id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0601131
Joel Predd
Joel B. Predd, Sanjeev R. Kulkarni, Daniel N. Osherson, and H. Vincent Poor
Scalable Algorithms for Aggregating Disparate Forecasts of Probability
To be presented at the Ninth International Conference on Information Fusion, Florence, Italy, July 10-13, 2006
null
null
null
cs.AI cs.DC cs.IT math.IT
null
In this paper, computational aspects of the panel aggregation problem are addressed. Motivated primarily by applications of risk assessment, an algorithm is developed for aggregating large corpora of internally incoherent probability assessments. The algorithm is characterized by a provable performance guarantee, and is demonstrated to be orders of magnitude faster than existing tools when tested on several real-world data-sets. In addition, unexpected connections between research in risk assessment and wireless sensor networks are exposed, as several key ideas are illustrated to be useful in both fields.
[ { "version": "v1", "created": "Tue, 31 Jan 2006 03:01:35 GMT" }, { "version": "v2", "created": "Mon, 1 May 2006 19:52:13 GMT" } ]
2007-07-13T00:00:00
[ [ "Predd", "Joel B.", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Osherson", "Daniel N.", "" ], [ "Poor", "H. Vincent", "" ] ]
cs/0602014
Amir Leshem
Amir Laufer, Amir Leshem, Hagit Messer
Game theoretic aspects of distributed spectral coordination with application to DSL networks
null
null
null
null
cs.IT math.IT
null
In this paper we use game theoretic techniques to study the value of cooperation in distributed spectrum management problems. We show that the celebrated iterative water-filling algorithm is subject to the prisoner's dilemma and therefore can lead to severe degradation of the achievable rate region in an interference channel environment. We also provide thorough analysis of a simple two bands near-far situation where we are able to provide closed form tight bounds on the rate region of both fixed margin iterative water filling (FM-IWF) and dynamic frequency division multiplexing (DFDM) methods. This is the only case where such analytic expressions are known and all previous studies included only simulated results of the rate region. We then propose an alternative algorithm that alleviates some of the drawbacks of the IWF algorithm in near-far scenarios relevant to DSL access networks. We also provide experimental analysis based on measured DSL channels of both algorithms as well as the centralized optimum spectrum management.
[ { "version": "v1", "created": "Mon, 6 Feb 2006 00:14:24 GMT" } ]
2007-07-13T00:00:00
[ [ "Laufer", "Amir", "" ], [ "Leshem", "Amir", "" ], [ "Messer", "Hagit", "" ] ]
cs/0602015
Ahmad Khoshnevis
Ahmad Khoshnevis and Ashutosh Sabharwal
On the Asymptotic Performance of Multiple Antenna Channels with Fast Channel Feedback
Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
In this paper, we analyze the asymptotic performance of multiple antenna channels where the transmitter has either perfect or finite bit channel state information. Using the diversity-multiplexing tradeoff to characterize the system performance, we demonstrate that channel feedback can fundamentally change the system behavior. Even one-bit of information can increase the diversity order of the system compared to the system with no transmitter information. In addition, as the amount of channel information at the transmitter increases, the diversity order for each multiplexing gain increases and goes to infinity for perfect transmitter information. The major reason for diversity order gain is a "location-dependent" temporal power control, which adapts the power control strategy based on the average channel conditions of the channel.
[ { "version": "v1", "created": "Mon, 6 Feb 2006 07:29:17 GMT" } ]
2007-07-13T00:00:00
[ [ "Khoshnevis", "Ahmad", "" ], [ "Sabharwal", "Ashutosh", "" ] ]
cs/0602028
Andrea Montanari
Andrea Montanari and David Tse
Analysis of Belief Propagation for Non-Linear Problems: The Example of CDMA (or: How to Prove Tanaka's Formula)
5 pages, 3 eps figures, IEEE Information Theory Workshop, Punta del Este, Uruguay, March 13-17, 2006 (invited)
null
null
null
cs.IT math.IT
null
We consider the CDMA (code-division multiple-access) multi-user detection problem for binary signals and additive white gaussian noise. We propose a spreading sequences scheme based on random sparse signatures, and a detection algorithm based on belief propagation (BP) with linear time complexity. In the new scheme, each user conveys its power onto a finite number of chips l, in the large system limit. We analyze the performances of BP detection and prove that they coincide with the ones of optimal (symbol MAP) detection in the l->\infty limit. In the same limit, we prove that the information capacity of the system converges to Tanaka's formula for random `dense' signatures, thus providing the first rigorous justification of this formula. Apart from being computationally convenient, the new scheme allows for optimization in close analogy with irregular low density parity check code ensembles.
[ { "version": "v1", "created": "Tue, 7 Feb 2006 18:56:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Montanari", "Andrea", "" ], [ "Tse", "David", "" ] ]
cs/0602030
Mohammed Khan Zafar
Md. Zafar ALi Khan and B. Sundar Rajan
Single-Symbol Maximum Likelihood Decodable Linear STBCs
38 pages, 9 Figures, accepted for publication in IEEE Trans. Information Theory, 2006
null
null
null
cs.IT math.IT
null
Space-Time block codes (STBC) from Orthogonal Designs (OD) and Co-ordinate Interleaved Orthogonal Designs (CIOD) have been attracting wider attention due to their amenability for fast (single-symbol) ML decoding, and full-rate with full-rank over quasi-static fading channels. However, these codes are instances of single-symbol decodable codes and it is natural to ask, if there exist codes other than STBCs form ODs and CIODs that allow single-symbol coding? In this paper, the above question is answered in the affirmative by characterizing all linear STBCs, that allow single-symbol ML decoding (not necessarily full-diversity) over quasi-static fading channels-calling them single-symbol decodable designs (SDD). The class SDD includes ODs and CIODs as proper subclasses. Further, among the SDD, a class of those that offer full-diversity, called Full-rank SDD (FSDD) are characterized and classified.
[ { "version": "v1", "created": "Wed, 8 Feb 2006 08:46:34 GMT" } ]
2007-07-13T00:00:00
[ [ "Khan", "Md. Zafar ALi", "" ], [ "Rajan", "B. Sundar", "" ] ]
cs/0602032
David Doty
David Doty, Jack H. Lutz, Satyadev Nandakumar
Finite-State Dimension and Real Arithmetic
15 pages
null
null
null
cs.CC cs.IT math.IT
null
We use entropy rates and Schur concavity to prove that, for every integer k >= 2, every nonzero rational number q, and every real number alpha, the base-k expansions of alpha, q+alpha, and q*alpha all have the same finite-state dimension and the same finite-state strong dimension. This extends, and gives a new proof of, Wall's 1949 theorem stating that the sum or product of a nonzero rational number and a Borel normal number is always Borel normal.
[ { "version": "v1", "created": "Thu, 9 Feb 2006 00:20:30 GMT" } ]
2007-07-13T00:00:00
[ [ "Doty", "David", "" ], [ "Lutz", "Jack H.", "" ], [ "Nandakumar", "Satyadev", "" ] ]
cs/0602046
Martin Wainwright
Emin Martinian, Martin J. Wainwright
Analysis of LDGM and compound codes for lossy compression and binning
5 pages; to appear in Workshop on Information Theory and its Applications, February 2006, San Diego
null
null
null
cs.IT math.IT
null
Recent work has suggested that low-density generator matrix (LDGM) codes are likely to be effective for lossy source coding problems. We derive rigorous upper bounds on the effective rate-distortion function of LDGM codes for the binary symmetric source, showing that they quickly approach the rate-distortion function as the degree increases. We also compare and contrast the standard LDGM construction with a compound LDPC/LDGM construction introduced in our previous work, which provably saturates the rate-distortion bound with finite degrees. Moreover, this compound construction can be used to generate nested codes that are simultaneously good as source and channel codes, and are hence well-suited to source/channel coding with side information. The sparse and high-girth graphical structure of our constructions render them well-suited to message-passing encoding.
[ { "version": "v1", "created": "Mon, 13 Feb 2006 03:07:28 GMT" } ]
2007-07-13T00:00:00
[ [ "Martinian", "Emin", "" ], [ "Wainwright", "Martin J.", "" ] ]
cs/0602050
Amir Avestimehr
Salman Avestimehr and David N.C. Tse
Outage Capacity of the Fading Relay Channel in the Low SNR Regime
null
null
null
null
cs.IT math.IT
null
In slow fading scenarios, cooperation between nodes can increase the amount of diversity for communication. We study the performance limit in such scenarios by analyzing the outage capacity of slow fading relay channels. Our focus is on the low SNR and low outage probability regime, where the adverse impact of fading is greatest but so are the potential gains from cooperation. We showed that while the standard Amplify-Forward protocol performs very poorly in this regime, a modified version we called the Bursty Amplify-Forward protocol is optimal and achieves the outage capacity of the network. Moreover, this performance can be achieved without a priori channel knowledge at the receivers. In contrast, the Decode-Forward protocol is strictly sub-optimal in this regime. Our results directly yield the outage capacity per unit energy of fading relay channels.
[ { "version": "v1", "created": "Tue, 14 Feb 2006 00:37:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Avestimehr", "Salman", "" ], [ "Tse", "David N. C.", "" ] ]
cs/0602054
Petros Elia
Petros Elia, K. Raj Kumar, Sameer A. Pawar, P. Vijay Kumar and Hsiao-feng Lu
Explicit Space-Time Codes Achieving The Diversity-Multiplexing Gain Tradeoff
Revised submission to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
A recent result of Zheng and Tse states that over a quasi-static channel, there exists a fundamental tradeoff, referred to as the diversity-multiplexing gain (D-MG) tradeoff, between the spatial multiplexing gain and the diversity gain that can be simultaneously achieved by a space-time (ST) block code. This tradeoff is precisely known in the case of i.i.d. Rayleigh-fading, for T>= n_t+n_r-1 where T is the number of time slots over which coding takes place and n_t,n_r are the number of transmit and receive antennas respectively. For T < n_t+n_r-1, only upper and lower bounds on the D-MG tradeoff are available. In this paper, we present a complete solution to the problem of explicitly constructing D-MG optimal ST codes, i.e., codes that achieve the D-MG tradeoff for any number of receive antennas. We do this by showing that for the square minimum-delay case when T=n_t=n, cyclic-division-algebra (CDA) based ST codes having the non-vanishing determinant property are D-MG optimal. While constructions of such codes were previously known for restricted values of n, we provide here a construction for such codes that is valid for all n. For the rectangular, T > n_t case, we present two general techniques for building D-MG-optimal rectangular ST codes from their square counterparts. A byproduct of our results establishes that the D-MG tradeoff for all T>= n_t is the same as that previously known to hold for T >= n_t + n_r -1.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 00:19:51 GMT" } ]
2007-07-13T00:00:00
[ [ "Elia", "Petros", "" ], [ "Kumar", "K. Raj", "" ], [ "Pawar", "Sameer A.", "" ], [ "Kumar", "P. Vijay", "" ], [ "Lu", "Hsiao-feng", "" ] ]
cs/0602058
Ruoheng Liu
Ruoheng Liu, Predrag Spasojevic, and Emina Soljanin
Incremental Redundancy Cooperative Coding for Wireless Networks: Cooperative Diversity, Coding, and Transmission Energy Gain
revised version
null
null
null
cs.IT math.IT
null
We study an incremental redundancy (IR) cooperative coding scheme for wireless networks. To exploit the spatial diversity benefit we propose a cluster-based collaborating strategy for a quasi-static Rayleigh fading channel model and based on a network geometric distance profile. Our scheme enhances the network performance by embedding an IR cooperative coding scheme into an existing noncooperative route. More precisely, for each hop, we form a collaborating cluster of M-1 nodes between the (hop) sender and the (hop) destination. The transmitted message is encoded using a mother code and partitioned into M blocks corresponding to the each of M slots. In the first slot, the (hop) sender broadcasts its information by transmitting the first block, and its helpers attempt to relay this message. In the remaining slots, the each of left-over M-1 blocks is sent either through a helper which has successfully decoded the message or directly by the (hop) sender where a dynamic schedule is based on the ACK-based feedback from the cluster. By employing powerful good codes (e.g., turbo codes, LDPC codes, and raptor codes) whose performance is characterized by a threshold behavior, our approach improves the reliability of a multi-hop routing through not only cooperation diversity benefit but also a coding advantage. The study of the diversity and the coding gain of the proposed scheme is based on a new simple threshold bound on the frame-error rate (FER) of maximum likelihood decoding. A average FER upper bound and its asymptotic (in large SNR) version are derived as a function of the average fading channel SNRs and the code threshold.
[ { "version": "v1", "created": "Wed, 15 Feb 2006 20:55:30 GMT" }, { "version": "v2", "created": "Sat, 17 Feb 2007 20:44:50 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Ruoheng", "" ], [ "Spasojevic", "Predrag", "" ], [ "Soljanin", "Emina", "" ] ]
cs/0602071
Martin Wainwright
Alexandros G. Dimakis, Anand D. Sarwate, Martin J. Wainwright
Geographic Gossip: Efficient Aggregation for Sensor Networks
8 pages total; to appear in Information Processing in Sensor Networks (IPSN) 2006
null
null
null
cs.IT math.IT
null
Gossip algorithms for aggregation have recently received significant attention for sensor network applications because of their simplicity and robustness in noisy and uncertain environments. However, gossip algorithms can waste significant energy by essentially passing around redundant information multiple times. For realistic sensor network model topologies like grids and random geometric graphs, the inefficiency of gossip schemes is caused by slow mixing times of random walks on those graphs. We propose and analyze an alternative gossiping scheme that exploits geographic information. By utilizing a simple resampling method, we can demonstrate substantial gains over previously proposed gossip protocols. In particular, for random geometric graphs, our algorithm computes the true average to accuracy $1/n^a$ using $O(n^{1.5}\sqrt{\log n})$ radio transmissions, which reduces the energy consumption by a $\sqrt{\frac{n}{\log n}}$ factor over standard gossip algorithms.
[ { "version": "v1", "created": "Mon, 20 Feb 2006 03:52:57 GMT" } ]
2007-07-13T00:00:00
[ [ "Dimakis", "Alexandros G.", "" ], [ "Sarwate", "Anand D.", "" ], [ "Wainwright", "Martin J.", "" ] ]
cs/0602084
Boris Ryabko
Boris Ryabko, Jaakko Astola
Universal Codes as a Basis for Time Series Testing
accepted for "Statistical Methodology" (Elsevier)
null
null
null
cs.IT math.IT
null
We suggest a new approach to hypothesis testing for ergodic and stationary processes. In contrast to standard methods, the suggested approach gives a possibility to make tests, based on any lossless data compression method even if the distribution law of the codeword lengths is not known. We apply this approach to the following four problems: goodness-of-fit testing (or identity testing), testing for independence, testing of serial independence and homogeneity testing and suggest nonparametric statistical tests for these problems. It is important to note that practically used so-called archivers can be used for suggested testing.
