id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0601131
|
Joel Predd
|
Joel B. Predd, Sanjeev R. Kulkarni, Daniel N. Osherson, and H. Vincent
Poor
|
Scalable Algorithms for Aggregating Disparate Forecasts of Probability
|
To be presented at the Ninth International Conference on Information
Fusion, Florence, Italy, July 10-13, 2006
| null | null | null |
cs.AI cs.DC cs.IT math.IT
| null |
In this paper, computational aspects of the panel aggregation problem are
addressed. Motivated primarily by applications of risk assessment, an algorithm
is developed for aggregating large corpora of internally incoherent probability
assessments. The algorithm is characterized by a provable performance
guarantee, and is demonstrated to be orders of magnitude faster than existing
tools when tested on several real-world data-sets. In addition, unexpected
connections between research in risk assessment and wireless sensor networks
are exposed, as several key ideas are illustrated to be useful in both fields.
|
[
{
"version": "v1",
"created": "Tue, 31 Jan 2006 03:01:35 GMT"
},
{
"version": "v2",
"created": "Mon, 1 May 2006 19:52:13 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Predd",
"Joel B.",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
],
[
"Osherson",
"Daniel N.",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
cs/0602014
|
Amir Leshem
|
Amir Laufer, Amir Leshem, Hagit Messer
|
Game theoretic aspects of distributed spectral coordination with
application to DSL networks
| null | null | null | null |
cs.IT math.IT
| null |
In this paper we use game theoretic techniques to study the value of
cooperation in distributed spectrum management problems. We show that the
celebrated iterative water-filling algorithm is subject to the prisoner's
dilemma and therefore can lead to severe degradation of the achievable rate
region in an interference channel environment. We also provide thorough
analysis of a simple two bands near-far situation where we are able to provide
closed form tight bounds on the rate region of both fixed margin iterative
water filling (FM-IWF) and dynamic frequency division multiplexing (DFDM)
methods. This is the only case where such analytic expressions are known and
all previous studies included only simulated results of the rate region. We
then propose an alternative algorithm that alleviates some of the drawbacks of
the IWF algorithm in near-far scenarios relevant to DSL access networks. We
also provide experimental analysis based on measured DSL channels of both
algorithms as well as the centralized optimum spectrum management.
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2006 00:14:24 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Laufer",
"Amir",
""
],
[
"Leshem",
"Amir",
""
],
[
"Messer",
"Hagit",
""
]
] |
cs/0602015
|
Ahmad Khoshnevis
|
Ahmad Khoshnevis and Ashutosh Sabharwal
|
On the Asymptotic Performance of Multiple Antenna Channels with Fast
Channel Feedback
|
Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
In this paper, we analyze the asymptotic performance of multiple antenna
channels where the transmitter has either perfect or finite bit channel state
information. Using the diversity-multiplexing tradeoff to characterize the
system performance, we demonstrate that channel feedback can fundamentally
change the system behavior. Even one-bit of information can increase the
diversity order of the system compared to the system with no transmitter
information. In addition, as the amount of channel information at the
transmitter increases, the diversity order for each multiplexing gain increases
and goes to infinity for perfect transmitter information. The major reason for
diversity order gain is a "location-dependent" temporal power control, which
adapts the power control strategy based on the average channel conditions of
the channel.
|
[
{
"version": "v1",
"created": "Mon, 6 Feb 2006 07:29:17 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Khoshnevis",
"Ahmad",
""
],
[
"Sabharwal",
"Ashutosh",
""
]
] |
cs/0602028
|
Andrea Montanari
|
Andrea Montanari and David Tse
|
Analysis of Belief Propagation for Non-Linear Problems: The Example of
CDMA (or: How to Prove Tanaka's Formula)
|
5 pages, 3 eps figures, IEEE Information Theory Workshop, Punta del
Este, Uruguay, March 13-17, 2006 (invited)
| null | null | null |
cs.IT math.IT
| null |
We consider the CDMA (code-division multiple-access) multi-user detection
problem for binary signals and additive white gaussian noise. We propose a
spreading sequences scheme based on random sparse signatures, and a detection
algorithm based on belief propagation (BP) with linear time complexity. In the
new scheme, each user conveys its power onto a finite number of chips l, in the
large system limit.
We analyze the performances of BP detection and prove that they coincide with
the ones of optimal (symbol MAP) detection in the l->\infty limit. In the same
limit, we prove that the information capacity of the system converges to
Tanaka's formula for random `dense' signatures, thus providing the first
rigorous justification of this formula. Apart from being computationally
convenient, the new scheme allows for optimization in close analogy with
irregular low density parity check code ensembles.
|
[
{
"version": "v1",
"created": "Tue, 7 Feb 2006 18:56:09 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Montanari",
"Andrea",
""
],
[
"Tse",
"David",
""
]
] |
cs/0602030
|
Mohammed Khan Zafar
|
Md. Zafar ALi Khan and B. Sundar Rajan
|
Single-Symbol Maximum Likelihood Decodable Linear STBCs
|
38 pages, 9 Figures, accepted for publication in IEEE Trans.
Information Theory, 2006
| null | null | null |
cs.IT math.IT
| null |
Space-Time block codes (STBC) from Orthogonal Designs (OD) and Co-ordinate
Interleaved Orthogonal Designs (CIOD) have been attracting wider attention due
to their amenability for fast (single-symbol) ML decoding, and full-rate with
full-rank over quasi-static fading channels. However, these codes are instances
of single-symbol decodable codes and it is natural to ask, if there exist codes
other than STBCs form ODs and CIODs that allow single-symbol coding?
In this paper, the above question is answered in the affirmative by
characterizing all linear STBCs, that allow single-symbol ML decoding (not
necessarily full-diversity) over quasi-static fading channels-calling them
single-symbol decodable designs (SDD). The class SDD includes ODs and CIODs as
proper subclasses. Further, among the SDD, a class of those that offer
full-diversity, called Full-rank SDD (FSDD) are characterized and classified.
|
[
{
"version": "v1",
"created": "Wed, 8 Feb 2006 08:46:34 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Khan",
"Md. Zafar ALi",
""
],
[
"Rajan",
"B. Sundar",
""
]
] |
cs/0602032
|
David Doty
|
David Doty, Jack H. Lutz, Satyadev Nandakumar
|
Finite-State Dimension and Real Arithmetic
|
15 pages
| null | null | null |
cs.CC cs.IT math.IT
| null |
We use entropy rates and Schur concavity to prove that, for every integer k
>= 2, every nonzero rational number q, and every real number alpha, the base-k
expansions of alpha, q+alpha, and q*alpha all have the same finite-state
dimension and the same finite-state strong dimension. This extends, and gives a
new proof of, Wall's 1949 theorem stating that the sum or product of a nonzero
rational number and a Borel normal number is always Borel normal.
|
[
{
"version": "v1",
"created": "Thu, 9 Feb 2006 00:20:30 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Doty",
"David",
""
],
[
"Lutz",
"Jack H.",
""
],
[
"Nandakumar",
"Satyadev",
""
]
] |
cs/0602046
|
Martin Wainwright
|
Emin Martinian, Martin J. Wainwright
|
Analysis of LDGM and compound codes for lossy compression and binning
|
5 pages; to appear in Workshop on Information Theory and its
Applications, February 2006, San Diego
| null | null | null |
cs.IT math.IT
| null |
Recent work has suggested that low-density generator matrix (LDGM) codes are
likely to be effective for lossy source coding problems. We derive rigorous
upper bounds on the effective rate-distortion function of LDGM codes for the
binary symmetric source, showing that they quickly approach the rate-distortion
function as the degree increases. We also compare and contrast the standard
LDGM construction with a compound LDPC/LDGM construction introduced in our
previous work, which provably saturates the rate-distortion bound with finite
degrees. Moreover, this compound construction can be used to generate nested
codes that are simultaneously good as source and channel codes, and are hence
well-suited to source/channel coding with side information. The sparse and
high-girth graphical structure of our constructions render them well-suited to
message-passing encoding.
|
[
{
"version": "v1",
"created": "Mon, 13 Feb 2006 03:07:28 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Martinian",
"Emin",
""
],
[
"Wainwright",
"Martin J.",
""
]
] |
cs/0602050
|
Amir Avestimehr
|
Salman Avestimehr and David N.C. Tse
|
Outage Capacity of the Fading Relay Channel in the Low SNR Regime
| null | null | null | null |
cs.IT math.IT
| null |
In slow fading scenarios, cooperation between nodes can increase the amount
of diversity for communication. We study the performance limit in such
scenarios by analyzing the outage capacity of slow fading relay channels. Our
focus is on the low SNR and low outage probability regime, where the adverse
impact of fading is greatest but so are the potential gains from cooperation.
We showed that while the standard Amplify-Forward protocol performs very poorly
in this regime, a modified version we called the Bursty Amplify-Forward
protocol is optimal and achieves the outage capacity of the network. Moreover,
this performance can be achieved without a priori channel knowledge at the
receivers. In contrast, the Decode-Forward protocol is strictly sub-optimal in
this regime. Our results directly yield the outage capacity per unit energy of
fading relay channels.
|
[
{
"version": "v1",
"created": "Tue, 14 Feb 2006 00:37:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Avestimehr",
"Salman",
""
],
[
"Tse",
"David N. C.",
""
]
] |
cs/0602054
|
Petros Elia
|
Petros Elia, K. Raj Kumar, Sameer A. Pawar, P. Vijay Kumar and
Hsiao-feng Lu
|
Explicit Space-Time Codes Achieving The Diversity-Multiplexing Gain
Tradeoff
|
Revised submission to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
A recent result of Zheng and Tse states that over a quasi-static channel,
there exists a fundamental tradeoff, referred to as the diversity-multiplexing
gain (D-MG) tradeoff, between the spatial multiplexing gain and the diversity
gain that can be simultaneously achieved by a space-time (ST) block code. This
tradeoff is precisely known in the case of i.i.d. Rayleigh-fading, for T>=
n_t+n_r-1 where T is the number of time slots over which coding takes place and
n_t,n_r are the number of transmit and receive antennas respectively. For T <
n_t+n_r-1, only upper and lower bounds on the D-MG tradeoff are available.
In this paper, we present a complete solution to the problem of explicitly
constructing D-MG optimal ST codes, i.e., codes that achieve the D-MG tradeoff
for any number of receive antennas. We do this by showing that for the square
minimum-delay case when T=n_t=n, cyclic-division-algebra (CDA) based ST codes
having the non-vanishing determinant property are D-MG optimal. While
constructions of such codes were previously known for restricted values of n,
we provide here a construction for such codes that is valid for all n.
For the rectangular, T > n_t case, we present two general techniques for
building D-MG-optimal rectangular ST codes from their square counterparts. A
byproduct of our results establishes that the D-MG tradeoff for all T>= n_t is
the same as that previously known to hold for T >= n_t + n_r -1.
|
[
{
"version": "v1",
"created": "Wed, 15 Feb 2006 00:19:51 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Elia",
"Petros",
""
],
[
"Kumar",
"K. Raj",
""
],
[
"Pawar",
"Sameer A.",
""
],
[
"Kumar",
"P. Vijay",
""
],
[
"Lu",
"Hsiao-feng",
""
]
] |
cs/0602058
|
Ruoheng Liu
|
Ruoheng Liu, Predrag Spasojevic, and Emina Soljanin
|
Incremental Redundancy Cooperative Coding for Wireless Networks:
Cooperative Diversity, Coding, and Transmission Energy Gain
|
revised version
| null | null | null |
cs.IT math.IT
| null |
We study an incremental redundancy (IR) cooperative coding scheme for
wireless networks. To exploit the spatial diversity benefit we propose a
cluster-based collaborating strategy for a quasi-static Rayleigh fading channel
model and based on a network geometric distance profile. Our scheme enhances
the network performance by embedding an IR cooperative coding scheme into an
existing noncooperative route. More precisely, for each hop, we form a
collaborating cluster of M-1 nodes between the (hop) sender and the (hop)
destination. The transmitted message is encoded using a mother code and
partitioned into M blocks corresponding to the each of M slots. In the first
slot, the (hop) sender broadcasts its information by transmitting the first
block, and its helpers attempt to relay this message. In the remaining slots,
the each of left-over M-1 blocks is sent either through a helper which has
successfully decoded the message or directly by the (hop) sender where a
dynamic schedule is based on the ACK-based feedback from the cluster. By
employing powerful good codes (e.g., turbo codes, LDPC codes, and raptor codes)
whose performance is characterized by a threshold behavior, our approach
improves the reliability of a multi-hop routing through not only cooperation
diversity benefit but also a coding advantage. The study of the diversity and
the coding gain of the proposed scheme is based on a new simple threshold bound
on the frame-error rate (FER) of maximum likelihood decoding. A average FER
upper bound and its asymptotic (in large SNR) version are derived as a function
of the average fading channel SNRs and the code threshold.
|
[
{
"version": "v1",
"created": "Wed, 15 Feb 2006 20:55:30 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Feb 2007 20:44:50 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Ruoheng",
""
],
[
"Spasojevic",
"Predrag",
""
],
[
"Soljanin",
"Emina",
""
]
] |
cs/0602071
|
Martin Wainwright
|
Alexandros G. Dimakis, Anand D. Sarwate, Martin J. Wainwright
|
Geographic Gossip: Efficient Aggregation for Sensor Networks
|
8 pages total; to appear in Information Processing in Sensor Networks
(IPSN) 2006
| null | null | null |
cs.IT math.IT
| null |
Gossip algorithms for aggregation have recently received significant
attention for sensor network applications because of their simplicity and
robustness in noisy and uncertain environments. However, gossip algorithms can
waste significant energy by essentially passing around redundant information
multiple times. For realistic sensor network model topologies like grids and
random geometric graphs, the inefficiency of gossip schemes is caused by slow
mixing times of random walks on those graphs. We propose and analyze an
alternative gossiping scheme that exploits geographic information. By utilizing
a simple resampling method, we can demonstrate substantial gains over
previously proposed gossip protocols. In particular, for random geometric
graphs, our algorithm computes the true average to accuracy $1/n^a$ using
$O(n^{1.5}\sqrt{\log n})$ radio transmissions, which reduces the energy
consumption by a $\sqrt{\frac{n}{\log n}}$ factor over standard gossip
algorithms.
|
[
{
"version": "v1",
"created": "Mon, 20 Feb 2006 03:52:57 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dimakis",
"Alexandros G.",
""
],
[
"Sarwate",
"Anand D.",
""
],
[
"Wainwright",
"Martin J.",
""
]
] |
cs/0602084
|
Boris Ryabko
|
Boris Ryabko, Jaakko Astola
|
Universal Codes as a Basis for Time Series Testing
|
accepted for "Statistical Methodology" (Elsevier)
| null | null | null |
cs.IT math.IT
| null |
We suggest a new approach to hypothesis testing for ergodic and stationary
processes. In contrast to standard methods, the suggested approach gives a
possibility to make tests, based on any lossless data compression method even
if the distribution law of the codeword lengths is not known. We apply this
approach to the following four problems: goodness-of-fit testing (or identity
testing), testing for independence, testing of serial independence and
homogeneity testing and suggest nonparametric statistical tests for these
problems. It is important to note that practically used so-called archivers can
be used for suggested testing.
|
[
{
"version": "v1",
"created": "Sat, 25 Feb 2006 07:37:56 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ryabko",
"Boris",
""
],
[
"Astola",
"Jaakko",
""
]
] |
cs/0602085
|
Michael Baer
|
Michael B. Baer
|
Twenty (or so) Questions: $D$-ary Length-Bounded Prefix Coding
|
12 pages, 4 figures, extended version of cs/0701012 (accepted to ISIT
2007), formerly "Twenty (or so) Questions: $D$-ary Bounded-Length Huffman
Coding"
| null | null | null |
cs.IT cs.DS math.IT
| null |
Efficient optimal prefix coding has long been accomplished via the Huffman
algorithm. However, there is still room for improvement and exploration
regarding variants of the Huffman problem. Length-limited Huffman coding,
useful for many practical applications, is one such variant, for which codes
are restricted to the set of codes in which none of the $n$ codewords is longer
than a given length, $l_{\max}$. Binary length-limited coding can be done in
$O(n l_{\max})$ time and O(n) space via the widely used Package-Merge algorithm
and with even smaller asymptotic complexity using a lesser-known algorithm. In
this paper these algorithms are generalized without increasing complexity in
order to introduce a minimum codeword length constraint $l_{\min}$, to allow
for objective functions other than the minimization of expected codeword
length, and to be applicable to both binary and nonbinary codes; nonbinary
codes were previously addressed using a slower dynamic programming approach.
