185 research outputs found

    On Generalizations of Network Design Problems with Degree Bounds

    Get PDF
    Iterative rounding and relaxation have arguably become the method of choice in dealing with unconstrained and constrained network design problems. In this paper we extend the scope of the iterative relaxation method in two directions: (1) by handling more complex degree constraints in the minimum spanning tree problem (namely, laminar crossing spanning tree), and (2) by incorporating `degree bounds' in other combinatorial optimization problems such as matroid intersection and lattice polyhedra. We give new or improved approximation algorithms, hardness results, and integrality gaps for these problems.Comment: v2, 24 pages, 4 figure

    Ideal hierarchical secret sharing schemes

    Get PDF
    Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention from the invention of secret sharing until nowadays. Several constructions of ideal hierarchical secret sharing schemes have been proposed, but it was not known what access structures admit such a scheme. We solve this problem by providing a natural definition for the family of the hierarchical access structures and, more importantly, by presenting a complete characterization of the ideal hierarchical access structures, that is, the ones admitting an ideal secret sharing scheme. Our characterization deals with the properties of the hierarchically minimal sets of the access structure, which are the minimal qualified sets whose participants are in the lowest possible levels in the hierarchy. By using our characterization, it can be efficiently checked whether any given hierarchical access structure that is defined by its hierarchically minimal sets is ideal. We use the well known connection between ideal secret sharing and matroids and, in particular, the fact that every ideal access structure is a matroid port. In addition, we use recent results on ideal multipartite access structures and the connection between multipartite matroids and integer polymatroids. We prove that every ideal hierarchical access structure is the port of a representable matroid and, more specifically, we prove that every ideal structure in this family admits ideal linear secret sharing schemes over fields of all characteristics. In addition, methods to construct such ideal schemes can be derived from the results in this paper and the aforementioned ones on ideal multipartite secret sharing. Finally, we use our results to find a new proof for the characterization of the ideal weighted threshold access structures that is simpler than the existing one.Peer ReviewedPostprint (author's final draft

    On Achievable Rate Region of Multiple Coordinated Multiple Access Channels

    Get PDF
    Coordination between two or more multiple access channel (MAC) receivers can enlarge the achievable rate region of the whole system. This paper focuses on coordination by sharing the codebooks of the users between the receivers of MACs. We first define the achievable rate region of the time invariant multiple coordinated MAC (MCMAC) and subsequently derive its achievable rate region. We later express the achievable rate region in terms of the dominating points. We base our numerical analysis on the two-user two-receiver Gaussian coordinated MAC and make comparison with the interference channel, full cooperation and the individual MAC performance analysis. It is observed that this approach though suboptimal is less complex in comparison with full cooperation and that the MCMAC rate region is at least equal to the rate region of the uncoordinated approach. Over several channel states, the rate region of MCMAC exceeds that of the uncoordinated approach
    • …
    corecore