[ { "version": "v1", "created": "Sat, 25 Feb 2006 07:37:56 GMT" } ]
2007-07-13T00:00:00
[ [ "Ryabko", "Boris", "" ], [ "Astola", "Jaakko", "" ] ]
cs/0602085
Michael Baer
Michael B. Baer
Twenty (or so) Questions: $D$-ary Length-Bounded Prefix Coding
12 pages, 4 figures, extended version of cs/0701012 (accepted to ISIT 2007), formerly "Twenty (or so) Questions: $D$-ary Bounded-Length Huffman Coding"
null
null
null
cs.IT cs.DS math.IT
null
Efficient optimal prefix coding has long been accomplished via the Huffman algorithm. However, there is still room for improvement and exploration regarding variants of the Huffman problem. Length-limited Huffman coding, useful for many practical applications, is one such variant, for which codes are restricted to the set of codes in which none of the $n$ codewords is longer than a given length, $l_{\max}$. Binary length-limited coding can be done in $O(n l_{\max})$ time and O(n) space via the widely used Package-Merge algorithm and with even smaller asymptotic complexity using a lesser-known algorithm. In this paper these algorithms are generalized without increasing complexity in order to introduce a minimum codeword length constraint $l_{\min}$, to allow for objective functions other than the minimization of expected codeword length, and to be applicable to both binary and nonbinary codes; nonbinary codes were previously addressed using a slower dynamic programming approach. These extensions have various applications -- including fast decompression and a modified version of the game ``Twenty Questions'' -- and can be used to solve the problem of finding an optimal code with limited fringe, that is, finding the best code among codes with a maximum difference between the longest and shortest codewords. The previously proposed method for solving this problem was nonpolynomial time, whereas solving this using the novel linear-space algorithm requires only $O(n (l_{\max}- l_{\min})^2)$ time, or even less if $l_{\max}- l_{\min}$ is not $O(\log n)$.
[ { "version": "v1", "created": "Sat, 25 Feb 2006 19:09:11 GMT" }, { "version": "v2", "created": "Thu, 6 Apr 2006 01:20:41 GMT" }, { "version": "v3", "created": "Wed, 12 Apr 2006 05:39:00 GMT" }, { "version": "v4", "created": "Wed, 20 Jun 2007 19:47:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
cs/0602089
Pascal Vontobel
Roxana Smarandache and Pascal O. Vontobel
Pseudo-Codeword Analysis of Tanner Graphs from Projective and Euclidean Planes
Submitted to IEEE Transactions on Information Theory, February 25, 2006
null
null
null
cs.IT cs.DM math.IT
null
In order to understand the performance of a code under maximum-likelihood (ML) decoding, one studies the codewords, in particular the minimal codewords, and their Hamming weights. In the context of linear programming (LP) decoding, one's attention needs to be shifted to the pseudo-codewords, in particular to the minimal pseudo-codewords, and their pseudo-weights. In this paper we investigate some families of codes that have good properties under LP decoding, namely certain families of low-density parity-check (LDPC) codes that are derived from projective and Euclidean planes: we study the structure of their minimal pseudo-codewords and give lower bounds on their pseudo-weight.
[ { "version": "v1", "created": "Sun, 26 Feb 2006 01:33:01 GMT" } ]
2007-07-13T00:00:00
[ [ "Smarandache", "Roxana", "" ], [ "Vontobel", "Pascal O.", "" ] ]
cs/0602091
Young-Han Kim
Young-Han Kim
Feedback Capacity of Stationary Gaussian Channels
64 pages, submitted to IEEE Trans. Inform. Theory
null
null
null
cs.IT math.IT
null
The feedback capacity of additive stationary Gaussian noise channels is characterized as the solution to a variational problem. Toward this end, it is proved that the optimal feedback coding scheme is stationary. When specialized to the first-order autoregressive moving average noise spectrum, this variational characterization yields a closed-form expression for the feedback capacity. In particular, this result shows that the celebrated Schalkwijk-Kailath coding scheme achieves the feedback capacity for the first-order autoregressive moving average Gaussian channel, positively answering a long-standing open problem studied by Butman, Schalkwijk-Tiernan, Wolfowitz, Ozarow, Ordentlich, Yang-Kavcic-Tatikonda, and others. More generally, it is shown that a k-dimensional generalization of the Schalkwijk-Kailath coding scheme achieves the feedback capacity for any autoregressive moving average noise spectrum of order k. Simply put, the optimal transmitter iteratively refines the receiver's knowledge of the intended message.
[ { "version": "v1", "created": "Sun, 26 Feb 2006 08:11:33 GMT" } ]
2007-07-13T00:00:00
[ [ "Kim", "Young-Han", "" ] ]
cs/0602092
Martin Wainwright
Martin J. Wainwright
Inconsistent parameter estimation in Markov random fields: Benefits in the computation-limited setting
UC Berkeley, Department of Statistics; Technical Report 690
null
null
null
cs.LG cs.IT math.IT math.ST stat.TH
null
Consider the problem of joint parameter estimation and prediction in a Markov random field: i.e., the model parameters are estimated on the basis of an initial set of data, and then the fitted model is used to perform prediction (e.g., smoothing, denoising, interpolation) on a new noisy observation. Working under the restriction of limited computation, we analyze a joint method in which the \emph{same convex variational relaxation} is used to construct an M-estimator for fitting parameters, and to perform approximate marginalization for the prediction step. The key result of this paper is that in the computation-limited setting, using an inconsistent parameter estimator (i.e., an estimator that returns the ``wrong'' model even in the infinite data limit) can be provably beneficial, since the resulting errors can partially compensate for errors made by using an approximate prediction technique. En route to this result, we analyze the asymptotic properties of M-estimators based on convex variational relaxations, and establish a Lipschitz stability property that holds for a broad class of variational methods. We show that joint estimation/prediction based on the reweighted sum-product algorithm substantially outperforms a commonly used heuristic based on ordinary sum-product.
[ { "version": "v1", "created": "Mon, 27 Feb 2006 05:22:15 GMT" } ]
2007-07-13T00:00:00
[ [ "Wainwright", "Martin J.", "" ] ]
cs/0603007
Khaled Abdel-Ghaffar
Khaled A. S. Abdel-Ghaffar and Jos H. Weber
Complete Enumeration of Stopping Sets of Full-Rank Parity-Check Matrices of Hamming Codes
7 pages, submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
Stopping sets, and in particular their numbers and sizes, play an important role in determining the performance of iterative decoders of linear codes over binary erasure channels. In the 2004 Shannon Lecture, McEliece presented an expression for the number of stopping sets of size three for a full-rank parity-check matrix of the Hamming code. In this correspondence, we derive an expression for the number of stopping sets of any given size for the same parity-check matrix.
[ { "version": "v1", "created": "Thu, 2 Mar 2006 06:06:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Abdel-Ghaffar", "Khaled A. S.", "" ], [ "Weber", "Jos H.", "" ] ]
cs/0603008
Hao Chen
Hao Chen
Linear Secret Sharing from Algebraic-Geometric Codes
11 pages, note added in the new version
null
null
null
cs.CR cs.IT math.IT
null
It is well-known that the linear secret-sharing scheme (LSSS) can be constructed from linear error-correcting codes (Brickell [1], R.J. McEliece and D.V.Sarwate [2],Cramer, el.,[3]). The theory of linear codes from algebraic-geometric curves (algebraic-geometric (AG) codes or geometric Goppa code) has been well-developed since the work of V.Goppa and Tsfasman, Vladut, and Zink(see [17], [18] and [19]). In this paper the linear secret-sharing scheme from algebraic-geometric codes, which are non-threshold scheme for curves of genus greater than 0, are presented . We analysis the minimal access structure, $d_{min}$ and $d_{cheat}$([8]), (strongly) multiplicativity and the applications in verifiable secret-sharing (VSS) scheme and secure multi-party computation (MPC) of this construction([3] and [10-11]). Our construction also offers many examples of the self-dually $GF(q)$-representable matroids and many examples of new ideal linear secret-sharing schemes addressing to the problem of the characterization of the access structures for ideal secret-sharing schemes([3] and [9]). The access structures of the linear secret-sharing schemes from the codes on elliptic curves are given explicitly. From the work in this paper we can see that the algebraic-geometric structure of the underlying algebraic curves is an important resource for secret-sharing, matroid theory, verifiable secret-sharing and secure multi-party computation.
[ { "version": "v1", "created": "Thu, 2 Mar 2006 02:58:07 GMT" }, { "version": "v2", "created": "Wed, 8 Mar 2006 06:24:55 GMT" }, { "version": "v3", "created": "Thu, 9 Mar 2006 02:07:03 GMT" }, { "version": "v4", "created": "Fri, 10 Mar 2006 09:12:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Chen", "Hao", "" ] ]
cs/0603009
Sergio Servetto
Ron Dabora and Sergio D. Servetto (Cornell University)
An Achievability Result for the General Relay Channel
This correspondence article has been folded into the revision of another paper of ours, cs.IT/0605135. This replacement paper explains why
null
null
null
cs.IT math.IT
null
See cs.IT/0605135: R. Dabora, S. D. Servetto; On the Role of Estimate-and-Forward with Time-Sharing in Cooperative Communications.
[ { "version": "v1", "created": "Thu, 2 Mar 2006 03:54:10 GMT" }, { "version": "v2", "created": "Wed, 1 Nov 2006 07:35:46 GMT" } ]
2007-07-13T00:00:00
[ [ "Dabora", "Ron", "", "Cornell University" ], [ "Servetto", "Sergio D.", "", "Cornell University" ] ]
cs/0603013
Heide Gluesing-Luerssen
Heide Gluesing-Luerssen, Gert Schneider
On the MacWilliams Identity for Convolutional Codes
null
null
null
null
cs.IT math.IT math.OC
null
The adjacency matrix associated with a convolutional code collects in a detailed manner information about the weight distribution of the code. A MacWilliams Identity Conjecture, stating that the adjacency matrix of a code fully determines the adjacency matrix of the dual code, will be formulated, and an explicit formula for the transformation will be stated. The formula involves the MacWilliams matrix known from complete weight enumerators of block codes. The conjecture will be proven for the class of convolutional codes where either the code itself or its dual does not have Forney indices bigger than one. For the general case the conjecture is backed up by many examples, and a weaker version will be established.
[ { "version": "v1", "created": "Thu, 2 Mar 2006 17:57:02 GMT" } ]
2007-07-13T00:00:00
[ [ "Gluesing-Luerssen", "Heide", "" ], [ "Schneider", "Gert", "" ] ]
cs/0603014
Carlos Munuera
C. Carvalho, C. Munuera, E. Silva, F. Torres
Near orders and codes
15 pages
null
null
null
cs.IT math.IT
null
Hoholdt, van Lint and Pellikaan used order functions to construct codes by means of Linear Algebra and Semigroup Theory only. However, Geometric Goppa codes that can be represented by this method are mainly those based on just one point. In this paper we introduce the concept of near order function with the aim of generalize this approach in such a way that a of wider family of Geometric Goppa codes can be studied on a more elementary setting.
[ { "version": "v1", "created": "Thu, 2 Mar 2006 18:31:13 GMT" } ]
2007-07-13T00:00:00
[ [ "Carvalho", "C.", "" ], [ "Munuera", "C.", "" ], [ "Silva", "E.", "" ], [ "Torres", "F.", "" ] ]
cs/0603018
Siddharth Ray
Siddharth Ray, Muriel Medard and Lizhong Zheng
On Non-coherent MIMO Channels in the Wideband Regime: Capacity and Reliability
null
null
null
null
cs.IT math.IT
null
We consider a multiple-input, multiple-output (MIMO) wideband Rayleigh block fading channel where the channel state is unknown to both the transmitter and the receiver and there is only an average power constraint on the input. We compute the capacity and analyze its dependence on coherence length, number of antennas and receive signal-to-noise ratio (SNR) per degree of freedom. We establish conditions on the coherence length and number of antennas for the non-coherent channel to have a "near coherent" performance in the wideband regime. We also propose a signaling scheme that is near-capacity achieving in this regime. We compute the error probability for this wideband non-coherent MIMO channel and study its dependence on SNR, number of transmit and receive antennas and coherence length. We show that error probability decays inversely with coherence length and exponentially with the product of the number of transmit and receive antennas. Moreover, channel outage dominates error probability in the wideband regime. We also show that the critical as well as cut-off rates are much smaller than channel capacity in this regime.
[ { "version": "v1", "created": "Fri, 3 Mar 2006 22:41:58 GMT" } ]
2007-07-13T00:00:00
[ [ "Ray", "Siddharth", "" ], [ "Medard", "Muriel", "" ], [ "Zheng", "Lizhong", "" ] ]
cs/0603022
Siddharth Ray
Siddharth Ray, Michelle Effros, Muriel Medard, Ralf Koetter, Tracey Ho, David Karger and Jinane Abounadi
On Separation, Randomness and Linearity for Network Codes over Finite Fields
null
null
null
MIT LIDS Technical Report 2687
cs.IT math.IT
null
We examine the issue of separation and code design for networks that operate over finite fields. We demonstrate that source-channel (or source-network) separation holds for several canonical network examples like the noisy multiple access channel and the erasure degraded broadcast channel, when the whole network operates over a common finite field. This robustness of separation is predicated on the fact that noise and inputs are independent, and we examine the failure of separation when noise is dependent on inputs in multiple access channels. Our approach is based on the sufficiency of linear codes. Using a simple and unifying framework, we not only re-establish with economy the optimality of linear codes for single-transmitter, single-receiver channels and for Slepian-Wolf source coding, but also establish the optimality of linear codes for multiple access and for erasure degraded broadcast channels. The linearity allows us to obtain simple optimal code constructions and to study capacity regions of the noisy multiple access and the degraded broadcast channel. The linearity of both source and network coding blurs the delineation between source and network codes. While our results point to the fact that separation of source coding and channel coding is optimal in some canonical networks, we show that decomposing networks into canonical subnetworks may not be effective. Thus, we argue that it may be the lack of decomposability of a network into canonical network modules, rather than the lack of separation between source and channel coding, that presents major challenges for coding over networks.
[ { "version": "v1", "created": "Mon, 6 Mar 2006 16:52:28 GMT" } ]
2007-07-13T00:00:00
[ [ "Ray", "Siddharth", "" ], [ "Effros", "Michelle", "" ], [ "Medard", "Muriel", "" ], [ "Koetter", "Ralf", "" ], [ "Ho", "Tracey", "" ], [ "Karger", "David", "" ], [ "Abounadi", "Jinane", "" ] ]
cs/0603027
Shuangquan Wang
Shuangquan Wang, Ali Abdi
On the Second-Order Statistics of the Instantaneous Mutual Information in Rayleigh Fading Channels
11 pages, 6 figures, submitted to IEEE Trans. Inform. Theory, Dec. 2005
null
null
null
cs.IT math.IT
null
In this paper, the second-order statistics of the instantaneous mutual information are studied, in time-varying Rayleigh fading channels, assuming general non-isotropic scattering environments. Specifically, first the autocorrelation function, correlation coefficient, level crossing rate, and the average outage duration of the instantaneous mutual information are investigated in single-input single-output (SISO) systems. Closed-form exact expressions are derived, as well as accurate approximations in low- and high-SNR regimes. Then, the results are extended to multiple-input single-output and single-input multiple-output systems, as well as multiple-input multiple-output systems with orthogonal space-time block code transmission. Monte Carlo simulations are provided to verify the accuracy of the analytical results. The results shed more light on the dynamic behavior of the instantaneous mutual information in mobile fading channels.
