id
string | submitter
string | authors
string | title
string | comments
string | journal-ref
string | doi
string | report-no
string | categories
string | license
string | abstract
string | versions
list | update_date
timestamp[s] | authors_parsed
list |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
cs/0607027
|
Hans-Andrea Loeliger
|
Junli Hu, Hans-Andrea Loeliger, Justin Dauwels, and Frank Kschischang
|
A general computation rule for lossy summaries/messages with examples
from equalization
|
Proc. of the 44th Allerton Conference on Communication, Control, and
Computing, Monticello, Ill., USA, Sept. 2006
| null | null | null |
cs.IT math.IT
| null |
Elaborating on prior work by Minka, we formulate a general computation rule
for lossy messages. An important special case (with many applications in
communications) is the conversion of "soft-bit" messages to Gaussian messages.
By this method, the performance of a Kalman equalizer is improved, both for
uncoded and coded transmission.
|
[
{
"version": "v1",
"created": "Fri, 7 Jul 2006 17:03:46 GMT"
},
{
"version": "v2",
"created": "Sun, 1 Oct 2006 14:33:19 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Hu",
"Junli",
""
],
[
"Loeliger",
"Hans-Andrea",
""
],
[
"Dauwels",
"Justin",
""
],
[
"Kschischang",
"Frank",
""
]
] |
cs/0607030
|
Michael Vielhaber
|
Michael Vielhaber, Monica del Pilar Canales
|
Towards a General Theory of Simultaneous Diophantine Approximation of
Formal Power Series: Multidimensional Linear Complexity
|
28 pages, 1 figure
| null | null | null |
cs.IT math.IT
| null |
We model the development of the linear complexity of multisequences by a
stochastic infinite state machine, the Battery-Discharge-Model, BDM. The states
s in S of the BDM have asymptotic probabilities or mass Pr(s)=1/(P(q,M)
q^K(s)), where K(s) in N_0 is the class of the state s, and P(q,M)=\sum_(K
in\N0) P_M(K)q^(-K)=\prod_(i=1..M) q^i/(q^i-1) is the generating function of
the number of partitions into at most M parts. We have (for each timestep
modulo M+1) just P_M(K) states of class K \.
We obtain a closed formula for the asymptotic probability for the linear
complexity deviation d(n) := L(n)-\lceil n\cdot M/(M+1)\rceil with
Pr(d)=O(q^(-|d|(M+1))), for M in N, for d in Z. The precise formula is given in
the text. It has been verified numerically for M=1..8, and is conjectured to
hold for all M in N.
From the asymptotic growth (proven for all M in N), we infer the Law of the
Logarithm for the linear complexity deviation, -liminf_{n\to\infty} d_a(n) /
log n = 1 /((M+1)log q) = limsup_{n\to\infty} d_a(n) / log n, which immediately
yields L_a(n)/n \to M/(M+1) with measure one, for all M in N, a result recently
shown already by Niederreiter and Wang. Keywords: Linear complexity, linear
complexity deviation, multisequence, Battery Discharge Model, isometry.
|
[
{
"version": "v1",
"created": "Mon, 10 Jul 2006 18:03:06 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Vielhaber",
"Michael",
""
],
[
"Canales",
"Monica del Pilar",
""
]
] |
cs/0607042
|
Rahul Jain
|
Rahul Jain
|
Towards a classical proof of exponential lower bound for 2-probe smooth
codes
|
7 pages, no figure
| null | null | null |
cs.CR cs.IT math.IT
| null |
Let C: {0,1}^n -> {0,1}^m be a code encoding an n-bit string into an m-bit
string. Such a code is called a (q, c, e) smooth code if there exists a
decoding algorithm which while decoding any bit of the input, makes at most q
probes on the code word and the probability that it looks at any location is at
most c/m. The error made by the decoding algorithm is at most e. Smooth codes
were introduced by Katz and Trevisan in connection with Locally decodable
codes.
For 2-probe smooth codes Kerenedis and de Wolf have shown exponential in n
lower bound on m in case c and e are constants. Their lower bound proof went
through quantum arguments and interestingly there is no completely classical
argument as yet for the same (albeit completely classical !) statement.
We do not match the bounds shown by Kerenedis and de Wolf but however show
the following. Let C: {0,1}^n -> {0,1}^m be a (2,c,e) smooth code and if e <=
c^2/8n^2, then m >= 2^(n/320c^2 - 1)$. We hope that the arguments and
techniques used in this paper extend (or are helpful in making similar other
arguments), to match the bounds shown using quantum arguments. More so,
hopefully they extend to show bounds for codes with greater number of probes
where quantum arguments unfortunately do not yield good bounds (even for
3-probe codes).
|
[
{
"version": "v1",
"created": "Tue, 11 Jul 2006 02:56:28 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jain",
"Rahul",
""
]
] |
cs/0607064
|
Andrea Montanari
|
Abdelaziz Amraoui, Andrea Montanari, Ruediger Urbanke
|
How to Find Good Finite-Length Codes: From Art Towards Science
|
13 pages, 13 eps figures, enhanced version of an invited paperat the
4th International Symposium on Turbo Codes and Related Topics, Munich,
Germany, 2006
| null | null | null |
cs.IT math.IT
| null |
We explain how to optimize finite-length LDPC codes for transmission over the
binary erasure channel. Our approach relies on an analytic approximation of the
erasure probability. This is in turn based on a finite-length scaling result to
model large scale erasures and a union bound involving minimal stopping sets to
take into account small error events. We show that the performances of
optimized ensembles as observed in simulations are well described by our
approximation. Although we only address the case of transmission over the
binary erasure channel, our method should be applicable to a more general
setting.
|
[
{
"version": "v1",
"created": "Thu, 13 Jul 2006 09:54:10 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Amraoui",
"Abdelaziz",
""
],
[
"Montanari",
"Andrea",
""
],
[
"Urbanke",
"Ruediger",
""
]
] |
cs/0607068
|
Felice Manganiello
|
Felice Manganiello
|
Computation of the Weight Distribution of CRC Codes
|
16 pages, 1 figure, submitted for publication
| null | null | null |
cs.IT math.AC math.IT
| null |
In this article, we illustrate an algorithm for the computation of the weight
distribution of CRC codes. The recursive structure of CRC codes will give us an
iterative way to compute the weight distribution of their dual codes starting
from just some ``representative'' words. Thanks to MacWilliams Theorem, the
computation of the weight distribution of dual codes can be easily brought back
to that of CRC codes. This algorithm is a good alternative to the standard
algorithm that involves listing every word of the code.
