-
Improved upper bounds for the Heilbronn's Problem for $k$-gons
Authors:
Rishikesh Gajjala,
Jayanth Ravi
Abstract:
The Heilbronn triangle problem asks for the placement of $n$ points in a unit square that maximizes the smallest area of a triangle formed by any three of those points. In $1972$, Schmidt considered a natural generalization of this problem. He asked for the placement of $n$ points in a unit square that maximizes the smallest area of the convex hull formed by any four of those points. He showed a l…
▽ More
The Heilbronn triangle problem asks for the placement of $n$ points in a unit square that maximizes the smallest area of a triangle formed by any three of those points. In $1972$, Schmidt considered a natural generalization of this problem. He asked for the placement of $n$ points in a unit square that maximizes the smallest area of the convex hull formed by any four of those points. He showed a lower bound of $Ω(n^{-3/2})$, which was improved to $Ω(n^{-3/2}\log{n})$ by Leffman.
A trivial upper bound of $3/n$ could be obtained, and Schmidt asked if this could be improved asymptotically. However, despite several efforts, no asymptotic improvement over the trivial upper bound was known for the last $50$ years, and the problem started to get the tag of being notoriously hard. Szemer{é}di posed the question of whether one can, at least, improve the constant in this trivial upper bound. In this work, we answer this question by proving an upper bound of $2/n+o(1/n)$. We also extend our results to any convex hulls formed by $k\geq 4$ points.
△ Less
Submitted 21 May, 2024;
originally announced May 2024.
-
On the Second-Order Asymptotics of the Hoeffding Test and Other Divergence Tests
Authors:
K. V. Harsha,
Jithin Ravi,
Tobias Koch
Abstract:
Consider a binary statistical hypothesis testing problem, where $n$ independent and identically distributed random variables $Z^n$ are either distributed according to the null hypothesis $P$ or the alternative hypothesis $Q$, and only $P$ is known. A well-known test that is suitable for this case is the so-called Hoeffding test, which accepts $P$ if the Kullback-Leibler (KL) divergence between the…
▽ More
Consider a binary statistical hypothesis testing problem, where $n$ independent and identically distributed random variables $Z^n$ are either distributed according to the null hypothesis $P$ or the alternative hypothesis $Q$, and only $P$ is known. A well-known test that is suitable for this case is the so-called Hoeffding test, which accepts $P$ if the Kullback-Leibler (KL) divergence between the empirical distribution of $Z^n$ and $P$ is below some threshold. This work characterizes the first and second-order terms of the type-II error probability for a fixed type-I error probability for the Hoeffding test as well as for divergence tests, where the KL divergence is replaced by a general divergence. It is demonstrated that, irrespective of the divergence, divergence tests achieve the first-order term of the Neyman-Pearson test, which is the optimal test when both $P$ and $Q$ are known. In contrast, the second-order term of divergence tests is strictly worse than that of the Neyman-Pearson test. It is further demonstrated that divergence tests with an invariant divergence achieve the same second-order term as the Hoeffding test, but divergence tests with a non-invariant divergence may outperform the Hoeffding test for some alternative hypotheses $Q$. Potentially, this behavior could be exploited by a composite hypothesis test with partial knowledge of the alternative hypothesis $Q$ by tailoring the divergence of the divergence test to the set of possible alternative hypotheses.
△ Less
Submitted 12 April, 2024; v1 submitted 6 March, 2024;
originally announced March 2024.