[ { "version": "v1", "created": "Wed, 8 Mar 2006 01:21:41 GMT" } ]
2007-07-13T00:00:00
[ [ "Wang", "Shuangquan", "" ], [ "Abdi", "Ali", "" ] ]
cs/0603031
Wei Dai
Wei Dai, Youjian Liu, Brian Rider
Performance Analysis of CDMA Signature Optimization with Finite Rate Feedback
6 pages, 3 figures, conference paper for CISS 2006
null
null
null
cs.IT cs.DM math.IT
null
We analyze the performance of CDMA signature optimization with finite rate feedback. For a particular user, the receiver selects a signature vector from a signature codebook to avoid the interference from other users, and feeds the corresponding index back to this user through a finite rate and error-free feedback link. We assume the codebook is randomly constructed where the entries are independent and isotropically distributed. It has been shown that the randomly constructed codebook is asymptotically optimal. In this paper, we consider two types of signature selection criteria. One is to select the signature vector that minimizes the interference from other users. The other one is to select the signature vector to match the weakest interference directions. By letting the processing gain, number of users and feedback bits approach infinity with fixed ratios, we derive the exact asymptotic formulas to calculate the average interference for both criteria. Our simulations demonstrate the theoretical formulas. The analysis can be extended to evaluate the signal-to-interference plus noise ratio performance for both match filter and linear minimum mean-square error receivers.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 03:52:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Dai", "Wei", "" ], [ "Liu", "Youjian", "" ], [ "Rider", "Brian", "" ] ]
cs/0603039
Wei Dai
Wei Dai, Youjian Liu, Brian Rider
Quantization Bounds on Grassmann Manifolds and Applications to MIMO Communications
26 pages, 7 figures, submitted to IEEE Transactions on Information Theory in Aug, 2005
null
null
null
cs.IT math.IT
null
This paper considers the quantization problem on the Grassmann manifold \mathcal{G}_{n,p}, the set of all p-dimensional planes (through the origin) in the n-dimensional Euclidean space. The chief result is a closed-form formula for the volume of a metric ball in the Grassmann manifold when the radius is sufficiently small. This volume formula holds for Grassmann manifolds with arbitrary dimension n and p, while previous results pertained only to p=1, or a fixed p with asymptotically large n. Based on this result, several quantization bounds are derived for sphere packing and rate distortion tradeoff. We establish asymptotically equivalent lower and upper bounds for the rate distortion tradeoff. Since the upper bound is derived by constructing random codes, this result implies that the random codes are asymptotically optimal. The above results are also extended to the more general case, in which \mathcal{G}_{n,q} is quantized through a code in \mathcal{G}_{n,p}, where p and q are not necessarily the same. Finally, we discuss some applications of the derived results to multi-antenna communication systems.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 16:58:27 GMT" }, { "version": "v2", "created": "Tue, 16 May 2006 02:53:17 GMT" } ]
2007-07-13T00:00:00
[ [ "Dai", "Wei", "" ], [ "Liu", "Youjian", "" ], [ "Rider", "Brian", "" ] ]
cs/0603040
Wei Dai
Wei Dai, Youjian Liu, Vincent K.N. Lau, Brian Rider
On the Information Rate of MIMO Systems with Finite Rate Channel State Feedback Using Beamforming and Power On/Off Strategy
44 pages, 8 figures, submitted to IEEE Transactions on Information Theory in 2005
null
null
null
cs.IT math.IT
null
It is well known that Multiple-Input Multiple-Output (MIMO) systems have high spectral efficiency, especially when channel state information at the transmitter (CSIT) is available. When CSIT is obtained by feedback, it is practical to assume that the channel state feedback rate is finite and the CSIT is not perfect. For such a system, we consider beamforming and power on/off strategy for its simplicity and near optimality, where power on/off means that a beamforming vector (beam) is either turned on with a constant power or turned off. The main contribution of this paper is to accurately evaluate the information rate as a function of the channel state feedback rate. Name a beam turned on as an on-beam and the minimum number of the transmit and receive antennas as the dimension of a MIMO system. We prove that the ratio of the optimal number of on-beams and the system dimension converges to a constant for a given signal-to-noise ratio (SNR) when the numbers of transmit and receive antennas approach infinity simultaneously and when beamforming is perfect. Asymptotic formulas are derived to evaluate this ratio and the corresponding information rate per dimension. The asymptotic results can be accurately applied to finite dimensional systems and suggest a power on/off strategy with a constant number of on-beams. For this suboptimal strategy, we take a novel approach to introduce power efficiency factor, which is a function of the feedback rate, to quantify the effect of imperfect beamforming. By combining power efficiency factor and the asymptotic formulas for perfect beamforming case, the information rate of the power on/off strategy with a constant number of on-beams is accurately characterized.
[ { "version": "v1", "created": "Thu, 9 Mar 2006 17:08:28 GMT" } ]
2007-07-13T00:00:00
[ [ "Dai", "Wei", "" ], [ "Liu", "Youjian", "" ], [ "Lau", "Vincent K. N.", "" ], [ "Rider", "Brian", "" ] ]
cs/0603045
Balaji Nedurumalli
Balaji Nedurumalli
Information and Errors in Quantum Teleportation
5 pages
null
null
null
cs.IT math.IT
null
This article considers the question of the teleportation protocol from an engineering perspective. The protocol ideally requires an authority that ensures that the two communicating parties have a perfectly entangled pair of particles available to them. But this cannot be unconditionally established to the satisfaction of the parties due to the fact that an unknown quantum state cannot be copied. This supports the view that quantum information cannot be treated on the same basis as classical information.
[ { "version": "v1", "created": "Fri, 10 Mar 2006 22:54:56 GMT" } ]
2007-07-13T00:00:00
[ [ "Nedurumalli", "Balaji", "" ] ]
cs/0603049
Heide Gluesing-Luerssen
Heide Gluesing-Luerssen and Gert Schneider
State Space Realizations and Monomial Equivalence for Convolutional Codes
null
null
null
null
cs.IT math.IT math.OC
null
We will study convolutional codes with the help of state space realizations. It will be shown that two such minimal realizations belong to the same code if and only if they are equivalent under the full state feedback group. This result will be used in order to prove that two codes with positive Forney indices are monomially equivalent if and only if they share the same adjacency matrix. The adjacency matrix counts in a detailed way the weights of all possible outputs and thus contains full information about the weights of the codewords in the given code.
[ { "version": "v1", "created": "Mon, 13 Mar 2006 10:43:45 GMT" } ]
2007-07-13T00:00:00
[ [ "Gluesing-Luerssen", "Heide", "" ], [ "Schneider", "Gert", "" ] ]
cs/0603059
Guangyue Han
Guangyue Han, Brian Marcus
Derivatives of Entropy Rate in Special Families of Hidden Markov Chains
The relaxed condtions for entropy rate and examples are taken out (to be part of another paper). The section about general principle and an example to determine the domain of analyticity is taken out (to be part of another paper). A section about binary Markov chains corrupted by binary symmetric noise is added
null
null
null
cs.IT math.IT math.PR
null
Consider a hidden Markov chain obtained as the observation process of an ordinary Markov chain corrupted by noise. Zuk, et. al. [13], [14] showed how, in principle, one can explicitly compute the derivatives of the entropy rate of at extreme values of the noise. Namely, they showed that the derivatives of standard upper approximations to the entropy rate actually stabilize at an explicit finite time. We generalize this result to a natural class of hidden Markov chains called ``Black Holes.'' We also discuss in depth special cases of binary Markov chains observed in binary symmetric noise, and give an abstract formula for the first derivative in terms of a measure on the simplex due to Blackwell.
[ { "version": "v1", "created": "Tue, 14 Mar 2006 21:51:34 GMT" }, { "version": "v2", "created": "Mon, 3 Apr 2006 21:22:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Han", "Guangyue", "" ], [ "Marcus", "Brian", "" ] ]
cs/0603061
Chau Yuen
Chau Yuen, Yong Liang Guan, Tjeng Thiang Tjhung
Quasi-Orthogonal STBC With Minimum Decoding Complexity
IEEE Trans. on Wirless Communications
null
null
null
cs.IT math.IT
null
In this paper, we consider a quasi-orthogonal (QO) space-time block code (STBC) with minimum decoding complexity (MDC-QO-STBC). We formulate its algebraic structure and propose a systematic method for its construction. We show that a maximum-likelihood (ML) decoder for this MDC-QOSTBC, for any number of transmit antennas, only requires the joint detection of two real symbols. Assuming the use of a square or rectangular quadratic-amplitude modulation (QAM) or multiple phase-shift keying (MPSK) modulation for this MDC-QOSTBC, we also obtain the optimum constellation rotation angle, in order to achieve full diversity and optimum coding gain. We show that the maximum achievable code rate of these MDC-QOSTBC is 1 for three and four antennas and 3/4 for five to eight antennas. We also show that the proposed MDC-QOSTBC has several desirable properties, such as a more even power distribution among antennas and better scalability in adjusting the number of transmit antennas, compared with the coordinate interleaved orthogonal design (CIOD) and asymmetric CIOD (ACIOD) codes. For the case of an odd number of transmit antennas, MDC-QO-STBC also has better decoding performance than CIOD.
[ { "version": "v1", "created": "Thu, 16 Mar 2006 12:59:37 GMT" } ]
2007-07-13T00:00:00
[ [ "Yuen", "Chau", "" ], [ "Guan", "Yong Liang", "" ], [ "Tjhung", "Tjeng Thiang", "" ] ]
cs/0603066
Nihar Jindal
Nihar Jindal
A Feedback Reduction Technique for MIMO Broadcast Channels
Submitted to Int. Symposium on Information Theory, January 2006
null
null
null
cs.IT math.IT
null
A multiple antenna broadcast channel with perfect channel state information at the receivers is considered. If each receiver quantizes its channel knowledge to a finite number of bits which are fed back to the transmitter, the large capacity benefits of the downlink channel can be realized. However, the required number of feedback bits per mobile must be scaled with both the number of transmit antennas and the system SNR, and thus can be quite large in even moderately sized systems. It is shown that a small number of antennas can be used at each receiver to improve the quality of the channel estimate provided to the transmitter. As a result, the required feedback rate per mobile can be significantly decreased.
[ { "version": "v1", "created": "Thu, 16 Mar 2006 21:02:01 GMT" } ]
2007-07-13T00:00:00
[ [ "Jindal", "Nihar", "" ] ]
cs/0603078
Ciamac Moallemi
Ciamac C. Moallemi and Benjamin Van Roy
Consensus Propagation
journal version
IEEE Transactions on Information Theory, 2006, 52(11): 4753-4766
10.1109/TIT.2006.883539
null
cs.IT cs.AI cs.NI math.IT
null
We propose consensus propagation, an asynchronous distributed protocol for averaging numbers across a network. We establish convergence, characterize the convergence rate for regular graphs, and demonstrate that the protocol exhibits better scaling properties than pairwise averaging, an alternative that has received much recent attention. Consensus propagation can be viewed as a special case of belief propagation, and our results contribute to the belief propagation literature. In particular, beyond singly-connected graphs, there are very few classes of relevant problems for which belief propagation is known to converge.
[ { "version": "v1", "created": "Sun, 19 Mar 2006 23:50:28 GMT" }, { "version": "v2", "created": "Tue, 29 May 2007 17:23:45 GMT" } ]
2007-07-13T00:00:00
[ [ "Moallemi", "Ciamac C.", "" ], [ "Van Roy", "Benjamin", "" ] ]
cs/0603083
Ashutosh Gore
Ashutosh Deepak Gore and Abhay Karandikar
Entropy-optimal Generalized Token Bucket Regulator
6 pages (2 column, 10-point), 3 figures, 1 table
null
null
null
cs.IT math.IT
null
We derive the maximum entropy of a flow (information utility) which conforms to traffic constraints imposed by a generalized token bucket regulator, by taking into account the covert information present in the randomness of packet lengths. Under equality constraints of aggregate tokens and aggregate bucket depth, a generalized token bucket regulator can achieve higher information utility than a standard token bucket regulator. The optimal generalized token bucket regulator has a near-uniform bucket depth sequence and a decreasing token increment sequence.
[ { "version": "v1", "created": "Wed, 22 Mar 2006 06:23:53 GMT" } ]
2007-07-13T00:00:00
[ [ "Gore", "Ashutosh Deepak", "" ], [ "Karandikar", "Abhay", "" ] ]
cs/0603094
Philippe Loubaton
Julien Dumont, Philippe Loubaton, Samson Lasaulce
On the Capacity Achieving Transmit Covariance Matrices of MIMO Correlated Rician Channels: A Large System Approach
Paper submitted to Globecom2006
null
null
null
cs.IT math.IT
null
We determine the capacity-achieving input covariance matrices for coherent block-fading correlated MIMO Rician channels. In contrast with the Rayleigh and uncorrelated Rician cases, no closed-form expressions for the eigenvectors of the optimum input covariance matrix are available. Both the eigenvectors and eigenvalues have to be evaluated by using numerical techniques. As the corresponding optimization algorithms are not very attractive, we evaluate the limit of the average mutual information when the number of transmit and receive antennas converge to infinity at the same rate. If the channel is semi-correlated, we propose an attractive optimization algorithm of the large system approximant, and establish some convergence results. Simulation results show that our approach provide reliable results even for a quite moderate number of transmit and receive antennas.
[ { "version": "v1", "created": "Thu, 23 Mar 2006 12:14:53 GMT" }, { "version": "v2", "created": "Fri, 25 Aug 2006 12:07:30 GMT" } ]
2007-07-13T00:00:00
[ [ "Dumont", "Julien", "" ], [ "Loubaton", "Philippe", "" ], [ "Lasaulce", "Samson", "" ] ]
cs/0603095
Yan-Xiu Zheng
Yan-Xiu Zheng and Yu T. Su
A Turbo Coding System for High Speed Communications
11 figures
null
null
null
cs.IT math.IT
null
Conventional turbo codes (CTCs) usually employ a block-oriented interleaving so that each block is separately encoded and decoded. As interleaving and de-interleaving are performed within a block, the message-passing process associated with an iterative decoder is limited to proceed within the corresponding range. This paper presents a new turbo coding scheme that uses a special interleaver structure and a multiple-round early termination test involving both sign check and a CRC code. The new interleaver structure is naturally suited for high speed parallel processing and the resulting coding system offers new design options and tradeoffs that are not available to CTCs. In particular, it becomes possible for the decoder to employ an efficient inter-block collaborative decoding algorithm, passing the information obtained from termination test proved blocks to other unproved blocks. It also becomes important to have a proper decoding schedule. The combined effect is improved performance and reduction in the average decoding delay (whence the required computing power). A memory (storage) management mechanism is included as a critical part of the decoder so as to provide additional design tradeoff between performance and memory size. It is shown that the latter has a modular-like effect in that additional memory units render enhanced performance due not only to less forced early terminations but to possible increases of the interleaving depth. Depending on the decoding schedule, the degree of parallelism and other decoding resources available, the proposed scheme admits a variety of decoder architectures that meet a large range of throughput and performance demands.
[ { "version": "v1", "created": "Thu, 23 Mar 2006 15:03:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Zheng", "Yan-Xiu", "" ], [ "Su", "Yu T.", "" ] ]
cs/0603096
Massimiliano Siti Mr.
Massimiliano Siti, Michael P. Fitz
On Reduced Complexity Soft-Output MIMO ML detection
43 pages, 10 figures Submitted to the IEEE Transactions on Information Theory, March 2006
null
null
null
cs.IT math.IT
null
In multiple-input multiple-output (MIMO) fading channels maximum likelihood (ML) detection is desirable to achieve high performance, but its complexity grows exponentially with the spectral efficiency. The current state of the art in MIMO detection is list decoding and lattice decoding. This paper proposes a new class of lattice detectors that combines some of the principles of both list and lattice decoding, thus resulting in an efficient parallelizable implementation and near optimal soft-ouput ML performance. The novel detector is called layered orthogonal lattice detector (LORD), because it adopts a new lattice formulation and relies on a channel orthogonalization process. It should be noted that the algorithm achieves optimal hard-output ML performance in case of two transmit antennas. For two transmit antennas max-log bit soft-output information can be generated and for greater than two antennas approximate max-log detection is achieved. Simulation results show that LORD, in MIMO system employing orthogonal frequency division multiplexing (OFDM) and bit interleaved coded modulation (BICM) is able to achieve very high signal-to-noise ratio (SNR) gains compared to practical soft-output detectors such as minimum-mean square error (MMSE), in either linear or nonlinear iterative scheme. Besides, the performance comparison with hard-output decoded algebraic space time codes shows the fundamental importance of soft-output generation capability for practical wireless applications.