These extensions have various applications -- including fast decompression and
a modified version of the game ``Twenty Questions'' -- and can be used to solve
the problem of finding an optimal code with limited fringe, that is, finding
the best code among codes with a maximum difference between the longest and
shortest codewords. The previously proposed method for solving this problem was
nonpolynomial time, whereas solving this using the novel linear-space algorithm
requires only $O(n (l_{\max}- l_{\min})^2)$ time, or even less if $l_{\max}-
l_{\min}$ is not $O(\log n)$.
|
[
{
"version": "v1",
"created": "Sat, 25 Feb 2006 19:09:11 GMT"
},
{
"version": "v2",
"created": "Thu, 6 Apr 2006 01:20:41 GMT"
},
{
"version": "v3",
"created": "Wed, 12 Apr 2006 05:39:00 GMT"
},
{
"version": "v4",
"created": "Wed, 20 Jun 2007 19:47:12 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Baer",
"Michael B.",
""
]
] |
cs/0602089
|
Pascal Vontobel
|
Roxana Smarandache and Pascal O. Vontobel
|
Pseudo-Codeword Analysis of Tanner Graphs from Projective and Euclidean
Planes
|
Submitted to IEEE Transactions on Information Theory, February 25,
2006
| null | null | null |
cs.IT cs.DM math.IT
| null |
In order to understand the performance of a code under maximum-likelihood
(ML) decoding, one studies the codewords, in particular the minimal codewords,
and their Hamming weights. In the context of linear programming (LP) decoding,
one's attention needs to be shifted to the pseudo-codewords, in particular to
the minimal pseudo-codewords, and their pseudo-weights. In this paper we
investigate some families of codes that have good properties under LP decoding,
namely certain families of low-density parity-check (LDPC) codes that are
derived from projective and Euclidean planes: we study the structure of their
minimal pseudo-codewords and give lower bounds on their pseudo-weight.
|
[
{
"version": "v1",
"created": "Sun, 26 Feb 2006 01:33:01 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Smarandache",
"Roxana",
""
],
[
"Vontobel",
"Pascal O.",
""
]
] |
cs/0602091
|
Young-Han Kim
|
Young-Han Kim
|
Feedback Capacity of Stationary Gaussian Channels
|
64 pages, submitted to IEEE Trans. Inform. Theory
| null | null | null |
cs.IT math.IT
| null |
The feedback capacity of additive stationary Gaussian noise channels is
characterized as the solution to a variational problem. Toward this end, it is
proved that the optimal feedback coding scheme is stationary. When specialized
to the first-order autoregressive moving average noise spectrum, this
variational characterization yields a closed-form expression for the feedback
capacity. In particular, this result shows that the celebrated
Schalkwijk-Kailath coding scheme achieves the feedback capacity for the
first-order autoregressive moving average Gaussian channel, positively
answering a long-standing open problem studied by Butman, Schalkwijk-Tiernan,
Wolfowitz, Ozarow, Ordentlich, Yang-Kavcic-Tatikonda, and others. More
generally, it is shown that a k-dimensional generalization of the
Schalkwijk-Kailath coding scheme achieves the feedback capacity for any
autoregressive moving average noise spectrum of order k. Simply put, the
optimal transmitter iteratively refines the receiver's knowledge of the
intended message.
|
[
{
"version": "v1",
"created": "Sun, 26 Feb 2006 08:11:33 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Kim",
"Young-Han",
""
]
] |
cs/0602092
|
Martin Wainwright
|
Martin J. Wainwright
|
Inconsistent parameter estimation in Markov random fields: Benefits in
the computation-limited setting
|
UC Berkeley, Department of Statistics; Technical Report 690
| null | null | null |
cs.LG cs.IT math.IT math.ST stat.TH
| null |
Consider the problem of joint parameter estimation and prediction in a Markov
random field: i.e., the model parameters are estimated on the basis of an
initial set of data, and then the fitted model is used to perform prediction
(e.g., smoothing, denoising, interpolation) on a new noisy observation. Working
under the restriction of limited computation, we analyze a joint method in
which the \emph{same convex variational relaxation} is used to construct an
M-estimator for fitting parameters, and to perform approximate marginalization
for the prediction step. The key result of this paper is that in the
computation-limited setting, using an inconsistent parameter estimator (i.e.,
an estimator that returns the ``wrong'' model even in the infinite data limit)
can be provably beneficial, since the resulting errors can partially compensate
for errors made by using an approximate prediction technique. En route to this
result, we analyze the asymptotic properties of M-estimators based on convex
variational relaxations, and establish a Lipschitz stability property that
holds for a broad class of variational methods. We show that joint
estimation/prediction based on the reweighted sum-product algorithm
substantially outperforms a commonly used heuristic based on ordinary
sum-product.
|
[
{
"version": "v1",
"created": "Mon, 27 Feb 2006 05:22:15 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wainwright",
"Martin J.",
""
]
] |
cs/0603007
|
Khaled Abdel-Ghaffar
|
Khaled A. S. Abdel-Ghaffar and Jos H. Weber
|
Complete Enumeration of Stopping Sets of Full-Rank Parity-Check Matrices
of Hamming Codes
|
7 pages, submitted to the IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
Stopping sets, and in particular their numbers and sizes, play an important
role in determining the performance of iterative decoders of linear codes over
binary erasure channels. In the 2004 Shannon Lecture, McEliece presented an
expression for the number of stopping sets of size three for a full-rank
parity-check matrix of the Hamming code. In this correspondence, we derive an
expression for the number of stopping sets of any given size for the same
parity-check matrix.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2006 06:06:52 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Abdel-Ghaffar",
"Khaled A. S.",
""
],
[
"Weber",
"Jos H.",
""
]
] |
cs/0603008
|
Hao Chen
|
Hao Chen
|
Linear Secret Sharing from Algebraic-Geometric Codes
|
11 pages, note added in the new version
| null | null | null |
cs.CR cs.IT math.IT
| null |
It is well-known that the linear secret-sharing scheme (LSSS) can be
constructed from linear error-correcting codes (Brickell [1], R.J. McEliece and
D.V.Sarwate [2],Cramer, el.,[3]). The theory of linear codes from
algebraic-geometric curves (algebraic-geometric (AG) codes or geometric Goppa
code) has been well-developed since the work of V.Goppa and Tsfasman, Vladut,
and Zink(see [17], [18] and [19]). In this paper the linear secret-sharing
scheme from algebraic-geometric codes, which are non-threshold scheme for
curves of genus greater than 0, are presented . We analysis the minimal access
structure, $d_{min}$ and $d_{cheat}$([8]), (strongly) multiplicativity and the
applications in verifiable secret-sharing (VSS) scheme and secure multi-party
computation (MPC) of this construction([3] and [10-11]). Our construction also
offers many examples of the self-dually $GF(q)$-representable matroids and many
examples of new ideal linear secret-sharing schemes addressing to the problem
of the characterization of the access structures for ideal secret-sharing
schemes([3] and [9]). The access structures of the linear secret-sharing
schemes from the codes on elliptic curves are given explicitly. From the work
in this paper we can see that the algebraic-geometric structure of the
underlying algebraic curves is an important resource for secret-sharing,
matroid theory, verifiable secret-sharing and secure multi-party computation.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2006 02:58:07 GMT"
},
{
"version": "v2",
"created": "Wed, 8 Mar 2006 06:24:55 GMT"
},
{
"version": "v3",
"created": "Thu, 9 Mar 2006 02:07:03 GMT"
},
{
"version": "v4",
"created": "Fri, 10 Mar 2006 09:12:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Chen",
"Hao",
""
]
] |
cs/0603009
|
Sergio Servetto
|
Ron Dabora and Sergio D. Servetto (Cornell University)
|
An Achievability Result for the General Relay Channel
|
This correspondence article has been folded into the revision of
another paper of ours, cs.IT/0605135. This replacement paper explains why
| null | null | null |
cs.IT math.IT
| null |
See cs.IT/0605135: R. Dabora, S. D. Servetto; On the Role of
Estimate-and-Forward with Time-Sharing in Cooperative Communications.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2006 03:54:10 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Nov 2006 07:35:46 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dabora",
"Ron",
"",
"Cornell University"
],
[
"Servetto",
"Sergio D.",
"",
"Cornell University"
]
] |
cs/0603013
|
Heide Gluesing-Luerssen
|
Heide Gluesing-Luerssen, Gert Schneider
|
On the MacWilliams Identity for Convolutional Codes
| null | null | null | null |
cs.IT math.IT math.OC
| null |
The adjacency matrix associated with a convolutional code collects in a
detailed manner information about the weight distribution of the code. A
MacWilliams Identity Conjecture, stating that the adjacency matrix of a code
fully determines the adjacency matrix of the dual code, will be formulated, and
an explicit formula for the transformation will be stated. The formula involves
the MacWilliams matrix known from complete weight enumerators of block codes.
The conjecture will be proven for the class of convolutional codes where either
the code itself or its dual does not have Forney indices bigger than one. For
the general case the conjecture is backed up by many examples, and a weaker
version will be established.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2006 17:57:02 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gluesing-Luerssen",
"Heide",
""
],
[
"Schneider",
"Gert",
""
]
] |
cs/0603014
|
Carlos Munuera
|
C. Carvalho, C. Munuera, E. Silva, F. Torres
|
Near orders and codes
|
15 pages
| null | null | null |
cs.IT math.IT
| null |
Hoholdt, van Lint and Pellikaan used order functions to construct codes by
means of Linear Algebra and Semigroup Theory only. However, Geometric Goppa
codes that can be represented by this method are mainly those based on just one
point. In this paper we introduce the concept of near order function with the
aim of generalize this approach in such a way that a of wider family of
Geometric Goppa codes can be studied on a more elementary setting.
|
[
{
"version": "v1",
"created": "Thu, 2 Mar 2006 18:31:13 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Carvalho",
"C.",
""
],
[
"Munuera",
"C.",
""
],
[
"Silva",
"E.",
""
],
[
"Torres",
"F.",
""
]
] |
cs/0603018
|
Siddharth Ray
|
Siddharth Ray, Muriel Medard and Lizhong Zheng
|
On Non-coherent MIMO Channels in the Wideband Regime: Capacity and
Reliability
| null | null | null | null |
cs.IT math.IT
| null |
We consider a multiple-input, multiple-output (MIMO) wideband Rayleigh block
fading channel where the channel state is unknown to both the transmitter and
the receiver and there is only an average power constraint on the input. We
compute the capacity and analyze its dependence on coherence length, number of
antennas and receive signal-to-noise ratio (SNR) per degree of freedom. We
establish conditions on the coherence length and number of antennas for the
non-coherent channel to have a "near coherent" performance in the wideband
regime. We also propose a signaling scheme that is near-capacity achieving in
this regime.
We compute the error probability for this wideband non-coherent MIMO channel
and study its dependence on SNR, number of transmit and receive antennas and
coherence length. We show that error probability decays inversely with
coherence length and exponentially with the product of the number of transmit
and receive antennas. Moreover, channel outage dominates error probability in
the wideband regime. We also show that the critical as well as cut-off rates
are much smaller than channel capacity in this regime.
|
[
{
"version": "v1",
"created": "Fri, 3 Mar 2006 22:41:58 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ray",
"Siddharth",
""
],
[
"Medard",
"Muriel",
""
],
[
"Zheng",
"Lizhong",
""
]
] |
cs/0603022
|
Siddharth Ray
|
Siddharth Ray, Michelle Effros, Muriel Medard, Ralf Koetter, Tracey
Ho, David Karger and Jinane Abounadi
|
On Separation, Randomness and Linearity for Network Codes over Finite
Fields
| null | null | null |
MIT LIDS Technical Report 2687
|
cs.IT math.IT
| null |
We examine the issue of separation and code design for networks that operate
over finite fields. We demonstrate that source-channel (or source-network)
separation holds for several canonical network examples like the noisy multiple
access channel and the erasure degraded broadcast channel, when the whole
network operates over a common finite field. This robustness of separation is
predicated on the fact that noise and inputs are independent, and we examine
the failure of separation when noise is dependent on inputs in multiple access
channels.
Our approach is based on the sufficiency of linear codes. Using a simple and
unifying framework, we not only re-establish with economy the optimality of
linear codes for single-transmitter, single-receiver channels and for
Slepian-Wolf source coding, but also establish the optimality of linear codes
for multiple access and for erasure degraded broadcast channels. The linearity
allows us to obtain simple optimal code constructions and to study capacity
regions of the noisy multiple access and the degraded broadcast channel. The
linearity of both source and network coding blurs the delineation between
source and network codes. While our results point to the fact that separation
of source coding and channel coding is optimal in some canonical networks, we
show that decomposing networks into canonical subnetworks may not be effective.
Thus, we argue that it may be the lack of decomposability of a network into
canonical network modules, rather than the lack of separation between source
and channel coding, that presents major challenges for coding over networks.
|
[
{
"version": "v1",
"created": "Mon, 6 Mar 2006 16:52:28 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ray",
"Siddharth",
""
],
[
"Effros",
"Michelle",
""
],
[
"Medard",
"Muriel",
""
],
[
"Koetter",
"Ralf",
""
],
[
"Ho",
"Tracey",
""
],
[
"Karger",
"David",
""
],
[
"Abounadi",
"Jinane",
""
]
] |
cs/0603027
|
Shuangquan Wang
|
Shuangquan Wang, Ali Abdi
|
On the Second-Order Statistics of the Instantaneous Mutual Information
in Rayleigh Fading Channels
|
11 pages, 6 figures, submitted to IEEE Trans. Inform. Theory, Dec.
2005
| null | null | null |
cs.IT math.IT
| null |
In this paper, the second-order statistics of the instantaneous mutual
information are studied, in time-varying Rayleigh fading channels, assuming
general non-isotropic scattering environments. Specifically, first the
autocorrelation function, correlation coefficient, level crossing rate, and the
average outage duration of the instantaneous mutual information are
investigated in single-input single-output (SISO) systems. Closed-form exact
expressions are derived, as well as accurate approximations in low- and
high-SNR regimes. Then, the results are extended to multiple-input
single-output and single-input multiple-output systems, as well as
multiple-input multiple-output systems with orthogonal space-time block code
transmission. Monte Carlo simulations are provided to verify the accuracy of
the analytical results. The results shed more light on the dynamic behavior of
the instantaneous mutual information in mobile fading channels.
|
[
{
"version": "v1",
"created": "Wed, 8 Mar 2006 01:21:41 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wang",
"Shuangquan",
""
],
[
"Abdi",
"Ali",
""
]
] |
cs/0603031
|
Wei Dai
|
Wei Dai, Youjian Liu, Brian Rider
|
Performance Analysis of CDMA Signature Optimization with Finite Rate
Feedback
|
6 pages, 3 figures, conference paper for CISS 2006
| null | null | null |
cs.IT cs.DM math.IT
| null |
We analyze the performance of CDMA signature optimization with finite rate
feedback. For a particular user, the receiver selects a signature vector from a
signature codebook to avoid the interference from other users, and feeds the
corresponding index back to this user through a finite rate and error-free
feedback link. We assume the codebook is randomly constructed where the entries
are independent and isotropically distributed. It has been shown that the
randomly constructed codebook is asymptotically optimal. In this paper, we
consider two types of signature selection criteria. One is to select the
signature vector that minimizes the interference from other users. The other
one is to select the signature vector to match the weakest interference
directions. By letting the processing gain, number of users and feedback bits
approach infinity with fixed ratios, we derive the exact asymptotic formulas to
calculate the average interference for both criteria. Our simulations
demonstrate the theoretical formulas. The analysis can be extended to evaluate
the signal-to-interference plus noise ratio performance for both match filter
and linear minimum mean-square error receivers.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 03:52:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dai",
"Wei",
""
],
[
"Liu",
"Youjian",
""
],
[
"Rider",
"Brian",
""
]
] |
cs/0603039
|
Wei Dai
|
Wei Dai, Youjian Liu, Brian Rider
|
Quantization Bounds on Grassmann Manifolds and Applications to MIMO
Communications
|
26 pages, 7 figures, submitted to IEEE Transactions on Information
Theory in Aug, 2005
| null | null | null |
cs.IT math.IT
| null |
This paper considers the quantization problem on the Grassmann manifold
\mathcal{G}_{n,p}, the set of all p-dimensional planes (through the origin) in
the n-dimensional Euclidean space. The chief result is a closed-form formula
for the volume of a metric ball in the Grassmann manifold when the radius is
sufficiently small. This volume formula holds for Grassmann manifolds with
arbitrary dimension n and p, while previous results pertained only to p=1, or a
fixed p with asymptotically large n. Based on this result, several quantization
bounds are derived for sphere packing and rate distortion tradeoff. We
establish asymptotically equivalent lower and upper bounds for the rate
distortion tradeoff. Since the upper bound is derived by constructing random
codes, this result implies that the random codes are asymptotically optimal.