-
Examining Lyman-alpha Emitters through MillenniumTNG in anticipation of DESI-II
Authors:
Jyotsna Ravi,
Boryana Hadzhiyska,
Martin White,
Lars Hernquist,
Sownak Bose
Abstract:
The goal of this study is to conduct a timely analysis of the high-redshift star-forming galaxy populations, which will be informative in designing next-generation experiments and their extragalactic targets. We use the hydrodynamical simulation MillenniumTNG (MTNG) to model Lyman-alpha Emitting (LAE) galaxies to extract key properties such as their clustering and occupation statistics. We define…
▽ More
The goal of this study is to conduct a timely analysis of the high-redshift star-forming galaxy populations, which will be informative in designing next-generation experiments and their extragalactic targets. We use the hydrodynamical simulation MillenniumTNG (MTNG) to model Lyman-alpha Emitting (LAE) galaxies to extract key properties such as their clustering and occupation statistics. We define LAEs through an empirical relation between star formation rate (SFR) and Lyman-alpha flux. We also explore two other definitions, finding that imposing an additional cut on the maximum stellar mass of the galaxy sample, which approximates the effect of a low escape fraction at high halo mass, leads to a 5-10\% decrease of the linear bias of the population. As expected, we find that the HOD mass parameters rapidly decrease with increasing number density. Additionally, the HOD parameter $σ$ also decreases with number density, implying that the SFR-halo mass relationship becomes tighter for low-luminosity objects. Surprisingly, the non-linear clustering, estimated by the parameter $r_0$, is fixed at fixed number density, whereas the linear bias parameter varies with redshift as $b(z) \propto (1 + z)$, suggesting that our LAE samples are relatively stable and long-lived. Finally, we study the amount of galaxy assembly bias present at $z = 2, \ 3$ and find that while at $z = 2$ it is roughly $\lesssim$10\%, at $z = 3$ it decreases significantly to $\lesssim$5\%. This suggests that assembly bias effects become less important at high $z$ likely due to the lower number of cumulative two-halo interactions (mergers, splashback, strip**, etc.). While our study is based on a single full-physics simulation, we expect our results to reflect the properties of LAEs in the Universe. We demonstrate that our findings are in good agreement with previous results using both observations and simulations.
△ Less
Submitted 4 March, 2024;
originally announced March 2024.
-
Accelerating Causal Algorithms for Industrial-scale Data: A Distributed Computing Approach with Ray Framework
Authors:
Vishal Verma,
Vinod Reddy,
Jaiprakash Ravi
Abstract:
The increasing need for causal analysis in large-scale industrial datasets necessitates the development of efficient and scalable causal algorithms for real-world applications. This paper addresses the challenge of scaling causal algorithms in the context of conducting causal analysis on extensive datasets commonly encountered in industrial settings. Our proposed solution involves enhancing the sc…
▽ More
The increasing need for causal analysis in large-scale industrial datasets necessitates the development of efficient and scalable causal algorithms for real-world applications. This paper addresses the challenge of scaling causal algorithms in the context of conducting causal analysis on extensive datasets commonly encountered in industrial settings. Our proposed solution involves enhancing the scalability of causal algorithm libraries, such as EconML, by leveraging the parallelism capabilities offered by the distributed computing framework Ray. We explore the potential of parallelizing key iterative steps within causal algorithms to significantly reduce overall runtime, supported by a case study that examines the impact on estimation times and costs. Through this approach, we aim to provide a more effective solution for implementing causal analysis in large-scale industrial applications.
△ Less
Submitted 22 January, 2024;
originally announced January 2024.
-
Second-Order Asymptotics of Hoeffding-Like Hypothesis Tests
Authors:
K. V. Harsha,
Jithin Ravi,
Tobias Koch
Abstract:
We consider a binary statistical hypothesis testing problem, where $n$ independent and identically distributed random variables $Z^n$ are either distributed according to the null hypothesis $P$ or the alternate hypothesis $Q$, and only $P$ is known. For this problem, a well-known test is the Hoeffding test, which accepts $P$ if the Kullback-Leibler (KL) divergence between the empirical distributio…
▽ More
We consider a binary statistical hypothesis testing problem, where $n$ independent and identically distributed random variables $Z^n$ are either distributed according to the null hypothesis $P$ or the alternate hypothesis $Q$, and only $P$ is known. For this problem, a well-known test is the Hoeffding test, which accepts $P$ if the Kullback-Leibler (KL) divergence between the empirical distribution of $Z^n$ and $P$ is below some threshold. In this paper, we consider Hoeffding-like tests, where the KL divergence is replaced by other divergences, and characterize, for a large class of divergences, the first and second-order terms of the type-II error for a fixed type-I error. Since the considered class includes the KL divergence, we obtain the second-order term of the Hoeffiding test as a special case.
△ Less
Submitted 11 May, 2022;
originally announced May 2022.
