ∈R2≥0satisfying the constraintsλ1≤T({1}),λ2 ≤T({2}), andλ1+ λ2≤T({1,2}). W.l.o.g. we assume that at least one of these three inequalities is satisfied with equality, since we could increaseλotherwise. Ifλ12=T({1,2}), thenλ∈conv(S)sinceλ1≤T({1})and λ2 ≤T({2}). So let us now consider the caseλ1=T({1}). Ifλ2< T({2})andλ12 < T({1,2}) then we could increaseλ, so that we can assumeλ2 < T({2})and concludeλ12=T({1,2})from the subadditivity ofT. The caseλ2=T({2})can be treated analogously.

We remark that the generating set of Lemma 2.1 has cardinality2or1, where the latter happens if the two vectors coincide, which happens iffT({1}) =T({2})andT({1,2}) = 2T({1}).

Definition 2.2. For a set∅ 6=S ⊂N>0of positive integers we denote bySimpl(S)the set of non-zero vectors inh{ei|i∈S}ioverF2.

We remark that Definition 2.2 defines binary simplex codes, which can be easily generalized to arbi- trary finite fieldsFq.

The following is well-known:

Lemma 2.3. For each∅ 6=S⊆[k]⊂N>0we have# Simpl(S) = 2s−1andS(Simpl(S)) =R(T), wheres= #SandT: 2[k] →Nis given byT(U) = 2s−1ifU ∩S 6=∅andT(U) = 0otherwise (for allU ⊆[k]).

As an abbreviate we write 12 ·Simpl({i, j}) = {ei,ej}for two different positive integersiandj.

Note that the cardinality is1

2·# Simpl({i, j})

= 2and the service rate region contains the service rate region ofSimpl({i, j})scaled by a factor of 12, i.e.,

S({ei,ej}) =

λ∈Rk≥0i ≤1, λj ≤1 )

λ∈Rk≥0i≤1, λj≤1, λij≤1 . Theorem 2.4. For the service rate region

R=n

λ∈R2≥0 : λ1≤X, λ2≤Y, λ12≤Σo ,

whereX, Y,Σare non-negative integers withmax{X, Y} ≤Σ≤X+Y, we haven(R) =X+Y 2

. Proof. Note that the condition of Inequality (3) is satisfied, so that we can apply Lemma 2.1. The in- equalities from Lemma 1.9 read

n1+n3 ≥ X = max{X,Σ−Y}, n2+n3 ≥ Y = max{Y,Σ−X}, n1+n2 ≥ Σ = max{Σ,Σ}, so that summing up and dividing by two gives

n=n1+n2+n3≥ X+Y + Σ

2 .

(11)

Sincenis an integer, we obtainn(R)≥X+Y 2

.

For the upper bound on n(R), i.e., the constructive part, we letG(1) consist ofΣ−Y copies of Simpl({1}),G(2)consist ofΣ−Xcopies ofSimpl({2}), andG(3)consist ofX+Y2−Σcopies ofSimpl({1,2}).

Now, we setG=∪i∈[3]G(i), which is a multiset of point inPG(2−1,2)of cardinality (Σ−Y) + (Σ−X) +

3(X+Y −Σ) 2

=

X+Y + Σ 2

.

By construction we haveR(G) ⊇ R(T)forT(∅) = 0,T({1}) = X,T({2}) = Y, andT({1,2}) =

Σ.

Of course, we might give a more direct proof of Theorem 2.4. Instead of basing the constructive part on the “subcodes” introduced in Definition 2.2 we can directly write down the multiplicities for the columnse1,e2, ande1+e2.

Conjecture 2.5. n(R(T))can be attained by a union ofSimpl S(i) .