The above results are also extended to the more general case, in which
\mathcal{G}_{n,q} is quantized through a code in \mathcal{G}_{n,p}, where p and
q are not necessarily the same. Finally, we discuss some applications of the
derived results to multi-antenna communication systems.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 16:58:27 GMT"
},
{
"version": "v2",
"created": "Tue, 16 May 2006 02:53:17 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dai",
"Wei",
""
],
[
"Liu",
"Youjian",
""
],
[
"Rider",
"Brian",
""
]
] |
cs/0603040
|
Wei Dai
|
Wei Dai, Youjian Liu, Vincent K.N. Lau, Brian Rider
|
On the Information Rate of MIMO Systems with Finite Rate Channel State
Feedback Using Beamforming and Power On/Off Strategy
|
44 pages, 8 figures, submitted to IEEE Transactions on Information
Theory in 2005
| null | null | null |
cs.IT math.IT
| null |
It is well known that Multiple-Input Multiple-Output (MIMO) systems have high
spectral efficiency, especially when channel state information at the
transmitter (CSIT) is available. When CSIT is obtained by feedback, it is
practical to assume that the channel state feedback rate is finite and the CSIT
is not perfect. For such a system, we consider beamforming and power on/off
strategy for its simplicity and near optimality, where power on/off means that
a beamforming vector (beam) is either turned on with a constant power or turned
off. The main contribution of this paper is to accurately evaluate the
information rate as a function of the channel state feedback rate. Name a beam
turned on as an on-beam and the minimum number of the transmit and receive
antennas as the dimension of a MIMO system. We prove that the ratio of the
optimal number of on-beams and the system dimension converges to a constant for
a given signal-to-noise ratio (SNR) when the numbers of transmit and receive
antennas approach infinity simultaneously and when beamforming is perfect.
Asymptotic formulas are derived to evaluate this ratio and the corresponding
information rate per dimension. The asymptotic results can be accurately
applied to finite dimensional systems and suggest a power on/off strategy with
a constant number of on-beams. For this suboptimal strategy, we take a novel
approach to introduce power efficiency factor, which is a function of the
feedback rate, to quantify the effect of imperfect beamforming. By combining
power efficiency factor and the asymptotic formulas for perfect beamforming
case, the information rate of the power on/off strategy with a constant number
of on-beams is accurately characterized.
|
[
{
"version": "v1",
"created": "Thu, 9 Mar 2006 17:08:28 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dai",
"Wei",
""
],
[
"Liu",
"Youjian",
""
],
[
"Lau",
"Vincent K. N.",
""
],
[
"Rider",
"Brian",
""
]
] |
cs/0603045
|
Balaji Nedurumalli
|
Balaji Nedurumalli
|
Information and Errors in Quantum Teleportation
|
5 pages
| null | null | null |
cs.IT math.IT
| null |
This article considers the question of the teleportation protocol from an
engineering perspective. The protocol ideally requires an authority that
ensures that the two communicating parties have a perfectly entangled pair of
particles available to them. But this cannot be unconditionally established to
the satisfaction of the parties due to the fact that an unknown quantum state
cannot be copied. This supports the view that quantum information cannot be
treated on the same basis as classical information.
|
[
{
"version": "v1",
"created": "Fri, 10 Mar 2006 22:54:56 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Nedurumalli",
"Balaji",
""
]
] |
cs/0603049
|
Heide Gluesing-Luerssen
|
Heide Gluesing-Luerssen and Gert Schneider
|
State Space Realizations and Monomial Equivalence for Convolutional
Codes
| null | null | null | null |
cs.IT math.IT math.OC
| null |
We will study convolutional codes with the help of state space realizations.
It will be shown that two such minimal realizations belong to the same code if
and only if they are equivalent under the full state feedback group. This
result will be used in order to prove that two codes with positive Forney
indices are monomially equivalent if and only if they share the same adjacency
matrix. The adjacency matrix counts in a detailed way the weights of all
possible outputs and thus contains full information about the weights of the
codewords in the given code.
|
[
{
"version": "v1",
"created": "Mon, 13 Mar 2006 10:43:45 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gluesing-Luerssen",
"Heide",
""
],
[
"Schneider",
"Gert",
""
]
] |
cs/0603059
|
Guangyue Han
|
Guangyue Han, Brian Marcus
|
Derivatives of Entropy Rate in Special Families of Hidden Markov Chains
|
The relaxed condtions for entropy rate and examples are taken out (to
be part of another paper). The section about general principle and an example
to determine the domain of analyticity is taken out (to be part of another
paper). A section about binary Markov chains corrupted by binary symmetric
noise is added
| null | null | null |
cs.IT math.IT math.PR
| null |
Consider a hidden Markov chain obtained as the observation process of an
ordinary Markov chain corrupted by noise. Zuk, et. al. [13], [14] showed how,
in principle, one can explicitly compute the derivatives of the entropy rate of
at extreme values of the noise. Namely, they showed that the derivatives of
standard upper approximations to the entropy rate actually stabilize at an
explicit finite time. We generalize this result to a natural class of hidden
Markov chains called ``Black Holes.'' We also discuss in depth special cases of
binary Markov chains observed in binary symmetric noise, and give an abstract
formula for the first derivative in terms of a measure on the simplex due to
Blackwell.
|
[
{
"version": "v1",
"created": "Tue, 14 Mar 2006 21:51:34 GMT"
},
{
"version": "v2",
"created": "Mon, 3 Apr 2006 21:22:47 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Han",
"Guangyue",
""
],
[
"Marcus",
"Brian",
""
]
] |
cs/0603061
|
Chau Yuen
|
Chau Yuen, Yong Liang Guan, Tjeng Thiang Tjhung
|
Quasi-Orthogonal STBC With Minimum Decoding Complexity
|
IEEE Trans. on Wirless Communications
| null | null | null |
cs.IT math.IT
| null |
In this paper, we consider a quasi-orthogonal (QO) space-time block code
(STBC) with minimum decoding complexity (MDC-QO-STBC). We formulate its
algebraic structure and propose a systematic method for its construction. We
show that a maximum-likelihood (ML) decoder for this MDC-QOSTBC, for any number
of transmit antennas, only requires the joint detection of two real symbols.
Assuming the use of a square or rectangular quadratic-amplitude modulation
(QAM) or multiple phase-shift keying (MPSK) modulation for this MDC-QOSTBC, we
also obtain the optimum constellation rotation angle, in order to achieve full
diversity and optimum coding gain. We show that the maximum achievable code
rate of these MDC-QOSTBC is 1 for three and four antennas and 3/4 for five to
eight antennas. We also show that the proposed MDC-QOSTBC has several desirable
properties, such as a more even power distribution among antennas and better
scalability in adjusting the number of transmit antennas, compared with the
coordinate interleaved orthogonal design (CIOD) and asymmetric CIOD (ACIOD)
codes. For the case of an odd number of transmit antennas, MDC-QO-STBC also has
better decoding performance than CIOD.
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2006 12:59:37 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Yuen",
"Chau",
""
],
[
"Guan",
"Yong Liang",
""
],
[
"Tjhung",
"Tjeng Thiang",
""
]
] |
cs/0603066
|
Nihar Jindal
|
Nihar Jindal
|
A Feedback Reduction Technique for MIMO Broadcast Channels
|
Submitted to Int. Symposium on Information Theory, January 2006
| null | null | null |
cs.IT math.IT
| null |
A multiple antenna broadcast channel with perfect channel state information
at the receivers is considered. If each receiver quantizes its channel
knowledge to a finite number of bits which are fed back to the transmitter, the
large capacity benefits of the downlink channel can be realized. However, the
required number of feedback bits per mobile must be scaled with both the number
of transmit antennas and the system SNR, and thus can be quite large in even
moderately sized systems. It is shown that a small number of antennas can be
used at each receiver to improve the quality of the channel estimate provided
to the transmitter. As a result, the required feedback rate per mobile can be
significantly decreased.
|
[
{
"version": "v1",
"created": "Thu, 16 Mar 2006 21:02:01 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jindal",
"Nihar",
""
]
] |
cs/0603078
|
Ciamac Moallemi
|
Ciamac C. Moallemi and Benjamin Van Roy
|
Consensus Propagation
|
journal version
|
IEEE Transactions on Information Theory, 2006, 52(11): 4753-4766
|
10.1109/TIT.2006.883539
| null |
cs.IT cs.AI cs.NI math.IT
| null |
We propose consensus propagation, an asynchronous distributed protocol for
averaging numbers across a network. We establish convergence, characterize the
convergence rate for regular graphs, and demonstrate that the protocol exhibits
better scaling properties than pairwise averaging, an alternative that has
received much recent attention. Consensus propagation can be viewed as a
special case of belief propagation, and our results contribute to the belief
propagation literature. In particular, beyond singly-connected graphs, there
are very few classes of relevant problems for which belief propagation is known
to converge.
|
[
{
"version": "v1",
"created": "Sun, 19 Mar 2006 23:50:28 GMT"
},
{
"version": "v2",
"created": "Tue, 29 May 2007 17:23:45 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Moallemi",
"Ciamac C.",
""
],
[
"Van Roy",
"Benjamin",
""
]
] |
cs/0603083
|
Ashutosh Gore
|
Ashutosh Deepak Gore and Abhay Karandikar
|
Entropy-optimal Generalized Token Bucket Regulator
|
6 pages (2 column, 10-point), 3 figures, 1 table
| null | null | null |
cs.IT math.IT
| null |
We derive the maximum entropy of a flow (information utility) which conforms
to traffic constraints imposed by a generalized token bucket regulator, by
taking into account the covert information present in the randomness of packet
lengths. Under equality constraints of aggregate tokens and aggregate bucket
depth, a generalized token bucket regulator can achieve higher information
utility than a standard token bucket regulator. The optimal generalized token
bucket regulator has a near-uniform bucket depth sequence and a decreasing
token increment sequence.
|
[
{
"version": "v1",
"created": "Wed, 22 Mar 2006 06:23:53 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gore",
"Ashutosh Deepak",
""
],
[
"Karandikar",
"Abhay",
""
]
] |
cs/0603094
|
Philippe Loubaton
|
Julien Dumont, Philippe Loubaton, Samson Lasaulce
|
On the Capacity Achieving Transmit Covariance Matrices of MIMO
Correlated Rician Channels: A Large System Approach
|
Paper submitted to Globecom2006
| null | null | null |
cs.IT math.IT
| null |
We determine the capacity-achieving input covariance matrices for coherent
block-fading correlated MIMO Rician channels. In contrast with the Rayleigh and
uncorrelated Rician cases, no closed-form expressions for the eigenvectors of
the optimum input covariance matrix are available. Both the eigenvectors and
eigenvalues have to be evaluated by using numerical techniques. As the
corresponding optimization algorithms are not very attractive, we evaluate the
limit of the average mutual information when the number of transmit and receive
antennas converge to infinity at the same rate. If the channel is
semi-correlated, we propose an attractive optimization algorithm of the large
system approximant, and establish some convergence results. Simulation results
show that our approach provide reliable results even for a quite moderate
number of transmit and receive antennas.
|
[
{
"version": "v1",
"created": "Thu, 23 Mar 2006 12:14:53 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Aug 2006 12:07:30 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dumont",
"Julien",
""
],
[
"Loubaton",
"Philippe",
""
],
[
"Lasaulce",
"Samson",
""
]
] |
cs/0603095
|
Yan-Xiu Zheng
|
Yan-Xiu Zheng and Yu T. Su
|
A Turbo Coding System for High Speed Communications
|
11 figures
| null | null | null |
cs.IT math.IT
| null |
Conventional turbo codes (CTCs) usually employ a block-oriented interleaving
so that each block is separately encoded and decoded. As interleaving and
de-interleaving are performed within a block, the message-passing process
associated with an iterative decoder is limited to proceed within the
corresponding range. This paper presents a new turbo coding scheme that uses a
special interleaver structure and a multiple-round early termination test
involving both sign check and a CRC code. The new interleaver structure is
naturally suited for high speed parallel processing and the resulting coding
system offers new design options and tradeoffs that are not available to CTCs.
In particular, it becomes possible for the decoder to employ an efficient
inter-block collaborative decoding algorithm, passing the information obtained
from termination test proved blocks to other unproved blocks. It also becomes
important to have a proper decoding schedule. The combined effect is improved
performance and reduction in the average decoding delay (whence the required
computing power). A memory (storage) management mechanism is included as a
critical part of the decoder so as to provide additional design tradeoff
between performance and memory size. It is shown that the latter has a
modular-like effect in that additional memory units render enhanced performance
due not only to less forced early terminations but to possible increases of the
interleaving depth. Depending on the decoding schedule, the degree of
parallelism and other decoding resources available, the proposed scheme admits
a variety of decoder architectures that meet a large range of throughput and
performance demands.
|
[
{
"version": "v1",
"created": "Thu, 23 Mar 2006 15:03:09 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Zheng",
"Yan-Xiu",
""
],
[
"Su",
"Yu T.",
""
]
] |
cs/0603096
|
Massimiliano Siti Mr.
|
Massimiliano Siti, Michael P. Fitz
|
On Reduced Complexity Soft-Output MIMO ML detection
|
43 pages, 10 figures Submitted to the IEEE Transactions on
Information Theory, March 2006
| null | null | null |
cs.IT math.IT
| null |
In multiple-input multiple-output (MIMO) fading channels maximum likelihood
(ML) detection is desirable to achieve high performance, but its complexity
grows exponentially with the spectral efficiency. The current state of the art
in MIMO detection is list decoding and lattice decoding. This paper proposes a
new class of lattice detectors that combines some of the principles of both
list and lattice decoding, thus resulting in an efficient parallelizable
implementation and near optimal soft-ouput ML performance. The novel detector
is called layered orthogonal lattice detector (LORD), because it adopts a new
lattice formulation and relies on a channel orthogonalization process. It
should be noted that the algorithm achieves optimal hard-output ML performance
in case of two transmit antennas. For two transmit antennas max-log bit
soft-output information can be generated and for greater than two antennas
approximate max-log detection is achieved. Simulation results show that LORD,
in MIMO system employing orthogonal frequency division multiplexing (OFDM) and
bit interleaved coded modulation (BICM) is able to achieve very high
signal-to-noise ratio (SNR) gains compared to practical soft-output detectors
such as minimum-mean square error (MMSE), in either linear or nonlinear
iterative scheme. Besides, the performance comparison with hard-output decoded
algebraic space time codes shows the fundamental importance of soft-output
generation capability for practical wireless applications.
|
[
{
"version": "v1",
"created": "Fri, 24 Mar 2006 09:44:01 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Siti",
"Massimiliano",
""
],
[
"Fitz",
"Michael P.",
""
]
] |
cs/0603098
|
Siddharth Ray
|
Siddharth Ray, Muriel Medard and Lizhong Zheng
|
A SIMO Fiber Aided Wireless Network Architecture
| null | null | null | null |
cs.IT math.IT
| null |
The concept of a fiber aided wireless network architecture (FAWNA) is
introduced in [Ray et al., Allerton Conference 2005], which allows high-speed
mobile connectivity by leveraging the speed of optical networks. In this paper,
we consider a single-input, multiple-output (SIMO) FAWNA, which consists of a
SIMO wireless channel and an optical fiber channel, connected through
wireless-optical interfaces. We propose a scheme where the received wireless
signal at each interface is quantized and sent over the fiber. Though our
architecture is similar to that of the classical CEO problem, our problem is
different from it. We show that the capacity of our scheme approaches the
capacity of the architecture, exponentially with fiber capacity. We also show
that for a given fiber capacity, there is an optimal operating wireless
bandwidth and an optimal number of wireless-optical interfaces. The
wireless-optical interfaces of our scheme have low complexity and do not
require knowledge of the transmitter code book. They are also extendable to
FAWNAs with large number of transmitters and interfaces and, offer adaptability
to variable rates, changing channel conditions and node positions.
|
[
{
"version": "v1",
"created": "Sat, 25 Mar 2006 00:46:44 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ray",
"Siddharth",
""
],
[
"Medard",
"Muriel",
""
],
[
"Zheng",
"Lizhong",
""
]
] |
cs/0603103
|
Amir Leshem
|
Amir Leshem and Ephraim Zehavi
|
Bargaining over the interference channel
| null | null | null | null |
cs.IT math.IT
| null |
In this paper we analyze the interference channel as a conflict situation.