[ { "version": "v1", "created": "Fri, 24 Mar 2006 09:44:01 GMT" } ]
2007-07-13T00:00:00
[ [ "Siti", "Massimiliano", "" ], [ "Fitz", "Michael P.", "" ] ]
cs/0603098
Siddharth Ray
Siddharth Ray, Muriel Medard and Lizhong Zheng
A SIMO Fiber Aided Wireless Network Architecture
null
null
null
null
cs.IT math.IT
null
The concept of a fiber aided wireless network architecture (FAWNA) is introduced in [Ray et al., Allerton Conference 2005], which allows high-speed mobile connectivity by leveraging the speed of optical networks. In this paper, we consider a single-input, multiple-output (SIMO) FAWNA, which consists of a SIMO wireless channel and an optical fiber channel, connected through wireless-optical interfaces. We propose a scheme where the received wireless signal at each interface is quantized and sent over the fiber. Though our architecture is similar to that of the classical CEO problem, our problem is different from it. We show that the capacity of our scheme approaches the capacity of the architecture, exponentially with fiber capacity. We also show that for a given fiber capacity, there is an optimal operating wireless bandwidth and an optimal number of wireless-optical interfaces. The wireless-optical interfaces of our scheme have low complexity and do not require knowledge of the transmitter code book. They are also extendable to FAWNAs with large number of transmitters and interfaces and, offer adaptability to variable rates, changing channel conditions and node positions.
[ { "version": "v1", "created": "Sat, 25 Mar 2006 00:46:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Ray", "Siddharth", "" ], [ "Medard", "Muriel", "" ], [ "Zheng", "Lizhong", "" ] ]
cs/0603103
Amir Leshem
Amir Leshem and Ephraim Zehavi
Bargaining over the interference channel
null
null
null
null
cs.IT math.IT
null
In this paper we analyze the interference channel as a conflict situation. This viewpoint implies that certain points in the rate region are unreasonable to one of the players. Therefore these points cannot be considered achievable based on game theoretic considerations. We then propose to use Nash bargaining solution as a tool that provides preferred points on the boundary of the game theoretic rate region. We provide analysis for the 2x2 intereference channel using the FDM achievable rate region. We also outline how to generalize our results to other achievable rate regions for the interference channel as well as the multiple access channel. Keywords: Spectrum optimization, distributed coordination, game theory, interference channel, multiple access channel.
[ { "version": "v1", "created": "Sun, 26 Mar 2006 21:28:54 GMT" } ]
2007-07-13T00:00:00
[ [ "Leshem", "Amir", "" ], [ "Zehavi", "Ephraim", "" ] ]
cs/0603131
Chris Snow
C. Snow, L. Lampe, R. Schober
Error Rate Analysis for Coded Multicarrier Systems over Quasi-Static Fading Channels
5 pages, 3 figures, 2 tables. Submitted to Globecom 2006
null
null
null
cs.IT math.IT
null
This paper presents two methods for approximating the performance of coded multicarrier systems operating over frequency-selective, quasi-static fading channels with non-ideal interleaving. The first method is based on approximating the performance of the system over each realization of the channel, and is suitable for obtaining the outage performance of this type of system. The second method is based on knowledge of the correlation matrix of the frequency-domain channel gains and can be used to directly obtain the average performance. Both of the methods are applicable for convolutionally-coded interleaved systems employing Quadrature Amplitude Modulation (QAM). As examples, both methods are used to study the performance of the Multiband Orthogonal Frequency Division Multiplexing (OFDM) proposal for high data-rate Ultra-Wideband (UWB) communication.
[ { "version": "v1", "created": "Fri, 31 Mar 2006 19:36:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Snow", "C.", "" ], [ "Lampe", "L.", "" ], [ "Schober", "R.", "" ] ]
cs/0604005
Sergio Servetto
Sergio D. Servetto (Cornell University)
Multiterminal Source Coding with Two Encoders--I: A Computable Outer Bound
Submitted to the IEEE Transactions on Information Theory; Revised, November 2006. Substantial revision after the first round of reviews
null
null
null
cs.IT math.IT
null
In this first part, a computable outer bound is proved for the multiterminal source coding problem, for a setup with two encoders, discrete memoryless sources, and bounded distortion measures.
[ { "version": "v1", "created": "Mon, 3 Apr 2006 04:44:33 GMT" }, { "version": "v2", "created": "Mon, 8 May 2006 22:12:18 GMT" }, { "version": "v3", "created": "Wed, 15 Nov 2006 05:32:28 GMT" } ]
2007-07-13T00:00:00
[ [ "Servetto", "Sergio D.", "", "Cornell University" ] ]
cs/0604021
Nima Sarshar
Nima Sarshar and Behnam A. Rezaei and Vwani P. Roychowdhury
Low Latency Wireless Ad-Hoc Networking: Power and Bandwidth Challenges and a Hierarchical Solution
null
null
null
null
cs.IT math.IT
null
This paper is concerned with the scaling of the number of hops in a large scale wireless ad-hoc network (WANET), a quantity we call network latency. A large network latency affects all aspects of data communication in a WANET, including an increase in delay, packet loss, required processing power and memory. We consider network management and data routing challenges in WANETs with scalable network latency. On the physical side, reducing network latency imposes a significantly higher power and bandwidth demand on nodes, as is reflected in a set of new bounds. On the protocol front, designing distributed routing protocols that can guarantee the delivery of data packets within scalable number of hops is a challenging task. To solve this, we introduce multi-resolution randomized hierarchy (MRRH), a novel power and bandwidth efficient WANET protocol with scalable network latency. MRRH uses a randomized algorithm for building and maintaining a random hierarchical network topology, which together with the proposed routing algorithm can guarantee efficient delivery of data packets in the wireless network. For a network of size $N$, MRRH can provide an average latency of only $O(\log^{3} N)$. The power and bandwidth consumption of MRRH are shown to be \emph{nearly} optimal for the latency it provides. Therefore, MRRH, is a provably efficient candidate for truly large scale wireless ad-hoc networking.
[ { "version": "v1", "created": "Thu, 6 Apr 2006 14:00:20 GMT" } ]
2007-07-13T00:00:00
[ [ "Sarshar", "Nima", "" ], [ "Rezaei", "Behnam A.", "" ], [ "Roychowdhury", "Vwani P.", "" ] ]
cs/0604025
Tie Liu
Tie Liu and Pramod Viswanath
An Extremal Inequality Motivated by Multiterminal Information Theoretic Problems
32 pages, 1 figure
null
null
null
cs.IT math.IT
null
We prove a new extremal inequality, motivated by the vector Gaussian broadcast channel and the distributed source coding with a single quadratic distortion constraint problems. As a corollary, this inequality yields a generalization of the classical entropy-power inequality (EPI). As another corollary, this inequality sheds insight into maximizing the differential entropy of the sum of two dependent random variables.
[ { "version": "v1", "created": "Fri, 7 Apr 2006 04:50:59 GMT" }, { "version": "v2", "created": "Fri, 21 Apr 2006 21:01:03 GMT" }, { "version": "v3", "created": "Tue, 7 Nov 2006 18:15:17 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Tie", "" ], [ "Viswanath", "Pramod", "" ] ]
cs/0604028
Tie Liu
Tie Liu and Pramod Viswanath
Two Proofs of the Fisher Information Inequality via Data Processing Arguments
6 pages, 0 figure
null
null
null
cs.IT math.IT
null
Two new proofs of the Fisher information inequality (FII) using data processing inequalities for mutual information and conditional variance are presented.
[ { "version": "v1", "created": "Fri, 7 Apr 2006 16:51:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Tie", "" ], [ "Viswanath", "Pramod", "" ] ]
cs/0604030
Richard Barton
Richard J. Barton
The Influence of Adaptive Multicoding on Mutual Information and Channel Capacity for Uncertain Wideband CDMA Rayleigh Fading Channels
null
null
null
null
cs.IT math.IT
null
We consider the problem of adaptive modulation for wideband DS-CDMA Rayleigh fading channels with imperfect channel state information (CSI). We assume a multidimensional signal subspace spanned by a collection of random spreading codes (multicoding) and study the effects of both the subspace dimension and the probability distribution of the transmitted symbols on the mutual information between the channel input and output in the presence of uncertainty regarding the true state of the channel. We develop approximations for the mutual information as well as both upper and lower bounds on the mutual information that are stated explicitly in terms of the dimension of the signal constellation, the number of resolvable fading paths on the channel, the current estimate of channel state, and the mean-squared-error of the channel estimate. We analyze these approximations and bounds in order to quantify the impact of signal dimension and symbol distribution on system performance.
[ { "version": "v1", "created": "Fri, 7 Apr 2006 19:28:22 GMT" } ]
2007-07-13T00:00:00
[ [ "Barton", "Richard J.", "" ] ]
cs/0604031
Amos Lapidoth
Amos Lapidoth and Ligong Wang
On the Low SNR Capacity of Peak-Limited Non-Coherent Fading Channels with Memory
null
null
null
null
cs.IT math.IT
null
The capacity of non-coherent stationary Gaussian fading channels with memory under a peak-power constraint is studied in the asymptotic weak-signal regime. It is assumed that the fading law is known to both transmitter and receiver but that neither is cognizant of the fading realization. A connection is demonstrated between the asymptotic behavior of channel capacity in this regime and the asymptotic behavior of the prediction error incurred in predicting the fading process from very noisy observations of its past. This connection can be viewed as the low signal-to-noise ratio (SNR) analog of recent results by Lapidoth & Moser and by Lapidoth demonstrating connections between the high SNR capacity growth and the noiseless or almost-noiseless prediction error. We distinguish between two families of fading laws: the ``slowly forgetting'' and the ``quickly forgetting''. For channels in the former category the low SNR capacity is achieved by IID inputs, whereas in the latter such inputs are typically sub-optimal. Instead, the asymptotic capacity can be approached by inputs with IID phase but block-constant magnitude.
[ { "version": "v1", "created": "Fri, 7 Apr 2006 23:29:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Lapidoth", "Amos", "" ], [ "Wang", "Ligong", "" ] ]
cs/0604033
Shuangquan Wang
Shuangquan Wang, Ali Abdi
Statistical Properties of Eigen-Modes and Instantaneous Mutual Information in MIMO Time-Varying Rayleigh Channels
25 pages, 7 figures, 1 table, submitted to IEEE Trans. Inform. Theory, Apr., 2006
null
null
null
cs.IT math.IT
null
In this paper, we study two important metrics in multiple-input multiple-output (MIMO) time-varying Rayleigh flat fading channels. One is the eigen-mode, and the other is the instantaneous mutual information (IMI). Their second-order statistics, such as the correlation coefficient, level crossing rate (LCR), and average fade/outage duration, are investigated, assuming a general nonisotropic scattering environment. Exact closed-form expressions are derived and Monte Carlo simulations are provided to verify the accuracy of the analytical results. For the eigen-modes, we found they tend to be spatio-temporally uncorrelated in large MIMO systems. For the IMI, the results show that its correlation coefficient can be well approximated by the squared amplitude of the correlation coefficient of the channel, under certain conditions. Moreover, we also found the LCR of IMI is much more sensitive to the scattering environment than that of each eigen-mode.
[ { "version": "v1", "created": "Sat, 8 Apr 2006 15:55:21 GMT" } ]
2007-07-13T00:00:00
[ [ "Wang", "Shuangquan", "" ], [ "Abdi", "Ali", "" ] ]
cs/0604040
Nan Liu
Nan Liu and Sennur Ulukus
Optimal Distortion-Power Tradeoffs in Sensor Networks: Gauss-Markov Random Processes
6 pages, 0 figure, to appear in ICC 2006
null
null
null
cs.IT math.IT
null
We investigate the optimal performance of dense sensor networks by studying the joint source-channel coding problem. The overall goal of the sensor network is to take measurements from an underlying random process, code and transmit those measurement samples to a collector node in a cooperative multiple access channel with feedback, and reconstruct the entire random process at the collector node. We provide lower and upper bounds for the minimum achievable expected distortion when the underlying random process is stationary and Gaussian. In the case where the random process is also Markovian, we evaluate the lower and upper bounds explicitly and show that they are of the same order for a wide range of sum power constraints. Thus, for a Gauss-Markov random process, under these sum power constraints, we determine the achievability scheme that is order-optimal, and express the minimum achievable expected distortion as a function of the sum power constraint.
[ { "version": "v1", "created": "Mon, 10 Apr 2006 16:48:48 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Nan", "" ], [ "Ulukus", "Sennur", "" ] ]
cs/0604049
Vignesh Sethuraman
Vignesh Sethuraman, Bruce Hajek
Low SNR Capacity of Fading Channels with Peak and Average Power Constraints
13 pages, version without proofs submitted to ISIT 2006
null
null
null
cs.IT math.IT
null
Flat-fading channels that are correlated in time are considered under peak and average power constraints. For discrete-time channels, a new upper bound on the capacity per unit time is derived. A low SNR analysis of a full-scattering vector channel is used to derive a complimentary lower bound. Together, these bounds allow us to identify the exact scaling of channel capacity for a fixed peak to average ratio, as the average power converges to zero. The upper bound is also asymptotically tight as the average power converges to zero for a fixed peak power. For a continuous time infinite bandwidth channel, Viterbi identified the capacity for M-FSK modulation. Recently, Zhang and Laneman showed that the capacity can be achieved with non-bursty signaling (QPSK). An additional contribution of this paper is to obtain similar results under peak and average power constraints.
[ { "version": "v1", "created": "Tue, 11 Apr 2006 23:02:57 GMT" }, { "version": "v2", "created": "Thu, 13 Apr 2006 03:40:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Sethuraman", "Vignesh", "" ], [ "Hajek", "Bruce", "" ] ]
cs/0604056
Woonchul Ham
Woonchul Ham, Kemin Zhou
A Short Note on The Volume of Hypersphere
null
null
null
null
cs.IT math.IT
null
In this note, a new method for deriving the volume of hypersphere is proposed by using probability theory. The explicit expression of the multiple times convolution of the probability density functions we should use is very complicated. But in here, we don't need its whole explicit expression. We just need the only a part of information and this fact make it possible to derive the general expression of the voulume of hypersphere. We also comments about the paradox in the hypersphere which was introduced by R.W.Hamming.
[ { "version": "v1", "created": "Thu, 13 Apr 2006 02:31:39 GMT" } ]
2007-07-13T00:00:00
[ [ "Ham", "Woonchul", "" ], [ "Zhou", "Kemin", "" ] ]
cs/0604057
R.N.Mohan Professor
R.N.Mohan and P.T.Kulkarni
A New Fault-Tolerant M-network and its Analysis
null
null
null
null
cs.IT math.IT
null
This paper introduces a new class of efficient inter connection networks called as M-graphs for large multi-processor systems.The concept of M-matrix and M-graph is an extension of Mn-matrices and Mn-graphs.We analyze these M-graphs regarding their suitability for large multi-processor systems. An(p,N) M-graph consists of N nodes, where p is the degree of each node.The topology is found to be having many attractive features prominent among them is the capability of maximal fault-tolerance, high density and constant diameter.It is found that these combinatorial structures exibit some properties like symmetry,and an inter-relation with the nodes, and degree of the concerned graph, which can be utilized for the purposes of inter connected networks.But many of the properties of these mathematical and graphical structures still remained unexplored and the present aim of the paper is to study and analyze some of the properties of these M-graphs and explore their application in networks and multi-processor systems.