|
[
{
"version": "v1",
"created": "Thu, 13 Jul 2006 17:24:20 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Manganiello",
"Felice",
""
]
] |
cs/0607074
|
Xiaohong Peng
|
Xiao-Hong Peng and Paddy Farrell
|
On Construction of the (24,12,8) Golay Codes
|
To appear in IEEE Trans. on Information Theory Vol. 24 No. 8
| null | null | null |
cs.IT math.IT
| null |
Two product array codes are used to construct the (24, 12, 8) binary Golay
code through the direct sum operation. This construction provides a systematic
way to find proper (8, 4, 4) linear block component codes for generating the
Golay code, and it generates and extends previously existing methods that use a
similar construction framework. The code constructed is simple to decode.
|
[
{
"version": "v1",
"created": "Fri, 14 Jul 2006 18:39:36 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Peng",
"Xiao-Hong",
""
],
[
"Farrell",
"Paddy",
""
]
] |
cs/0607075
|
Chandra Nair
|
Chandra Nair, Balaji Prabhakar, Devavrat Shah
|
On entropy for mixtures of discrete and continuous variables
|
10 pages, two-column
| null | null | null |
cs.IT math.IT
| null |
Let $X$ be a discrete random variable with support $S$ and $f : S \to
S^\prime$ be a bijection. Then it is well-known that the entropy of $X$ is the
same as the entropy of $f(X)$. This entropy preservation property has been
well-utilized to establish non-trivial properties of discrete stochastic
processes, e.g. queuing process \cite{prg03}. Entropy as well as entropy
preservation is well-defined only in the context of purely discrete or
continuous random variables. However for a mixture of discrete and continuous
random variables, which arise in many interesting situations, the notions of
entropy and entropy preservation have not been well understood.
In this paper, we extend the notion of entropy in a natural manner for a
mixed-pair random variable, a pair of random variables with one discrete and
the other continuous. Our extensions are consistent with the existing
definitions of entropy in the sense that there exist natural injections from
discrete or continuous random variables into mixed-pair random variables such
that their entropy remains the same. This extension of entropy allows us to
obtain sufficient conditions for entropy preservation in mixtures of discrete
and continuous random variables under bijections.
The extended definition of entropy leads to an entropy rate for continuous
time Markov chains. As an application, we recover a known probabilistic result
related to Poisson process. We strongly believe that the frame-work developed
in this paper can be useful in establishing probabilistic properties of complex
processes, such as load balancing systems, queuing network, caching algorithms.
|
[
{
"version": "v1",
"created": "Fri, 14 Jul 2006 23:02:41 GMT"
},
{
"version": "v2",
"created": "Wed, 17 Jan 2007 17:58:00 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Nair",
"Chandra",
""
],
[
"Prabhakar",
"Balaji",
""
],
[
"Shah",
"Devavrat",
""
]
] |
cs/0607076
|
Oliver Kosut
|
Oliver Kosut and Lang Tong
|
Capacity of Cooperative Fusion in the Presence of Byzantine Sensors
|
8 pages, 2 figures
| null | null | null |
cs.IT math.IT
| null |
The problem of cooperative fusion in the presence of Byzantine sensors is
considered. An information theoretic formulation is used to characterize the
Shannon capacity of sensor fusion. It is shown that when less than half of the
sensors are Byzantine, the effect of Byzantine attack can be entirely
mitigated, and the fusion capacity is identical to that when all sensors are
honest. But when at least half of the sensors are Byzantine, they can
completely defeat the sensor fusion so that no information can be transmitted
reliably. A capacity achieving transmit-then-verify strategy is proposed for
the case that less than half of the sensors are Byzantine, and its error
probability and coding rate is analyzed by using a Markov decision process
modeling of the transmission protocol.
|
[
{
"version": "v1",
"created": "Fri, 14 Jul 2006 23:22:38 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Kosut",
"Oliver",
""
],
[
"Tong",
"Lang",
""
]
] |
cs/0607078
|
Ying Hung Gan
|
Ying Hung Gan, Cong Ling and Wai Ho Mow
|
Complex Lattice Reduction Algorithm for Low-Complexity MIMO Detection
|
Submitted to IEEE Transactions on Wireless Communication in March
2006. Part of this work was presented at the 2005 Global Telecommunications
Conference, United States, November 2005
| null | null | null |
cs.DS cs.IT math.IT
| null |
Recently, lattice-reduction-aided detectors have been proposed for
multiple-input multiple-output (MIMO) systems to give performance with full
diversity like maximum likelihood receiver, and yet with complexity similar to
linear receivers. However, these lattice-reduction-aided detectors are based on
the traditional LLL reduction algorithm that was originally introduced for
reducing real lattice bases, in spite of the fact that the channel matrices are
inherently complex-valued. In this paper, we introduce the complex LLL
algorithm for direct application to reduce the basis of a complex lattice which
is naturally defined by a complex-valued channel matrix. We prove that complex
LLL reduction-aided detection can also achieve full diversity. Our analysis
reveals that the new complex LLL algorithm can achieve a reduction in
complexity of nearly 50% over the traditional LLL algorithm, and this is
confirmed by simulation. It is noteworthy that the complex LLL algorithm
aforementioned has nearly the same bit-error-rate performance as the
traditional LLL algorithm.
|
[
{
"version": "v1",
"created": "Mon, 17 Jul 2006 09:01:33 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gan",
"Ying Hung",
""
],
[
"Ling",
"Cong",
""
],
[
"Mow",
"Wai Ho",
""
]
] |
cs/0607089
|
Ryan Hutchinson
|
R. Hutchinson, R. Smarandache, J. Trumpf
|
Superregular Matrices and the Construction of Convolutional Codes having
a Maximum Distance Profile
|
20 pages. Replaced on 19/7/2006, because bibtex files were not
included in the original submission
| null | null | null |
cs.IT math.CO math.IT
| null |
Superregular matrices are a class of lower triangular Toeplitz matrices that
arise in the context of constructing convolutional codes having a maximum
distance profile. These matrices are characterized by the property that no
submatrix has a zero determinant unless it is trivially zero due to the lower
triangular structure. In this paper, we discuss how superregular matrices may
be used to construct codes having a maximum distance profile. We also introduce
group actions that preserve the superregularity property and present an upper
bound on the minimum size a finite field must have in order that a superregular
matrix of a given size can exist over that field.
