entropy-logo

Journal Browser

Journal Browser

Extremal and Additive Combinatorial Aspects in Information Theory

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Information Theory, Probability and Statistics".

Deadline for manuscript submissions: closed (15 September 2024) | Viewed by 13890

Special Issue Editor


E-Mail Website
Guest Editor
1. Andrew & Erna Viterbi Faculty of Electrical and Computer Engineering, Technion—Israel Institute of Technology, Haifa 3200003, Israel
2. Faculty of Mathematics, Technion—Israel Institute of Technology, Haifa 3200003, Israel
Interests: information theory; coding theory; probability theory; combinatorics
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Extremal combinatorics deals with the problem of determining or bounding the maximum or minimum possible cardinality of a finite set of objects which satisfies certain requirements. Many interesting problems in extremal combinatorics are motivated by fundamental questions in information theory such as the Shannon capacity of graphs and its connection to Ramsey numbers and to perfect graphs, the zero-error capacity of communication channels, and Witsenhausen’s rate for graphs. The Shannon entropy and other classical information measures also serve as powerful tools in proving various extremal combinatorial and graph-theoretic results, such as Shearer’s lemma and its applications in extremal combinatorics and graph theory, the submodularity properties of information measures and their utility in the derivation of information inequalities and bounds in extremal graph theory, entropy-based proofs of combinatorial results such as Bregman’s theorem in matrix theory, Spencer’s theorem in discrepancy theory, problems related to intersection families in extremal set theory, and bounds for locally decodable codes.

Additive combinatorics (or arithmetic combinatorics) is a branch of mathematics which lies at the intersection of combinatorics, number theory, Fourier analysis, and ergodic theory. It has deep connections to information inequalities such as entropy inequalities for sums and differences of random variables with their relationship to probability limit theorems, and the adaptation of an information-theoretic approach for the study of sumset inequalities in additive combinatorics. Additionally, Szemeredi’s regularity lemma is a tool in graph theory that plays an important role in additive combinatorics; it was revisited by Tao from the perspective of information theory and probability theory, followed by a strengthening of this lemma.

 It is the purpose of this Special Issue to explore recent developments in extremal and additive combinatorics from the perspective of information theory. Topics of interest include, but are not limited to:

  • Information-theoretic proofs in extremal combinatorics;
  • Zero-error information theory;
  • Graph capacities and graph entropy;
  • Graph-theoretic results by information-theoretic tools;
  • Connections between extremal set theory and information theory;
  • Multiuser problems for special channels, and their relation to extremal and additive combinatorics;
  • Information inequalities and additive combinatorics;
  • Applications of additive combinatorics in information theory problems.

Prof. Dr. Igal Sason
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (8 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

21 pages, 527 KiB  
Article
Bipartite Unique Neighbour Expanders via Ramanujan Graphs
by Ron Asherov and Irit Dinur
Entropy 2024, 26(4), 348; https://doi.org/10.3390/e26040348 - 20 Apr 2024
Cited by 4 | Viewed by 1288
Abstract
We construct an infinite family of bounded-degree bipartite unique neighbour expander graphs with arbitrarily unbalanced sides. Although weaker than the lossless expanders constructed by Capalbo et al., our construction is simpler and may be closer to being implementable in practice, due to the [...] Read more.
We construct an infinite family of bounded-degree bipartite unique neighbour expander graphs with arbitrarily unbalanced sides. Although weaker than the lossless expanders constructed by Capalbo et al., our construction is simpler and may be closer to being implementable in practice, due to the smaller constants. We construct these graphs by composing bipartite Ramanujan graphs with a fixed-size gadget in a way that generalises the construction of unique neighbour expanders by Alon and Capalbo. For the analysis of our construction, we prove a strong upper bound on average degrees in small induced subgraphs of bipartite Ramanujan graphs. Our bound generalises Kahale’s average degree bound to bipartite Ramanujan graphs, and may be of independent interest. Surprisingly, our bound strongly relies on the exact Ramanujan-ness of the graph and is not known to hold for nearly-Ramanujan graphs. Full article
(This article belongs to the Special Issue Extremal and Additive Combinatorial Aspects in Information Theory)
Show Figures