This viewpoint implies that certain points in the rate region are unreasonable
to one of the players. Therefore these points cannot be considered achievable
based on game theoretic considerations. We then propose to use Nash bargaining
solution as a tool that provides preferred points on the boundary of the game
theoretic rate region. We provide analysis for the 2x2 intereference channel
using the FDM achievable rate region. We also outline how to generalize our
results to other achievable rate regions for the interference channel as well
as the multiple access channel.
Keywords: Spectrum optimization, distributed coordination, game theory,
interference channel, multiple access channel.
|
[
{
"version": "v1",
"created": "Sun, 26 Mar 2006 21:28:54 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Leshem",
"Amir",
""
],
[
"Zehavi",
"Ephraim",
""
]
] |
cs/0603131
|
Chris Snow
|
C. Snow, L. Lampe, R. Schober
|
Error Rate Analysis for Coded Multicarrier Systems over Quasi-Static
Fading Channels
|
5 pages, 3 figures, 2 tables. Submitted to Globecom 2006
| null | null | null |
cs.IT math.IT
| null |
This paper presents two methods for approximating the performance of coded
multicarrier systems operating over frequency-selective, quasi-static fading
channels with non-ideal interleaving. The first method is based on
approximating the performance of the system over each realization of the
channel, and is suitable for obtaining the outage performance of this type of
system. The second method is based on knowledge of the correlation matrix of
the frequency-domain channel gains and can be used to directly obtain the
average performance. Both of the methods are applicable for
convolutionally-coded interleaved systems employing Quadrature Amplitude
Modulation (QAM). As examples, both methods are used to study the performance
of the Multiband Orthogonal Frequency Division Multiplexing (OFDM) proposal for
high data-rate Ultra-Wideband (UWB) communication.
|
[
{
"version": "v1",
"created": "Fri, 31 Mar 2006 19:36:09 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Snow",
"C.",
""
],
[
"Lampe",
"L.",
""
],
[
"Schober",
"R.",
""
]
] |
cs/0604005
|
Sergio Servetto
|
Sergio D. Servetto (Cornell University)
|
Multiterminal Source Coding with Two Encoders--I: A Computable Outer
Bound
|
Submitted to the IEEE Transactions on Information Theory; Revised,
November 2006. Substantial revision after the first round of reviews
| null | null | null |
cs.IT math.IT
| null |
In this first part, a computable outer bound is proved for the multiterminal
source coding problem, for a setup with two encoders, discrete memoryless
sources, and bounded distortion measures.
|
[
{
"version": "v1",
"created": "Mon, 3 Apr 2006 04:44:33 GMT"
},
{
"version": "v2",
"created": "Mon, 8 May 2006 22:12:18 GMT"
},
{
"version": "v3",
"created": "Wed, 15 Nov 2006 05:32:28 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Servetto",
"Sergio D.",
"",
"Cornell University"
]
] |
cs/0604021
|
Nima Sarshar
|
Nima Sarshar and Behnam A. Rezaei and Vwani P. Roychowdhury
|
Low Latency Wireless Ad-Hoc Networking: Power and Bandwidth Challenges
and a Hierarchical Solution
| null | null | null | null |
cs.IT math.IT
| null |
This paper is concerned with the scaling of the number of hops in a large
scale wireless ad-hoc network (WANET), a quantity we call network latency. A
large network latency affects all aspects of data communication in a WANET,
including an increase in delay, packet loss, required processing power and
memory. We consider network management and data routing challenges in WANETs
with scalable network latency. On the physical side, reducing network latency
imposes a significantly higher power and bandwidth demand on nodes, as is
reflected in a set of new bounds. On the protocol front, designing distributed
routing protocols that can guarantee the delivery of data packets within
scalable number of hops is a challenging task. To solve this, we introduce
multi-resolution randomized hierarchy (MRRH), a novel power and bandwidth
efficient WANET protocol with scalable network latency. MRRH uses a randomized
algorithm for building and maintaining a random hierarchical network topology,
which together with the proposed routing algorithm can guarantee efficient
delivery of data packets in the wireless network. For a network of size $N$,
MRRH can provide an average latency of only $O(\log^{3} N)$. The power and
bandwidth consumption of MRRH are shown to be \emph{nearly} optimal for the
latency it provides. Therefore, MRRH, is a provably efficient candidate for
truly large scale wireless ad-hoc networking.
|
[
{
"version": "v1",
"created": "Thu, 6 Apr 2006 14:00:20 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sarshar",
"Nima",
""
],
[
"Rezaei",
"Behnam A.",
""
],
[
"Roychowdhury",
"Vwani P.",
""
]
] |
cs/0604025
|
Tie Liu
|
Tie Liu and Pramod Viswanath
|
An Extremal Inequality Motivated by Multiterminal Information Theoretic
Problems
|
32 pages, 1 figure
| null | null | null |
cs.IT math.IT
| null |
We prove a new extremal inequality, motivated by the vector Gaussian
broadcast channel and the distributed source coding with a single quadratic
distortion constraint problems. As a corollary, this inequality yields a
generalization of the classical entropy-power inequality (EPI). As another
corollary, this inequality sheds insight into maximizing the differential
entropy of the sum of two dependent random variables.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2006 04:50:59 GMT"
},
{
"version": "v2",
"created": "Fri, 21 Apr 2006 21:01:03 GMT"
},
{
"version": "v3",
"created": "Tue, 7 Nov 2006 18:15:17 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Tie",
""
],
[
"Viswanath",
"Pramod",
""
]
] |
cs/0604028
|
Tie Liu
|
Tie Liu and Pramod Viswanath
|
Two Proofs of the Fisher Information Inequality via Data Processing
Arguments
|
6 pages, 0 figure
| null | null | null |
cs.IT math.IT
| null |
Two new proofs of the Fisher information inequality (FII) using data
processing inequalities for mutual information and conditional variance are
presented.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2006 16:51:52 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Tie",
""
],
[
"Viswanath",
"Pramod",
""
]
] |
cs/0604030
|
Richard Barton
|
Richard J. Barton
|
The Influence of Adaptive Multicoding on Mutual Information and Channel
Capacity for Uncertain Wideband CDMA Rayleigh Fading Channels
| null | null | null | null |
cs.IT math.IT
| null |
We consider the problem of adaptive modulation for wideband DS-CDMA Rayleigh
fading channels with imperfect channel state information (CSI). We assume a
multidimensional signal subspace spanned by a collection of random spreading
codes (multicoding) and study the effects of both the subspace dimension and
the probability distribution of the transmitted symbols on the mutual
information between the channel input and output in the presence of uncertainty
regarding the true state of the channel. We develop approximations for the
mutual information as well as both upper and lower bounds on the mutual
information that are stated explicitly in terms of the dimension of the signal
constellation, the number of resolvable fading paths on the channel, the
current estimate of channel state, and the mean-squared-error of the channel
estimate. We analyze these approximations and bounds in order to quantify the
impact of signal dimension and symbol distribution on system performance.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2006 19:28:22 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Barton",
"Richard J.",
""
]
] |
cs/0604031
|
Amos Lapidoth
|
Amos Lapidoth and Ligong Wang
|
On the Low SNR Capacity of Peak-Limited Non-Coherent Fading Channels
with Memory
| null | null | null | null |
cs.IT math.IT
| null |
The capacity of non-coherent stationary Gaussian fading channels with memory
under a peak-power constraint is studied in the asymptotic weak-signal regime.
It is assumed that the fading law is known to both transmitter and receiver but
that neither is cognizant of the fading realization. A connection is
demonstrated between the asymptotic behavior of channel capacity in this regime
and the asymptotic behavior of the prediction error incurred in predicting the
fading process from very noisy observations of its past. This connection can be
viewed as the low signal-to-noise ratio (SNR) analog of recent results by
Lapidoth & Moser and by Lapidoth demonstrating connections between the high SNR
capacity growth and the noiseless or almost-noiseless prediction error. We
distinguish between two families of fading laws: the ``slowly forgetting'' and
the ``quickly forgetting''. For channels in the former category the low SNR
capacity is achieved by IID inputs, whereas in the latter such inputs are
typically sub-optimal. Instead, the asymptotic capacity can be approached by
inputs with IID phase but block-constant magnitude.
|
[
{
"version": "v1",
"created": "Fri, 7 Apr 2006 23:29:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Lapidoth",
"Amos",
""
],
[
"Wang",
"Ligong",
""
]
] |
cs/0604033
|
Shuangquan Wang
|
Shuangquan Wang, Ali Abdi
|
Statistical Properties of Eigen-Modes and Instantaneous Mutual
Information in MIMO Time-Varying Rayleigh Channels
|
25 pages, 7 figures, 1 table, submitted to IEEE Trans. Inform.
Theory, Apr., 2006
| null | null | null |
cs.IT math.IT
| null |
In this paper, we study two important metrics in multiple-input
multiple-output (MIMO) time-varying Rayleigh flat fading channels. One is the
eigen-mode, and the other is the instantaneous mutual information (IMI). Their
second-order statistics, such as the correlation coefficient, level crossing
rate (LCR), and average fade/outage duration, are investigated, assuming a
general nonisotropic scattering environment. Exact closed-form expressions are
derived and Monte Carlo simulations are provided to verify the accuracy of the
analytical results. For the eigen-modes, we found they tend to be
spatio-temporally uncorrelated in large MIMO systems. For the IMI, the results
show that its correlation coefficient can be well approximated by the squared
amplitude of the correlation coefficient of the channel, under certain
conditions. Moreover, we also found the LCR of IMI is much more sensitive to
the scattering environment than that of each eigen-mode.
|
[
{
"version": "v1",
"created": "Sat, 8 Apr 2006 15:55:21 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wang",
"Shuangquan",
""
],
[
"Abdi",
"Ali",
""
]
] |
cs/0604040
|
Nan Liu
|
Nan Liu and Sennur Ulukus
|
Optimal Distortion-Power Tradeoffs in Sensor Networks: Gauss-Markov
Random Processes
|
6 pages, 0 figure, to appear in ICC 2006
| null | null | null |
cs.IT math.IT
| null |
We investigate the optimal performance of dense sensor networks by studying
the joint source-channel coding problem. The overall goal of the sensor network
is to take measurements from an underlying random process, code and transmit
those measurement samples to a collector node in a cooperative multiple access
channel with feedback, and reconstruct the entire random process at the
collector node. We provide lower and upper bounds for the minimum achievable
expected distortion when the underlying random process is stationary and
Gaussian. In the case where the random process is also Markovian, we evaluate
the lower and upper bounds explicitly and show that they are of the same order
for a wide range of sum power constraints. Thus, for a Gauss-Markov random
process, under these sum power constraints, we determine the achievability
scheme that is order-optimal, and express the minimum achievable expected
distortion as a function of the sum power constraint.
|
[
{
"version": "v1",
"created": "Mon, 10 Apr 2006 16:48:48 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Nan",
""
],
[
"Ulukus",
"Sennur",
""
]
] |
cs/0604049
|
Vignesh Sethuraman
|
Vignesh Sethuraman, Bruce Hajek
|
Low SNR Capacity of Fading Channels with Peak and Average Power
Constraints
|
13 pages, version without proofs submitted to ISIT 2006
| null | null | null |
cs.IT math.IT
| null |
Flat-fading channels that are correlated in time are considered under peak
and average power constraints. For discrete-time channels, a new upper bound on
the capacity per unit time is derived. A low SNR analysis of a full-scattering
vector channel is used to derive a complimentary lower bound. Together, these
bounds allow us to identify the exact scaling of channel capacity for a fixed
peak to average ratio, as the average power converges to zero. The upper bound
is also asymptotically tight as the average power converges to zero for a fixed
peak power.
For a continuous time infinite bandwidth channel, Viterbi identified the
capacity for M-FSK modulation. Recently, Zhang and Laneman showed that the
capacity can be achieved with non-bursty signaling (QPSK). An additional
contribution of this paper is to obtain similar results under peak and average
power constraints.
|
[
{
"version": "v1",
"created": "Tue, 11 Apr 2006 23:02:57 GMT"
},
{
"version": "v2",
"created": "Thu, 13 Apr 2006 03:40:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sethuraman",
"Vignesh",
""
],
[
"Hajek",
"Bruce",
""
]
] |
cs/0604056
|
Woonchul Ham
|
Woonchul Ham, Kemin Zhou
|
A Short Note on The Volume of Hypersphere
| null | null | null | null |
cs.IT math.IT
| null |
In this note, a new method for deriving the volume of hypersphere is proposed
by using probability theory. The explicit expression of the multiple times
convolution of the probability density functions we should use is very
complicated. But in here, we don't need its whole explicit expression. We just
need the only a part of information and this fact make it possible to derive
the general expression of the voulume of hypersphere. We also comments about
the paradox in the hypersphere which was introduced by R.W.Hamming.
|
[
{
"version": "v1",
"created": "Thu, 13 Apr 2006 02:31:39 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ham",
"Woonchul",
""
],
[
"Zhou",
"Kemin",
""
]
] |
cs/0604057
|
R.N.Mohan Professor
|
R.N.Mohan and P.T.Kulkarni
|
A New Fault-Tolerant M-network and its Analysis
| null | null | null | null |
cs.IT math.IT
| null |
This paper introduces a new class of efficient inter connection networks
called as M-graphs for large multi-processor systems.The concept of M-matrix
and M-graph is an extension of Mn-matrices and Mn-graphs.We analyze these
M-graphs regarding their suitability for large multi-processor systems. An(p,N)
M-graph consists of N nodes, where p is the degree of each node.The topology is
found to be having many attractive features prominent among them is the
capability of maximal fault-tolerance, high density and constant diameter.It is
found that these combinatorial structures exibit some properties like
symmetry,and an inter-relation with the nodes, and degree of the concerned
graph, which can be utilized for the purposes of inter connected networks.But
many of the properties of these mathematical and graphical structures still
remained unexplored and the present aim of the paper is to study and analyze
some of the properties of these M-graphs and explore their application in
networks and multi-processor systems.
|
[
{
"version": "v1",
"created": "Thu, 13 Apr 2006 03:22:24 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Mohan",
"R. N.",
""
],
[
"Kulkarni",
"P. T.",
""
]
] |
cs/0604069
|
Neri Merhav
|
Neri Merhav and Meir Feder
|
Universal decoding with an erasure option
|
23 pages. submitted to the IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
Motivated by applications of rateless coding, decision feedback, and ARQ, we
study the problem of universal decoding for unknown channels, in the presence
of an erasure option. Specifically, we harness the competitive minimax
methodology developed in earlier studies, in order to derive a universal
version of Forney's classical erasure/list decoder, which in the erasure case,
optimally trades off between the probability of erasure and the probability of
undetected error. The proposed universal erasure decoder guarantees universal
achievability of a certain fraction $\xi$ of the optimum error exponents of
these probabilities (in a sense to be made precise in the sequel). A
single--letter expression for $\xi$, which depends solely on the coding rate
and the threshold, is provided. The example of the binary symmetric channel is
studied in full detail, and some conclusions are drawn.