-
Fundamental Limits of Demand-Private Coded Caching
Authors:
Chinmay Gurjarpadhye,
Jithin Ravi,
Sneha Kamath,
Bikash Kumar Dey,
Nikhil Karamchandani
Abstract:
We consider the coded caching problem with an additional privacy constraint that a user should not get any information about the demands of the other users. We first show that a demand-private scheme for $N$ files and $K$ users can be obtained from a non-private scheme that serves only a subset of the demands for the $N$ files and $NK$ users problem. We further use this fact to construct a demand-…
▽ More
We consider the coded caching problem with an additional privacy constraint that a user should not get any information about the demands of the other users. We first show that a demand-private scheme for $N$ files and $K$ users can be obtained from a non-private scheme that serves only a subset of the demands for the $N$ files and $NK$ users problem. We further use this fact to construct a demand-private scheme for $N$ files and $K$ users from a particular known non-private scheme for $N$ files and $NK-K+1$ users. It is then demonstrated that, the memory-rate pair $(M,\min \{N,K\}(1-M/N))$, which is achievable for non-private schemes with uncoded transmissions, is also achievable under demand privacy. We further propose a scheme that improves on these ideas by removing some redundant transmissions. The memory-rate trade-off achieved using our schemes is shown to be within a multiplicative factor of 3 from the optimal when $K < N$ and of 8 when $N\leq K$. Finally, we give the exact memory-rate trade-off for demand-private coded caching problems with $N\geq K=2$.
△ Less
Submitted 18 January, 2021;
originally announced January 2021.
-
Scaling Laws for Gaussian Random Many-Access Channels
Authors:
Jithin Ravi,
Tobias Koch
Abstract:
This paper considers a Gaussian multiple-access channel with random user activity where the total number of users $\ell_n$ and the average number of active users $k_n$ may grow with the blocklength $n$. For this channel, it studies the maximum number of bits that can be transmitted reliably per unit-energy as a function of $\ell_n$ and $k_n$. When all users are active with probability one, i.e.,…
▽ More
This paper considers a Gaussian multiple-access channel with random user activity where the total number of users $\ell_n$ and the average number of active users $k_n$ may grow with the blocklength $n$. For this channel, it studies the maximum number of bits that can be transmitted reliably per unit-energy as a function of $\ell_n$ and $k_n$. When all users are active with probability one, i.e., $\ell_n = k_n$, it is demonstrated that if $k_n$ is of an order strictly below $n/\log n$, then each user can achieve the single-user capacity per unit-energy $(\log e)/N_0$ (where $N_0/ 2$ is the noise power) by using an orthogonal-access scheme. In contrast, if $k_n$ is of an order strictly above $n/\log n$, then the capacity per unit-energy is zero. Consequently, there is a sharp transition between orders of growth where interference-free communication is feasible and orders of growth where reliable communication at a positive rate per unit-energy is infeasible. It is further demonstrated that orthogonal-access schemes in combination with orthogonal codebooks, which achieve the capacity per unit-energy when the number of users is bounded, can be strictly suboptimal.
When the user activity is random, i.e., when $\ell_n$ and $k_n$ are different, it is demonstrated that if $k_n\log \ell_n$ is sublinear in $n$, then each user can achieve the single-user capacity per unit-energy $(\log e)/N_0$. Conversely, if $k_n\log \ell_n$ is superlinear in $n$, then the capacity per unit-energy is zero. Consequently, there is again a sharp transition between orders of growth where interference-free communication is feasible and orders of growth where reliable communication at a positive rate is infeasible that depends on the asymptotic behaviours of both $\ell_n$ and $k_n$. It is further demonstrated that orthogonal-access schemes, which are optimal when $\ell_n = k_n$, can be strictly suboptimal.
△ Less
Submitted 2 September, 2021; v1 submitted 18 December, 2020;
originally announced December 2020.
-
Reconciling Multiple Connectivity Scores for Drug Repurposing
Authors:
Kewalin Samart,
Phoebe Tuyishime,
Arjun Krishnan,
Janani Ravi
Abstract:
The basis of several recent methods for drug repurposing is the key principle that an efficacious drug will reverse the disease molecular 'signature' with minimal side-effects. This principle was defined and popularized by the influential 'connectivity map' study in 2006 regarding reversal relationships between disease- and drug-induced gene expression profiles, quantified by a disease-drug 'conne…
▽ More
The basis of several recent methods for drug repurposing is the key principle that an efficacious drug will reverse the disease molecular 'signature' with minimal side-effects. This principle was defined and popularized by the influential 'connectivity map' study in 2006 regarding reversal relationships between disease- and drug-induced gene expression profiles, quantified by a disease-drug 'connectivity score.' Over the past 15 years, several studies have proposed variations in calculating connectivity scores towards improving accuracy and robustness in light of massive growth in reference drug profiles. However, these variations have been formulated inconsistently using various notations and terminologies even though they are based on a common set of conceptual and statistical ideas. Therefore, we present a systematic reconciliation of multiple disease-drug similarity metrics (ES, css, Sum, Cosine, XSum, XCor, XSpe, XCos, EWCos) and connectivity scores (CS, RGES, NCS, WCS, Tau, CSS, EMUDRA) by defining them using consistent notation and terminology. In addition to providing clarity and deeper insights, this coherent definition of connectivity scores and their relationships provides a unified scheme that newer methods can adopt, enabling the computational drug-development community to compare and investigate different approaches easily. To facilitate the continuous and transparent integration of newer methods, this article will be available as a live document (https://jravilab.github.io/connectivity_scores) coupled with a GitHub repository (https://github.com/jravilab/connectivity_scores) that any researcher can build on and push changes to.