Figure 1

18 pages, 928 KiB  
Article
Side Information Design in Zero-Error Coding for Computing
by Nicolas Charpenay, Maël Le Treust and Aline Roumy
Entropy 2024, 26(4), 338; https://doi.org/10.3390/e26040338 - 16 Apr 2024
Viewed by 1296
Abstract
We investigate the zero-error coding for computing problems with encoder side information. An encoder provides access to a source X and is furnished with side information g(Y). It communicates with a decoder that possesses side information Y and aims [...] Read more.
We investigate the zero-error coding for computing problems with encoder side information. An encoder provides access to a source X and is furnished with side information g(Y). It communicates with a decoder that possesses side information Y and aims to retrieve f(X,Y) with zero probability of error, where f and g are assumed to be deterministic functions. In previous work, we determined a condition that yields an analytic expression for the optimal rate R*(g); in particular, it covers the case where PX,Y is full support. In this article, we review this result and study the side information design problem, which consists of finding the best trade-offs between the quality of the encoder’s side information g(Y) and R*(g). We construct two greedy algorithms that give an achievable set of points in the side information design problem, based on partition refining and coarsening. One of them runs in polynomial time. Full article
(This article belongs to the Special Issue Extremal and Additive Combinatorial Aspects in Information Theory)
Show Figures

Figure 1

16 pages, 285 KiB  
Article
Entropic Bounds on the Average Length of Codes with a Space
by Roberto Bruno and Ugo Vaccaro
Entropy 2024, 26(4), 283; https://doi.org/10.3390/e26040283 - 26 Mar 2024
Viewed by 912
Abstract
We consider the problem of constructing prefix-free codes in which a designated symbol, a space, can only appear at the end of codewords. We provide a linear-time algorithm to construct almost-optimal codes with this property, meaning that their average length differs [...] Read more.
We consider the problem of constructing prefix-free codes in which a designated symbol, a space, can only appear at the end of codewords. We provide a linear-time algorithm to construct almost-optimal codes with this property, meaning that their average length differs from the minimum possible by at most one. We obtain our results by uncovering a relation between our class of codes and the class of one-to-one codes. Additionally, we derive upper and lower bounds to the average length of optimal prefix-free codes with a space in terms of the source entropy. Full article
(This article belongs to the Special Issue Extremal and Additive Combinatorial Aspects in Information Theory)
32 pages, 660 KiB  
Article
Smoothing of Binary Codes, Uniform Distributions, and Applications
by Madhura Pathegama and Alexander Barg
Entropy 2023, 25(11), 1515; https://doi.org/10.3390/e25111515 - 5 Nov 2023
Cited by 2 | Viewed by 1260
Abstract
The action of a noise operator on a code transforms it into a distribution on the respective space. Some common examples from information theory include Bernoulli noise acting on a code in the Hamming space and Gaussian noise acting on a lattice in [...] Read more.
The action of a noise operator on a code transforms it into a distribution on the respective space. Some common examples from information theory include Bernoulli noise acting on a code in the Hamming space and Gaussian noise acting on a lattice in the Euclidean space. We aim to characterize the cases when the output distribution is close to the uniform distribution on the space, as measured by the Rényi divergence of order α(1,]. A version of this question is known as the channel resolvability problem in information theory, and it has implications for security guarantees in wiretap channels, error correction, discrepancy, worst-to-average case complexity reductions, and many other problems. Our work quantifies the requirements for asymptotic uniformity (perfect smoothing) and identifies explicit code families that achieve it under the action of the Bernoulli and ball noise operators on the code. We derive expressions for the minimum rate of codes required to attain asymptotically perfect smoothing. In proving our results, we leverage recent results from harmonic analysis of functions on the Hamming space. Another result pertains to the use of code families in Wyner’s transmission scheme on the binary wiretap channel. We identify explicit families that guarantee strong secrecy when applied in this scheme, showing that nested Reed–Muller codes can transmit messages reliably and securely over a binary symmetric wiretap channel with a positive rate. Finally, we establish a connection between smoothing and error correction in the binary symmetric channel. Full article
(This article belongs to the Special Issue Extremal and Additive Combinatorial Aspects in Information Theory)
Show Figures

