A New Approach to Compute Information Theoretic Outer Bounds and Its Application to Regenerating Codes

05/03/2022
by   Wenjing Chen, et al.
0

The study of the fundamental limits of information systems is a central theme in information theory. Both the traditional analytical approach and the recently proposed computational approach have significant limitations, where the former is mainly due to its reliance on human ingenuity, and the latter due to its exponential memory and computational complexity. In this work, we propose a new computational approach to tackle the problem with much lower memory and computational requirements, which can naturally utilize certain intuitions, but also can maintain the strong computational advantage of the existing computational approach. A reformulation of the underlying optimization problem is first proposed, which converts the large linear program to a maximin problem. This leads to an iterative solving procedure, which uses the LP dual to carry over learned evidence between iterations. The key in the reformulated problem is the selection of good information inequalities, with which a relaxed LP can be formed. A particularly powerful intuition is a potentially optimal code construction, and we provide a method that directly utilizes it in the new algorithm. As an application, we derive a tighter outer bound for the storage-repair tradeoff for the (6,5,5) regenerating code problem, which involves at least 30 random variables and is impossible to compute with the previously known computational approach.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
08/03/2020

New Results on the Storage-Retrieval Tradeoff in Private Information Retrieval Systems

In a private information retrieval (PIR) system, the user needs to retri...
research
10/18/2019

An Open-Source Toolbox for Computer-Aided Investigation on the Fundamental Limits of Information Systems, Version 0.1

We provide an open source toolbox at https://github.com/ct2641/CAI/relea...
research
11/07/2017

Iterative Computation of Security Strategies of Matrix Games with Growing Action Set

This paper studies how to efficiently update the saddle-point strategy, ...
research
01/29/2021

An Automated Theorem Proving Framework for Information-Theoretic Results

We present a versatile automated theorem proving framework which is capa...
research
01/05/2023

A Shannon-Theoretic Approach to the Storage-Retrieval Tradeoff in PIR Systems

We consider the storage-retrieval rate tradeoff in private information r...
research
02/06/2022

Proving Information Inequalities and Identities with Symbolic Computation

Proving linear inequalities and identities of Shannon's information meas...

Please sign up or login with your details

Forgot password? Click here to reset