|
[
{
"version": "v1",
"created": "Tue, 18 Jul 2006 18:44:30 GMT"
},
{
"version": "v2",
"created": "Wed, 19 Jul 2006 10:35:49 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Hutchinson",
"R.",
""
],
[
"Smarandache",
"R.",
""
],
[
"Trumpf",
"J.",
""
]
] |
cs/0607095
|
Hyundong Shin
|
Hyundong Shin, Moe Z. Win
|
Gallager's Exponent for MIMO Channels: A Reliability-Rate Tradeoff
|
Submitted to the IEEE Transactions on Communications
| null | null | null |
cs.IT math.IT
| null |
In this paper, we derive Gallager's random coding error exponent for
multiple-input multiple-output (MIMO) channels, assuming no channel-state
information (CSI) at the transmitter and perfect CSI at the receiver. This
measure gives insight into a fundamental tradeoff between the communication
reliability and information rate of MIMO channels, enabling to determine the
required codeword length to achieve a prescribed error probability at a given
rate below the channel capacity. We quantify the effects of the number of
antennas, channel coherence time, and spatial fading correlation on the MIMO
exponent. In addition, general formulae for the ergodic capacity and the cutoff
rate in the presence of spatial correlation are deduced from the exponent
expressions. These formulae are applicable to arbitrary structures of transmit
and receive correlation, encompassing all the previously known results as
special cases of our expressions.
|
[
{
"version": "v1",
"created": "Thu, 20 Jul 2006 06:56:02 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Shin",
"Hyundong",
""
],
[
"Win",
"Moe Z.",
""
]
] |
cs/0607099
|
Syed Jafar
|
Syed A. Jafar, Shlomo Shamai (Shitz)
|
Degrees of Freedom Region for the MIMO X Channel
|
31 pages
| null | null | null |
cs.IT math.IT
| null |
We provide achievability as well as converse results for the degrees of
freedom region of a MIMO $X$ channel, i.e., a system with two transmitters, two
receivers, each equipped with multiple antennas, where independent messages
need to be conveyed over fixed channels from each transmitter to each receiver.
With M=1 antennas at each node, we find that the total (sum rate) degrees of
freedom are bounded above and below as $1 \leq\eta_X^\star \leq {4/3}$. If
$M>1$ and channel matrices are non-degenerate then the precise degrees of
freedom $\eta_X^\star = {4/3}M$. Simple zero forcing without dirty paper
encoding or successive decoding, suffices to achieve the ${4/3}M$ degrees of
freedom. With equal number of antennas at all nodes, we explore the increase in
degrees of freedom when some of the messages are made available to a
transmitter or receiver in the manner of cognitive radio. With a cognitive
transmitter we show that the number of degrees of freedom $\eta = {3/2}M$ (for
$M>1$) on the MIMO $X$ channel. The same degrees of freedom are obtained on the
MIMO $X$ channel with a cognitive receiver as well. In contrast to the $X$
channel result, we show that for the MIMO \emph{interference} channel, the
degrees of freedom are not increased even if both the transmitter and the
receiver of one user know the other user's message. However, the interference
channel can achieve the full $2M$ degrees of freedom if \emph{each} user has
either a cognitive transmitter or a cognitive receiver. Lastly, if the channels
vary with time/frequency then the $X$ channel with single antennas $(M=1)$ at
all nodes has exactly 4/3 degrees of freedom with no shared messages and
exactly 3/2 degrees of freedom with a cognitive transmitter or a cognitive
receiver.
|
[
{
"version": "v1",
"created": "Fri, 21 Jul 2006 07:50:42 GMT"
},
{
"version": "v2",
"created": "Tue, 12 Sep 2006 23:55:53 GMT"
},
{
"version": "v3",
"created": "Fri, 11 May 2007 20:48:40 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jafar",
"Syed A.",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] |
cs/0607107
|
Louis Mello
|
Louis Mello
|
Linear Predictive Coding as an Estimator of Volatility
| null | null | null | null |
cs.IT math.IT
| null |
In this paper, we present a method of estimating the volatility of a signal
that displays stochastic noise (such as a risky asset traded on an open market)
utilizing Linear Predictive Coding. The main purpose is to associate volatility
with a series of statistical properties that can lead us, through further
investigation, toward a better understanding of structural volatility as well
as to improve the quality of our current estimates.
|
[
{
"version": "v1",
"created": "Mon, 24 Jul 2006 19:10:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Mello",
"Louis",
""
]
] |
cs/0607108
|
Pierre Loidreau
|
E. M. Gabidulin and P. Loidreau
|
Properties of subspace subcodes of optimum codes in rank metric
|
17 pages, Submitted to IEEE-IT
| null | null | null |
cs.IT cs.DM math.IT
| null |
Maximum rank distance codes denoted MRD-codes are the equivalent in rank
metric of MDS-codes. Given any integer $q$ power of a prime and any integer $n$
there is a family of MRD-codes of length $n$ over $\FF{q^n}$ having
polynomial-time decoding algorithms. These codes can be seen as the analogs of
Reed-Solomon codes (hereafter denoted RS-codes) for rank metric. In this paper
their subspace subcodes are characterized. It is shown that hey are equivalent
to MRD-codes constructed in the same way but with smaller parameters. A
specific polynomial-time decoding algorithm is designed. Moreover, it is shown
that the direct sum of subspace subcodes is equivalent to the direct product of
MRD-codes with smaller parameters. This implies that the decoding procedure can
correct errors of higher rank than the error-correcting capability. Finally it
is shown that, for given parameters, subfield subcodes are completely
characterized by elements of the general linear group ${GL}_n(\FF{q})$ of
non-singular $q$-ary matrices of size $n$.