△ Less
Submitted 28 February, 2021; v1 submitted 19 September, 2020;
originally announced September 2020.
-
Private Index Coding
Authors:
Varun Narayanan,
Jithin Ravi,
Vivek K. Mishra,
Bikash Kumar Dey,
Nikhil Karamchandani,
Vinod M. Prabhakaran
Abstract:
We study the fundamental problem of index coding under an additional privacy constraint that requires each receiver to learn nothing more about the collection of messages beyond its demanded messages from the server and what is available to it as side information. To enable such private communication, we allow the use of a collection of independent secret keys, each of which is shared amongst a su…
▽ More
We study the fundamental problem of index coding under an additional privacy constraint that requires each receiver to learn nothing more about the collection of messages beyond its demanded messages from the server and what is available to it as side information. To enable such private communication, we allow the use of a collection of independent secret keys, each of which is shared amongst a subset of users and is known to the server. The goal is to study properties of the key access structures which make the problem feasible and then design encoding and decoding schemes efficient in the size of the server transmission as well as the sizes of the secret keys. We call this the private index coding problem.
We begin by characterizing the key access structures that make private index coding feasible. We also give conditions to check if a given linear scheme is a valid private index code. For up to three users, we characterize the rate region of feasible server transmission and key rates, and show that all feasible rates can be achieved using scalar linear coding and time sharing; we also show that scalar linear codes are sub-optimal for four receivers. The outer bounds used in the case of three users are extended to arbitrary number of users and seen as a generalized version of the well-known polymatroidal bounds for the standard non-private index coding. We also show that the presence of common randomness and private randomness does not change the rate region. Furthermore, we study the case where no keys are shared among the users and provide some necessary and sufficient conditions for feasibility in this setting under a weaker notion of privacy. If the server has the ability to multicast to any subset of users, we demonstrate how this flexibility can be used to provide privacy and characterize the minimum number of server multicasts required.
△ Less
Submitted 30 May, 2020;
originally announced June 2020.
-
Capacity per Unit-Energy of Gaussian Random Many-Access Channels
Authors:
Jithin Ravi,
Tobias Koch
Abstract:
We consider a Gaussian multiple-access channel with random user activity where the total number of users $\ell_n$ and the average number of active users $k_n$ may be unbounded. For this channel, we characterize the maximum number of bits that can be transmitted reliably per unit-energy in terms of $\ell_n$ and $k_n$. We show that if $k_n\log \ell_n$ is sublinear in $n$, then each user can achieve…
▽ More
We consider a Gaussian multiple-access channel with random user activity where the total number of users $\ell_n$ and the average number of active users $k_n$ may be unbounded. For this channel, we characterize the maximum number of bits that can be transmitted reliably per unit-energy in terms of $\ell_n$ and $k_n$. We show that if $k_n\log \ell_n$ is sublinear in $n$, then each user can achieve the single-user capacity per unit-energy. Conversely, if $k_n\log \ell_n$ is superlinear in $n$, then the capacity per unit-energy is zero. We further demonstrate that orthogonal-access schemes, which are optimal when all users are active with probability one, can be strictly suboptimal.
△ Less
Submitted 12 July, 2020; v1 submitted 15 May, 2020;
originally announced May 2020.
-
Demand-Private Coded Caching and the Exact Trade-off for N=K=2
Authors:
Sneha Kamath,
Jithin Ravi,
Bikash Kumar Dey
Abstract:
The distributed coded caching problem has been studied extensively in the recent past. While the known coded caching schemes achieve an improved transmission rate, they violate the privacy of the users since in these schemes the demand of one user is revealed to others in the delivery phase. In this paper, we consider the coded caching problem under the constraint that the demands of the other use…
▽ More
The distributed coded caching problem has been studied extensively in the recent past. While the known coded caching schemes achieve an improved transmission rate, they violate the privacy of the users since in these schemes the demand of one user is revealed to others in the delivery phase. In this paper, we consider the coded caching problem under the constraint that the demands of the other users remain information theoretically secret from each user. We first show that the memory-rate pair $(M,\min \{N,K\}(1-M/N))$ is achievable under information theoretic demand privacy, while using broadcast transmissions. We then show that a demand-private scheme for $N$ files and $K$ users can be obtained from a non-private scheme that satisfies only a restricted subset of demands of $NK$ users for $N$ files. We then focus on the demand-private coded caching problem for $K=2$ users, $N=2$ files. We characterize the exact memory-rate trade-off for this case. To show the achievability, we use our first result to construct a demand-private scheme from a non-private scheme satisfying a restricted demand subset that is known from an earlier work by Tian. Further, by giving a converse based on the extra requirement of privacy, we show that the obtained achievable region is the exact memory-rate trade-off.