[ { "version": "v1", "created": "Thu, 13 Apr 2006 03:22:24 GMT" } ]
2007-07-13T00:00:00
[ [ "Mohan", "R. N.", "" ], [ "Kulkarni", "P. T.", "" ] ]
cs/0604069
Neri Merhav
Neri Merhav and Meir Feder
Universal decoding with an erasure option
23 pages. submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
Motivated by applications of rateless coding, decision feedback, and ARQ, we study the problem of universal decoding for unknown channels, in the presence of an erasure option. Specifically, we harness the competitive minimax methodology developed in earlier studies, in order to derive a universal version of Forney's classical erasure/list decoder, which in the erasure case, optimally trades off between the probability of erasure and the probability of undetected error. The proposed universal erasure decoder guarantees universal achievability of a certain fraction $\xi$ of the optimum error exponents of these probabilities (in a sense to be made precise in the sequel). A single--letter expression for $\xi$, which depends solely on the coding rate and the threshold, is provided. The example of the binary symmetric channel is studied in full detail, and some conclusions are drawn.
[ { "version": "v1", "created": "Tue, 18 Apr 2006 16:42:03 GMT" } ]
2007-07-13T00:00:00
[ [ "Merhav", "Neri", "" ], [ "Feder", "Meir", "" ] ]
cs/0604083
Ori Shental
Ori Shental and Ido Kanter
Optimum Asymptotic Multiuser Efficiency of Pseudo-Orthogonal Randomly Spread CDMA
WIC 27th Symposium on Information Theory in the Benelux, 2006
null
null
null
cs.IT math.IT
null
A $K$-user pseudo-orthogonal (PO) randomly spread CDMA system, equivalent to transmission over a subset of $K'\leq K$ single-user Gaussian channels, is introduced. The high signal-to-noise ratio performance of the PO-CDMA is analyzed by rigorously deriving its asymptotic multiuser efficiency (AME) in the large system limit. Interestingly, the $K'$-optimized PO-CDMA transceiver scheme yields an AME which is practically equal to 1 for system loads smaller than 0.1 and lower bounded by 1/4 for increasing loads. As opposed to the vanishing efficiency of linear multiuser detectors, the derived efficiency is comparable to the ultimate CDMA efficiency achieved for the intractable optimal multiuser detector.
[ { "version": "v1", "created": "Fri, 21 Apr 2006 14:47:18 GMT" } ]
2007-07-13T00:00:00
[ [ "Shental", "Ori", "" ], [ "Kanter", "Ido", "" ] ]
cs/0604085
Gayathre Krishnan
Gayathre Krishnan
Information in Quantum Description and Gate Implementation
4 pages
null
null
null
cs.IT math.IT
null
This note considers Kak's observer-reference model of quantum information, where it is shown that qubits carry information that is sqrt n / ln n times classical information, where n is the number of components in the measurement system, to analyze information processing in quantum gates. The obverse side of this exponential nature of quantum information is that the computational complexity of implementing unconditionally reliable quantum gates is also exponential.
[ { "version": "v1", "created": "Fri, 21 Apr 2006 16:36:45 GMT" } ]
2007-07-13T00:00:00
[ [ "Krishnan", "Gayathre", "" ] ]
cs/0604091
Jun Chen
Jun Chen, Toby Berger
Robust Distributed Source Coding
40 pages, submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
We consider a distributed source coding system in which several observations are communicated to the decoder using limited transmission rate. The observations must be separately coded. We introduce a robust distributed coding scheme which flexibly trades off between system robustness and compression efficiency. The optimality of this coding scheme is proved for various special cases.
[ { "version": "v1", "created": "Sun, 23 Apr 2006 20:44:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Chen", "Jun", "" ], [ "Berger", "Toby", "" ] ]
cs/0604092
Sinan Gezici Dr
Sinan Gezici, Mung Chiang, H. Vincent Poor, and Hisashi Kobayashi
Optimal and Suboptimal Finger Selection Algorithms for MMSE Rake Receivers in Impulse Radio UWB Systems
Submitted to the EURASIP Journal on Wireless Communications and Networking - Special Issue on Ultra-Wideband (UWB) Communication Systems - Technology and Applications
null
null
null
cs.IT math.IT
null
The problem of choosing the optimal multipath components to be employed at a minimum mean square error (MMSE) selective Rake receiver is considered for an impulse radio ultra-wideband system. First, the optimal finger selection problem is formulated as an integer programming problem with a non-convex objective function. Then, the objective function is approximated by a convex function and the integer programming problem is solved by means of constraint relaxation techniques. The proposed algorithms are suboptimal due to the approximate objective function and the constraint relaxation steps. However, they perform better than the conventional finger selection algorithm, which is suboptimal since it ignores the correlation between multipath components, and they can get quite close to the optimal scheme that cannot be implemented in practice due to its complexity. In addition to the convex relaxation techniques, a genetic algorithm (GA) based approach is proposed, which does not need any approximations or integer relaxations. This iterative algorithm is based on the direct evaluation of the objective function, and can achieve near-optimal performance with a reasonable number of iterations. Simulation results are presented to compare the performance of the proposed finger selection algorithms with that of the conventional and the optimal schemes.
[ { "version": "v1", "created": "Sun, 23 Apr 2006 23:51:34 GMT" } ]
2007-07-13T00:00:00
[ [ "Gezici", "Sinan", "" ], [ "Chiang", "Mung", "" ], [ "Poor", "H. Vincent", "" ], [ "Kobayashi", "Hisashi", "" ] ]
cs/0604104
Navin Kashyap
Akiko Manada and Navin Kashyap
On the Shannon Covers of Certain Irreducible Constrained Systems of Finite Type
5 pages, 9 figures; to appear in the Proceedings of the 2006 International Symposium on Information Theory, July 2006
null
null
null
cs.IT cs.DM math.IT
null
A construction of Crochemore, Mignosi and Restivo in the automata theory literature gives a presentation of a finite-type constrained system (FTCS) that is deterministic and has a relatively small number of states. This construction is thus a good starting point for determining the minimal deterministic presentation, known as the Shannon cover, of an FTCS. We analyze in detail the Crochemore-Mignosi-Restivo (CMR) construction in the case when the list of forbidden words defining the FTCS is of size at most two. We show that if the FTCS is irreducible, then an irreducible presentation for the system can be easily obtained by deleting a prescribed few states from the CMR presentation. By studying the follower sets of the states in this irreducible presentation, we are able to explicitly determine the Shannon cover in some cases. In particular, our results show that the CMR construction directly yields the Shannon cover in the case of an irreducible FTCS with exactly one forbidden word, but this is not in general the case for FTCS's with two forbidden words.
[ { "version": "v1", "created": "Wed, 26 Apr 2006 06:16:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Manada", "Akiko", "" ], [ "Kashyap", "Navin", "" ] ]
cs/0604106
Ofer Shayevitz
Ofer Shayevitz, Ram Zamir and Meir Feder
Bounded expected delay in arithmetic coding
null
null
null
null
cs.IT math.IT
null
We address the problem of delay in an arithmetic coding system. Due to the nature of the arithmetic coding process, source sequences causing arbitrarily large encoding or decoding delays exist. This phenomena raises the question of just how large is the expected input to output delay in these systems, i.e., once a source sequence has been encoded, what is the expected number of source letters that should be further encoded to allow full decoding of that sequence. In this paper, we derive several new upper bounds on the expected delay for a memoryless source, which improve upon a known bound due to Gallager. The bounds provided are uniform in the sense of being independent of the sequence's history. In addition, we give a sufficient condition for a source to admit a bounded expected delay, which holds for a stationary ergodic Markov source of any order.
[ { "version": "v1", "created": "Wed, 26 Apr 2006 13:58:53 GMT" } ]
2007-07-13T00:00:00
[ [ "Shayevitz", "Ofer", "" ], [ "Zamir", "Ram", "" ], [ "Feder", "Meir", "" ] ]
cs/0604107
Aleksandar Jovicic
Aleksandar Jovicic and Pramod Viswanath
Cognitive Radio: An Information-Theoretic Perspective
34 pages, Sections 5 and A.2 updated
null
null
null
cs.IT math.IT
null
Cognitive radios have been proposed as a means to implement efficient reuse of the licensed spectrum. The key feature of a cognitive radio is its ability to recognize the primary (licensed) user and adapt its communication strategy to minimize the interference that it generates. We consider a communication scenario in which the primary and the cognitive user wish to communicate to different receivers, subject to mutual interference. Modeling the cognitive radio as a transmitter with side-information about the primary transmission, we characterize the largest rate at which the cognitive radio can reliably communicate under the constraint that (i) no interference is created for the primary user, and (ii) the primary encoder-decoder pair is oblivious to the presence of the cognitive radio.
[ { "version": "v1", "created": "Thu, 27 Apr 2006 06:00:07 GMT" }, { "version": "v2", "created": "Tue, 9 May 2006 23:47:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Jovicic", "Aleksandar", "" ], [ "Viswanath", "Pramod", "" ] ]
cs/0605001
Chao Tian
Chao Tian and Suhas Diggavi
On Multistage Successive Refinement for Wyner-Ziv Source Coding with Degraded Side Informations
Submitted to IEEE Trans. Information Theory Apr. 2006
null
null
null
cs.IT math.IT
null
We provide a complete characterization of the rate-distortion region for the multistage successive refinement of the Wyner-Ziv source coding problem with degraded side informations at the decoder. Necessary and sufficient conditions for a source to be successively refinable along a distortion vector are subsequently derived. A source-channel separation theorem is provided when the descriptions are sent over independent channels for the multistage case. Furthermore, we introduce the notion of generalized successive refinability with multiple degraded side informations. This notion captures whether progressive encoding to satisfy multiple distortion constraints for different side informations is as good as encoding without progressive requirement. Necessary and sufficient conditions for generalized successive refinability are given. It is shown that the following two sources are generalized successively refinable: (1) the Gaussian source with degraded Gaussian side informations, (2) the doubly symmetric binary source when the worse side information is a constant. Thus for both cases, the failure of being successively refinable is only due to the inherent uncertainty on which side information will occur at the decoder, but not the progressive encoding requirement.
[ { "version": "v1", "created": "Mon, 1 May 2006 12:41:23 GMT" }, { "version": "v2", "created": "Tue, 2 May 2006 18:20:06 GMT" } ]
2007-07-13T00:00:00
[ [ "Tian", "Chao", "" ], [ "Diggavi", "Suhas", "" ] ]
cs/0605005
Ruoheng Liu
Ruoheng Liu, Ivana Maric, Roy D. Yates, and Predrag Spasojevic
The Discrete Memoryless Multiple Access Channel with Confidential Messages
1 figure, accepted by ISIT 2006 conference
null
null
null
cs.IT math.IT
null
A multiple-access channel is considered in which messages from one encoder are confidential. Confidential messages are to be transmitted with perfect secrecy, as measured by equivocation at the other encoder. The upper bounds and the achievable rates for this communication situation are determined.
[ { "version": "v1", "created": "Mon, 1 May 2006 21:19:29 GMT" }, { "version": "v2", "created": "Sat, 17 Feb 2007 20:28:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Ruoheng", "" ], [ "Maric", "Ivana", "" ], [ "Yates", "Roy D.", "" ], [ "Spasojevic", "Predrag", "" ] ]
cs/0605006
Shengtian Yang
Shengtian Yang, Peiliang Qiu
An Information-Spectrum Approach to Multiterminal Rate-Distortion Theory
Submitted to IEEE Transactions on Information Theory (Apr. 2006)
null
null
null
cs.IT math.IT
null
An information-spectrum approach is applied to solve the multiterminal source coding problem for correlated general sources, where sources may be nonstationary and/or nonergodic, and the distortion measure is arbitrary and may be nonadditive. A general formula for the rate-distortion region of the multiterminal source coding problem with the maximum distortion criterion under fixed-length coding is shown in this correspondence.
[ { "version": "v1", "created": "Tue, 2 May 2006 01:29:01 GMT" } ]
2007-07-13T00:00:00
[ [ "Yang", "Shengtian", "" ], [ "Qiu", "Peiliang", "" ] ]
cs/0605009
Marcus Hutter
Marcus Hutter
On the Foundations of Universal Sequence Prediction
14 pages
Proc. 3rd Annual Conference on Theory and Applications of Models of Computation (TAMC 2006) pages 408-420
null
IDSIA-03-06
cs.LG cs.IT math.IT math.ST stat.TH
null
Solomonoff completed the Bayesian framework by providing a rigorous, unique, formal, and universal choice for the model class and the prior. We discuss in breadth how and in which sense universal (non-i.i.d.) sequence prediction solves various (philosophical) problems of traditional Bayesian sequence prediction. We show that Solomonoff's model possesses many desirable properties: Fast convergence and strong bounds, and in contrast to most classical continuous prior densities has no zero p(oste)rior problem, i.e. can confirm universal hypotheses, is reparametrization and regrouping invariant, and avoids the old-evidence and updating problem. It even performs well (actually better) in non-computable environments.
[ { "version": "v1", "created": "Wed, 3 May 2006 07:47:21 GMT" } ]
2007-07-13T00:00:00
[ [ "Hutter", "Marcus", "" ] ]
cs/0605010
Di Wu
Di Wu and Predrag Spasojevic
Complementary Set Matrices Satisfying a Column Correlation Constraint
null
null
null
null
cs.IT math.IT
null
Motivated by the problem of reducing the peak to average power ratio (PAPR) of transmitted signals, we consider a design of complementary set matrices whose column sequences satisfy a correlation constraint. The design algorithm recursively builds a collection of $2^{t+1}$ mutually orthogonal (MO) complementary set matrices starting from a companion pair of sequences. We relate correlation properties of column sequences to that of the companion pair and illustrate how to select an appropriate companion pair to ensure that a given column correlation constraint is satisfied. For $t=0$, companion pair properties directly determine matrix column correlation properties. For $t\geq 1$, reducing correlation merits of the companion pair may lead to improved column correlation properties. However, further decrease of the maximum out-off-phase aperiodic autocorrelation of column sequences is not possible once the companion pair correlation merit is less than a threshold determined by $t$. We also reveal a design of the companion pair which leads to complementary set matrices with Golay column sequences. Exhaustive search for companion pairs satisfying a column correlation constraint is infeasible for medium and long sequences. We instead search for two shorter length sequences by minimizing a cost function in terms of their autocorrelation and crosscorrelation merits. Furthermore, an improved cost function which helps in reducing the maximum out-off-phase column correlation is derived based on the properties of the companion pair. By exploiting the well-known Welch bound, sufficient conditions for the existence of companion pairs which satisfy a set of column correlation constraints are also given.
[ { "version": "v1", "created": "Wed, 3 May 2006 16:19:22 GMT" } ]
2007-07-13T00:00:00
[ [ "Wu", "Di", "" ], [ "Spasojevic", "Predrag", "" ] ]
cs/0605014
Yingbin Liang
Yingbin Liang and H. Vincent Poor
Generalized Multiple Access Channels with Confidential Messages
Submitted to IEEE Transactions on Information Theory, April 2006
null
null
null
cs.IT math.IT
null
A discrete memoryless generalized multiple access channel (GMAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination. The two users are allowed to receive channel outputs, and hence may obtain the confidential information sent by each other from channel outputs they receive. However, each user views the other user as a wire-tapper, and wishes to keep its confidential information as secret as possible from the other user. The level of secrecy of the confidential information is measured by the equivocation rate, i.e., the entropy rate of the confidential information conditioned on channel outputs at the wire-tapper. The performance measure of interest for the GMAC with confidential messages is the rate-equivocation tuple that includes the common rate, two private rates and two equivocation rates as components. The set that includes all these achievable rate-equivocation tuples is referred to as the capacity-equivocation region. The GMAC with one confidential message set is first studied, where only one user (user 1) has private (confidential) information for the destination. Inner and outer bounds on the capacity-equivocation region are derived, and the capacity-equivocation are established for some classes of channels including the Gaussian GMAC. Furthermore, the secrecy capacity region is established, which is the set of all achievable rates with user 2 being perfectly ignorant of confidential messages of user 1. For the GMAC with two confidential message sets, where both users have confidential messages for the destination, an inner bound on the capacity-equivocation region is obtained.