|
[
{
"version": "v1",
"created": "Tue, 25 Jul 2006 07:37:48 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gabidulin",
"E. M.",
""
],
[
"Loidreau",
"P.",
""
]
] |
cs/0607112
|
Misha Stepanov
|
M.G. Stepanov, M. Chertkov
|
Improving convergence of Belief Propagation decoding
| null | null | null |
LA-UR-06-5058
|
cs.IT math.IT
| null |
The decoding of Low-Density Parity-Check codes by the Belief Propagation (BP)
algorithm is revisited. We check the iterative algorithm for its convergence to
a codeword (termination), we run Monte Carlo simulations to find the
probability distribution function of the termination time, n_it. Tested on an
example [155, 64, 20] code, this termination curve shows a maximum and an
extended algebraic tail at the highest values of n_it. Aiming to reduce the
tail of the termination curve we consider a family of iterative algorithms
modifying the standard BP by means of a simple relaxation. The relaxation
parameter controls the convergence of the modified BP algorithm to a minimum of
the Bethe free energy. The improvement is experimentally demonstrated for
Additive-White-Gaussian-Noise channel in some range of the signal-to-noise
ratios. We also discuss the trade-off between the relaxation parameter of the
improved iterative scheme and the number of iterations.
|
[
{
"version": "v1",
"created": "Tue, 25 Jul 2006 21:54:15 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Stepanov",
"M. G.",
""
],
[
"Chertkov",
"M.",
""
]
] |
cs/0607132
|
Ludo M.G.M. Tolhuizen
|
R. Ahlswede, H. Aydinian, L.H. Khachatrian and L.M.G.M. Tolhuizen
|
On q-ary codes correcting all unidirectional errors of a limited
magnitude
|
22 pages,no figures. Accepted for publication of Journal of Armenian
Academy of Sciences, special issue dedicated to Rom Varshamov
| null | null | null |
cs.IT math.IT
| null |
We consider codes over the alphabet Q={0,1,..,q-1}intended for the control of
unidirectional errors of level l. That is, the transmission channel is such
that the received word cannot contain both a component larger than the
transmitted one and a component smaller than the transmitted one. Moreover, the
absolute value of the difference between a transmitted component and its
received version is at most l.
We introduce and study q-ary codes capable of correcting all unidirectional
errors of level l. Lower and upper bounds for the maximal size of those codes
are presented.
We also study codes for this aim that are defined by a single equation on the
codeword coordinates(similar to the Varshamov-Tenengolts codes for correcting
binary asymmetric errors). We finally consider the problem of detecting all
unidirectional errors of level l.
|
[
{
"version": "v1",
"created": "Thu, 27 Jul 2006 15:51:31 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ahlswede",
"R.",
""
],
[
"Aydinian",
"H.",
""
],
[
"Khachatrian",
"L. H.",
""
],
[
"Tolhuizen",
"L. M. G. M.",
""
]
] |
cs/0608006
|
S. Sandeep Pradhan
|
Suhan Choi and S. Sandeep Pradhan
|
A Graph-based Framework for Transmission of Correlated Sources over
Broadcast Channels
|
36 pages, 9 figures
| null | null | null |
cs.IT math.IT
| null |
In this paper we consider the communication problem that involves
transmission of correlated sources over broadcast channels. We consider a
graph-based framework for this information transmission problem. The system
involves a source coding module and a channel coding module. In the source
coding module, the sources are efficiently mapped into a nearly semi-regular
bipartite graph, and in the channel coding module, the edges of this graph are
reliably transmitted over a broadcast channel. We consider nearly semi-regular
bipartite graphs as discrete interface between source coding and channel coding
in this multiterminal setting. We provide an information-theoretic
characterization of (1) the rate of exponential growth (as a function of the
number of channel uses) of the size of the bipartite graphs whose edges can be
reliably transmitted over a broadcast channel and (2) the rate of exponential
growth (as a function of the number of source samples) of the size of the
bipartite graphs which can reliably represent a pair of correlated sources to
be transmitted over a broadcast channel.
|
[
{
"version": "v1",
"created": "Tue, 1 Aug 2006 22:34:26 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Choi",
"Suhan",
""
],
[
"Pradhan",
"S. Sandeep",
""
]
] |
cs/0608007
|
Renato Renner
|
Thomas Holenstein and Renato Renner
|
On the randomness of independent experiments
|
latex, 15 pages
| null | null | null |
cs.IT math.IT
| null |
Given a probability distribution P, what is the minimum amount of bits needed
to store a value x sampled according to P, such that x can later be recovered
(except with some small probability)? Or, what is the maximum amount of uniform
randomness that can be extracted from x? Answering these and similar
information-theoretic questions typically boils down to computing so-called
smooth entropies. In this paper, we derive explicit and almost tight bounds on
the smooth entropies of n-fold product distributions.
|
[
{
"version": "v1",
"created": "Wed, 2 Aug 2006 03:25:06 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Holenstein",
"Thomas",
""
],
[
"Renner",
"Renato",
""
]
] |
cs/0608010
|
Sander Stepanov
|
Sander Stepanov
|
MIMO scheme performance and detection in epsilon noise
|
30 pages
| null | null | null |
cs.IT math.IT
| null |
New approach for analysis and decoding MIMO signaling is developed for usual
model of nongaussion noise consists of background and impulsive noise named
epsilon - noise. It is shown that non-gaussion noise performance significantly
worse than gaussion ones. Stimulation results strengthen out theory. Robust in
statistical sense detection rule is suggested for such kind of noise features
much best robust detector performance than detector designed for Gaussian noise
in impulsive environment and modest margin in background noise. Proposed
algorithms performance are comparable with developed potential bound. Proposed
tool, is crucial issue for MIMO communication system design, since real noise
environment has impulsive character that contradict with wide used Gaussian
approach, so real MIMO performance much different for Gaussian a non-Gaussian
noise model.
|
[
{
"version": "v1",
"created": "Wed, 2 Aug 2006 09:52:11 GMT"
},
{
"version": "v2",
"created": "Fri, 29 Sep 2006 11:59:19 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Stepanov",
"Sander",
""
]
] |
cs/0608023
|
Thomas Michel
|
Gerhard Wunder, Thomas Michel
|
Optimal resource allocation for OFDM multiuser channels
| null | null | null | null |
cs.IT math.IT
| null |
In this paper, a unifying framework for orthogonal frequency division
multiplexing (OFDM) multiuser resource allocation is presented. The isolated
seeming problems of maximizing a weighted sum of rates for a given power budget
$\bar{P}$ and minimizing sum power for given rate requirements
$\mathbf{\bar{R}}$ can be interpreted jointly in this framework. To this end we
embed the problems in a higher dimensional space. Based on these results, we
subsequently consider the combined problem of maximizing a weighted sum of
rates under given rate requirements $\mathbf{\bar{R}}$ and a fixed power budget
$\bar{P}$. This new problem is challenging, since the additional constraints do
not allow to use the hitherto existing approaches. Interestingly, the optimal
decoding orders turn out to be the ordering of the Lagrangian factors in all
problems.