Lemma 2.6. If T: 2[3] → Nis monotone, subadditive, satisfies T(∅) = 0 and T([3]) +T({i}) ≤ P

j∈[3]\{i}T({i, j}), then a generating set ofR(T)is given by S=n

T(π≤1)−T(π<1), T(π≤2)−T(π<2), T(π≤1)−T(π<3)

|πis a bijection[3]→[3]o , whereπ≤i={j∈[k]|π(j)≤π(i)}andπ<i={j ∈[k]|π(j)< π(i)}.

Proof. First, we need to check that eachλ∈Ssatisfies the constraintsP

i∈Uλi≤T(U)for allU ⊆[3].

In explicit form the elements ofSin Lemma 2.6 are given by

T({1}), T({1,2})−T({1}), T({1,2,3})−T({1,2}) ,

T({1}), T({1,2,3})−T({1,3}), T({1,3})−T({1}) ,

T({1,2})−T({2}), T({2}), T({1,2,3})−T({1,2}) ,

T({1,2,3})−T({2,3}), T({2}), T({2,3} −T({2})) ,

T({1,3})−T({3}), T({1,2,3})−T({1,3}), T({3}) , and T({1,2,3})−T({2,3}), T({2,3})−T({3}), T({3})

.

It can be easily verified that under the conditions of Lemma 2.6, eachλ∈S satisfies the constraints P

i∈Uλi ≤T(U)for allU ⊆[3]. For the other direction, we need to show that eachλ∈R3≥0satisfying the constraintsP

i∈Uλi ≤ T(U)for allU ⊆[3], is inconv(S)↓. The proof is similar to the proof of Lemma 2.1. W.l.o.g. we assume that at least one of these seven inequalities is satisfied with equality, since we could increaseλotherwise. If λ123=T({1,2,3}), then λ∈conv(S)since all other six inequalities are satisfied. So now let us consider the caseλ1=T({1}). Ifλ2< T({2}),λ3< T({3}), λ12< T({1,2}),λ13< T({1,3}),λ23< T({2,3}), andλ122< T({1,2,3}), then we could increaseλ, so thatλ12=T({1,2})andλ123=T({1,2,3})from the subadditivity andT([3]) +T({i})≤P

j∈[3]\{i}T({i, j})properties ofT. All other cases can be treated analogously.

(12)

The notion of Lemma 2.6 can also be used to characterize the generating set in Lemma 2.1. In explicit form the elements ofSin Lemma 2.6 are given by

T({1}), T({1,2})−T({1}), T({1,2,3})−T({1,2}) ,

T({1}), T({1,2,3})−T({1,3}), T({1,3})−T({1}) ,

T({1,2})−T({2}), T({2}), T({1,2,3})−T({1,2}) ,

T({1,2,3})−T({2,3}), T({2}), T({2,3} −T({2})) , T({1,3})−T({1}), T({1,2,3})−T({1,3}), T({3})

, and T({1,2,3})−T({2,3}), T({2,3})−T({3}), T({3})

. Under the conditions of Lemma 2.6 none of the constraintsP

i∈Uλi≤T(U), for∅ 6=U ⊆[3], is strictly redundant, i.e., each inequality can be attained with equality by someλ∈R3≥0without violating one of the other constraints.

Example 2.7. Fork= 3the functionT: 2[k]→N, given by

T(U) =





0 : #U = 0, 4 : #U = 1, 5 : #U = 2, 7 : #U = 3

,

is monotone and subadditive but does not satisfy the last condition of Lemma 2.6. A generating set of R(T)is given by

n

(4,1,1),(1,4,1),(1,1,4),(3,2,2),(2,3,2),(2,2,3)o . We haven(R(T)) = 9.

Lemma 2.6 can be generalized in the sense that we can characterize some elements ofR(T)at the very least.

Lemma 2.8. If T: 2[k] → N is monotone and satisfiesT(∅) = 0 for some positive integer k, then R(T)contains the vectorxπfor every bijectionπof[k], where the components ofxπcan be computed recursively in the ordering ofπ:

xπi = min

T(U∪ {i})−X

j∈U

xj|U ⊆π<i

 , whereπ<i={j∈[k]|π(j)< π(i)}.