△ Less
Submitted 18 February, 2020; v1 submitted 16 November, 2019;
originally announced November 2019.
-
Capacity per Unit-Energy of Gaussian Many-Access Channels
Authors:
Jithin Ravi,
Tobias Koch
Abstract:
We consider a Gaussian multiple-access channel where the number of transmitters grows with the blocklength $n$. For this setup, the maximum number of bits that can be transmitted reliably per unit-energy is analyzed. We show that if the number of users is of an order strictly above $n/\log n$, then the users cannot achieve any positive rate per unit-energy. In contrast, if the number of users is o…
▽ More
We consider a Gaussian multiple-access channel where the number of transmitters grows with the blocklength $n$. For this setup, the maximum number of bits that can be transmitted reliably per unit-energy is analyzed. We show that if the number of users is of an order strictly above $n/\log n$, then the users cannot achieve any positive rate per unit-energy. In contrast, if the number of users is of order strictly below $n/\log n$, then each user can achieve the single-user capacity per unit-energy $(\log e)/N_0$ (where $N_0/ 2$ is the noise power) by using an orthogonal access scheme such as time division multiple access. We further demonstrate that orthogonal codebooks, which achieve the capacity per unit-energy when the number of users is bounded, can be strictly suboptimal.
△ Less
Submitted 26 April, 2019;
originally announced April 2019.
-
Interactive Secure Function Computation
Authors:
Deepesh Data,
Gowtham R. Kurri,
Jithin Ravi,
Vinod M. Prabhakaran
Abstract:
We consider interactive computation of randomized functions between two users with the following privacy requirement: the interaction should not reveal to either user any extra information about the other user's input and output other than what can be inferred from the user's own input and output. We also consider the case where privacy is required against only one of the users. For both cases, we…
▽ More
We consider interactive computation of randomized functions between two users with the following privacy requirement: the interaction should not reveal to either user any extra information about the other user's input and output other than what can be inferred from the user's own input and output. We also consider the case where privacy is required against only one of the users. For both cases, we give single-letter expressions for feasibility and optimal rates of communication. Then we discuss the role of common randomness and interaction in both privacy settings. We also study perfectly secure non-interactive computation when only one of the users computes a randomized function based on a single transmission from the other user. We characterize randomized functions which can be perfectly securely computed in this model and obtain tight bounds on the optimal message lengths in all the privacy settings.
△ Less
Submitted 9 March, 2020; v1 submitted 10 December, 2018;
originally announced December 2018.
-
Broadcast Function Computation with Complementary Side Information
Authors:
Jithin Ravi,
Bikash Kumar Dey
Abstract:
We consider the function computation problem in a three node network with one encoder and two decoders. The encoder has access to two correlated sources $X$ and $Y$. The encoder encodes $X^n$ and $Y^n$ into a message which is given to two decoders. Decoder 1 and decoder 2 have access to $X$ and $Y$ respectively, and they want to compute two functions $f(X,Y)$ and $g(X,Y)$ respectively using the en…
▽ More
We consider the function computation problem in a three node network with one encoder and two decoders. The encoder has access to two correlated sources $X$ and $Y$. The encoder encodes $X^n$ and $Y^n$ into a message which is given to two decoders. Decoder 1 and decoder 2 have access to $X$ and $Y$ respectively, and they want to compute two functions $f(X,Y)$ and $g(X,Y)$ respectively using the encoded message and their respective side information. We want to find the optimum (minimum) encoding rate under the zero error and $ε$-error (i.e. vanishing error) criteria. For the special case of this problem with $f(X,Y) = Y$ and $g(X,Y) = X$, we show that the $ε$-error optimum rate is also achievable with zero error. This result extends to a more general `complementary delivery index coding' problem with arbitrary number of messages and decoders. For other functions, we show that the cut-set bound is achievable under $ε$-error if $X$ and $Y$ are binary, or if the functions are from a special class of `compatible' functions which includes the case $f=g$.