|
[
{
"version": "v1",
"created": "Fri, 4 Aug 2006 08:12:37 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wunder",
"Gerhard",
""
],
[
"Michel",
"Thomas",
""
]
] |
cs/0608029
|
Martin Wainwright
|
Alexandros G. Dimakis, Martin J. Wainwright
|
Guessing Facets: Polytope Structure and Improved LP Decoder
|
Appeared in International Symposium on Information Theory, Seattle,
WA. July 2006. Revision: fixed author names in abstract (to be recognized as
two separate authors)
| null | null | null |
cs.IT math.IT
| null |
A new approach for decoding binary linear codes by solving a linear program
(LP) over a relaxed codeword polytope was recently proposed by Feldman et al.
In this paper we investigate the structure of the polytope used in the LP
relaxation decoding. We begin by showing that for expander codes, every
fractional pseudocodeword always has at least a constant fraction of
non-integral bits. We then prove that for expander codes, the active set of any
fractional pseudocodeword is smaller by a constant fraction than the active set
of any codeword. We exploit this fact to devise a decoding algorithm that
provably outperforms the LP decoder for finite blocklengths. It proceeds by
guessing facets of the polytope, and resolving the linear program on these
facets. While the LP decoder succeeds only if the ML codeword has the highest
likelihood over all pseudocodewords, we prove that for expander codes the
proposed algorithm succeeds even with a constant number of pseudocodewords of
higher likelihood. Moreover, the complexity of the proposed algorithm is only a
constant factor larger than that of the LP decoder.
|
[
{
"version": "v1",
"created": "Sat, 5 Aug 2006 01:25:45 GMT"
},
{
"version": "v2",
"created": "Fri, 11 Aug 2006 22:30:23 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dimakis",
"Alexandros G.",
""
],
[
"Wainwright",
"Martin J.",
""
]
] |
cs/0608042
|
Igal Sason
|
Gil Wiechman and Igal Sason
|
An Improved Sphere-Packing Bound for Finite-Length Codes on Symmetric
Memoryless Channels
|
Submitted to the IEEE Transactions on Information Theory (40 pages,
10 figures)
| null | null | null |
cs.IT math.IT
| null |
This paper derives an improved sphere-packing (ISP) bound for finite-length
codes whose transmission takes place over symmetric memoryless channels. We
first review classical results, i.e., the 1959 sphere-packing (SP59) bound of
Shannon for the Gaussian channel, and the 1967 sphere-packing (SP67) bound of
Shannon et al. for discrete memoryless channels. A recent improvement on the
SP67 bound, as suggested by Valembois and Fossorier, is also discussed. These
concepts are used for the derivation of a new lower bound on the decoding error
probability (referred to as the ISP bound) which is uniformly tighter than the
SP67 bound and its recent improved version. The ISP bound is applicable to
symmetric memoryless channels, and some of its applications are exemplified.
Its tightness is studied by comparing it with bounds on the ML decoding error
probability, and computer simulations of iteratively decoded turbo-like codes.
The paper also presents a technique which performs the entire calculation of
the SP59 bound in the logarithmic domain, thus facilitating the exact
calculation of this bound for moderate to large block lengths without the need
for the asymptotic approximations provided by Shannon.
|
[
{
"version": "v1",
"created": "Tue, 8 Aug 2006 11:51:29 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Sep 2006 22:15:58 GMT"
},
{
"version": "v3",
"created": "Sat, 17 Mar 2007 15:50:13 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wiechman",
"Gil",
""
],
[
"Sason",
"Igal",
""
]
] |
cs/0608056
|
Bin Dai
|
Bin Dai, Yuan Luo
|
Wiretap Channel With Side Information
| null | null | null | null |
cs.IT math.IT
| null |
This submission has been withdrawn by the author.
|
[
{
"version": "v1",
"created": "Mon, 14 Aug 2006 06:20:20 GMT"
},
{
"version": "v2",
"created": "Fri, 25 Aug 2006 04:39:10 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dai",
"Bin",
""
],
[
"Luo",
"Yuan",
""
]
] |
cs/0608060
|
Syed Jafar
|
Syed A. Jafar, Krishna S. Gomadam
|
Duality and Capacity Region of AF Relay MAC and BC
|
33 pages
| null | null | null |
cs.IT math.IT
| null |
We consider multi-hop multiple access (MAC) and broadcast channels (BC) where
communication takes place with the assistance of relays that amplify and
forward (AF) their received signals. For a two hop parallel AF relay MAC,
assuming a sum power constraint across all relays we characterize optimal relay
amplification factors and the resulting capacity regions. We find that the
parallel AF relay MAC with total transmit power of the two users $P_1+P_2=P$
and total relay power $P_R$ is the dual of the parallel AF relay BC where the
MAC source nodes become the BC destination nodes, the MAC destination node
becomes the BC source node, the dual BC source transmit power is $P_R$ and the
total transmit power of the AF relays is $P$. The duality means that the
capacity region of the AF relay MAC with a sum power constraint $P$ on the
transmitters is the same as that of the dual BC. The duality relationship is
found to be useful in characterizing the capacity region of the AF relay BC as
the union of MAC capacity regions. The duality extends to distributed relays
with multiple antennas and more than 2 hops as well.