Proof. Directly from the definition of thexπi and the orderingπof the evaluation we conclude that thexπi are uniquely defined. Next we want to showxπ≥0. So, assume to the contrary thatiis the with respect toπearliest index in[k]withxπi <0. Now letU ⊆π<0a subset withxπi =T(U ∪ {i})−P

j∈Uxj. By construction we haveP

j∈Uxj≤T(U), so that monotonicity ofT, i.e.,T(U∪ {i})≥T(U), yields xπi ≥0, which is a contradiction. Finally we show thatP

j∈Uxj ≤T(U)for all∅ 6=U ⊆[k]. So, let such a subsetU be given and letibe the with respect toπlatest element inU. By construction we have

xπi ≤T(U0∪ {i})− X

j∈U0

xj, whereU0=U\ {i}, so thatP

j∈Uxj≤T(U).

(13)

IfT: 2[3]→Nis monotone, subadditive and satisfiesT(∅) = 0, then the formula forxπof Lemma 2.8 can be simplified to

xππ(1) = T({π(1)}),

xππ(2) = T({π(1), π(2)})−T({π(1)}), and

xππ(3) = min{T([3])−T({π(1), π(2)}), T({π(1), π(3)})−T({π(1)})}.

Example 2.9. Letk = 3andT: 2[k] → Nby defined byT(∅) = 0, T({1}) = 13,T({2}) = 14, T({5}) = 15, T({1,2}) = 18, T({1,3}) = 21, T({2,3}) = 22, and T({1,2,3}) = 30. From Lemma 2.8 we conclude

n

(13,5,8),(4,14,8),(6,7,15)o

⊆ R(T).

We can easily check that also(9,9,12)∈ R(T), while(9,9,12)∈/ conv({(13,5,8),(4,14,8),(6,7,15))}) since

13a+ 4b+ 6c ≥ 9 (14)

5a+ 14b+ 7c ≥ 9 (15)

8a+ 8b+ 15c ≥ 12 (16)

witha, b, c ∈ R≥0 anda+b+c = 1impliesa+b ≥ 1(summing the first two inequalities), so that c= 0, which contradicts the last inequality. A generating set ofR(T)is given by

n

(13,5,8),(4,14,8),(6,7,15),(9,9,12),(8,10,12),(8,9,13)o

as we will see in the subsequent lemma. The ILP of Corollary 1.10 has an optimal solutionn1 = 10, n2 = 9,n3 = 1,n4 = 8,n5 = 1,n6 = 2, andn7 = 3, so thatn(R(T)) ≥ 34. We remark that Proposition 2.12 givesn(R(T))≥ d33.25e= 34.

Proposition 2.10. LetT: 2[3] → NwithT(∅) = 0and none of the constraintsP

i∈Uxi ≤ T(U)is strictly redundant inRk≥0for∅ 6=U ⊆[3]. Then, the following list of vectors gives a generating set of R(T):

• Γ1=

T(1), T(12)−T(1),min

T(123)−T(12), T(13)−T(1)

;

• Γ2=

T(1),min

T(123)−T(13), T(12)−T(1) , T(13)−T(1)

;

• Γ3=

T(12)−T(2), T(2),min

T(123)−T(12), T(23)−T2)

;

• Γ4= min

T(123)−T(23), T(12)−T(2) , T(2), T(23)−T(2)

;

• Γ5=

T(13)−T(3),min

T(123)−T(13), T(23)−T(3) , T(3)

;

• Γ6= min

T(123)−T(23), T(13)−T(3) , T(23)−T(3), T(3)

;

• Γ7=

T(12) +T(13)−T(123), T(123)−T(13), T(123)−T(12)

ifT(12) +T(13)≤T(123) + T(1);

• Γ8=

T(123)−T(23), T(12) +T(23)−T(123), T(123)−T(12)

ifT(12) +T(23)≤T(123) + T(2);

• Γ9=

T(123)−T(23), T(123)−T(13), T(13) +T(23)−T(123)

ifT(13) +T(23)≤T(123) + T(3).