[ { "version": "v1", "created": "Thu, 4 May 2006 18:33:15 GMT" } ]
2007-07-13T00:00:00
[ [ "Liang", "Yingbin", "" ], [ "Poor", "H. Vincent", "" ] ]
cs/0605016
Yingbin Liang
Yingbin Liang and Venugopal V. Veeravalli
Cooperative Relay Broadcast Channels
Submitted to the IEEE Transactions on Information Theory, July 2005
null
null
null
cs.IT math.IT
null
The capacity regions are investigated for two relay broadcast channels (RBCs), where relay links are incorporated into standard two-user broadcast channels to support user cooperation. In the first channel, the Partially Cooperative Relay Broadcast Channel, only one user in the system can act as a relay and transmit to the other user through a relay link. An achievable rate region is derived based on the relay using the decode-and-forward scheme. An outer bound on the capacity region is derived and is shown to be tighter than the cut-set bound. For the special case where the Partially Cooperative RBC is degraded, the achievable rate region is shown to be tight and provides the capacity region. Gaussian Partially Cooperative RBCs and Partially Cooperative RBCs with feedback are further studied. In the second channel model being studied in the paper, the Fully Cooperative Relay Broadcast Channel, both users can act as relay nodes and transmit to each other through relay links. This is a more general model than the Partially Cooperative RBC. All the results for Partially Cooperative RBCs are correspondingly generalized to the Fully Cooperative RBCs. It is further shown that the AWGN Fully Cooperative RBC has a larger achievable rate region than the AWGN Partially Cooperative RBC. The results illustrate that relaying and user cooperation are powerful techniques in improving the capacity of broadcast channels.
[ { "version": "v1", "created": "Thu, 4 May 2006 19:13:50 GMT" } ]
2007-07-13T00:00:00
[ [ "Liang", "Yingbin", "" ], [ "Veeravalli", "Venugopal V.", "" ] ]
cs/0605023
Ender Tekin
Ender Tekin and Aylin Yener
The Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy Constraints
International Symposium on Information Theory, 2006. 5 pages
null
null
null
cs.IT cs.CR math.IT
null
We consider the Gaussian Multiple Access Wire-Tap Channel (GMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and informed wire-tapper who receives a degraded version of the signal at the receiver. We define a suitable security measure for this multi-access environment. We derive an outer bound for the rate region such that secrecy to some pre-determined degree can be maintained. We also find, using Gaussian codebooks, an achievable such secrecy region. Gaussian codewords are shown to achieve the sum capacity outer bound, and the achievable region concides with the outer bound for Gaussian codewords, giving the capacity region when inputs are constrained to be Gaussian. We present numerical results showing the new rate region and compare it with that of the Gaussian Multiple-Access Channel (GMAC) with no secrecy constraints.
[ { "version": "v1", "created": "Sat, 6 May 2006 16:22:26 GMT" } ]
2007-07-13T00:00:00
[ [ "Tekin", "Ender", "" ], [ "Yener", "Aylin", "" ] ]
cs/0605044
Georg Schmidt
Georg Schmidt, and Vladimir R. Sidorenko
Linear Shift-Register Synthesis for Multiple Sequences of Varying Length
null
null
null
null
cs.IT math.IT
null
The problem of finding the shortest linear shift-register capable of generating t finite length sequences over some field F is considered. A similar problem was already addressed by Feng and Tzeng. They presented an iterative algorithm for solving this multi-sequence shift-register synthesis problem, which can be considered as generalization of the well known Berlekamp-Massey algorithm. The Feng-Tzeng algorithm works indeed, if all t sequences have the same length. This paper focuses on multi-sequence shift-register synthesis for generating sequences of varying length. It is exposed, that the Feng-Tzeng algorithm does not always give the correct solution in this case. A modified algorithm is proposed and formally proved, which overcomes this problem.
[ { "version": "v1", "created": "Tue, 9 May 2006 21:23:11 GMT" } ]
2007-07-13T00:00:00
[ [ "Schmidt", "Georg", "" ], [ "Sidorenko", "Vladimir R.", "" ] ]
cs/0605051
Chad Cole
Chad A. Cole, Stephen G. Wilson, Eric. K. Hall, Thomas R. Giallorenzi
A General Method for Finding Low Error Rates of LDPC Codes
Submitted Trans. Inf. Theory
null
null
null
cs.IT math.IT
null
This paper outlines a three-step procedure for determining the low bit error rate performance curve of a wide class of LDPC codes of moderate length. The traditional method to estimate code performance in the higher SNR region is to use a sum of the contributions of the most dominant error events to the probability of error. These dominant error events will be both code and decoder dependent, consisting of low-weight codewords as well as non-codeword events if ML decoding is not used. For even moderate length codes, it is not feasible to find all of these dominant error events with a brute force search. The proposed method provides a convenient way to evaluate very low bit error rate performance of an LDPC code without requiring knowledge of the complete error event weight spectrum or resorting to a Monte Carlo simulation. This new method can be applied to various types of decoding such as the full belief propagation version of the message passing algorithm or the commonly used min-sum approximation to belief propagation. The proposed method allows one to efficiently see error performance at bit error rates that were previously out of reach of Monte Carlo methods. This result will provide a solid foundation for the analysis and design of LDPC codes and decoders that are required to provide a guaranteed very low bit error rate performance at certain SNRs.
[ { "version": "v1", "created": "Thu, 11 May 2006 14:21:36 GMT" } ]
2007-07-13T00:00:00
[ [ "Cole", "Chad A.", "" ], [ "Wilson", "Stephen G.", "" ], [ "Hall", "Eric. K.", "" ], [ "Giallorenzi", "Thomas R.", "" ] ]
cs/0605071
Wei Wu
Wei Wu, Sriram Vishwanath and Ari Arapostathis
On the Capacity of Interference Channels with Degraded Message sets
null
null
null
null
cs.IT math.IT
null
This paper is motivated by a sensor network on a correlated field where nearby sensors share information, and can thus assist rather than interfere with one another. A special class of two-user Gaussian interference channels (IFCs) is considered where one of the two transmitters knows both the messages to be conveyed to the two receivers (called the IFC with degraded message sets). Both achievability and converse arguments are provided for this scenario for a class of discrete memoryless channels with weak interference. For the case of the Gaussian weak interference channel with degraded message sets, optimality of Gaussian inputs is also shown, resulting in the capacity region of this channel.
[ { "version": "v1", "created": "Wed, 17 May 2006 07:19:16 GMT" } ]
2007-07-13T00:00:00
[ [ "Wu", "Wei", "" ], [ "Vishwanath", "Sriram", "" ], [ "Arapostathis", "Ari", "" ] ]
cs/0605072
Wei Wu
Wei Wu, Sriram Vishwanath and Ari Arapostathis
On the Capacity of Gaussian Weak Interference Channels with Degraded Message sets
This paper appears in CISS 2006, Princeton, NJ
null
null
null
cs.IT math.IT
null
This paper is motivated by a sensor network on a correlated field where nearby sensors share information, and can thus assist rather than interfere with one another. We consider a special class of two-user Gaussian interference channels (IFCs) where one of the two transmitters knows both the messages to be conveyed to the two receivers. Both achievability and converse arguments are provided for a channel with Gaussian inputs and Gaussian noise when the interference is weaker than the direct link (a so called weak IFC). In general, this region serves as an outer bound on the capacity of weak IFCs with no shared knowledge between transmitters.
[ { "version": "v1", "created": "Wed, 17 May 2006 07:34:50 GMT" } ]
2007-07-13T00:00:00
[ [ "Wu", "Wei", "" ], [ "Vishwanath", "Sriram", "" ], [ "Arapostathis", "Ari", "" ] ]
cs/0605077
Taesup Moon
Taesup Moon, Tsachy Weissman
Universal Filtering via Hidden Markov Modeling
29 pages
null
null
null
cs.IT math.IT
null
The problem of discrete universal filtering, in which the components of a discrete signal emitted by an unknown source and corrupted by a known DMC are to be causally estimated, is considered. A family of filters are derived, and are shown to be universally asymptotically optimal in the sense of achieving the optimum filtering performance when the clean signal is stationary, ergodic, and satisfies an additional mild positivity condition. Our schemes are comprised of approximating the noisy signal using a hidden Markov process (HMP) via maximum-likelihood (ML) estimation, followed by the use of the forward recursions for HMP state estimation. It is shown that as the data length increases, and as the number of states in the HMP approximation increases, our family of filters attain the performance of the optimal distribution-dependent filter.
[ { "version": "v1", "created": "Wed, 17 May 2006 18:00:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Moon", "Taesup", "" ], [ "Weissman", "Tsachy", "" ] ]
cs/0605079
Amos Lapidoth
Amos Lapidoth, Shlomo Shamai, Michele Wigger
On the Capacity of Fading MIMO Broadcast Channels with Imperfect Transmitter Side-Information
Extended version of a paper of the same title that appeared in the Proceedings of the 43rd Annual Allerton Conference on Communication, Control, and Computing, Sept. 28-30, 2005
null
null
null
cs.IT math.IT
null
A fading broadcast channel is considered where the transmitter employs two antennas and each of the two receivers employs a single receive antenna. It is demonstrated that even if the realization of the fading is precisely known to the receivers, the high signal-to-noise (SNR) throughput is greatly reduced if, rather than knowing the fading realization \emph{precisely}, the trasmitter only knows the fading realization \emph{approximately}. The results are general and are not limited to memoryless Gaussian fading.
[ { "version": "v1", "created": "Wed, 17 May 2006 22:29:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Lapidoth", "Amos", "" ], [ "Shamai", "Shlomo", "" ], [ "Wigger", "Michele", "" ] ]
cs/0605084
Yingbin Liang
Yingbin Liang and H. Vincent Poor
The Generalized Multiple Access Channel with Confidential Messages
To appear in the Proceedings of the 2006 IEEE International Symposium on Information Theory, Seattle, WA, July 9 - 14, 2006
null
null
null
cs.IT math.IT
null
A discrete memoryless generalized multiple access channel (GMAC) with confidential messages is studied, where two users attempt to transmit common information to a destination and each user also has private (confidential) information intended for the destination. This channel generalizes the multiple access channel (MAC) in that the two users also receive channel outputs. It is assumed that each user views the other user as a wire-tapper, and wishes to keep its confidential information as secret as possible from the other user. The level of secrecy of the confidential information is measured by the equivocation rate. The performance measure of interest is the rate-equivocation tuple that includes the common rate, two private rates and two equivocation rates as components. The set that includes all achievable rate-equivocation tuples is referred to as the capacity-equivocation region. For the GMAC with one confidential message set, where only one user (user 1) has private (confidential) information for the destination, inner and outer bounds on the capacity-equivocation region are derived. The secrecy capacity region is established, which is the set of all achievable rates with user 2 being perfectly ignorant of confidential messages of user 1. Furthermore, the capacity-equivocation region and the secrecy capacity region are established for the degraded GMAC with one confidential message set. For the GMAC with two confidential message sets, where both users have confidential messages for the destination, inner bounds on the capacity-equivocation region and the secrecy capacity region are obtained.
[ { "version": "v1", "created": "Fri, 19 May 2006 05:02:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Liang", "Yingbin", "" ], [ "Poor", "H. Vincent", "" ] ]
cs/0605086
Chih-Chun Wang
Chih-Chun Wang (1), Sanjeev R. Kulkarni (2), H. Vincent Poor (2) ((1) Purdue University, (2) Princeton University)
Upper Bounding the Performance of Arbitrary Finite LDPC Codes on Binary Erasure Channels
To appear in the Proceedings of the 2006 IEEE International Symposium on Information Theory, Seattle, WA, July 9 - 14, 2006
null
null
null
cs.IT math.IT
null
Assuming iterative decoding for binary erasure channels (BECs), a novel tree-based technique for upper bounding the bit error rates (BERs) of arbitrary, finite low-density parity-check (LDPC) codes is provided and the resulting bound can be evaluated for all operating erasure probabilities, including both the waterfall and the error floor regions. This upper bound can also be viewed as a narrowing search of stopping sets, which is an approach different from the stopping set enumeration used for lower bounding the error floor. When combined with optimal leaf-finding modules, this upper bound is guaranteed to be tight in terms of the asymptotic order. The Boolean framework proposed herein further admits a composite search for even tighter results. For comparison, a refinement of the algorithm is capable of exhausting all stopping sets of size <14 for irregular LDPC codes of length n=500, which requires approximately 1.67*10^25 trials if a brute force approach is taken. These experiments indicate that this upper bound can be used both as an analytical tool and as a deterministic worst-performance (error floor) guarantee, the latter of which is crucial to optimizing LDPC codes for extremely low BER applications, e.g., optical/satellite communications.
[ { "version": "v1", "created": "Fri, 19 May 2006 17:55:08 GMT" } ]
2007-07-13T00:00:00
[ [ "Wang", "Chih-Chun", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Poor", "H. Vincent", "" ] ]
cs/0605091
Martin Wainwright
Emin Martinian, Martin J. Wainwright
Low-density constructions can achieve the Wyner-Ziv and Gelfand-Pinsker bounds
To appear at International Symposium on Information Theory, Seattle, WA. July 2006
null
null
null
cs.IT math.IT
null
We describe and analyze sparse graphical code constructions for the problems of source coding with decoder side information (the Wyner-Ziv problem), and channel coding with encoder side information (the Gelfand-Pinsker problem). Our approach relies on a combination of low-density parity check (LDPC) codes and low-density generator matrix (LDGM) codes, and produces sparse constructions that are simultaneously good as both source and channel codes. In particular, we prove that under maximum likelihood encoding/decoding, there exist low-density codes (i.e., with finite degrees) from our constructions that can saturate both the Wyner-Ziv and Gelfand-Pinsker bounds.
[ { "version": "v1", "created": "Sun, 21 May 2006 19:36:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Martinian", "Emin", "" ], [ "Wainwright", "Martin J.", "" ] ]
cs/0605098
Sharon Betz
Sharon Betz and H. Vincent Poor
Energy Efficiency in Multi-hop CDMA Networks: A Game Theoretic Analysis
To appear in the Proceedings of the Workshop on Multi-Layer Modelling and Design of Multi-Hop Wireless Networks (MLMD 06), Minneapolis, MN, July 12 - 15, 2006
null
null
null
cs.IT math.IT
null
A game-theoretic analysis is used to study the effects of receiver choice on the energy efficiency of multi-hop networks in which the nodes communicate using Direct-Sequence Code Division Multiple Access (DS-CDMA). A Nash equilibrium of the game in which the network nodes can choose their receivers as well as their transmit powers to maximize the total number of bits they transmit per unit of energy is derived. The energy efficiencies resulting from the use of different linear multiuser receivers in this context are compared, looking at both the non-cooperative game and the Pareto optimal solution. For analytical ease, particular attention is paid to asymptotically large networks. Significant gains in energy efficiency are observed when multiuser receivers, particularly the linear minimum mean-square error (MMSE) receiver, are used instead of conventional matched filter receivers.
[ { "version": "v1", "created": "Mon, 22 May 2006 16:47:54 GMT" } ]
2007-07-13T00:00:00
[ [ "Betz", "Sharon", "" ], [ "Poor", "H. Vincent", "" ] ]
cs/0605105
Chandra Nair
Chandra Nair, Abbas El Gamal
An outer bound to the capacity region of the broadcast channel
12 pages, 1 figure ISIT 2006
null
null
null
cs.IT math.IT
null
An outer bound to the capacity region of the two-receiver discrete memoryless broadcast channel is given. The outer bound is tight for all cases where the capacity region is known. When specialized to the case of no common information, this outer bound is contained in the Korner-Marton outer bound. This containment is shown to be strict for the binary skew-symmetric broadcast channel. Thus, this outer bound is in general tighter than all other known outer bounds on the discrete memoryless broadcast channel.
