• Tidak ada hasil yang ditemukan

The three canonical configurations

be zero(s), and vice versa withs1. Other states are abbreviated with their first initials in Equation5.11.

h

1

h

2

h

1

h

2

h

1

h h

h3

v

1

v

2

v v

1

Con f i g ur ati on1 Con f i g ur ati on2

0 12 21 0 12 21

h1 h2 Vh h v1 v2 h v1 v2 h h v h2 h v h1 h

s0 s0 0+ p 0 0 e 0 0 e s1 0 v e 0 v e

s0 s0 0+e p 0 0 s1 0 0 s1 p 0 v s1 0 v s1

s0 s0 0+e+ p 0 0 p 0 0 p p 0 v p 0 v p

s0 s0 0+1 s0 0 0 v 0 0 v s0 0 v v 0 v v s0 s0 0+1e s0 0 0 s0 0 0 s0 s0 0 v s0 0 v s0 s0 s0 0+1e+ s0 0 0 s0 0 0 s0 s0 0 v s0 0 v s0

s0 s1 0+ p 0 1 v 0 1 v s1 0 e v 1 e v

s0 s1 0+e p 0 1 s0 0 1 s0 p 0 e s0 1 e s0 s0 s1 0+e+ p 0 1 s0 0 1 s0 p 0 e s0 1 e s0 s0 s1 0+1 s0 0 1 e 0 1 e s0 0 e e 1 e e s0 s1 0+1e s0 0 1 e 0 1 e s0 0 e e 1 e e s0 s1 0+1e+ s0 0 1 e 0 1 e s0 0 e e 1 e e

s1 s0 0+ p 1 0 v 1 0 v s1 1 e e 0 e e

s1 s0 0+e p 1 0 s0 1 0 s0 p 1 e s1 0 e s1 s1 s0 0+e+ p 1 0 s0 1 0 s0 p 1 e p 0 e p s1 s0 0+1 s0 1 0 e 1 0 e s0 1 e v 0 e v s1 s0 0+1e s0 1 0 e 1 0 e s0 1 e s0 0 e s0 s1 s0 0+1e+ s0 1 0 e 1 0 e s0 1 e s0 0 e s0

s1 s1 0+ p 1 1 e 1 1 e s1 1 v v 1 v v

s1 s1 0+e p 1 1 e 1 1 e p 1 v s0 1 v s0 s1 s1 0+e+ p 1 1 e 1 1 e p 1 v s0 1 v s0

s1 s1 0+1 s0 1 1 e 1 1 e s0 1 v e 1 v e s1 s1 0+1e s0 1 1 e 1 1 e s0 1 v e 1 v e s1 s1 0+1e+ s0 1 1 e 1 1 e s0 1 v e 1 v e

Table 1: The first two configurations

Having proven that SOLVEreturns a unique answer regardless of the order in which the sol ve nodes are processed, we address the issue of handling the stopping sets. SOLVE

is called (recursively) by another procedure called DECODE, shown in Listing2. The recursion is initiated by executing DECODE(X,1). The parametermaxsol controls the maximum number of results returned by DECODE, making it a variablelist decoder.

Line5requires explanation: the row, column, block, and erasures mentioned there refer to theq-aryS, not the binaryS. For instance, if the first row has only three erasures, while the other rows, columns, and blocks have more erasures, thenxrefers to the first

row. Ifq=9 and the missing numbers inxare 3, 4, and 7, then there are 3! possible ways to place these numbers intox, each potentially leading to a solution, which is stored in Y. EachyY is then passed as a context to SOLVE, which tries to find a solution within y.

In conclusion, in this paper we have presented an iterative algorithm that can be used to decode (and solve) the Latin and Sudoku codes (and puzzles). We proved that the algorithm returns consistent solutions regardless of the path taken to compute them.

An interesting question for future research is whether the same decoding algorithm can be adapted to solve Sudoku puzzles with symbol errors (instead of erasures).

BIBLIOGRAPHY

[1] R. O’Dell, R. Wattenhofer, “Information dissemination in highly dynamic graphs,” DIALM-POMC 2005, Cologne, Germany 2005.

[2] H. Dubois-Ferriere, et al., “Age matters: efficient route discovery in mobile ad-hoc networks using encounter ages,” Proc. of MobiHoc 2004.

[3] E. Gafni, D. Bertsekas, “Distributed algorithms for generating loop-free routes in networks with frequently changing topology,” IEEE Trans. Comm., vol. 29, no. 1, 1981.

[4] Z.J. Haas, M.R. Pearlman, P. Samar, “ZRP: A hybrid framework for routing in ad-hoc networks,”Ad Hoc Networking, Addison-Wesley, 2001.

[5] D.B. Johnson, et al., “DSR: The dynamic source routing protocol for multi-hop wire- less ad hoc networks”,Ad Hoc Networking. Addison-Wesley, 2001.

[6] F. Kuhn, R. Wattenhofer, Y. Zhang, A. Zollinger, “Geometric ad-hoc routing: Of the- ory and practice,”Proceedings of PODC, 2003.

[7] A. Lindgren, A. Doria, O. Schelen, “Probabilistic Routing in Intermittently Con- nected Network,”Proceedings of SAPIR 2004, Brazil, 2004.

[8] C.E. Perkins, E.M. Royer. “Ad-hoc on-demand distance vector routing,”Proceedings of WMCSA 1999.

[9] P. Samar, et al., “Independent Zone Routing: An adaptive hybrid routing framework for ad hoc wireless networks,”IEEE/ACM TON, vol. 12, no. 4, 2004.