Proof. Due to our assumptionT is monotone and subadditive. The first six vectors of our list are con- tained inR(T)due to Lemma 2.8. Given the assumptionT(12) +T(13)≤ T(123) +T(1)we have for (x1, x2, x3) = Γ7 thatx1+x2 = T(12),x1+x3 = T(13), andx1+x2+x3 = T(123). The

(14)

condition x2 +x3 ≤ T(23) follows from 2T(123) ≤ T(12) + T(13) +T(23)since x2 +x3 = 2T(123)−T(12)−T(13). The conditionsx2 ≤T(2)andx3≤T(3)follow from the subadditivity of Tand the conditionx1≤T(1)is equivalent to the assumption. Thus, given the assumption,Γ7∈ R(T).

By symmetry, we have the analogues statement forΓ8andΓ9. The polytopeR(T)is described by four types of inequalities:

(i) x1≥0,x2≥0,x3≥0;

(ii) x1≤T(1),x2≤T(2),x3≤T(3);

(iii) x1+x2≤T(12),x1+x3≤T(13),x2+x3≤T(23);

(iv) x1+x2+x3≤T(123).

Since we assume that no constraint is strictly redundant the vertices ofR(T)are given by each triple of linear independent inequalities, i.e., the coefficient vectors of the inequalities are linearly independent.

Next we will check all possible cases taking the symmetry of the symmetric group on3 elements into account. Note thatΓ1, . . . ,Γ6form indeed an orbit under this group action. The vectorsΓ7, . . . ,Γ9form another orbit under this group action.

Three times type (i) gives the vertex(0,0,0) ≤ Γ1. If type (i) occurs two times, then we assume x1=x2= 0w.l.o.g. Sincemin{T(3), T(13), T(23), T(123)}=T(3)the corresponding vertex is given by(0,0, T(3)) ≤ Γ5. If type (i) occurs exactly one time, then we assumex3 = 0w.l.o.g. Moreover for the other two inequalities we only need to consider those which do not involvex3. If the other two arex1 ≤ T(1)andx2 ≤ T(2), then the corresponding vertex is given by(T(1), T(2),0) ≤Γ1since T is subadditive, i.e.,T(12)−T(1) ≤ T(2). If the other two arex1 ≤ T(1)andx1+x2 ≤ T(12), then the corresponding vertex is(T(1), T(12)−T(1),0) ≤ Γ1. If the other two arex2 ≤ T(2)and x1+x2≤T(12), then the corresponding vertex is(T(12)−T(2), T(2),0)≤Γ2. Thus, in the following we can assume that type (i) does not occur at all.

If type (ii) is attained at least once then we assume x1 = T(1) w.l.o.g. If either x3 ≤ T(3) or x1 +x3 ≤ T(13)occurs then we assume w.l.o.g. that x2 ≤ T(2) or x1+x2 ≤ T(12). Due to subadditivity ofT we then havex1+x2=T(12), i.e.,x2=T(12)−T(1). Forx3we then have

x3= minn

T(3), T(13)−T(1), T(123)−T(12), T(23)−T(12) +T(1)o ,

so that the corresponding vertex equalsΓ1. Otherwise, neitherx2 = T(2),x3 = T(3), x1 +x3 = T(13), norx2+x3 =T(23)are valid. The only two remaining possibilities arex2+x3 =T(23)and x1+x2+x3=T(123), which, however, are linearly dependent.