[ { "version": "v1", "created": "Wed, 24 May 2006 14:40:45 GMT" }, { "version": "v2", "created": "Thu, 5 Oct 2006 16:58:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Nair", "Chandra", "" ], [ "Gamal", "Abbas El", "" ] ]
cs/0605116
Nan Liu
Nan Liu and Sennur Ulukus
Optimal Distortion-Power Tradeoffs in Gaussian Sensor Networks
5 pages, 0 figure, To appear in ISIT 2006
null
null
null
cs.IT math.IT
null
We investigate the optimal performance of dense sensor networks by studying the joint source-channel coding problem. The overall goal of the sensor network is to take measurements from an underlying random process, code and transmit those measurement samples to a collector node in a cooperative multiple access channel with imperfect feedback, and reconstruct the entire random process at the collector node. We provide lower and upper bounds for the minimum achievable expected distortion when the underlying random process is Gaussian. In the case where the random process satisfies some general conditions, we evaluate the lower and upper bounds explicitly and show that they are of the same order for a wide range of sum power constraints. Thus, for these random processes, under these sum power constraints, we determine the achievability scheme that is order-optimal, and express the minimum achievable expected distortion as a function of the sum power constraint.
[ { "version": "v1", "created": "Wed, 24 May 2006 20:58:55 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Nan", "" ], [ "Ulukus", "Sennur", "" ] ]
cs/0605117
Seijoon Shim
Seijoon Shim, Chan-Byoung Chae, and Robert W. Heath Jr
A Lattice-Based MIMO Broadcast Precoder for Multi-Stream Transmission
30 pages, 9 figures, submitted to IEEE Trans. on Communications and partly submitted to the Globecomm 2006
null
null
null
cs.IT math.IT
null
Precoding with block diagonalization is an attractive scheme for approaching sum capacity in multiuser multiple input multiple output (MIMO) broadcast channels. This method requires either global channel state information at every receiver or an additional training phase, which demands additional system planning. In this paper we propose a lattice based multi-user precoder that uses block diagonalization combined with pre-equalization and perturbation for the multiuser MIMO broadcast channel. An achievable sum rate of the proposed scheme is derived and used to show that the proposed technique approaches the achievable sum rate of block diagonalization with water-filling but does not require the additional information at the receiver. Monte Carlo simulations with equal power allocation show that the proposed method provides better bit error rate and diversity performance than block diagonalization with a zero-forcing receiver. Additionally, the proposed method shows similar performance to the maximum likelihood receiver but with much lower receiver complexity.
[ { "version": "v1", "created": "Thu, 25 May 2006 02:32:54 GMT" } ]
2007-07-13T00:00:00
[ [ "Shim", "Seijoon", "" ], [ "Chae", "Chan-Byoung", "" ], [ "Heath", "Robert W.", "Jr" ] ]
cs/0605135
Sergio Servetto
R. Dabora and S. D. Servetto (Cornell University)
On the Role of Estimate-and-Forward with Time-Sharing in Cooperative Communications
Submitted to the IEEE Transactions on Information Theory, May 2006; Revised, October 2006
null
null
null
cs.IT math.IT
null
In this work we focus on the general relay channel. We investigate the application of estimate-and-forward (EAF) to different scenarios. Specifically, we consider assignments of the auxiliary random variables that always satisfy the feasibility constraints. We first consider the multiple relay channel and obtain an achievable rate without decoding at the relays. We demonstrate the benefits of this result via an explicit discrete memoryless multiple relay scenario where multi-relay EAF is superior to multi-relay decode-and-forward (DAF). We then consider the Gaussian relay channel with coded modulation, where we show that a three-level quantization outperforms the Gaussian quantization commonly used to evaluate the achievable rates in this scenario. Finally we consider the cooperative general broadcast scenario with a multi-step conference. We apply estimate-and-forward to obtain a general multi-step achievable rate region. We then give an explicit assignment of the auxiliary random variables, and use this result to obtain an explicit expression for the single common message broadcast scenario with a two-step conference.
[ { "version": "v1", "created": "Mon, 29 May 2006 18:12:55 GMT" }, { "version": "v2", "created": "Wed, 1 Nov 2006 07:56:58 GMT" } ]
2007-07-13T00:00:00
[ [ "Dabora", "R.", "", "Cornell University" ], [ "Servetto", "S. D.", "", "Cornell University" ] ]
cs/0606011
Hao Chen
Hao Chen, Liang Ma and Jianhua Li
Vectorial Resilient $PC(l)$ of Order $k$ Boolean Functions from AG-Codes
11 pages, new version, minor corrections
null
null
null
cs.CR cs.IT math.IT
null
Propagation criterion of degree $l$ and order $k$ ($PC(l)$ of order $k$) and resiliency of vectorial Boolean functions are important for cryptographic purpose (see [1, 2, 3,6, 7,8,10,11,16]. Kurosawa, Stoh [8] and Carlet [1] gave a construction of Boolean functions satisfying $PC(l)$ of order $k$ from binary linear or nonlinear codes in. In this paper, algebraic-geometric codes over $GF(2^m)$ are used to modify Carlet and Kurosawa-Satoh's construction for giving vectorial resilient Boolean functions satisfying $PC(l)$ of order $k$. The new construction is compared with previously known results.
[ { "version": "v1", "created": "Fri, 2 Jun 2006 05:50:15 GMT" }, { "version": "v2", "created": "Mon, 12 Jun 2006 09:49:43 GMT" }, { "version": "v3", "created": "Mon, 31 Jul 2006 07:01:10 GMT" }, { "version": "v4", "created": "Sun, 3 Sep 2006 08:13:41 GMT" }, { "version": "v5", "created": "Wed, 6 Sep 2006 04:33:25 GMT" }, { "version": "v6", "created": "Tue, 19 Sep 2006 04:02:59 GMT" } ]
2007-07-13T00:00:00
[ [ "Chen", "Hao", "" ], [ "Ma", "Liang", "" ], [ "Li", "Jianhua", "" ] ]
cs/0606014
Wei Wu
Wei Wu, Sriram Vishwanath and Ari Arapostathis
On the Capacity of Multiple Access Channels with State Information and Feedback
Prelimenary result appears in ISIT 2006
null
null
null
cs.IT math.IT
null
In this paper, the multiple access channel (MAC) with channel state is analyzed in a scenario where a) the channel state is known non-causally to the transmitters and b) there is perfect causal feedback from the receiver to the transmitters. An achievable region and an outer bound are found for a discrete memoryless MAC that extend existing results, bringing together ideas from the two separate domains of MAC with state and MAC with feedback. Although this achievable region does not match the outer bound in general, special cases where they meet are identified. In the case of a Gaussian MAC, a specialized achievable region is found by using a combination of dirty paper coding and a generalization of the Schalkwijk-Kailath, Ozarow and Merhav-Weissman schemes, and this region is found to be capacity achieving. Specifically, it is shown that additive Gaussian interference that is known non-causally to the transmitter causes no loss in capacity for the Gaussian MAC with feedback.
[ { "version": "v1", "created": "Sat, 3 Jun 2006 03:54:11 GMT" } ]
2007-07-13T00:00:00
[ [ "Wu", "Wei", "" ], [ "Vishwanath", "Sriram", "" ], [ "Arapostathis", "Ari", "" ] ]
cs/0606026
Ludo M.G.M. Tolhuizen
Henk D.L. Hollmann and Ludo M.G.M. Tolhuizen
Generating parity check equations for bounded-distance iterative erasure decoding
Accepted for publication in Proc Int Symposium on Information Theory 2006, ISIT 06
null
null
null
cs.IT math.IT
null
A generic $(r,m)$-erasure correcting set is a collection of vectors in $\bF_2^r$ which can be used to generate, for each binary linear code of codimension $r$, a collection of parity check equations that enables iterative decoding of all correctable erasure patterns of size at most $m$. That is to say, the only stopping sets of size at most $m$ for the generated parity check equations are the erasure patterns for which there is more than one manner to fill in theerasures to obtain a codeword. We give an explicit construction of generic $(r,m)$-erasure correcting sets of cardinality $\sum_{i=0}^{m-1} {r-1\choose i}$. Using a random-coding-like argument, we show that for fixed $m$, the minimum size of a generic $(r,m)$-erasure correcting set is linear in $r$. Keywords: iterative decoding, binary erasure channel, stopping set
[ { "version": "v1", "created": "Tue, 6 Jun 2006 18:03:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Hollmann", "Henk D. L.", "" ], [ "Tolhuizen", "Ludo M. G. M.", "" ] ]
cs/0606051
Shu-Tao Xia
Shu-Tao Xia, Fang-Wei Fu
Minimum Pseudo-Weight and Minimum Pseudo-Codewords of LDPC Codes
17 pages, 1 figure
null
null
null
cs.IT math.IT
null
In this correspondence, we study the minimum pseudo-weight and minimum pseudo-codewords of low-density parity-check (LDPC) codes under linear programming (LP) decoding. First, we show that the lower bound of Kelly, Sridhara, Xu and Rosenthal on the pseudo-weight of a pseudo-codeword of an LDPC code with girth greater than 4 is tight if and only if this pseudo-codeword is a real multiple of a codeword. Then, we show that the lower bound of Kashyap and Vardy on the stopping distance of an LDPC code is also a lower bound on the pseudo-weight of a pseudo-codeword of this LDPC code with girth 4, and this lower bound is tight if and only if this pseudo-codeword is a real multiple of a codeword. Using these results we further show that for some LDPC codes, there are no other minimum pseudo-codewords except the real multiples of minimum codewords. This means that the LP decoding for these LDPC codes is asymptotically optimal in the sense that the ratio of the probabilities of decoding errors of LP decoding and maximum-likelihood decoding approaches to 1 as the signal-to-noise ratio leads to infinity. Finally, some LDPC codes are listed to illustrate these results.
[ { "version": "v1", "created": "Mon, 12 Jun 2006 05:12:10 GMT" }, { "version": "v2", "created": "Sat, 11 Nov 2006 14:07:48 GMT" } ]
2007-07-13T00:00:00
[ [ "Xia", "Shu-Tao", "" ], [ "Fu", "Fang-Wei", "" ] ]
cs/0606052
Jos\'e M. F. Moura
Soummya Kar, Saeed Aldosari and Jos\'e M. F. Moura
Topology for Distributed Inference on Graphs
Submitted for Journal publication
null
null
null
cs.IT math.IT
null
Let $N$ local decision makers in a sensor network communicate with their neighbors to reach a decision \emph{consensus}. Communication is local, among neighboring sensors only, through noiseless or noisy links. We study the design of the network topology that optimizes the rate of convergence of the iterative decision consensus algorithm. We reformulate the topology design problem as a spectral graph design problem, namely, maximizing the eigenratio~$\gamma$ of two eigenvalues of the graph Laplacian~$L$, a matrix that is naturally associated with the interconnectivity pattern of the network. This reformulation avoids costly Monte Carlo simulations and leads to the class of non-bipartite Ramanujan graphs for which we find a lower bound on~$\gamma$. For Ramanujan topologies and noiseless links, the local probability of error converges much faster to the overall global probability of error than for structured graphs, random graphs, or graphs exhibiting small-world characteristics. With noisy links, we determine the optimal number of iterations before calling a decision. Finally, we introduce a new class of random graphs that are easy to construct, can be designed with arbitrary number of sensors, and whose spectral and convergence properties make them practically equivalent to Ramanujan topologies.
[ { "version": "v1", "created": "Mon, 12 Jun 2006 17:32:33 GMT" } ]
2007-07-13T00:00:00
[ [ "Kar", "Soummya", "" ], [ "Aldosari", "Saeed", "" ], [ "Moura", "José M. F.", "" ] ]
cs/0606071
Mehdi Ansari Sadrabadi Mr.
Mehdi Ansari Sadrabadi, Alireza Bayesteh and Amir K. Khandani
Scheduling and Codeword Length Optimization in Time Varying Wireless Networks
null
null
null
#2006-01
cs.IT math.IT
null
In this paper, a downlink scenario in which a single-antenna base station communicates with K single antenna users, over a time-correlated fading channel, is considered. It is assumed that channel state information is perfectly known at each receiver, while the statistical characteristics of the fading process and the fading gain at the beginning of each frame are known to the transmitter. By evaluating the random coding error exponent of the time-correlated fading channel, it is shown that there is an optimal codeword length which maximizes the throughput. The throughput of the conventional scheduling that transmits to the user with the maximum signal to noise ratio is examined using both fixed length codewords and variable length codewords. Although optimizing the codeword length improves the performance, it is shown that using the conventional scheduling, the gap between the achievable throughput and the maximum possible throughput of the system tends to infinity as K goes to infinity. A simple scheduling that considers both the signal to noise ratio and the channel time variation is proposed. It is shown that by using this scheduling, the gap between the achievable throughput and the maximum throughput of the system approaches zero.
[ { "version": "v1", "created": "Thu, 15 Jun 2006 00:20:43 GMT" }, { "version": "v2", "created": "Wed, 28 Mar 2007 18:10:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Sadrabadi", "Mehdi Ansari", "" ], [ "Bayesteh", "Alireza", "" ], [ "Khandani", "Amir K.", "" ] ]
cs/0606074
Yingbin Liang
Yingbin Liang and Gerhard Kramer
Rate Regions for Relay Broadcast Channels
Submitted to the IEEE Transactions on Information Theory, June 2006
null
null
null
cs.IT math.IT
null
A partially cooperative relay broadcast channel (RBC) is a three-node network with one source node and two destination nodes (destinations 1 and 2) where destination 1 can act as a relay to assist destination 2. Inner and outer bounds on the capacity region of the discrete memoryless partially cooperative RBC are obtained. When the relay function is disabled, the inner and outer bounds reduce to new bounds on the capacity region of broadcast channels. Four classes of RBCs are studied in detail. For the partially cooperative RBC with degraded message sets, inner and outer bounds are obtained. For the semideterministic partially cooperative RBC and the orthogonal partially cooperative RBC, the capacity regions are established. For the parallel partially cooperative RBC with unmatched degraded subchannels, the capacity region is established for the case of degraded message sets. The capacity is also established when the source node has only a private message for destination 2, i.e., the channel reduces to a parallel relay channel with unmatched degraded subchannels.
[ { "version": "v1", "created": "Thu, 15 Jun 2006 14:41:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Liang", "Yingbin", "" ], [ "Kramer", "Gerhard", "" ] ]
cs/0606083
Joakim Jalden
J. Jalden and B. Ottersten
The Diversity Order of the Semidefinite Relaxation Detector
Submitted to the IEEE Transactions on Information Theory, June 2006
null
null
null
cs.IT math.IT
null
We consider the detection of binary (antipodal) signals transmitted in a spatially multiplexed fashion over a fading multiple-input multiple-output (MIMO) channel and where the detection is done by means of semidefinite relaxation (SDR). The SDR detector is an attractive alternative to maximum likelihood (ML) detection since the complexity is polynomial rather than exponential. Assuming that the channel matrix is drawn with i.i.d. real valued Gaussian entries, we study the receiver diversity and prove that the SDR detector achieves the maximum possible diversity. Thus, the error probability of the receiver tends to zero at the same rate as the optimal maximum likelihood (ML) receiver in the high signal to noise ratio (SNR) limit. This significantly strengthens previous performance guarantees available for the semidefinite relaxation detector. Additionally, it proves that full diversity detection is in certain scenarios also possible when using a non-combinatorial receiver structure.