|
[
{
"version": "v1",
"created": "Tue, 18 Apr 2006 16:42:03 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Merhav",
"Neri",
""
],
[
"Feder",
"Meir",
""
]
] |
cs/0604083
|
Ori Shental
|
Ori Shental and Ido Kanter
|
Optimum Asymptotic Multiuser Efficiency of Pseudo-Orthogonal Randomly
Spread CDMA
|
WIC 27th Symposium on Information Theory in the Benelux, 2006
| null | null | null |
cs.IT math.IT
| null |
A $K$-user pseudo-orthogonal (PO) randomly spread CDMA system, equivalent to
transmission over a subset of $K'\leq K$ single-user Gaussian channels, is
introduced. The high signal-to-noise ratio performance of the PO-CDMA is
analyzed by rigorously deriving its asymptotic multiuser efficiency (AME) in
the large system limit. Interestingly, the $K'$-optimized PO-CDMA transceiver
scheme yields an AME which is practically equal to 1 for system loads smaller
than 0.1 and lower bounded by 1/4 for increasing loads. As opposed to the
vanishing efficiency of linear multiuser detectors, the derived efficiency is
comparable to the ultimate CDMA efficiency achieved for the intractable optimal
multiuser detector.
|
[
{
"version": "v1",
"created": "Fri, 21 Apr 2006 14:47:18 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Shental",
"Ori",
""
],
[
"Kanter",
"Ido",
""
]
] |
cs/0604085
|
Gayathre Krishnan
|
Gayathre Krishnan
|
Information in Quantum Description and Gate Implementation
|
4 pages
| null | null | null |
cs.IT math.IT
| null |
This note considers Kak's observer-reference model of quantum information,
where it is shown that qubits carry information that is sqrt n / ln n times
classical information, where n is the number of components in the measurement
system, to analyze information processing in quantum gates. The obverse side of
this exponential nature of quantum information is that the computational
complexity of implementing unconditionally reliable quantum gates is also
exponential.
|
[
{
"version": "v1",
"created": "Fri, 21 Apr 2006 16:36:45 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Krishnan",
"Gayathre",
""
]
] |
cs/0604091
|
Jun Chen
|
Jun Chen, Toby Berger
|
Robust Distributed Source Coding
|
40 pages, submitted to the IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
We consider a distributed source coding system in which several observations
are communicated to the decoder using limited transmission rate. The
observations must be separately coded. We introduce a robust distributed coding
scheme which flexibly trades off between system robustness and compression
efficiency. The optimality of this coding scheme is proved for various special
cases.
|
[
{
"version": "v1",
"created": "Sun, 23 Apr 2006 20:44:23 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Chen",
"Jun",
""
],
[
"Berger",
"Toby",
""
]
] |
cs/0604092
|
Sinan Gezici Dr
|
Sinan Gezici, Mung Chiang, H. Vincent Poor, and Hisashi Kobayashi
|
Optimal and Suboptimal Finger Selection Algorithms for MMSE Rake
Receivers in Impulse Radio UWB Systems
|
Submitted to the EURASIP Journal on Wireless Communications and
Networking - Special Issue on Ultra-Wideband (UWB) Communication Systems -
Technology and Applications
| null | null | null |
cs.IT math.IT
| null |
The problem of choosing the optimal multipath components to be employed at a
minimum mean square error (MMSE) selective Rake receiver is considered for an
impulse radio ultra-wideband system. First, the optimal finger selection
problem is formulated as an integer programming problem with a non-convex
objective function. Then, the objective function is approximated by a convex
function and the integer programming problem is solved by means of constraint
relaxation techniques. The proposed algorithms are suboptimal due to the
approximate objective function and the constraint relaxation steps. However,
they perform better than the conventional finger selection algorithm, which is
suboptimal since it ignores the correlation between multipath components, and
they can get quite close to the optimal scheme that cannot be implemented in
practice due to its complexity. In addition to the convex relaxation
techniques, a genetic algorithm (GA) based approach is proposed, which does not
need any approximations or integer relaxations. This iterative algorithm is
based on the direct evaluation of the objective function, and can achieve
near-optimal performance with a reasonable number of iterations. Simulation
results are presented to compare the performance of the proposed finger
selection algorithms with that of the conventional and the optimal schemes.
|
[
{
"version": "v1",
"created": "Sun, 23 Apr 2006 23:51:34 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gezici",
"Sinan",
""
],
[
"Chiang",
"Mung",
""
],
[
"Poor",
"H. Vincent",
""
],
[
"Kobayashi",
"Hisashi",
""
]
] |
cs/0604104
|
Navin Kashyap
|
Akiko Manada and Navin Kashyap
|
On the Shannon Covers of Certain Irreducible Constrained Systems of
Finite Type
|
5 pages, 9 figures; to appear in the Proceedings of the 2006
International Symposium on Information Theory, July 2006
| null | null | null |
cs.IT cs.DM math.IT
| null |
A construction of Crochemore, Mignosi and Restivo in the automata theory
literature gives a presentation of a finite-type constrained system (FTCS) that
is deterministic and has a relatively small number of states. This construction
is thus a good starting point for determining the minimal deterministic
presentation, known as the Shannon cover, of an FTCS. We analyze in detail the
Crochemore-Mignosi-Restivo (CMR) construction in the case when the list of
forbidden words defining the FTCS is of size at most two. We show that if the
FTCS is irreducible, then an irreducible presentation for the system can be
easily obtained by deleting a prescribed few states from the CMR presentation.
By studying the follower sets of the states in this irreducible presentation,
we are able to explicitly determine the Shannon cover in some cases. In
particular, our results show that the CMR construction directly yields the
Shannon cover in the case of an irreducible FTCS with exactly one forbidden
word, but this is not in general the case for FTCS's with two forbidden words.
|
[
{
"version": "v1",
"created": "Wed, 26 Apr 2006 06:16:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Manada",
"Akiko",
""
],
[
"Kashyap",
"Navin",
""
]
] |
cs/0604106
|
Ofer Shayevitz
|
Ofer Shayevitz, Ram Zamir and Meir Feder
|
Bounded expected delay in arithmetic coding
| null | null | null | null |
cs.IT math.IT
| null |
We address the problem of delay in an arithmetic coding system. Due to the
nature of the arithmetic coding process, source sequences causing arbitrarily
large encoding or decoding delays exist. This phenomena raises the question of
just how large is the expected input to output delay in these systems, i.e.,
once a source sequence has been encoded, what is the expected number of source
letters that should be further encoded to allow full decoding of that sequence.
In this paper, we derive several new upper bounds on the expected delay for a
memoryless source, which improve upon a known bound due to Gallager. The bounds
provided are uniform in the sense of being independent of the sequence's
history. In addition, we give a sufficient condition for a source to admit a
bounded expected delay, which holds for a stationary ergodic Markov source of
any order.
|
[
{
"version": "v1",
"created": "Wed, 26 Apr 2006 13:58:53 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Shayevitz",
"Ofer",
""
],
[
"Zamir",
"Ram",
""
],
[
"Feder",
"Meir",
""
]
] |
cs/0604107
|
Aleksandar Jovicic
|
Aleksandar Jovicic and Pramod Viswanath
|
Cognitive Radio: An Information-Theoretic Perspective
|
34 pages, Sections 5 and A.2 updated
| null | null | null |
cs.IT math.IT
| null |
Cognitive radios have been proposed as a means to implement efficient reuse
of the licensed spectrum. The key feature of a cognitive radio is its ability
to recognize the primary (licensed) user and adapt its communication strategy
to minimize the interference that it generates. We consider a communication
scenario in which the primary and the cognitive user wish to communicate to
different receivers, subject to mutual interference. Modeling the cognitive
radio as a transmitter with side-information about the primary transmission, we
characterize the largest rate at which the cognitive radio can reliably
communicate under the constraint that (i) no interference is created for the
primary user, and (ii) the primary encoder-decoder pair is oblivious to the
presence of the cognitive radio.
|
[
{
"version": "v1",
"created": "Thu, 27 Apr 2006 06:00:07 GMT"
},
{
"version": "v2",
"created": "Tue, 9 May 2006 23:47:52 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jovicic",
"Aleksandar",
""
],
[
"Viswanath",
"Pramod",
""
]
] |
cs/0605001
|
Chao Tian
|
Chao Tian and Suhas Diggavi
|
On Multistage Successive Refinement for Wyner-Ziv Source Coding with
Degraded Side Informations
|
Submitted to IEEE Trans. Information Theory Apr. 2006
| null | null | null |
cs.IT math.IT
| null |
We provide a complete characterization of the rate-distortion region for the
multistage successive refinement of the Wyner-Ziv source coding problem with
degraded side informations at the decoder. Necessary and sufficient conditions
for a source to be successively refinable along a distortion vector are
subsequently derived. A source-channel separation theorem is provided when the
descriptions are sent over independent channels for the multistage case.
Furthermore, we introduce the notion of generalized successive refinability
with multiple degraded side informations. This notion captures whether
progressive encoding to satisfy multiple distortion constraints for different
side informations is as good as encoding without progressive requirement.
Necessary and sufficient conditions for generalized successive refinability are
given. It is shown that the following two sources are generalized successively
refinable: (1) the Gaussian source with degraded Gaussian side informations,
(2) the doubly symmetric binary source when the worse side information is a
constant. Thus for both cases, the failure of being successively refinable is
only due to the inherent uncertainty on which side information will occur at
the decoder, but not the progressive encoding requirement.
|
[
{
"version": "v1",
"created": "Mon, 1 May 2006 12:41:23 GMT"
},
{
"version": "v2",
"created": "Tue, 2 May 2006 18:20:06 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Tian",
"Chao",
""
],
[
"Diggavi",
"Suhas",
""
]
] |
cs/0605005
|
Ruoheng Liu
|
Ruoheng Liu, Ivana Maric, Roy D. Yates, and Predrag Spasojevic
|
The Discrete Memoryless Multiple Access Channel with Confidential
Messages
|
1 figure, accepted by ISIT 2006 conference
| null | null | null |
cs.IT math.IT
| null |
A multiple-access channel is considered in which messages from one encoder
are confidential. Confidential messages are to be transmitted with perfect
secrecy, as measured by equivocation at the other encoder. The upper bounds and
the achievable rates for this communication situation are determined.
|
[
{
"version": "v1",
"created": "Mon, 1 May 2006 21:19:29 GMT"
},
{
"version": "v2",
"created": "Sat, 17 Feb 2007 20:28:23 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Ruoheng",
""
],
[
"Maric",
"Ivana",
""
],
[
"Yates",
"Roy D.",
""
],
[
"Spasojevic",
"Predrag",
""
]
] |
cs/0605006
|
Shengtian Yang
|
Shengtian Yang, Peiliang Qiu
|
An Information-Spectrum Approach to Multiterminal Rate-Distortion Theory
|
Submitted to IEEE Transactions on Information Theory (Apr. 2006)
| null | null | null |
cs.IT math.IT
| null |
An information-spectrum approach is applied to solve the multiterminal source
coding problem for correlated general sources, where sources may be
nonstationary and/or nonergodic, and the distortion measure is arbitrary and
may be nonadditive. A general formula for the rate-distortion region of the
multiterminal source coding problem with the maximum distortion criterion under
fixed-length coding is shown in this correspondence.
|
[
{
"version": "v1",
"created": "Tue, 2 May 2006 01:29:01 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Yang",
"Shengtian",
""
],
[
"Qiu",
"Peiliang",
""
]
] |
cs/0605009
|
Marcus Hutter
|
Marcus Hutter
|
On the Foundations of Universal Sequence Prediction
|
14 pages
|
Proc. 3rd Annual Conference on Theory and Applications of Models
of Computation (TAMC 2006) pages 408-420
| null |
IDSIA-03-06
|
cs.LG cs.IT math.IT math.ST stat.TH
| null |
Solomonoff completed the Bayesian framework by providing a rigorous, unique,
formal, and universal choice for the model class and the prior. We discuss in
breadth how and in which sense universal (non-i.i.d.) sequence prediction
solves various (philosophical) problems of traditional Bayesian sequence
prediction. We show that Solomonoff's model possesses many desirable
properties: Fast convergence and strong bounds, and in contrast to most
classical continuous prior densities has no zero p(oste)rior problem, i.e. can
confirm universal hypotheses, is reparametrization and regrouping invariant,
and avoids the old-evidence and updating problem. It even performs well
(actually better) in non-computable environments.
|
[
{
"version": "v1",
"created": "Wed, 3 May 2006 07:47:21 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Hutter",
"Marcus",
""
]
] |
cs/0605010
|
Di Wu
|
Di Wu and Predrag Spasojevic
|
Complementary Set Matrices Satisfying a Column Correlation Constraint
| null | null | null | null |
cs.IT math.IT
| null |
Motivated by the problem of reducing the peak to average power ratio (PAPR)
of transmitted signals, we consider a design of complementary set matrices
whose column sequences satisfy a correlation constraint. The design algorithm
recursively builds a collection of $2^{t+1}$ mutually orthogonal (MO)
complementary set matrices starting from a companion pair of sequences. We
relate correlation properties of column sequences to that of the companion pair
and illustrate how to select an appropriate companion pair to ensure that a
given column correlation constraint is satisfied. For $t=0$, companion pair
properties directly determine matrix column correlation properties. For $t\geq
1$, reducing correlation merits of the companion pair may lead to improved
column correlation properties. However, further decrease of the maximum
out-off-phase aperiodic autocorrelation of column sequences is not possible
once the companion pair correlation merit is less than a threshold determined
by $t$. We also reveal a design of the companion pair which leads to
complementary set matrices with Golay column sequences. Exhaustive search for
companion pairs satisfying a column correlation constraint is infeasible for
medium and long sequences. We instead search for two shorter length sequences
by minimizing a cost function in terms of their autocorrelation and
crosscorrelation merits. Furthermore, an improved cost function which helps in
reducing the maximum out-off-phase column correlation is derived based on the
properties of the companion pair. By exploiting the well-known Welch bound,
sufficient conditions for the existence of companion pairs which satisfy a set
of column correlation constraints are also given.
|
[
{
"version": "v1",
"created": "Wed, 3 May 2006 16:19:22 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wu",
"Di",
""
],
[
"Spasojevic",
"Predrag",
""
]
] |
cs/0605014
|
Yingbin Liang
|
Yingbin Liang and H. Vincent Poor
|
Generalized Multiple Access Channels with Confidential Messages
|
Submitted to IEEE Transactions on Information Theory, April 2006
| null | null | null |
cs.IT math.IT
| null |
A discrete memoryless generalized multiple access channel (GMAC) with
confidential messages is studied, where two users attempt to transmit common
information to a destination and each user also has private (confidential)
information intended for the destination. The two users are allowed to receive
channel outputs, and hence may obtain the confidential information sent by each
other from channel outputs they receive. However, each user views the other
user as a wire-tapper, and wishes to keep its confidential information as
secret as possible from the other user. The level of secrecy of the
confidential information is measured by the equivocation rate, i.e., the
entropy rate of the confidential information conditioned on channel outputs at
the wire-tapper. The performance measure of interest for the GMAC with
confidential messages is the rate-equivocation tuple that includes the common
rate, two private rates and two equivocation rates as components. The set that
includes all these achievable rate-equivocation tuples is referred to as the
capacity-equivocation region. The GMAC with one confidential message set is
first studied, where only one user (user 1) has private (confidential)
information for the destination. Inner and outer bounds on the
capacity-equivocation region are derived, and the capacity-equivocation are
established for some classes of channels including the Gaussian GMAC.