In the remaining cases types (i) and (ii) do not occur at all. If type (iii) is attained three times, then we havex1= T(12) +T(13)−T(23)

/2,x2= T(12) +T(23)−T(13)

/2, andx3= T(13) +T(23)−

T(12)

/2, so thatx1+x2+x3= T(12) +T(13) +T(23)

/2. Since the inequalitiesx1+x2≤T(12), x1 +x3 ≤ T(13), andx2+x3 ≤ T(23) implyT(123) ≤ T(12) +T(13) +T(23)

/2, so that T(123) = T(12) +T(13) +T(23)

/2. In this situation our vector(x1, x2, x3)equalsΓ7= Γ8= Γ9. Next, we assumex1+x2 = T(12), x1+x3 = T(13), andx1+x2+x3 = T(123), i.e.,x3 = T(123)−T(12),x2 =T(123)−T(13), andx1 = T(12) +T(13)−T(123). So, the corresponding vertex equalsΓ7. Due to our symmetry assumptions we also have to considerΓ8andΓ9. While it might be hard to give explicit formulas for the generating set ofR(T),1we can easily gener- alize the lower bound of Theorem 2.4 if we assume that none of the constraints is (strictly) redundant.

Definition 2.11. LetP=

x∈Rk|Ax≤b, x≥0 be a polyhedron inRkwith description(A, b). We say that a constrainta(i)x≤biis redundant, wherea(i)denotes theith row ofA, ifP =

x∈Rk|A0x≤b0, x≥0 ,

1In general a polytope{xRn :Axb}described bym“≥”-inequalities has at most m−

jn+1 2

k

m−n

+ m−

ln+1 2

m

m−n

extreme points [10], which are vertices in the case of a polytope. This upper bound is attained by the so-called cyclic polytopes, see [4]. If the entries ofAare all contained in{0,1}, then there is an upper ofn!, see [3].

(15)

whereA0 andb0 arise from Aand bby removing the ith row, respectively. We say that a constraint a(i)x≤biis strictly redundant if there does not existx¯∈P witha(i)x¯=bi.

As an example considerT: 2[2]→Ndefined viaT(∅) = 0andT({1}) =T({2}) =T({1,2}) = 1.

With this we consider the polyhedron inR2≥0defined by the inequalitiesP

i∈Uλi ≤T(U)(choosingλ as variable) for all∅ 6=U ⊆[2]. Since the vectors(1,0)and(0,1)are contained in the polyhedron, no inequality is strictly redundant. The inqualitiesλ1≤T({1})andλ2≤T({2})are redundant, while the inequalityλ12≤T({1,2})is not redundant since e.g.(1,1)is not contained in the polyhedron.

Proposition 2.12. We have

n(R(T))≥

& P

∅6=U⊆[k]T(U) 2k−1

' ,

whereT: 2[k] →Nfor some positive integerkand none of the constraintsP

i∈Uλi ≤T(U)is strictly redundant inRk≥0.

Proof. We want to apply the ILP formulation of Corollary 1.10. First we observe that each hyperplaneH inPG(k−1,2)can be uniquely characterized by a set∅ 6=S ⊆[k]such that{i∈[k]|ei∈ H}/ =S.

So, we will writeS(H)for this setSin the following. Due to our assumption that no constraint (of the ILP formulation of Corollary 1.10) is strictly redundant, we can chooseT(S)as right hand side, i.e.,

X

j∈[l] :vj∈H/

nj≥T(S(H)),

whereS(H) = {i∈[k] : ei∈ H}, as described above. For each/ j ∈[l]we havevj ∈ H/ for exactly 2k−1hyperplanesH. Thus, summing all of the above2k−1inequalities and dividing by2k−1yields

n=X

j∈[l]

nj≥ P

∅6=U⊆[k]T(U) 2k−1 .

Finally, we observe thatnhas to be an integer.

We remark that the lower bound of Proposition 2.12 is indeed tight (ifk= 2andT is monotone and subadditive), see Theorem 2.4. However, it is not tight in general, e.g., in Example 1.13n(R(T))is one larger than the corresponding lower bound of Proposition 2.12, while none of the constraints strictly redundant.