△ Less
Submitted 4 October, 2016;
originally announced October 2016.
-
Function Computation through a Bidirectional Relay
Authors:
Jithin Ravi,
Bikash Kumar Dey
Abstract:
We consider a function computation problem in a three node wireless network. Nodes A and B observe two correlated sources $X$ and $Y$ respectively, and want to compute a function $f(X,Y)$. To achieve this, nodes A and B send messages to a relay node C at rates $R_A$ and $R_B$ respectively. The relay C then broadcasts a message to A and B at rate $R_C$. We allow block coding, and study the achievab…
▽ More
We consider a function computation problem in a three node wireless network. Nodes A and B observe two correlated sources $X$ and $Y$ respectively, and want to compute a function $f(X,Y)$. To achieve this, nodes A and B send messages to a relay node C at rates $R_A$ and $R_B$ respectively. The relay C then broadcasts a message to A and B at rate $R_C$. We allow block coding, and study the achievable region of rate triples under both zero-error and $ε$-error. As a preparation, we first consider a broadcast network from the relay to A and B. A and B have side information $X$ and $Y$ respectively. The relay node C observes both $X$ and $Y$ and broadcasts an encoded message to A and B. We want to obtain the optimal broadcast rate such that A and B can recover the function $f(X,Y)$ from the received message and their individual side information $X$ and $Y$ respectively. For this problem, we show equivalence between $ε$-error and zero-error computations-- this gives a rate characterization for zero-error computation. As a corollary, this also gives a rate characterization for the relay network under zero-error for a class of functions called {\em component-wise one-to-one functions} when the support set of $p_{XY}$ is full. For the relay network, the zero-error rate region for arbitrary functions is characterized in terms of graph coloring of some suitably defined probabilistic graphs. We then give a single-letter inner bound to this rate region. Further, we extend the graph theoretic ideas to address the $ε$-error problem and obtain a single-letter inner bound.
△ Less
Submitted 27 October, 2018; v1 submitted 26 September, 2016;
originally announced September 2016.
-
Oblivious Transfer over Wireless Channels
Authors:
Jithin Ravi,
Bikash Kumar Dey,
Emanuele Viterbo
Abstract:
We consider the problem of oblivious transfer (OT) over OFDM and MIMO wireless communication systems where only the receiver knows the channel state information. The sender and receiver also have unlimited access to a noise-free real channel. Using a physical layer approach, based on the properties of the noisy fading channel, we propose a scheme that enables the transmitter to send obliviously on…
▽ More
We consider the problem of oblivious transfer (OT) over OFDM and MIMO wireless communication systems where only the receiver knows the channel state information. The sender and receiver also have unlimited access to a noise-free real channel. Using a physical layer approach, based on the properties of the noisy fading channel, we propose a scheme that enables the transmitter to send obliviously one-of-two files, i.e., without knowing which one has been actually requested by the receiver, while also ensuring that the receiver does not get any information about the other file.
△ Less
Submitted 4 August, 2015;
originally announced August 2015.
-
Zero-Error Function Computation through a Bidirectional Relay
Authors:
Jithin Ravi,
Bikash Kumar Dey
Abstract:
We consider zero error function computation in a three node wireless network. Nodes A and B observe $X$ and $Y$ respectively, and want to compute a function $f(X,Y)$ with zero error. To achieve this, nodes A and B send messages to a relay node C at rates $R_A$ and $R_B$ respectively. The relay C then broadcasts a message to A and B at rate $R_C$ to help them compute $f(X,Y)$ with zero error. We al…
▽ More
We consider zero error function computation in a three node wireless network. Nodes A and B observe $X$ and $Y$ respectively, and want to compute a function $f(X,Y)$ with zero error. To achieve this, nodes A and B send messages to a relay node C at rates $R_A$ and $R_B$ respectively. The relay C then broadcasts a message to A and B at rate $R_C$ to help them compute $f(X,Y)$ with zero error. We allow block coding, and study the region of rate-triples $(R_A,R_B,R_C)$ that are feasible. The rate region is characterized in terms of graph coloring of some suitably defined probabilistic graphs. We give single letter inner and outer bounds which meet for some simple examples. We provide a sufficient condition on the joint distribution $p_{XY}$ under which the relay can also compute $f(X,Y)$ if A and B can compute it with zero error.
△ Less
Submitted 25 November, 2014;
originally announced November 2014.