Furthermore, the secrecy capacity region is established, which is the set of
all achievable rates with user 2 being perfectly ignorant of confidential
messages of user 1. For the GMAC with two confidential message sets, where both
users have confidential messages for the destination, an inner bound on the
capacity-equivocation region is obtained.
|
[
{
"version": "v1",
"created": "Thu, 4 May 2006 18:33:15 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liang",
"Yingbin",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
cs/0605016
|
Yingbin Liang
|
Yingbin Liang and Venugopal V. Veeravalli
|
Cooperative Relay Broadcast Channels
|
Submitted to the IEEE Transactions on Information Theory, July 2005
| null | null | null |
cs.IT math.IT
| null |
The capacity regions are investigated for two relay broadcast channels
(RBCs), where relay links are incorporated into standard two-user broadcast
channels to support user cooperation. In the first channel, the Partially
Cooperative Relay Broadcast Channel, only one user in the system can act as a
relay and transmit to the other user through a relay link. An achievable rate
region is derived based on the relay using the decode-and-forward scheme. An
outer bound on the capacity region is derived and is shown to be tighter than
the cut-set bound. For the special case where the Partially Cooperative RBC is
degraded, the achievable rate region is shown to be tight and provides the
capacity region. Gaussian Partially Cooperative RBCs and Partially Cooperative
RBCs with feedback are further studied. In the second channel model being
studied in the paper, the Fully Cooperative Relay Broadcast Channel, both users
can act as relay nodes and transmit to each other through relay links. This is
a more general model than the Partially Cooperative RBC. All the results for
Partially Cooperative RBCs are correspondingly generalized to the Fully
Cooperative RBCs. It is further shown that the AWGN Fully Cooperative RBC has a
larger achievable rate region than the AWGN Partially Cooperative RBC. The
results illustrate that relaying and user cooperation are powerful techniques
in improving the capacity of broadcast channels.
|
[
{
"version": "v1",
"created": "Thu, 4 May 2006 19:13:50 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liang",
"Yingbin",
""
],
[
"Veeravalli",
"Venugopal V.",
""
]
] |
cs/0605023
|
Ender Tekin
|
Ender Tekin and Aylin Yener
|
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy
Constraints
|
International Symposium on Information Theory, 2006. 5 pages
| null | null | null |
cs.IT cs.CR math.IT
| null |
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this
scenario, multiple users communicate with an intended receiver in the presence
of an intelligent and informed wire-tapper who receives a degraded version of
the signal at the receiver. We define a suitable security measure for this
multi-access environment. We derive an outer bound for the rate region such
that secrecy to some pre-determined degree can be maintained. We also find,
using Gaussian codebooks, an achievable such secrecy region. Gaussian codewords
are shown to achieve the sum capacity outer bound, and the achievable region
concides with the outer bound for Gaussian codewords, giving the capacity
region when inputs are constrained to be Gaussian. We present numerical results
showing the new rate region and compare it with that of the Gaussian
Multiple-Access Channel (GMAC) with no secrecy constraints.
|
[
{
"version": "v1",
"created": "Sat, 6 May 2006 16:22:26 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Tekin",
"Ender",
""
],
[
"Yener",
"Aylin",
""
]
] |
cs/0605044
|
Georg Schmidt
|
Georg Schmidt, and Vladimir R. Sidorenko
|
Linear Shift-Register Synthesis for Multiple Sequences of Varying Length
| null | null | null | null |
cs.IT math.IT
| null |
The problem of finding the shortest linear shift-register capable of
generating t finite length sequences over some field F is considered. A similar
problem was already addressed by Feng and Tzeng. They presented an iterative
algorithm for solving this multi-sequence shift-register synthesis problem,
which can be considered as generalization of the well known Berlekamp-Massey
algorithm. The Feng-Tzeng algorithm works indeed, if all t sequences have the
same length. This paper focuses on multi-sequence shift-register synthesis for
generating sequences of varying length. It is exposed, that the Feng-Tzeng
algorithm does not always give the correct solution in this case. A modified
algorithm is proposed and formally proved, which overcomes this problem.
|
[
{
"version": "v1",
"created": "Tue, 9 May 2006 21:23:11 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Schmidt",
"Georg",
""
],
[
"Sidorenko",
"Vladimir R.",
""
]
] |
cs/0605051
|
Chad Cole
|
Chad A. Cole, Stephen G. Wilson, Eric. K. Hall, Thomas R. Giallorenzi
|
A General Method for Finding Low Error Rates of LDPC Codes
|
Submitted Trans. Inf. Theory
| null | null | null |
cs.IT math.IT
| null |
This paper outlines a three-step procedure for determining the low bit error
rate performance curve of a wide class of LDPC codes of moderate length. The
traditional method to estimate code performance in the higher SNR region is to
use a sum of the contributions of the most dominant error events to the
probability of error. These dominant error events will be both code and decoder
dependent, consisting of low-weight codewords as well as non-codeword events if
ML decoding is not used. For even moderate length codes, it is not feasible to
find all of these dominant error events with a brute force search. The proposed
method provides a convenient way to evaluate very low bit error rate
performance of an LDPC code without requiring knowledge of the complete error
event weight spectrum or resorting to a Monte Carlo simulation. This new method
can be applied to various types of decoding such as the full belief propagation
version of the message passing algorithm or the commonly used min-sum
approximation to belief propagation. The proposed method allows one to
efficiently see error performance at bit error rates that were previously out
of reach of Monte Carlo methods. This result will provide a solid foundation
for the analysis and design of LDPC codes and decoders that are required to
provide a guaranteed very low bit error rate performance at certain SNRs.
|
[
{
"version": "v1",
"created": "Thu, 11 May 2006 14:21:36 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Cole",
"Chad A.",
""
],
[
"Wilson",
"Stephen G.",
""
],
[
"Hall",
"Eric. K.",
""
],
[
"Giallorenzi",
"Thomas R.",
""
]
] |
cs/0605071
|
Wei Wu
|
Wei Wu, Sriram Vishwanath and Ari Arapostathis
|
On the Capacity of Interference Channels with Degraded Message sets
| null | null | null | null |
cs.IT math.IT
| null |
This paper is motivated by a sensor network on a correlated field where
nearby sensors share information, and can thus assist rather than interfere
with one another. A special class of two-user Gaussian interference channels
(IFCs) is considered where one of the two transmitters knows both the messages
to be conveyed to the two receivers (called the IFC with degraded message
sets). Both achievability and converse arguments are provided for this scenario
for a class of discrete memoryless channels with weak interference. For the
case of the Gaussian weak interference channel with degraded message sets,
optimality of Gaussian inputs is also shown, resulting in the capacity region
of this channel.
|
[
{
"version": "v1",
"created": "Wed, 17 May 2006 07:19:16 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wu",
"Wei",
""
],
[
"Vishwanath",
"Sriram",
""
],
[
"Arapostathis",
"Ari",
""
]
] |
cs/0605072
|
Wei Wu
|
Wei Wu, Sriram Vishwanath and Ari Arapostathis
|
On the Capacity of Gaussian Weak Interference Channels with Degraded
Message sets
|
This paper appears in CISS 2006, Princeton, NJ
| null | null | null |
cs.IT math.IT
| null |
This paper is motivated by a sensor network on a correlated field where
nearby sensors share information, and can thus assist rather than interfere
with one another. We consider a special class of two-user Gaussian interference
channels (IFCs) where one of the two transmitters knows both the messages to be
conveyed to the two receivers. Both achievability and converse arguments are
provided for a channel with Gaussian inputs and Gaussian noise when the
interference is weaker than the direct link (a so called weak IFC). In general,
this region serves as an outer bound on the capacity of weak IFCs with no
shared knowledge between transmitters.
|
[
{
"version": "v1",
"created": "Wed, 17 May 2006 07:34:50 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wu",
"Wei",
""
],
[
"Vishwanath",
"Sriram",
""
],
[
"Arapostathis",
"Ari",
""
]
] |
cs/0605077
|
Taesup Moon
|
Taesup Moon, Tsachy Weissman
|
Universal Filtering via Hidden Markov Modeling
|
29 pages
| null | null | null |
cs.IT math.IT
| null |
The problem of discrete universal filtering, in which the components of a
discrete signal emitted by an unknown source and corrupted by a known DMC are
to be causally estimated, is considered. A family of filters are derived, and
are shown to be universally asymptotically optimal in the sense of achieving
the optimum filtering performance when the clean signal is stationary, ergodic,
and satisfies an additional mild positivity condition. Our schemes are
comprised of approximating the noisy signal using a hidden Markov process (HMP)
via maximum-likelihood (ML) estimation, followed by the use of the forward
recursions for HMP state estimation. It is shown that as the data length
increases, and as the number of states in the HMP approximation increases, our
family of filters attain the performance of the optimal distribution-dependent
filter.
|
[
{
"version": "v1",
"created": "Wed, 17 May 2006 18:00:10 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Moon",
"Taesup",
""
],
[
"Weissman",
"Tsachy",
""
]
] |
cs/0605079
|
Amos Lapidoth
|
Amos Lapidoth, Shlomo Shamai, Michele Wigger
|
On the Capacity of Fading MIMO Broadcast Channels with Imperfect
Transmitter Side-Information
|
Extended version of a paper of the same title that appeared in the
Proceedings of the 43rd Annual Allerton Conference on Communication, Control,
and Computing, Sept. 28-30, 2005
| null | null | null |
cs.IT math.IT
| null |
A fading broadcast channel is considered where the transmitter employs two
antennas and each of the two receivers employs a single receive antenna. It is
demonstrated that even if the realization of the fading is precisely known to
the receivers, the high signal-to-noise (SNR) throughput is greatly reduced if,
rather than knowing the fading realization \emph{precisely}, the trasmitter
only knows the fading realization \emph{approximately}. The results are general
and are not limited to memoryless Gaussian fading.
|
[
{
"version": "v1",
"created": "Wed, 17 May 2006 22:29:44 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Lapidoth",
"Amos",
""
],
[
"Shamai",
"Shlomo",
""
],
[
"Wigger",
"Michele",
""
]
] |
cs/0605084
|
Yingbin Liang
|
Yingbin Liang and H. Vincent Poor
|
The Generalized Multiple Access Channel with Confidential Messages
|
To appear in the Proceedings of the 2006 IEEE International Symposium
on Information Theory, Seattle, WA, July 9 - 14, 2006
| null | null | null |
cs.IT math.IT
| null |
A discrete memoryless generalized multiple access channel (GMAC) with
confidential messages is studied, where two users attempt to transmit common
information to a destination and each user also has private (confidential)
information intended for the destination. This channel generalizes the multiple
access channel (MAC) in that the two users also receive channel outputs. It is
assumed that each user views the other user as a wire-tapper, and wishes to
keep its confidential information as secret as possible from the other user.
The level of secrecy of the confidential information is measured by the
equivocation rate. The performance measure of interest is the rate-equivocation
tuple that includes the common rate, two private rates and two equivocation
rates as components. The set that includes all achievable rate-equivocation
tuples is referred to as the capacity-equivocation region. For the GMAC with
one confidential message set, where only one user (user 1) has private
(confidential) information for the destination, inner and outer bounds on the
capacity-equivocation region are derived. The secrecy capacity region is
established, which is the set of all achievable rates with user 2 being
perfectly ignorant of confidential messages of user 1. Furthermore, the
capacity-equivocation region and the secrecy capacity region are established
for the degraded GMAC with one confidential message set. For the GMAC with two
confidential message sets, where both users have confidential messages for the
destination, inner bounds on the capacity-equivocation region and the secrecy
capacity region are obtained.
|
[
{
"version": "v1",
"created": "Fri, 19 May 2006 05:02:09 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liang",
"Yingbin",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
cs/0605086
|
Chih-Chun Wang
|
Chih-Chun Wang (1), Sanjeev R. Kulkarni (2), H. Vincent Poor (2) ((1)
Purdue University, (2) Princeton University)
|
Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary
Erasure Channels
|
To appear in the Proceedings of the 2006 IEEE International Symposium
on Information Theory, Seattle, WA, July 9 - 14, 2006
| null | null | null |
cs.IT math.IT
| null |
Assuming iterative decoding for binary erasure channels (BECs), a novel
tree-based technique for upper bounding the bit error rates (BERs) of
arbitrary, finite low-density parity-check (LDPC) codes is provided and the
resulting bound can be evaluated for all operating erasure probabilities,
including both the waterfall and the error floor regions. This upper bound can
also be viewed as a narrowing search of stopping sets, which is an approach
different from the stopping set enumeration used for lower bounding the error
floor. When combined with optimal leaf-finding modules, this upper bound is
guaranteed to be tight in terms of the asymptotic order. The Boolean framework
proposed herein further admits a composite search for even tighter results. For
comparison, a refinement of the algorithm is capable of exhausting all stopping
sets of size <14 for irregular LDPC codes of length n=500, which requires
approximately 1.67*10^25 trials if a brute force approach is taken. These
experiments indicate that this upper bound can be used both as an analytical
tool and as a deterministic worst-performance (error floor) guarantee, the
latter of which is crucial to optimizing LDPC codes for extremely low BER
applications, e.g., optical/satellite communications.
|
[
{
"version": "v1",
"created": "Fri, 19 May 2006 17:55:08 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wang",
"Chih-Chun",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
cs/0605091
|
Martin Wainwright
|
Emin Martinian, Martin J. Wainwright
|
Low-density constructions can achieve the Wyner-Ziv and Gelfand-Pinsker
bounds
|
To appear at International Symposium on Information Theory, Seattle,
WA. July 2006
| null | null | null |
cs.IT math.IT
| null |
We describe and analyze sparse graphical code constructions for the problems
of source coding with decoder side information (the Wyner-Ziv problem), and
channel coding with encoder side information (the Gelfand-Pinsker problem). Our
approach relies on a combination of low-density parity check (LDPC) codes and
low-density generator matrix (LDGM) codes, and produces sparse constructions
that are simultaneously good as both source and channel codes. In particular,
we prove that under maximum likelihood encoding/decoding, there exist
low-density codes (i.e., with finite degrees) from our constructions that can
saturate both the Wyner-Ziv and Gelfand-Pinsker bounds.
|
[
{
"version": "v1",
"created": "Sun, 21 May 2006 19:36:09 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Martinian",
"Emin",
""
],
[
"Wainwright",
"Martin J.",
""
]
] |
cs/0605098
|
Sharon Betz
|
Sharon Betz and H. Vincent Poor
|
Energy Efficiency in Multi-hop CDMA Networks: A Game Theoretic Analysis
|
To appear in the Proceedings of the Workshop on Multi-Layer Modelling
and Design of Multi-Hop Wireless Networks (MLMD 06), Minneapolis, MN, July 12
- 15, 2006
| null | null | null |
cs.IT math.IT
| null |
A game-theoretic analysis is used to study the effects of receiver choice on
the energy efficiency of multi-hop networks in which the nodes communicate
using Direct-Sequence Code Division Multiple Access (DS-CDMA). A Nash
equilibrium of the game in which the network nodes can choose their receivers
as well as their transmit powers to maximize the total number of bits they
transmit per unit of energy is derived. The energy efficiencies resulting from
the use of different linear multiuser receivers in this context are compared,
looking at both the non-cooperative game and the Pareto optimal solution. For
analytical ease, particular attention is paid to asymptotically large networks.
Significant gains in energy efficiency are observed when multiuser receivers,
particularly the linear minimum mean-square error (MMSE) receiver, are used
instead of conventional matched filter receivers.
|
[
{
"version": "v1",
"created": "Mon, 22 May 2006 16:47:54 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Betz",
"Sharon",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
cs/0605105
|
Chandra Nair
|
Chandra Nair, Abbas El Gamal
|
An outer bound to the capacity region of the broadcast channel
|
12 pages, 1 figure ISIT 2006
| null | null | null |
cs.IT math.IT
| null |
An outer bound to the capacity region of the two-receiver discrete memoryless
broadcast channel is given. The outer bound is tight for all cases where the
capacity region is known. When specialized to the case of no common
information, this outer bound is contained in the Korner-Marton outer bound.