|
[
{
"version": "v1",
"created": "Mon, 14 Aug 2006 20:03:46 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jafar",
"Syed A.",
""
],
[
"Gomadam",
"Krishna S.",
""
]
] |
cs/0608071
|
Avi Steiner
|
Avi Steiner, Amichai Sanderovich, Shlomo Shamai (Shitz)
|
Broadcast Cooperation Strategies for Two Colocated Users
| null | null | null | null |
cs.IT math.IT
| null |
This work considers the problem of communication from a single transmitter,
over a network with colocated users, through an independent block Rayleigh
fading channel. The colocation nature of the users allows cooperation, which
increases the overall achievable rate, from the transmitter to the destined
user. The transmitter is ignorant of the fading coefficients, while receivers
have access to perfect channel state information (CSI). This gives rise to the
multi-layer broadcast approach used by the transmitter. The broadcast approach
allows, in our network setting, to improve the cooperation between the
colocated users. That is due to the nature of broadcasting, where the better
the channel quality, the more layers that can be decoded. The cooperation
between the users is performed over an additive white Gaussian channels (AWGN),
with a relaying power constraint, and unlimited bandwidth. Three commonly used
cooperation techniques are studied: amplify-forward (AF), compress-forward
(CF), and decode-forward (DF). These methods are extended using the broadcast
approach, for the case of relaxed decoding delay constraint. For this case a
separated processing of the layers, which includes multi-session cooperation is
shown to be beneficial. Further, closed form expressions for infinitely many AF
sessions and recursive expressions for the more complex CF are given. Numerical
results for the various cooperation strategies demonstrate the efficiency of
multi-session cooperation.
|
[
{
"version": "v1",
"created": "Thu, 17 Aug 2006 14:35:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Steiner",
"Avi",
"",
"Shitz"
],
[
"Sanderovich",
"Amichai",
"",
"Shitz"
],
[
"Shamai",
"Shlomo",
"",
"Shitz"
]
] |
cs/0608072
|
Dandan Luo
|
Dandan Luo, Yunmin Zhu
|
Applications of Random Parameter Matrices Kalman Filtering in Uncertain
Observation and Multi-Model Systems
|
4 figures
| null | null | null |
cs.IT math.IT
| null |
This paper considers the Linear Minimum Variance recursive state estimation
for the linear discrete time dynamic system with random state transition and
measurement matrices, i.e., random parameter matrices Kalman filtering. It is
shown that such system can be converted to a linear dynamic system with
deterministic parameter matrices but state-dependent process and measurement
noises. It is proved that under mild conditions, the recursive state estimation
of this system is still of the form of a modified Kalman filtering. More
importantly, this result can be applied to Kalman filtering with intermittent
and partial observations as well as randomly variant dynamic systems.
|
[
{
"version": "v1",
"created": "Fri, 18 Aug 2006 00:15:52 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Luo",
"Dandan",
""
],
[
"Zhu",
"Yunmin",
""
]
] |
cs/0608089
|
Shuchin Aeron
|
Shuchin Aeron and Venkatesh Saligrama
|
Wireless ad-hoc networks: Strategies and Scaling laws for the fixed SNR
regime
|
26 pages single column, submitted to Transactions on Information
Theory
|
IEEE Transactions on Information Theory, Volume 53, No. 6, June
2007, pp. 2044-2059
|
10.1109/TIT.2007.896858
| null |
cs.IT math.IT
| null |
This paper deals with throughput scaling laws for random ad-hoc wireless
networks in a rich scattering environment. We develop schemes to optimize the
ratio, $\rho(n)$ of achievable network sum capacity to the sum of the
point-to-point capacities of source-destinations pairs operating in isolation.
For fixed SNR networks, i.e., where the worst case SNR over the
source-destination pairs is fixed independent of $n$, we show that
collaborative strategies yield a scaling law of $\rho(n) = {\cal
O}(\frac{1}{n^{1/3}})$ in contrast to multi-hop strategies which yield a
scaling law of $\rho(n) = {\cal O}(\frac{1}{\sqrt{n}})$. While, networks where
worst case SNR goes to zero, do not preclude the possibility of collaboration,
multi-hop strategies achieve optimal throughput. The plausible reason is that
the gains due to collaboration cannot offset the effect of vanishing receive
SNR. This suggests that for fixed SNR networks, a network designer should look
for network protocols that exploit collaboration. The fact that most current
networks operate in a fixed SNR interference limited environment provides
further motivation for considering this regime.
|
[
{
"version": "v1",
"created": "Wed, 23 Aug 2006 02:02:16 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Aeron",
"Shuchin",
""
],
[
"Saligrama",
"Venkatesh",
""
]
] |
cs/0608117
|
Chih-Chun Wang
|
Chih-Chun Wang (Purdue University)
|
Code Annealing and the Suppressing Effect of the Cyclically Lifted LDPC
Code Ensemble
|
To appear in the Proc. 2006 IEEE Information Theory Workshop,
Chengdu, China
| null | null | null |
cs.IT math.IT
| null |
Code annealing, a new method of designing good codes of short block length,
is proposed, which is then concatenated with cyclic lifting to create finite
codes of low frame error rate (FER) error floors without performance outliers.
The stopping set analysis is performed on the cyclically lifted code ensemble
assuming uniformly random lifting sequences, and the suppressing effect/weight
of the cyclic lifting is identified for the first time, based on which the
ensemble FER error floor can be analytically determined and a scaling law is
derived. Both the first-order and high-order suppressing effects are discussed
and quantified by different methods including the explicit expression, an
algorithmic upper bound, and an algebraic lower bound.
The mismatch between the suppressing weight and the stopping distances
explains the dramatic performance discrepancy among different cyclically lifted
codes when the underlying base codes have degree 2 variable nodes or not. For
the former case, a degree augmentation method is further introduced to mitigate
this metric mismatch, and a systematic method of constructing irregular codes
of low FER error floors is presented. Both regular and irregular codes of very
low FER error floors are reported, for which the improvement factor ranges from
10^6-10^4 when compared to the classic graph-based code ensembles.