[10] A. Vahdat, D. Becker. “Epidemic routing for partially connected ad-hoc networks,”

Technical Report CS-200006, Duke University, April 2000.

[11] L. Lamport, R. Shostak, M. Pease, “The Byzantine generals problem,”ACM Trans.

Program. Lang. Syst. 4,vol. 3, pp. 382–401.

[12] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam, E. Cayirci, “A Survey on Sensor Net- works,”IEEE Communications Magazine, August 2002.

[13] F. Zhao, L. Guibas,Wireless Sensor Networks: An Information Processing Approach, Morgan Kaufmann, 2004.

[14] M. Raynal,Distributed Algorithms and Protocols, John Wiley, 1988.

[15] R. Olfati-Saber, R.M. Murray, “Consensus problems in networks of agents with switching topology and time-delays.”The IEEE Transactions on Automatic Control, vol. 49, no. 9, pp. 1520–1533, September 2004.

[16] R. Olfati-Saber, R.M. Murray, “Consensus protocols for networks of dynamic agents,”Proc. of the Amer. Cont. Conf., vol. 2, pp. 951–956, June 2003.

[17] R. Olfati-Saber, R.M. Murray, “Flocking with Obstacle Avoidance: Cooperation with Limited Communication in Mobile Networks.”Proc. of the 42nd IEEE Conf. on Dec.

and Control, vol. 2, pp. 2022–2028, Dec. 2003.

[18] W. Ren, R.W. Beard, “Consensus of Information Under Dynamically Changing In- teraction Topologies.”Proc. of the Amer. Cont. Conf., 2004.

[19] A. Tahbaz-Salehi, A. Jadbabaie, “On Consensus Over Random Networks”, Proc. of the 44th Annual Allerton Conference, Sept 2006.

[20] S.C. Wang, Y.H. Chin, K.Q. Yan, “Byzantine Agreement in a Generalized Connected Network,”IEEE Trans. Par. and Dist. Systems., vol. 6, pp. 420–427, April 1995.

[21] O. Babaoglu, R. Drummond, “Streets of Byzantium: Network architectures for fast reliable broadcasts,”IEEE Trans. Software Eng., vol. SE-11, pp. 546–554, June 1985.

[22] 0. Babaoglu, P. Stephenson, R. Drummond, “Reliable broadcasts and communica- tion models: Tradeoffs and lower bounds,” Dist. Computing, vol. 2, pp. 177–189, 1988.

[23] A. Bar-Noy, D. Dolev, C. Dwork, R. Strong, “Shifting gears: Changing algorithms on the fly to expedite Byzantine Agreement,”Proc. Symp. Principles Dist. Computing, pp. 42–51, 1987.

[24] K.M. Chandy, J. Misra, Parallel Program Design: A Foundation. Addison-Wesley, Reading, MA, 1988.

[25] D. Dolev, R. Reischuk, “Bounds on information exchange for Byzantine Agree- ment,”JACM, vol. 32, no. 1, pp. 191–204, Jan. 1985.

[26] M. Fischer, “The consensus problem in unreliable distributed systems (a brief sur- vey),”Lecture notes in computer science, in Proc. 1983 Int. FCT-Con. Borgholm, Swe- den, pp. 127–140, Aug. 1983.

[27] B.M. McMillin, L.M. Ni, “Byzantine fault-tolerance through application oriented specification,”Proc. COMPASAC87, pp. 347–353, 1987.

[28] R. Reischuk, “A new solution for the Byzantine generals problem,”IBM Res. Rep., RJ–3673, Computer Science, 1982.

[29] R. Turpin, B. Coan, “Extending binary Byzantine agreement to multivalued Byzan- tine agreement”,Process, Lett., vol. 18, pp. 73–76, 1984.

[30] R.C. Read, R.J. Wilson,An Atlas of Graphs. Oxford University Press, Oxford, England, 1998.

[31] N.J.A. Sloane, The On-Line Encyclopedia of Integer Sequences, Sequences A006820/M1617, A033301, and A033483.

[32] Contributors, “Sudoku”, Wikipedia, The Free Encyclopedia,

http://en.wikipedia.org/w/ index.php?title=Sudoku, January 2006.

[33] D.J.C. MacKay,Information Theory, Inference, and Learning Algorithms, Cambridge University Press, 2003.

[34] R.M. Tanner, “A Recursive Approach to Low Complexity Codes”,IEEE Trans. on In- formation Theory, vol. 27, no. 5, pp. 533–547, Sept 1981.

6

Additional Topics

HISchapter contains two sections that discuss additional topics in the area of (1) error-correcting codes and their relationships to combinatorial structures, and (2) application of message-passing algorithms in games of perfect information.

In Chapter 5we discussed the close relationship between binary LDPC codes and Latin (or Sudoku) Squares. In the first section, we will discuss the close relationship between MDC codes and ternary Latin hypersquares. We prove that everyq-ary MDS code of lengthnand distance 2 can be uniquely represented by a Latin square of order q. By counting the total number of the latter, we count the total number of the former.

In our analysis, we define a Latin hypersquare as a generalization of a Latin square.

Suppose we represent each letter in the ternary alphabet by three colored cubes: white, grey, and black. Hypercubes of dimensions 0, 1, 2, and 3 can be represented by a single cube, an array of three cubes, a 3×3 square of nine cubes, and a 3×3×3 block of 27 cubes, as shown in Figure6.1.

(a) (b) (c) (d)