Figure 1

15 pages, 343 KiB  
Article
Assisted Identification over Modulo-Additive Noise Channels
by Amos Lapidoth and Baohua Ni
Entropy 2023, 25(9), 1314; https://doi.org/10.3390/e25091314 - 8 Sep 2023
Viewed by 1008
Abstract
The gain in the identification capacity afforded by a rate-limited description of the noise sequence corrupting a modulo-additive noise channel is studied. Both the classical Ahlswede–Dueck version and the Ahlswede–Cai–Ning–Zhang version, which does not allow for missed identifications, are studied. Irrespective of whether [...] Read more.
The gain in the identification capacity afforded by a rate-limited description of the noise sequence corrupting a modulo-additive noise channel is studied. Both the classical Ahlswede–Dueck version and the Ahlswede–Cai–Ning–Zhang version, which does not allow for missed identifications, are studied. Irrespective of whether the description is provided to the receiver, to the transmitter, or to both, the two capacities coincide and both equal the helper-assisted Shannon capacity. Full article
(This article belongs to the Special Issue Extremal and Additive Combinatorial Aspects in Information Theory)
10 pages, 288 KiB  
Article
Dimension-Free Bounds for the Union-Closed Sets Conjecture
by Lei Yu
Entropy 2023, 25(5), 767; https://doi.org/10.3390/e25050767 - 8 May 2023
Cited by 6 | Viewed by 1538
Abstract
The union-closed sets conjecture states that, in any nonempty union-closed family F of subsets of a finite set, there exists an element contained in at least a proportion 1/2 of the sets of F. Using an information-theoretic method, Gilmer recently [...] Read more.
The union-closed sets conjecture states that, in any nonempty union-closed family F of subsets of a finite set, there exists an element contained in at least a proportion 1/2 of the sets of F. Using an information-theoretic method, Gilmer recently showed that there exists an element contained in at least a proportion 0.01 of the sets of such F. He conjectured that their technique can be pushed to the constant 352 which was subsequently confirmed by several researchers including Sawin. Furthermore, Sawin also showed that Gilmer’s technique can be improved to obtain a bound better than 352 but this new bound was not explicitly given by Sawin. This paper further improves Gilmer’s technique to derive new bounds in the optimization form for the union-closed sets conjecture. These bounds include Sawin’s improvement as a special case. By providing cardinality bounds on auxiliary random variables, we make Sawin’s improvement computable and then evaluate it numerically, which yields a bound approximately 0.38234, slightly better than 3520.38197. Full article
(This article belongs to the Special Issue Extremal and Additive Combinatorial Aspects in Information Theory)
40 pages, 613 KiB  
Article
Observations on the Lovász θ-Function, Graph Capacity, Eigenvalues, and Strong Products
by Igal Sason
Entropy 2023, 25(1), 104; https://doi.org/10.3390/e25010104 - 4 Jan 2023
Cited by 3 | Viewed by 2543
Abstract
This paper provides new observations on the Lovász θ-function of graphs. These include a simple closed-form expression of that function for all strongly regular graphs, together with upper and lower bounds on that function for all regular graphs. These bounds are expressed [...] Read more.
This paper provides new observations on the Lovász θ-function of graphs. These include a simple closed-form expression of that function for all strongly regular graphs, together with upper and lower bounds on that function for all regular graphs. These bounds are expressed in terms of the second-largest and smallest eigenvalues of the adjacency matrix of the regular graph, together with sufficient conditions for equalities (the upper bound is due to Lovász, followed by a new sufficient condition for its tightness). These results are shown to be useful in many ways, leading to the determination of the exact value of the Shannon capacity of various graphs, eigenvalue inequalities, and bounds on the clique and chromatic numbers of graphs. Since the Lovász θ-function factorizes for the strong product of graphs, the results are also particularly useful for parameters of strong products or strong powers of graphs. Bounds on the smallest and second-largest eigenvalues of strong products of regular graphs are consequently derived, expressed as functions of the Lovász θ-function (or the smallest eigenvalue) of each factor. The resulting lower bound on the second-largest eigenvalue of a k-fold strong power of a regular graph is compared to the Alon–Boppana bound; under a certain condition, the new bound is superior in its exponential growth rate (in k). Lower bounds on the chromatic number of strong products of graphs are expressed in terms of the order and the Lovász θ-function of each factor. The utility of these bounds is exemplified, leading in some cases to an exact determination of the chromatic numbers of strong products or strong powers of graphs. The present research paper is aimed to have tutorial value as well. Full article
(This article belongs to the Special Issue Extremal and Additive Combinatorial Aspects in Information Theory)
27 pages, 460 KiB  
Article
Hypercontractive Inequalities for the Second Norm of Highly Concentrated Functions, and Mrs. Gerber’s-Type Inequalities for the Second Rényi Entropy
by Niv Levhari and Alex Samorodnitsky
Entropy 2022, 24(10), 1376; https://doi.org/10.3390/e24101376 - 27 Sep 2022
Cited by 1 | Viewed by 1390
Abstract
Let Tϵ, 0ϵ1/2, be the noise operator acting on functions on the boolean cube {0,1}n. Let f be a distribution on {0,1}n and [...] Read more.
Let Tϵ, 0ϵ1/2, be the noise operator acting on functions on the boolean cube {0,1}n. Let f be a distribution on {0,1}n and let q>1. We prove tight Mrs. Gerber-type results for the second Rényi entropy of Tϵf which take into account the value of the qth Rényi entropy of f. For a general function f on {0,1}n we prove tight hypercontractive inequalities for the 2 norm of Tϵf which take into account the ratio between q and 1 norms of f. Full article
(This article belongs to the Special Issue Extremal and Additive Combinatorial Aspects in Information Theory)
Back to TopTop