|
[
{
"version": "v1",
"created": "Tue, 29 Aug 2006 14:10:10 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wang",
"Chih-Chun",
"",
"Purdue University"
]
] |
cs/0609046
|
Chih-Chun Wang
|
Chih-Chun Wang (1), Sanjeev R. Kulkarni (2), H. Vincent Poor (2) ((1)
Purdue University, (2) Princeton University)
|
Exhausting Error-Prone Patterns in LDPC Codes
|
submitted to IEEE Trans. Information Theory
| null | null | null |
cs.IT cs.DS math.IT
| null |
It is proved in this work that exhaustively determining bad patterns in
arbitrary, finite low-density parity-check (LDPC) codes, including stopping
sets for binary erasure channels (BECs) and trapping sets (also known as
near-codewords) for general memoryless symmetric channels, is an NP-complete
problem, and efficient algorithms are provided for codes of practical short
lengths n~=500. By exploiting the sparse connectivity of LDPC codes, the
stopping sets of size <=13 and the trapping sets of size <=11 can be
efficiently exhaustively determined for the first time, and the resulting
exhaustive list is of great importance for code analysis and finite code
optimization. The featured tree-based narrowing search distinguishes this
algorithm from existing ones for which inexhaustive methods are employed. One
important byproduct is a pair of upper bounds on the bit-error rate (BER) &
frame-error rate (FER) iterative decoding performance of arbitrary codes over
BECs that can be evaluated for any value of the erasure probability, including
both the waterfall and the error floor regions. The tightness of these upper
bounds and the exhaustion capability of the proposed algorithm are proved when
combining an optimal leaf-finding module with the tree-based search. These
upper bounds also provide a worst-case-performance guarantee which is crucial
to optimizing LDPC codes for extremely low error rate applications, e.g.,
optical/satellite communications. Extensive numerical experiments are conducted
that include both randomly and algebraically constructed LDPC codes, the
results of which demonstrate the superior efficiency of the exhaustion
algorithm and its significant value for finite length code optimization.
|
[
{
"version": "v1",
"created": "Mon, 11 Sep 2006 00:50:16 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wang",
"Chih-Chun",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
cs/0609049
|
Asaf Cohen
|
Asaf Cohen, Neri Merhav and Tsachy Weissman
|
Scanning and Sequential Decision Making for Multi-Dimensional Data -
Part I: the Noiseless Case
|
46 pages, 2 figures. Revised version: title changed, section 1
revised, section 3.1 added, a few minor/technical corrections made
| null | null | null |
cs.IT cs.LG math.IT
| null |
We investigate the problem of scanning and prediction ("scandiction", for
short) of multidimensional data arrays. This problem arises in several aspects
of image and video processing, such as predictive coding, for example, where an
image is compressed by coding the error sequence resulting from scandicting it.
Thus, it is natural to ask what is the optimal method to scan and predict a
given image, what is the resulting minimum prediction loss, and whether there
exist specific scandiction schemes which are universal in some sense.
Specifically, we investigate the following problems: First, modeling the data
array as a random field, we wish to examine whether there exists a scandiction
scheme which is independent of the field's distribution, yet asymptotically
achieves the same performance as if this distribution was known. This question
is answered in the affirmative for the set of all spatially stationary random
fields and under mild conditions on the loss function. We then discuss the
scenario where a non-optimal scanning order is used, yet accompanied by an
optimal predictor, and derive bounds on the excess loss compared to optimal
scanning and prediction.
This paper is the first part of a two-part paper on sequential decision
making for multi-dimensional data. It deals with clean, noiseless data arrays.
The second part deals with noisy data arrays, namely, with the case where the
decision maker observes only a noisy version of the data, yet it is judged with
respect to the original, clean data.
|
[
{
"version": "v1",
"created": "Mon, 11 Sep 2006 09:35:57 GMT"
},
{
"version": "v2",
"created": "Tue, 8 May 2007 07:34:29 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Cohen",
"Asaf",
""
],
[
"Merhav",
"Neri",
""
],
[
"Weissman",
"Tsachy",
""
]
] |
cs/0609055
|
Tsachy Weissman
|
Nuno C Martins, Tsachy Weissman
|
Coding for Additive White Noise Channels with Feedback Corrupted by
Uniform Quantization or Bounded Noise
| null | null | null | null |
cs.IT math.IT
| null |
We present simple coding strategies, which are variants of the
Schalkwijk-Kailath scheme, for communicating reliably over additive white noise
channels in the presence of corrupted feedback. More specifically, we consider
a framework comprising an additive white forward channel and a backward link
which is used for feedback. We consider two types of corruption mechanisms in
the backward link. The first is quantization noise, i.e., the encoder receives
the quantized values of the past outputs of the forward channel. The
quantization is uniform, memoryless and time invariant (that is,
symbol-by-symbol scalar quantization), with bounded quantization error. The
second corruption mechanism is an arbitrarily distributed additive bounded
noise in the backward link. Here we allow symbol-by-symbol encoding at the
input to the backward channel. We propose simple explicit schemes that
guarantee positive information rate, in bits per channel use, with positive
error exponent. If the forward channel is additive white Gaussian then our
schemes achieve capacity, in the limit of diminishing amplitude of the noise
components at the backward link, while guaranteeing that the probability of
error converges to zero as a doubly exponential function of the block length.
Furthermore, if the forward channel is additive white Gaussian and the backward
link consists of an additive bounded noise channel, with signal-to-noise ratio
(SNR) constrained symbol-by-symbol encoding, then our schemes are also
capacity-achieving in the limit of high SNR.
|
[
{
"version": "v1",
"created": "Mon, 11 Sep 2006 23:28:46 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Martins",
"Nuno C",
""
],
[
"Weissman",
"Tsachy",
""
]
] |
cs/0609094
|
Igal Sason
|
Gil Wiechman and Igal Sason
|
An Improved Sphere-Packing Bound Targeting Codes of Short to Moderate
Block Lengths and Applications
|
To be presented in the 44th Allerton conference, 27-29 September
2006. The full paper version was submitted to the IEEE Trans. on Information
Theory, August 2006 (see http://www.ee.technion.ac.il/people/sason/ISP.pdf)
| null | null | null |
cs.IT math.IT
| null |
This paper derives an improved sphere-packing (ISP) bound targeting codes of
short to moderate block lengths. We first review the 1967 sphere-packing (SP67)
bound for discrete memoryless channels, and a recent improvement by Valembois
and Fossorier. These concepts are used for the derivation of a new lower bound
on the decoding error probability (referred to as the ISP bound) which is
uniformly tighter than the SP67 bound and its recent improved version. Under a
mild condition, the ISP bound is applicable to general memoryless channels, and
some of its applications are exemplified. Its tightness is studied by comparing
it with bounds on the ML decoding error probability. It is exemplified that the
ISP bound suggests an interesting alternative to the 1959 sphere-packing (SP59)
bound of Shannon for the Gaussian channel, especially for digital modulations
of high spectral efficiency.