This containment is shown to be strict for the binary skew-symmetric broadcast
channel. Thus, this outer bound is in general tighter than all other known
outer bounds on the discrete memoryless broadcast channel.
|
[
{
"version": "v1",
"created": "Wed, 24 May 2006 14:40:45 GMT"
},
{
"version": "v2",
"created": "Thu, 5 Oct 2006 16:58:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Nair",
"Chandra",
""
],
[
"Gamal",
"Abbas El",
""
]
] |
cs/0605116
|
Nan Liu
|
Nan Liu and Sennur Ulukus
|
Optimal Distortion-Power Tradeoffs in Gaussian Sensor Networks
|
5 pages, 0 figure, To appear in ISIT 2006
| null | null | null |
cs.IT math.IT
| null |
We investigate the optimal performance of dense sensor networks by studying
the joint source-channel coding problem. The overall goal of the sensor network
is to take measurements from an underlying random process, code and transmit
those measurement samples to a collector node in a cooperative multiple access
channel with imperfect feedback, and reconstruct the entire random process at
the collector node. We provide lower and upper bounds for the minimum
achievable expected distortion when the underlying random process is Gaussian.
In the case where the random process satisfies some general conditions, we
evaluate the lower and upper bounds explicitly and show that they are of the
same order for a wide range of sum power constraints. Thus, for these random
processes, under these sum power constraints, we determine the achievability
scheme that is order-optimal, and express the minimum achievable expected
distortion as a function of the sum power constraint.
|
[
{
"version": "v1",
"created": "Wed, 24 May 2006 20:58:55 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Nan",
""
],
[
"Ulukus",
"Sennur",
""
]
] |
cs/0605117
|
Seijoon Shim
|
Seijoon Shim, Chan-Byoung Chae, and Robert W. Heath Jr
|
A Lattice-Based MIMO Broadcast Precoder for Multi-Stream Transmission
|
30 pages, 9 figures, submitted to IEEE Trans. on Communications and
partly submitted to the Globecomm 2006
| null | null | null |
cs.IT math.IT
| null |
Precoding with block diagonalization is an attractive scheme for approaching
sum capacity in multiuser multiple input multiple output (MIMO) broadcast
channels. This method requires either global channel state information at every
receiver or an additional training phase, which demands additional system
planning. In this paper we propose a lattice based multi-user precoder that
uses block diagonalization combined with pre-equalization and perturbation for
the multiuser MIMO broadcast channel. An achievable sum rate of the proposed
scheme is derived and used to show that the proposed technique approaches the
achievable sum rate of block diagonalization with water-filling but does not
require the additional information at the receiver. Monte Carlo simulations
with equal power allocation show that the proposed method provides better bit
error rate and diversity performance than block diagonalization with a
zero-forcing receiver. Additionally, the proposed method shows similar
performance to the maximum likelihood receiver but with much lower receiver
complexity.
|
[
{
"version": "v1",
"created": "Thu, 25 May 2006 02:32:54 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Shim",
"Seijoon",
""
],
[
"Chae",
"Chan-Byoung",
""
],
[
"Heath",
"Robert W.",
"Jr"
]
] |
cs/0605135
|
Sergio Servetto
|
R. Dabora and S. D. Servetto (Cornell University)
|
On the Role of Estimate-and-Forward with Time-Sharing in Cooperative
Communications
|
Submitted to the IEEE Transactions on Information Theory, May 2006;
Revised, October 2006
| null | null | null |
cs.IT math.IT
| null |
In this work we focus on the general relay channel. We investigate the
application of estimate-and-forward (EAF) to different scenarios. Specifically,
we consider assignments of the auxiliary random variables that always satisfy
the feasibility constraints. We first consider the multiple relay channel and
obtain an achievable rate without decoding at the relays. We demonstrate the
benefits of this result via an explicit discrete memoryless multiple relay
scenario where multi-relay EAF is superior to multi-relay decode-and-forward
(DAF). We then consider the Gaussian relay channel with coded modulation, where
we show that a three-level quantization outperforms the Gaussian quantization
commonly used to evaluate the achievable rates in this scenario. Finally we
consider the cooperative general broadcast scenario with a multi-step
conference. We apply estimate-and-forward to obtain a general multi-step
achievable rate region. We then give an explicit assignment of the auxiliary
random variables, and use this result to obtain an explicit expression for the
single common message broadcast scenario with a two-step conference.
|
[
{
"version": "v1",
"created": "Mon, 29 May 2006 18:12:55 GMT"
},
{
"version": "v2",
"created": "Wed, 1 Nov 2006 07:56:58 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dabora",
"R.",
"",
"Cornell University"
],
[
"Servetto",
"S. D.",
"",
"Cornell University"
]
] |
cs/0606011
|
Hao Chen
|
Hao Chen, Liang Ma and Jianhua Li
|
Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes
|
11 pages, new version, minor corrections
| null | null | null |
cs.CR cs.IT math.IT
| null |
Propagation criterion of degree $l$ and order $k$ ($PC(l)$ of order $k$) and
resiliency of vectorial Boolean functions are important for cryptographic
purpose (see [1, 2, 3,6, 7,8,10,11,16]. Kurosawa, Stoh [8] and Carlet [1] gave
a construction of Boolean functions satisfying $PC(l)$ of order $k$ from binary
linear or nonlinear codes in. In this paper, algebraic-geometric codes over
$GF(2^m)$ are used to modify Carlet and Kurosawa-Satoh's construction for
giving vectorial resilient Boolean functions satisfying $PC(l)$ of order $k$.
The new construction is compared with previously known results.
|
[
{
"version": "v1",
"created": "Fri, 2 Jun 2006 05:50:15 GMT"
},
{
"version": "v2",
"created": "Mon, 12 Jun 2006 09:49:43 GMT"
},
{
"version": "v3",
"created": "Mon, 31 Jul 2006 07:01:10 GMT"
},
{
"version": "v4",
"created": "Sun, 3 Sep 2006 08:13:41 GMT"
},
{
"version": "v5",
"created": "Wed, 6 Sep 2006 04:33:25 GMT"
},
{
"version": "v6",
"created": "Tue, 19 Sep 2006 04:02:59 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Chen",
"Hao",
""
],
[
"Ma",
"Liang",
""
],
[
"Li",
"Jianhua",
""
]
] |
cs/0606014
|
Wei Wu
|
Wei Wu, Sriram Vishwanath and Ari Arapostathis
|
On the Capacity of Multiple Access Channels with State Information and
Feedback
|
Prelimenary result appears in ISIT 2006
| null | null | null |
cs.IT math.IT
| null |
In this paper, the multiple access channel (MAC) with channel state is
analyzed in a scenario where a) the channel state is known non-causally to the
transmitters and b) there is perfect causal feedback from the receiver to the
transmitters. An achievable region and an outer bound are found for a discrete
memoryless MAC that extend existing results, bringing together ideas from the
two separate domains of MAC with state and MAC with feedback. Although this
achievable region does not match the outer bound in general, special cases
where they meet are identified.
In the case of a Gaussian MAC, a specialized achievable region is found by
using a combination of dirty paper coding and a generalization of the
Schalkwijk-Kailath, Ozarow and Merhav-Weissman schemes, and this region is
found to be capacity achieving. Specifically, it is shown that additive
Gaussian interference that is known non-causally to the transmitter causes no
loss in capacity for the Gaussian MAC with feedback.
|
[
{
"version": "v1",
"created": "Sat, 3 Jun 2006 03:54:11 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wu",
"Wei",
""
],
[
"Vishwanath",
"Sriram",
""
],
[
"Arapostathis",
"Ari",
""
]
] |
cs/0606026
|
Ludo M.G.M. Tolhuizen
|
Henk D.L. Hollmann and Ludo M.G.M. Tolhuizen
|
Generating parity check equations for bounded-distance iterative erasure
decoding
|
Accepted for publication in Proc Int Symposium on Information Theory
2006, ISIT 06
| null | null | null |
cs.IT math.IT
| null |
A generic $(r,m)$-erasure correcting set is a collection of vectors in
$\bF_2^r$ which can be used to generate, for each binary linear code of
codimension $r$, a collection of parity check equations that enables iterative
decoding of all correctable erasure patterns of size at most $m$.
That is to say, the only stopping sets of size at most $m$ for the generated
parity check equations are the erasure patterns for which there is more than
one manner to fill in theerasures to obtain a codeword.
We give an explicit construction of generic $(r,m)$-erasure correcting sets
of cardinality $\sum_{i=0}^{m-1} {r-1\choose i}$. Using a random-coding-like
argument, we show that for fixed $m$, the minimum size of a generic
$(r,m)$-erasure correcting set is linear in $r$.
Keywords: iterative decoding, binary erasure channel, stopping set
|
[
{
"version": "v1",
"created": "Tue, 6 Jun 2006 18:03:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Hollmann",
"Henk D. L.",
""
],
[
"Tolhuizen",
"Ludo M. G. M.",
""
]
] |
cs/0606051
|
Shu-Tao Xia
|
Shu-Tao Xia, Fang-Wei Fu
|
Minimum Pseudo-Weight and Minimum Pseudo-Codewords of LDPC Codes
|
17 pages, 1 figure
| null | null | null |
cs.IT math.IT
| null |
In this correspondence, we study the minimum pseudo-weight and minimum
pseudo-codewords of low-density parity-check (LDPC) codes under linear
programming (LP) decoding. First, we show that the lower bound of Kelly,
Sridhara, Xu and Rosenthal on the pseudo-weight of a pseudo-codeword of an LDPC
code with girth greater than 4 is tight if and only if this pseudo-codeword is
a real multiple of a codeword. Then, we show that the lower bound of Kashyap
and Vardy on the stopping distance of an LDPC code is also a lower bound on the
pseudo-weight of a pseudo-codeword of this LDPC code with girth 4, and this
lower bound is tight if and only if this pseudo-codeword is a real multiple of
a codeword. Using these results we further show that for some LDPC codes, there
are no other minimum pseudo-codewords except the real multiples of minimum
codewords. This means that the LP decoding for these LDPC codes is
asymptotically optimal in the sense that the ratio of the probabilities of
decoding errors of LP decoding and maximum-likelihood decoding approaches to 1
as the signal-to-noise ratio leads to infinity. Finally, some LDPC codes are
listed to illustrate these results.
|
[
{
"version": "v1",
"created": "Mon, 12 Jun 2006 05:12:10 GMT"
},
{
"version": "v2",
"created": "Sat, 11 Nov 2006 14:07:48 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Xia",
"Shu-Tao",
""
],
[
"Fu",
"Fang-Wei",
""
]
] |
cs/0606052
|
Jos\'e M. F. Moura
|
Soummya Kar, Saeed Aldosari and Jos\'e M. F. Moura
|
Topology for Distributed Inference on Graphs
|
Submitted for Journal publication
| null | null | null |
cs.IT math.IT
| null |
Let $N$ local decision makers in a sensor network communicate with their
neighbors to reach a decision \emph{consensus}. Communication is local, among
neighboring sensors only, through noiseless or noisy links. We study the design
of the network topology that optimizes the rate of convergence of the iterative
decision consensus algorithm. We reformulate the topology design problem as a
spectral graph design problem, namely, maximizing the eigenratio~$\gamma$ of
two eigenvalues of the graph Laplacian~$L$, a matrix that is naturally
associated with the interconnectivity pattern of the network. This
reformulation avoids costly Monte Carlo simulations and leads to the class of
non-bipartite Ramanujan graphs for which we find a lower bound on~$\gamma$. For
Ramanujan topologies and noiseless links, the local probability of error
converges much faster to the overall global probability of error than for
structured graphs, random graphs, or graphs exhibiting small-world
characteristics. With noisy links, we determine the optimal number of
iterations before calling a decision. Finally, we introduce a new class of
random graphs that are easy to construct, can be designed with arbitrary number
of sensors, and whose spectral and convergence properties make them practically
equivalent to Ramanujan topologies.
|
[
{
"version": "v1",
"created": "Mon, 12 Jun 2006 17:32:33 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Kar",
"Soummya",
""
],
[
"Aldosari",
"Saeed",
""
],
[
"Moura",
"José M. F.",
""
]
] |
cs/0606071
|
Mehdi Ansari Sadrabadi Mr.
|
Mehdi Ansari Sadrabadi, Alireza Bayesteh and Amir K. Khandani
|
Scheduling and Codeword Length Optimization in Time Varying Wireless
Networks
| null | null | null |
#2006-01
|
cs.IT math.IT
| null |
In this paper, a downlink scenario in which a single-antenna base station
communicates with K single antenna users, over a time-correlated fading
channel, is considered. It is assumed that channel state information is
perfectly known at each receiver, while the statistical characteristics of the
fading process and the fading gain at the beginning of each frame are known to
the transmitter. By evaluating the random coding error exponent of the
time-correlated fading channel, it is shown that there is an optimal codeword
length which maximizes the throughput. The throughput of the conventional
scheduling that transmits to the user with the maximum signal to noise ratio is
examined using both fixed length codewords and variable length codewords.
Although optimizing the codeword length improves the performance, it is shown
that using the conventional scheduling, the gap between the achievable
throughput and the maximum possible throughput of the system tends to infinity
as K goes to infinity. A simple scheduling that considers both the signal to
noise ratio and the channel time variation is proposed. It is shown that by
using this scheduling, the gap between the achievable throughput and the
maximum throughput of the system approaches zero.
|
[
{
"version": "v1",
"created": "Thu, 15 Jun 2006 00:20:43 GMT"
},
{
"version": "v2",
"created": "Wed, 28 Mar 2007 18:10:44 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sadrabadi",
"Mehdi Ansari",
""
],
[
"Bayesteh",
"Alireza",
""
],
[
"Khandani",
"Amir K.",
""
]
] |
cs/0606074
|
Yingbin Liang
|
Yingbin Liang and Gerhard Kramer
|
Rate Regions for Relay Broadcast Channels
|
Submitted to the IEEE Transactions on Information Theory, June 2006
| null | null | null |
cs.IT math.IT
| null |
A partially cooperative relay broadcast channel (RBC) is a three-node network
with one source node and two destination nodes (destinations 1 and 2) where
destination 1 can act as a relay to assist destination 2. Inner and outer
bounds on the capacity region of the discrete memoryless partially cooperative
RBC are obtained. When the relay function is disabled, the inner and outer
bounds reduce to new bounds on the capacity region of broadcast channels. Four
classes of RBCs are studied in detail. For the partially cooperative RBC with
degraded message sets, inner and outer bounds are obtained. For the
semideterministic partially cooperative RBC and the orthogonal partially
cooperative RBC, the capacity regions are established. For the parallel
partially cooperative RBC with unmatched degraded subchannels, the capacity
region is established for the case of degraded message sets. The capacity is
also established when the source node has only a private message for
destination 2, i.e., the channel reduces to a parallel relay channel with
unmatched degraded subchannels.
|
[
{
"version": "v1",
"created": "Thu, 15 Jun 2006 14:41:12 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liang",
"Yingbin",
""
],
[
"Kramer",
"Gerhard",
""
]
] |
cs/0606083
|
Joakim Jalden
|
J. Jalden and B. Ottersten
|
The Diversity Order of the Semidefinite Relaxation Detector
|
Submitted to the IEEE Transactions on Information Theory, June 2006
| null | null | null |
cs.IT math.IT
| null |
We consider the detection of binary (antipodal) signals transmitted in a
spatially multiplexed fashion over a fading multiple-input multiple-output
(MIMO) channel and where the detection is done by means of semidefinite
relaxation (SDR). The SDR detector is an attractive alternative to maximum
likelihood (ML) detection since the complexity is polynomial rather than
exponential. Assuming that the channel matrix is drawn with i.i.d. real valued
Gaussian entries, we study the receiver diversity and prove that the SDR
detector achieves the maximum possible diversity. Thus, the error probability
of the receiver tends to zero at the same rate as the optimal maximum
likelihood (ML) receiver in the high signal to noise ratio (SNR) limit. This
significantly strengthens previous performance guarantees available for the
semidefinite relaxation detector. Additionally, it proves that full diversity
detection is in certain scenarios also possible when using a non-combinatorial
receiver structure.
