### Abstract

A code design problem for memory devices with restricted state transitions is formulated as a combinatorial optimization problem that is called a subgraph domatic partition (subDP) problem. If any neighbor set of a given state transition graph contains all the colors, then the coloring is said to be valid. The goal of a subDP problem is to find the valid coloring that has the largest number of colors for a subgraph of a given directed graph. The number of colors in an optimal valid coloring indicates the writing capacity of that state transition graph. The subDP problems are computationally hard; it is proved to be NP-complete in this paper. One of our main contributions in this paper is to show the asymptotic behavior of the writing capacity C(G) for sequences of dense bidirectional graphs; this is given by C(G) = Ω(n/ ln n), where n is the number of nodes. A probabilistic method, Lovász local lemma (LLL), plays an essential role in deriving the asymptotic expression.

Original language | English |
---|---|

Title of host publication | Proceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015 |

Publisher | Institute of Electrical and Electronics Engineers Inc. |

Pages | 1307-1311 |

Number of pages | 5 |

ISBN (Electronic) | 9781467377041 |

DOIs | |

Publication status | Published - Sep 28 2015 |

Event | IEEE International Symposium on Information Theory, ISIT 2015 - Hong Kong, Hong Kong Duration: Jun 14 2015 → Jun 19 2015 |

### Publication series

Name | IEEE International Symposium on Information Theory - Proceedings |
---|---|

Volume | 2015-June |

ISSN (Print) | 2157-8095 |

### Other

Other | IEEE International Symposium on Information Theory, ISIT 2015 |
---|---|

Country | Hong Kong |

City | Hong Kong |

Period | 6/14/15 → 6/19/15 |

### All Science Journal Classification (ASJC) codes

- Theoretical Computer Science
- Information Systems
- Modelling and Simulation
- Applied Mathematics

## Fingerprint Dive into the research topics of 'Subgraph domatic problem and writing capacity of memory devices with restricted state transitions'. Together they form a unique fingerprint.

## Cite this

*Proceedings - 2015 IEEE International Symposium on Information Theory, ISIT 2015*(pp. 1307-1311). [7282667] (IEEE International Symposium on Information Theory - Proceedings; Vol. 2015-June). Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/ISIT.2015.7282667