Corollary 2.13. We have

n(R(T))≥

&

X· 2k−1 2k−1

' ,

whereT: 2[k] →Nfor some positive integerk,X ∈N,T(∅) = 0, andT(U) =X for all∅ 6=U ⊆[k].

redundant inRk≥0. Moreover, ifX =t·2k−1for some integert, then the lower bound is tight.

Proof. We can easily check that none of the constraints is strictly redundant, so that we can apply Propo- sition 2.12. Indeed, a generating set of R(T)is given by{X·ei|i∈[k]}. A t-fold k-dimensional binary simplex codeSimpl([k])achieves the desired service rate region.

We remark that the situation ofT(U) = X ∈Nfor all∅ 6=U ⊆[k]is equivalent to the situation of PIR codes, see e.g. [9] for some recent lower bounds.

In the light of Example 1.13 we want to give further general lower bounds similar to the bound of Proposition 2.12.

(16)

Proposition 2.14. For some positive integerk ≥ 2let T: 2[k] → Nbe a function such that none of the constraintsP

i∈Uλi ≤T(U)is strictly redundant inRk≥0. For eachi ∈ [k]we have n(R(T))≥ lα

ii 2

m where

αi=

& P

∅6=U⊆[k]\{i}T(U) 2k−2

'

and

βi=

& P

{i}⊆U⊆[k]T(U) 2k−2

' . Proof. We proceed similar as in the proof of Proposition 2.12 and utilize

X

j∈[l] :vj∈H/

nj ≥T(S(H)), (17)

whereS(H) ={i∈[k] : ei∈ H}. We can also parameterize those constraints by subsets/ ∅ 6=U ⊆[k]

by uniquely characterizingHbyS(H) =U. Now leti ∈[k]be arbitrary but fix and¯i= 2k−i, so that v¯i=ei. Summing Inequality (17) for all∅ 6=U ⊆[k]\ {i}gives

2k−2· X

j∈[l]\{¯i}

nj ≥ X

∅6=U⊆[k]\{i}

T(U).

Summing Inequality (17) for all{i} ⊆U ⊆[k]gives 2k−1·n¯i+ 2k−2· X

j∈[l]\{¯i}

nj≥ X

{i}⊆U⊆[k]

T(U).

Since thenjare integers we haveP

j∈[l]\{¯i}nj ≥αiand2n¯i+P

j∈[l]\{¯i}nj ≥βi. Dividing the sum of these two inequalities by2gives

n=n¯i+ X

j∈[l]\{¯i}

nj≥ αii

2 ,

where we again can upround the right hand side sincenis an integer.

We remark that Proposition 2.14 implies Proposition 2.12 (fork ≥ 2). However, for Example 1.13 also Proposition 2.14 implies onlyn(R)≥5since we haveαi= 4andβi= 6for alli∈[3]. We remark that Proposition 3.10 gives the tight lower boundn(R)≥6.

Proposition 2.15. For some positive integerk≥2letT: 2[k] →Nbe a function such that none of the constraintsP

i∈Uλi≤T(U)is strictly redundant inRk≥0. For eachj∈[l]we have n(R(T))≥

& P

∅6=U⊆[k] : #(U∩J)≡0 (mod 2)T(U) 2k−2

' , whereJ ⊆[k]such thatvj=P

h∈Jeh.

Proof. We proceed similar as in the proof of Proposition 2.12 and utilize X

j∈[l] :vj∈H/

nj ≥T(S(H)), (18)

whereS(H) ={i∈[k] : ei∈ H}. We can also parameterize those constraints by subsets/ ∅ 6=U ⊆[k]

by uniquely characterizingHbyS(H) = U. Now letj ∈ [l]by arbitrary but fix. Our aim is to sum

(17)