|
[
{
"version": "v1",
"created": "Mon, 19 Jun 2006 13:45:41 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jalden",
"J.",
""
],
[
"Ottersten",
"B.",
""
]
] |
cs/0606090
|
Chris Snow
|
Chris Snow, Lutz Lampe and Robert Schober
|
Error Rate Analysis for Coded Multicarrier Systems over Quasi-Static
Fading Channels
|
31 pages, 9 figures, 1 table. Submitted to the IEEE Transactions on
Communications (June 20, 2006)
| null | null | null |
cs.IT math.IT
| null |
Several recent standards such as IEEE 802.11a/g, IEEE 802.16, and ECMA
Multiband Orthogonal Frequency Division Multiplexing (MB-OFDM) for high
data-rate Ultra-Wideband (UWB), employ bit-interleaved convolutionally-coded
multicarrier modulation over quasi-static fading channels. Motivated by the
lack of appropriate error rate analysis techniques for this popular type of
system and channel model, we present two novel analytical methods for bit error
rate (BER) estimation of coded multicarrier systems operating over
frequency-selective quasi-static channels with non-ideal interleaving. In the
first method, the approximate performance of the system is calculated for each
realization of the channel, which is suitable for obtaining the outage BER
performance (a common performance measure for e.g. MB-OFDM systems). The second
method assumes Rayleigh distributed frequency-domain subcarrier channel gains
and knowledge of their correlation matrix, and can be used to directly obtain
the average BER performance. Both methods are applicable to
convolutionally-coded interleaved multicarrier systems employing Quadrature
Amplitude Modulation (QAM), and are also able to account for narrowband
interference (modeled as a sum of tone interferers). To illustrate the
application of the proposed analysis, both methods are used to study the
performance of a tone-interference-impaired MB-OFDM system.
|
[
{
"version": "v1",
"created": "Tue, 20 Jun 2006 21:32:09 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Snow",
"Chris",
""
],
[
"Lampe",
"Lutz",
""
],
[
"Schober",
"Robert",
""
]
] |
cs/0606104
|
Te Sun Han
|
Te Sun Han
|
An information-spectrum approach to large deviation theorems
| null | null | null | null |
cs.IT math.IT
| null |
In this paper we show a some new look at large deviation theorems from the
viewpoint of the information-spectrum (IS) methods, which has been first
exploited in information theory, and also demonstrate a new basic formula for
the large deviation rate function in general, which is a pair of the lower and
upper IS rate functions. In particular, we are interested in establishing the
general large deviation rate functions that can be derivable as the
Fenchel-Legendre transform of the cumulant generating function. The final goal
is to show a necessary and sufficient condition for the rate function to be of
Cram\'er-G\"artner-Ellis type.
|
[
{
"version": "v1",
"created": "Mon, 26 Jun 2006 09:16:40 GMT"
},
{
"version": "v2",
"created": "Fri, 30 Jun 2006 05:11:36 GMT"
},
{
"version": "v3",
"created": "Mon, 10 Jul 2006 07:13:23 GMT"
},
{
"version": "v4",
"created": "Tue, 11 Jul 2006 04:39:19 GMT"
},
{
"version": "v5",
"created": "Wed, 12 Jul 2006 06:23:02 GMT"
},
{
"version": "v6",
"created": "Fri, 14 Jul 2006 10:51:11 GMT"
},
{
"version": "v7",
"created": "Mon, 17 Jul 2006 09:25:07 GMT"
},
{
"version": "v8",
"created": "Fri, 28 Jul 2006 06:59:23 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Han",
"Te Sun",
""
]
] |
cs/0606106
|
Andrew Thangaraj
|
Sundeep B and Andrew Thangaraj
|
Self-orthogonality of $q$-ary Images of $q^m$-ary Codes and Quantum Code
Construction
|
submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
A code over GF$(q^m)$ can be imaged or expanded into a code over GF$(q)$
using a basis for the extension field over the base field. The properties of
such an image depend on the original code and the basis chosen for imaging.
Problems relating the properties of a code and its image with respect to a
basis have been of great interest in the field of coding theory. In this work,
a generalized version of the problem of self-orthogonality of the $q$-ary image
of a $q^m$-ary code has been considered. Given an inner product (more
generally, a biadditive form), necessary and sufficient conditions have been
derived for a code over a field extension and an expansion basis so that an
image of that code is self-orthogonal. The conditions require that the original
code be self-orthogonal with respect to several related biadditive forms
whenever certain power sums of the dual basis elements do not vanish. Numerous
interesting corollaries have been derived by specializing the general
conditions. An interesting result for the canonical or regular inner product in
fields of characteristic two is that only self-orthogonal codes result in
self-orthogonal images. Another result is that image of a code is
self-orthogonal for all bases if and only if trace of the code is
self-orthogonal, except for the case of binary images of 4-ary codes. The
conditions are particularly simple to state and apply for cyclic codes. To
illustrate a possible application, new quantum error-correcting codes have been
constructed with larger minimum distance than previously known.
|
[
{
"version": "v1",
"created": "Mon, 26 Jun 2006 12:05:44 GMT"
},
{
"version": "v2",
"created": "Tue, 27 Jun 2006 05:45:58 GMT"
},
{
"version": "v3",
"created": "Sat, 6 Jan 2007 06:44:21 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"B",
"Sundeep",
""
],
[
"Thangaraj",
"Andrew",
""
]
] |
cs/0606114
|
Mohammad Rezaeian
|
Mohammad Rezaeian
|
Hidden Markov Process: A New Representation, Entropy Rate and Estimation
Entropy
|
7 pages. Submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
We consider a pair of correlated processes {Z_n} and {S_n} (two sided), where
the former is observable and the later is hidden. The uncertainty in the
estimation of Z_n upon its finite past history is H(Z_n|Z_0^{n-1}), and for
estimation of S_n upon this observation is H(S_n|Z_0^{n-1}), which are both
sequences of n. The limits of these sequences (and their existence) are of
practical and theoretical interest. The first limit, if exists, is the entropy
rate. We call the second limit the estimation entropy. An example of a process
jointly correlated to another one is the hidden Markov process. It is the
memoryless observation of the Markov state process where state transitions are
independent of past observations. We consider a new representation of hidden
Markov process using iterated function system. In this representation the state
transitions are deterministically related to the process. This representation
provides a unified framework for the analysis of the two limiting entropies for
this process, resulting in integral expressions for the limits. This analysis
shows that under mild conditions the limits exist and provides a simple method
for calculating the elements of the corresponding sequences.
|
[
{
"version": "v1",
"created": "Tue, 27 Jun 2006 15:00:12 GMT"
},
{
"version": "v2",
"created": "Fri, 28 Jul 2006 16:15:20 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Rezaeian",
"Mohammad",
""
]
] |
cs/0607002
|
Igal Sason
|
I. Sason and I. Goldenberg
|
Coding for Parallel Channels: Gallager Bounds for Binary Linear Codes
with Applications to Repeat-Accumulate Codes and Variations
|
Submitted to IEEE Trans. on Information Theory, June 2006 (57 pages,
9 figures)
| null | null | null |
cs.IT math.IT
| null |
This paper is focused on the performance analysis of binary linear block
codes (or ensembles) whose transmission takes place over independent and
memoryless parallel channels. New upper bounds on the maximum-likelihood (ML)
decoding error probability are derived. These bounds are applied to various
ensembles of turbo-like codes, focusing especially on repeat-accumulate codes
and their recent variations which possess low encoding and decoding complexity
and exhibit remarkable performance under iterative decoding. The framework of
the second version of the Duman and Salehi (DS2) bounds is generalized to the
case of parallel channels, along with the derivation of their optimized tilting
measures. The connection between the generalized DS2 and the 1961 Gallager
bounds, addressed by Divsalar and by Sason and Shamai for a single channel, is
explored in the case of an arbitrary number of independent parallel channels.
The generalization of the DS2 bound for parallel channels enables to re-derive
specific bounds which were originally derived by Liu et al. as special cases of
the Gallager bound. In the asymptotic case where we let the block length tend
to infinity, the new bounds are used to obtain improved inner bounds on the
attainable channel regions under ML decoding. The tightness of the new bounds
for independent parallel channels is exemplified for structured ensembles of
turbo-like codes. The improved bounds with their optimized tilting measures
show, irrespectively of the block length of the codes, an improvement over the
union bound and other previously reported bounds for independent parallel
channels; this improvement is especially pronounced for moderate to large block
lengths.
|
[
{
"version": "v1",
"created": "Sun, 2 Jul 2006 08:39:55 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sason",
"I.",
""
],
[
"Goldenberg",
"I.",
""
]
] |
cs/0607003
|
Igal Sason
|
M. Twitto, I. Sason and S. Shamai
|
Tightened Upper Bounds on the ML Decoding Error Probability of Binary
Linear Block Codes
|
Submitted to the IEEE Trans. on Information Theory (as a
correspondence), February 2006
| null | null | null |
cs.IT math.IT
| null |
The performance of maximum-likelihood (ML) decoded binary linear block codes
is addressed via the derivation of tightened upper bounds on their decoding
error probability. The upper bounds on the block and bit error probabilities
are valid for any memoryless, binary-input and output-symmetric communication
channel, and their effectiveness is exemplified for various ensembles of
turbo-like codes over the AWGN channel. An expurgation of the distance spectrum
of binary linear block codes further tightens the resulting upper bounds.
|
[
{
"version": "v1",
"created": "Sun, 2 Jul 2006 09:03:06 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Twitto",
"M.",
""
],
[
"Sason",
"I.",
""
],
[
"Shamai",
"S.",
""
]
] |
cs/0607004
|
Igal Sason
|
M. Twitto and I. Sason
|
On the Error Exponents of Some Improved Tangential-Sphere Bounds
|
Submitted to the IEEE Trans. on Information Theory (as a
correspondence), March 2006. Revised (August 2006)
| null | null | null |
cs.IT math.IT
| null |
The performance of maximum-likelihood (ML) decoded binary linear block codes
over the AWGN channel is addressed via the tangential-sphere bound (TSB) and
two of its recent improved versions. The paper is focused on the derivation of
the error exponents of these bounds. Although it was exemplified that some
recent improvements of the TSB tighten this bound for finite-length codes, it
is demonstrated in this paper that their error exponents coincide. For an
arbitrary ensemble of binary linear block codes, the common value of these
error exponents is explicitly expressed in terms of the asymptotic growth rate
of the average distance spectrum.
|
[
{
"version": "v1",
"created": "Sun, 2 Jul 2006 09:15:39 GMT"
},
{
"version": "v2",
"created": "Sat, 2 Sep 2006 21:27:11 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Twitto",
"M.",
""
],
[
"Sason",
"I.",
""
]
] |
cs/0607010
|
Samuel Sattath
|
Samuel Sattath
|
ITs, a structure sensitive information theory
| null | null | null | null |
cs.IT math.IT
| null |
Broadly speaking Information theory (IT) assumes no structure of the
underlying states. But what about contexts where states do have a clear
structure - how should IT cope with such situations? And if such coping is at
all possible then - how should structure be expressed so that it can be coped
with? A possible answer to these questions is presented here. Noting that IT
can cope well with a structure expressed as an accurate clustering (by shifting
to the implied reduced alphabet), a generalization is suggested in which
structure is expressed as a measure on reduced alphabets. Given such structure
an extension of IT is presented where the reduced alphabets are treated
simultaneously. This structure-sensitive IT, called ITs, extends traditional IT
in the sense that: a)there are structure-sensitive analogs to the notions of
traditional IT and b)translating a theorem in IT by replacing its notions with
their structure-sensitive counterparts, yields a (provable) theorem of ITs.
Seemingly paradoxically, ITs extends IT but it's completely within the
framework of IT. The richness of the suggested structures is demonstrated by
two disparate families studied in more detail: the family of hierarchical
structures and the family of linear structures. The formal findings extend the
scope of cases to which a rigorous application of IT can be applied (with
implications on quantization, for example). The implications on the foundations
of IT are that the assumption regarding no underlying structure of states is
not mandatory and that there is a framework for expressing such underlying
structure.
|
[
{
"version": "v1",
"created": "Mon, 3 Jul 2006 10:23:31 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sattath",
"Samuel",
""
]
] |
cs/0607020
|
Chun-Hao Hsu
|
Chun-Hao Hsu and Achilleas Anastasopoulos
|
Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels
|
10 pages, no figures. This paper is submitted to the 44rd Annual
Allerton Conference on Communication, Control and Computing, Monticello, IL,
USA, Sept. 27-29, 2006
| null | null | null |
cs.IT math.IT
| null |
The asymptotic iterative decoding performances of low-density parity-check
(LDPC) codes using min-sum (MS) and sum-product (SP) decoding algorithms on
memoryless binary-input output-symmetric (MBIOS) channels are analyzed in this
paper. For MS decoding, the analysis is done by upper bounding the bit error
probability of the root bit of a tree code by the sequence error probability of
a subcode of the tree code assuming the transmission of the all-zero codeword.
The result is a recursive upper bound on the bit error probability after each
iteration. For SP decoding, we derive a recursively determined lower bound on
the bit error probability after each iteration. This recursive lower bound
recovers the density evolution equation of LDPC codes on the binary erasure
channel (BEC) with inequalities satisfied with equalities. A significant
implication of this result is that the performance of LDPC codes under SP
decoding on the BEC is an upper bound of the performance on all MBIOS channels
with the same uncoded bit error probability. All results hold for the more
general multi-edge type LDPC codes.
|
[
{
"version": "v1",
"created": "Thu, 6 Jul 2006 19:08:26 GMT"
},
{
"version": "v2",
"created": "Fri, 7 Jul 2006 18:33:57 GMT"
},
{
"version": "v3",
"created": "Wed, 12 Jul 2006 19:02:24 GMT"
},
{
"version": "v4",
"created": "Tue, 18 Jul 2006 15:25:03 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Hsu",
"Chun-Hao",
""
],
[
"Anastasopoulos",
"Achilleas",
""
]
] |
cs/0607021
|
Jun Chen
|
Jun Chen, Da-ke He, and Ashish Jagmohan
|
Slepian-Wolf Code Design via Source-Channel Correspondence
|
to appear at ISIT 2006
| null | null | null |
cs.IT math.IT
| null |
We consider Slepian-Wolf code design based on LDPC (low-density parity-check)
coset codes for memoryless source-side information pairs. A density evolution
formula, equipped with a concentration theorem, is derived for Slepian- Wolf
coding based on LDPC coset codes. As a consequence, an intimate connection
between Slepian-Wolf coding and channel coding is established. Specifically we
show that, under density evolution, design of binary LDPC coset codes for
Slepian-Wolf coding of an arbitrary memoryless source-side information pair
reduces to design of binary LDPC codes for binary-input output-symmetric
channels without loss of optimality. With this connection, many classic results
in channel coding can be easily translated into the Slepian-Wolf setting.
|
[
{
"version": "v1",
"created": "Thu, 6 Jul 2006 22:14:47 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Chen",
"Jun",
""
],
[
"He",
"Da-ke",
""
],
[
"Jagmohan",
"Ashish",
""
]
] |
cs/0607024
|
Jos Weber
|
Jos H. Weber and Khaled A.S. Abdel-Ghaffar
|
Results on Parity-Check Matrices with Optimal Stopping and/or Dead-End
Set Enumerators
|
8 pages, submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
The performance of iterative decoding techniques for linear block codes
correcting erasures depends very much on the sizes of the stopping sets
associated with the underlying Tanner graph, or, equivalently, the parity-check
matrix representing the code. In this paper, we introduce the notion of
dead-end sets to explicitly demonstrate this dependency. The choice of the
parity-check matrix entails a trade-off between performance and complexity. We
give bounds on the complexity of iterative decoders achieving optimal
performance in terms of the sizes of the underlying parity-check matrices.
Further, we fully characterize codes for which the optimal stopping set
enumerator equals the weight enumerator.
|
[
{
"version": "v1",
"created": "Fri, 7 Jul 2006 09:04:43 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Weber",
"Jos H.",
""
],
[
"Abdel-Ghaffar",
"Khaled A. S.",
""
]
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.