[ { "version": "v1", "created": "Mon, 19 Jun 2006 13:45:41 GMT" } ]
2007-07-13T00:00:00
[ [ "Jalden", "J.", "" ], [ "Ottersten", "B.", "" ] ]
cs/0606090
Chris Snow
Chris Snow, Lutz Lampe and Robert Schober
Error Rate Analysis for Coded Multicarrier Systems over Quasi-Static Fading Channels
31 pages, 9 figures, 1 table. Submitted to the IEEE Transactions on Communications (June 20, 2006)
null
null
null
cs.IT math.IT
null
Several recent standards such as IEEE 802.11a/g, IEEE 802.16, and ECMA Multiband Orthogonal Frequency Division Multiplexing (MB-OFDM) for high data-rate Ultra-Wideband (UWB), employ bit-interleaved convolutionally-coded multicarrier modulation over quasi-static fading channels. Motivated by the lack of appropriate error rate analysis techniques for this popular type of system and channel model, we present two novel analytical methods for bit error rate (BER) estimation of coded multicarrier systems operating over frequency-selective quasi-static channels with non-ideal interleaving. In the first method, the approximate performance of the system is calculated for each realization of the channel, which is suitable for obtaining the outage BER performance (a common performance measure for e.g. MB-OFDM systems). The second method assumes Rayleigh distributed frequency-domain subcarrier channel gains and knowledge of their correlation matrix, and can be used to directly obtain the average BER performance. Both methods are applicable to convolutionally-coded interleaved multicarrier systems employing Quadrature Amplitude Modulation (QAM), and are also able to account for narrowband interference (modeled as a sum of tone interferers). To illustrate the application of the proposed analysis, both methods are used to study the performance of a tone-interference-impaired MB-OFDM system.
[ { "version": "v1", "created": "Tue, 20 Jun 2006 21:32:09 GMT" } ]
2007-07-13T00:00:00
[ [ "Snow", "Chris", "" ], [ "Lampe", "Lutz", "" ], [ "Schober", "Robert", "" ] ]
cs/0606104
Te Sun Han
Te Sun Han
An information-spectrum approach to large deviation theorems
null
null
null
null
cs.IT math.IT
null
In this paper we show a some new look at large deviation theorems from the viewpoint of the information-spectrum (IS) methods, which has been first exploited in information theory, and also demonstrate a new basic formula for the large deviation rate function in general, which is a pair of the lower and upper IS rate functions. In particular, we are interested in establishing the general large deviation rate functions that can be derivable as the Fenchel-Legendre transform of the cumulant generating function. The final goal is to show a necessary and sufficient condition for the rate function to be of Cram\'er-G\"artner-Ellis type.
[ { "version": "v1", "created": "Mon, 26 Jun 2006 09:16:40 GMT" }, { "version": "v2", "created": "Fri, 30 Jun 2006 05:11:36 GMT" }, { "version": "v3", "created": "Mon, 10 Jul 2006 07:13:23 GMT" }, { "version": "v4", "created": "Tue, 11 Jul 2006 04:39:19 GMT" }, { "version": "v5", "created": "Wed, 12 Jul 2006 06:23:02 GMT" }, { "version": "v6", "created": "Fri, 14 Jul 2006 10:51:11 GMT" }, { "version": "v7", "created": "Mon, 17 Jul 2006 09:25:07 GMT" }, { "version": "v8", "created": "Fri, 28 Jul 2006 06:59:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Han", "Te Sun", "" ] ]
cs/0606106
Andrew Thangaraj
Sundeep B and Andrew Thangaraj
Self-orthogonality of $q$-ary Images of $q^m$-ary Codes and Quantum Code Construction
submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
A code over GF$(q^m)$ can be imaged or expanded into a code over GF$(q)$ using a basis for the extension field over the base field. The properties of such an image depend on the original code and the basis chosen for imaging. Problems relating the properties of a code and its image with respect to a basis have been of great interest in the field of coding theory. In this work, a generalized version of the problem of self-orthogonality of the $q$-ary image of a $q^m$-ary code has been considered. Given an inner product (more generally, a biadditive form), necessary and sufficient conditions have been derived for a code over a field extension and an expansion basis so that an image of that code is self-orthogonal. The conditions require that the original code be self-orthogonal with respect to several related biadditive forms whenever certain power sums of the dual basis elements do not vanish. Numerous interesting corollaries have been derived by specializing the general conditions. An interesting result for the canonical or regular inner product in fields of characteristic two is that only self-orthogonal codes result in self-orthogonal images. Another result is that image of a code is self-orthogonal for all bases if and only if trace of the code is self-orthogonal, except for the case of binary images of 4-ary codes. The conditions are particularly simple to state and apply for cyclic codes. To illustrate a possible application, new quantum error-correcting codes have been constructed with larger minimum distance than previously known.
[ { "version": "v1", "created": "Mon, 26 Jun 2006 12:05:44 GMT" }, { "version": "v2", "created": "Tue, 27 Jun 2006 05:45:58 GMT" }, { "version": "v3", "created": "Sat, 6 Jan 2007 06:44:21 GMT" } ]
2007-07-13T00:00:00
[ [ "B", "Sundeep", "" ], [ "Thangaraj", "Andrew", "" ] ]
cs/0606114
Mohammad Rezaeian
Mohammad Rezaeian
Hidden Markov Process: A New Representation, Entropy Rate and Estimation Entropy
7 pages. Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
We consider a pair of correlated processes {Z_n} and {S_n} (two sided), where the former is observable and the later is hidden. The uncertainty in the estimation of Z_n upon its finite past history is H(Z_n|Z_0^{n-1}), and for estimation of S_n upon this observation is H(S_n|Z_0^{n-1}), which are both sequences of n. The limits of these sequences (and their existence) are of practical and theoretical interest. The first limit, if exists, is the entropy rate. We call the second limit the estimation entropy. An example of a process jointly correlated to another one is the hidden Markov process. It is the memoryless observation of the Markov state process where state transitions are independent of past observations. We consider a new representation of hidden Markov process using iterated function system. In this representation the state transitions are deterministically related to the process. This representation provides a unified framework for the analysis of the two limiting entropies for this process, resulting in integral expressions for the limits. This analysis shows that under mild conditions the limits exist and provides a simple method for calculating the elements of the corresponding sequences.
[ { "version": "v1", "created": "Tue, 27 Jun 2006 15:00:12 GMT" }, { "version": "v2", "created": "Fri, 28 Jul 2006 16:15:20 GMT" } ]
2007-07-13T00:00:00
[ [ "Rezaeian", "Mohammad", "" ] ]
cs/0607002
Igal Sason
I. Sason and I. Goldenberg
Coding for Parallel Channels: Gallager Bounds for Binary Linear Codes with Applications to Repeat-Accumulate Codes and Variations
Submitted to IEEE Trans. on Information Theory, June 2006 (57 pages, 9 figures)
null
null
null
cs.IT math.IT
null
This paper is focused on the performance analysis of binary linear block codes (or ensembles) whose transmission takes place over independent and memoryless parallel channels. New upper bounds on the maximum-likelihood (ML) decoding error probability are derived. These bounds are applied to various ensembles of turbo-like codes, focusing especially on repeat-accumulate codes and their recent variations which possess low encoding and decoding complexity and exhibit remarkable performance under iterative decoding. The framework of the second version of the Duman and Salehi (DS2) bounds is generalized to the case of parallel channels, along with the derivation of their optimized tilting measures. The connection between the generalized DS2 and the 1961 Gallager bounds, addressed by Divsalar and by Sason and Shamai for a single channel, is explored in the case of an arbitrary number of independent parallel channels. The generalization of the DS2 bound for parallel channels enables to re-derive specific bounds which were originally derived by Liu et al. as special cases of the Gallager bound. In the asymptotic case where we let the block length tend to infinity, the new bounds are used to obtain improved inner bounds on the attainable channel regions under ML decoding. The tightness of the new bounds for independent parallel channels is exemplified for structured ensembles of turbo-like codes. The improved bounds with their optimized tilting measures show, irrespectively of the block length of the codes, an improvement over the union bound and other previously reported bounds for independent parallel channels; this improvement is especially pronounced for moderate to large block lengths.
[ { "version": "v1", "created": "Sun, 2 Jul 2006 08:39:55 GMT" } ]
2007-07-13T00:00:00
[ [ "Sason", "I.", "" ], [ "Goldenberg", "I.", "" ] ]
cs/0607003
Igal Sason
M. Twitto, I. Sason and S. Shamai
Tightened Upper Bounds on the ML Decoding Error Probability of Binary Linear Block Codes
Submitted to the IEEE Trans. on Information Theory (as a correspondence), February 2006
null
null
null
cs.IT math.IT
null
The performance of maximum-likelihood (ML) decoded binary linear block codes is addressed via the derivation of tightened upper bounds on their decoding error probability. The upper bounds on the block and bit error probabilities are valid for any memoryless, binary-input and output-symmetric communication channel, and their effectiveness is exemplified for various ensembles of turbo-like codes over the AWGN channel. An expurgation of the distance spectrum of binary linear block codes further tightens the resulting upper bounds.
[ { "version": "v1", "created": "Sun, 2 Jul 2006 09:03:06 GMT" } ]
2007-07-13T00:00:00
[ [ "Twitto", "M.", "" ], [ "Sason", "I.", "" ], [ "Shamai", "S.", "" ] ]
cs/0607004
Igal Sason
M. Twitto and I. Sason
On the Error Exponents of Some Improved Tangential-Sphere Bounds
Submitted to the IEEE Trans. on Information Theory (as a correspondence), March 2006. Revised (August 2006)
null
null
null
cs.IT math.IT
null
The performance of maximum-likelihood (ML) decoded binary linear block codes over the AWGN channel is addressed via the tangential-sphere bound (TSB) and two of its recent improved versions. The paper is focused on the derivation of the error exponents of these bounds. Although it was exemplified that some recent improvements of the TSB tighten this bound for finite-length codes, it is demonstrated in this paper that their error exponents coincide. For an arbitrary ensemble of binary linear block codes, the common value of these error exponents is explicitly expressed in terms of the asymptotic growth rate of the average distance spectrum.
[ { "version": "v1", "created": "Sun, 2 Jul 2006 09:15:39 GMT" }, { "version": "v2", "created": "Sat, 2 Sep 2006 21:27:11 GMT" } ]
2007-07-13T00:00:00
[ [ "Twitto", "M.", "" ], [ "Sason", "I.", "" ] ]
cs/0607010
Samuel Sattath
Samuel Sattath
ITs, a structure sensitive information theory
null
null
null
null
cs.IT math.IT
null
Broadly speaking Information theory (IT) assumes no structure of the underlying states. But what about contexts where states do have a clear structure - how should IT cope with such situations? And if such coping is at all possible then - how should structure be expressed so that it can be coped with? A possible answer to these questions is presented here. Noting that IT can cope well with a structure expressed as an accurate clustering (by shifting to the implied reduced alphabet), a generalization is suggested in which structure is expressed as a measure on reduced alphabets. Given such structure an extension of IT is presented where the reduced alphabets are treated simultaneously. This structure-sensitive IT, called ITs, extends traditional IT in the sense that: a)there are structure-sensitive analogs to the notions of traditional IT and b)translating a theorem in IT by replacing its notions with their structure-sensitive counterparts, yields a (provable) theorem of ITs. Seemingly paradoxically, ITs extends IT but it's completely within the framework of IT. The richness of the suggested structures is demonstrated by two disparate families studied in more detail: the family of hierarchical structures and the family of linear structures. The formal findings extend the scope of cases to which a rigorous application of IT can be applied (with implications on quantization, for example). The implications on the foundations of IT are that the assumption regarding no underlying structure of states is not mandatory and that there is a framework for expressing such underlying structure.
[ { "version": "v1", "created": "Mon, 3 Jul 2006 10:23:31 GMT" } ]
2007-07-13T00:00:00
[ [ "Sattath", "Samuel", "" ] ]
cs/0607020
Chun-Hao Hsu
Chun-Hao Hsu and Achilleas Anastasopoulos
Iterative Decoding Performance Bounds for LDPC Codes on Noisy Channels
10 pages, no figures. This paper is submitted to the 44rd Annual Allerton Conference on Communication, Control and Computing, Monticello, IL, USA, Sept. 27-29, 2006
null
null
null
cs.IT math.IT
null
The asymptotic iterative decoding performances of low-density parity-check (LDPC) codes using min-sum (MS) and sum-product (SP) decoding algorithms on memoryless binary-input output-symmetric (MBIOS) channels are analyzed in this paper. For MS decoding, the analysis is done by upper bounding the bit error probability of the root bit of a tree code by the sequence error probability of a subcode of the tree code assuming the transmission of the all-zero codeword. The result is a recursive upper bound on the bit error probability after each iteration. For SP decoding, we derive a recursively determined lower bound on the bit error probability after each iteration. This recursive lower bound recovers the density evolution equation of LDPC codes on the binary erasure channel (BEC) with inequalities satisfied with equalities. A significant implication of this result is that the performance of LDPC codes under SP decoding on the BEC is an upper bound of the performance on all MBIOS channels with the same uncoded bit error probability. All results hold for the more general multi-edge type LDPC codes.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 19:08:26 GMT" }, { "version": "v2", "created": "Fri, 7 Jul 2006 18:33:57 GMT" }, { "version": "v3", "created": "Wed, 12 Jul 2006 19:02:24 GMT" }, { "version": "v4", "created": "Tue, 18 Jul 2006 15:25:03 GMT" } ]
2007-07-13T00:00:00
[ [ "Hsu", "Chun-Hao", "" ], [ "Anastasopoulos", "Achilleas", "" ] ]
cs/0607021
Jun Chen
Jun Chen, Da-ke He, and Ashish Jagmohan
Slepian-Wolf Code Design via Source-Channel Correspondence
to appear at ISIT 2006
null
null
null
cs.IT math.IT
null
We consider Slepian-Wolf code design based on LDPC (low-density parity-check) coset codes for memoryless source-side information pairs. A density evolution formula, equipped with a concentration theorem, is derived for Slepian- Wolf coding based on LDPC coset codes. As a consequence, an intimate connection between Slepian-Wolf coding and channel coding is established. Specifically we show that, under density evolution, design of binary LDPC coset codes for Slepian-Wolf coding of an arbitrary memoryless source-side information pair reduces to design of binary LDPC codes for binary-input output-symmetric channels without loss of optimality. With this connection, many classic results in channel coding can be easily translated into the Slepian-Wolf setting.
[ { "version": "v1", "created": "Thu, 6 Jul 2006 22:14:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Chen", "Jun", "" ], [ "He", "Da-ke", "" ], [ "Jagmohan", "Ashish", "" ] ]
cs/0607024
Jos Weber
Jos H. Weber and Khaled A.S. Abdel-Ghaffar
Results on Parity-Check Matrices with Optimal Stopping and/or Dead-End Set Enumerators
8 pages, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
The performance of iterative decoding techniques for linear block codes correcting erasures depends very much on the sizes of the stopping sets associated with the underlying Tanner graph, or, equivalently, the parity-check matrix representing the code. In this paper, we introduce the notion of dead-end sets to explicitly demonstrate this dependency. The choice of the parity-check matrix entails a trade-off between performance and complexity. We give bounds on the complexity of iterative decoders achieving optimal performance in terms of the sizes of the underlying parity-check matrices. Further, we fully characterize codes for which the optimal stopping set enumerator equals the weight enumerator.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 09:04:43 GMT" } ]
2007-07-13T00:00:00
[ [ "Weber", "Jos H.", "" ], [ "Abdel-Ghaffar", "Khaled A. S.", "" ] ]