Inequality (18) over all2k−1−1hyperplanesHthat containvj. We claim thatvj =P

h∈Jeh ∈ Hiff

#(U ∩J)≡0 (mod 2), whereU =S(H). If#U ≥2, then for some arbitrary elementx∈U the set {ei|i∈[k]\U} ∪ {ex+ei|i∈U\x}

is a basis ofH. So, we havevj=P

h∈Jeh∈ Hiff#(U∩J)≡0 (mod 2). In the remaining cases we have#U = 1and choosex∈[k]such thatU ={x}. A basis ofHis given by{eh|h∈[k]\ {x}}. So, vj ∈ Hiffx /∈J, i.e.,#(U∩J) = 0≡ (mod 2). Thus, we obtain

2k−2· X

a∈[l]\{j}

na= X

hyperplaneH:vj∈H

X

a:va∈H/

na ≥ X

∅6=U⊆[k] : #(U∩J)≡0 (mod 2)

T(U).

SinceP

a∈[l]\{j}nais not larger thannand an integer, we obtain the stated lower bound.

Example 2.16. Letxbe a positive integer andT: 2[3]→Nbe defined byT({1}) =T({2}) =T({3}) = T({1,2}) = T({1,3}) = xandT({2,3}) = T({1,2,3}) = 2x. Proposition 2.12 givesn(R(T)) ≥ 9x

4

. Forj= 3Proposition 2.15 givesn(R(T))≥5x

2

.

So, there fork = 3(and indeed for allk ≥3) there is no finite upper bound on the deviation of the lower bound of Proposition 2.12 and the exact value ofn(R(T)).

3. PARTIAL RESULTS FOR THREE FILES

Fork= 3files the possible reduced recovery sets are given by Y1 = n

{4},{1,5},{2,6},{3,7},{5,6,7},{2,3,5},{1,3,6},{1,2,7}o , Y2 = n

{2},{4,6},{1,3},{5,7},{3,6,7},{1,5,6},{3,4,5},{1,4,7}o , and Y3 = n

{1},{4,5},{2,3},{6,7},{3,5,7},{2,5,6},{3,4,6},{2,4,7}o .

Lemma 3.1. Let{λ}be a generating set ofRandnbe an integral solution of the ILP of Corollary 1.10 withn1=n2=n4= 0. Ifλ∈R3≥0, andGis the multiset corresponding ton, thenλ∈ S(G), i.e., there exists a feasible choice ofαY satisfying (2a)-(2c).

Proof. Plugging inn1=n2=n4= 0the constraints of Corollary 1.10 read n5+n6+n7 ≥ λ1,

n3+n6+n7 ≥ λ2, n3+n5+n7 ≥ λ3,

n3+n5 ≥ λ12, n3+n6 ≥ λ13, n5+n6 ≥ λ23, and

n7 ≥ λ123. We choose

α{3,7} = min{λ1, n3}, α{5,7} = min{λ2, n5}, α{6,7} = min{λ3, n6}, α{5,6,7} = λ1−α{3,7}, α{3,6,7} = λ2−α{5,7}, and α{3,5,7} = λ3−α{6,7},

Referenzen

ÄHNLICHE DOKUMENTE

A broad comparison between Tables 2 and 3 suggests that the 44 studies taking the individual elements interaction approach provide far more mixed results with respect to any

As a filter in E 0 converges to the origin in the strong topology if and only if it converges to the origin uniformly on every bounded subset of E (see Proposition 3.2.2), the

We use Erd¨ os’ probabilistic method: if one wants to prove that a structure with certain desired properties exists, one defines an appropriate probability space of structures and

The following theorem (also from Chapter 2 of slides) has an analogous formulation..

The lengths of projective 2- and 4-divisible linear binary codes have been completely determined, but already for projective 8-divisible codes there is a single open case, which

We study asymptotic lower and upper bounds for the sizes of constant dimension codes with respect to the subspace or injection distance, which is used in random linear network

The large-scale drift bodies deposited in the entire eastern Fram Strait are associated with 371  . the northbound West Spitsbergen Current in the southern part, and from the

Cloud Computing (SS2018) Faculty of Computer Science and Engineering Frankfurt University of Applied Sciences.. Your