|
[
{
"version": "v1",
"created": "Sun, 17 Sep 2006 21:21:46 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wiechman",
"Gil",
""
],
[
"Sason",
"Igal",
""
]
] |
cs/0609099
|
Igal Sason
|
Igal Sason and Idan Goldenberg
|
Coding for Parallel Channels: Gallager Bounds and Applications to
Repeat-Accumulate Codes
|
5 pages, 4 figures. To be presented in the IEEE Conference for
Electrical Engineers in Israel, Eilat, Nov. 15-17, 2006. The full paper
version was submitted to the IEEE Trans. on Information Theory in June 2006,
and is available at http://arxiv.org/abs/cs.IT/0607002
| null | null | null |
cs.IT math.IT
| null |
This paper is focused on the performance analysis of binary linear block
codes (or ensembles) whose transmission takes place over independent and
memoryless parallel channels. New upper bounds on the maximum-likelihood (ML)
decoding error probability are derived. The framework of the second version of
the Duman and Salehi (DS2) bounds is generalized to the case of parallel
channels, along with the derivation of optimized tilting measures. The
connection between the generalized DS2 and the 1961 Gallager bounds, known
previously for a single channel, is revisited for the case of parallel
channels. The new bounds are used to obtain improved inner bounds on the
attainable channel regions under ML decoding. These improved bounds are applied
to ensembles of turbo-like codes, focusing on repeat-accumulate codes and their
recent variations.
|
[
{
"version": "v1",
"created": "Mon, 18 Sep 2006 06:26:23 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sason",
"Igal",
""
],
[
"Goldenberg",
"Idan",
""
]
] |
cs/0609123
|
Xiang Huang
|
Xiang Huang, Xiaolin Wu
|
Optimal Design of Multiple Description Lattice Vector Quantizers
|
Submitted to IEEE Trans. on Information Theory, Sep 2006 (30 pages, 7
figures)
| null | null | null |
cs.IT math.IT
| null |
In the design of multiple description lattice vector quantizers (MDLVQ),
index assignment plays a critical role. In addition, one also needs to choose
the Voronoi cell size of the central lattice v, the sublattice index N, and the
number of side descriptions K to minimize the expected MDLVQ distortion, given
the total entropy rate of all side descriptions Rt and description loss
probability p. In this paper we propose a linear-time MDLVQ index assignment
algorithm for any K >= 2 balanced descriptions in any dimensions, based on a
new construction of so-called K-fraction lattice. The algorithm is greedy in
nature but is proven to be asymptotically (N -> infinity) optimal for any K >=
2 balanced descriptions in any dimensions, given Rt and p. The result is
stronger when K = 2: the optimality holds for finite N as well, under some mild
conditions. For K > 2, a local adjustment algorithm is developed to augment the
greedy index assignment, and conjectured to be optimal for finite N.
Our algorithmic study also leads to better understanding of v, N and K in
optimal MDLVQ design. For K = 2 we derive, for the first time, a
non-asymptotical closed form expression of the expected distortion of optimal
MDLVQ in p, Rt, N. For K > 2, we tighten the current asymptotic formula of the
expected distortion, relating the optimal values of N and K to p and Rt more
precisely.
|
[
{
"version": "v1",
"created": "Fri, 22 Sep 2006 02:14:03 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Huang",
"Xiang",
""
],
[
"Wu",
"Xiaolin",
""
]
] |
cs/0609139
|
Sekhar Tatikonda
|
Sekhar Tatikonda and Sanjoy Mitter
|
The Capacity of Channels with Feedback
| null | null | null | null |
cs.IT math.IT
| null |
We introduce a general framework for treating channels with memory and
feedback. First, we generalize Massey's concept of directed information and use
it to characterize the feedback capacity of general channels. Second, we
present coding results for Markov channels. This requires determining
appropriate sufficient statistics at the encoder and decoder. Third, a dynamic
programming framework for computing the capacity of Markov channels is
presented. Fourth, it is shown that the average cost optimality equation (ACOE)
can be viewed as an implicit single-letter characterization of the capacity.
Fifth, scenarios with simple sufficient statistics are described.
|
[
{
"version": "v1",
"created": "Mon, 25 Sep 2006 14:04:12 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Tatikonda",
"Sekhar",
""
],
[
"Mitter",
"Sanjoy",
""
]
] |
cs/0609148
|
Roxana Smarandache
|
Roxana Smarandache, Ali E. Pusane, Pascal O. Vontobel, Daniel J.
Costello Jr
|
Pseudo-Codeword Performance Analysis for LDPC Convolutional Codes
|
26 pages, 6 figures, 2 tables
| null | null | null |
cs.IT math.IT
| null |
Message-passing iterative decoders for low-density parity-check (LDPC) block
codes are known to be subject to decoding failures due to so-called
pseudo-codewords. These failures can cause the large signal-to-noise ratio
performance of message-passing iterative decoding to be worse than that
predicted by the maximum-likelihood decoding union bound. In this paper we
address the pseudo-codeword problem from the convolutional-code perspective. In
particular, we compare the performance of LDPC convolutional codes with that of
their ``wrapped'' quasi-cyclic block versions and we show that the minimum
pseudo-weight of an LDPC convolutional code is at least as large as the minimum
pseudo-weight of an underlying quasi-cyclic code. This result, which parallels
a well-known relationship between the minimum Hamming weight of convolutional
codes and the minimum Hamming weight of their quasi-cyclic counterparts, is due
to the fact that every pseudo-codeword in the convolutional code induces a
pseudo-codeword in the block code with pseudo-weight no larger than that of the
convolutional code's pseudo-codeword. This difference in the weight spectra
leads to improved performance at low-to-moderate signal-to-noise ratios for the
convolutional code, a conclusion supported by simulation results.
|
[
{
"version": "v1",
"created": "Wed, 27 Sep 2006 02:27:52 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Smarandache",
"Roxana",
""
],
[
"Pusane",
"Ali E.",
""
],
[
"Vontobel",
"Pascal O.",
""
],
[
"Costello",
"Daniel J.",
"Jr"
]
] |
cs/0609154
|
Michael Chertkov
|
Michael Chertkov and Vladimir Y. Chernyak
|
Loop Calculus Helps to Improve Belief Propagation and Linear Programming
Decodings of Low-Density-Parity-Check Codes
|
10 pages, 2 figures; Invited talk at 44-th annual Allerton Conference
on Communications, Control and Computing, Sep 27-Sep 29, 2006
| null | null |
LAUR-06-6751
|
cs.IT cond-mat.dis-nn cond-mat.stat-mech math.IT
| null |
We illustrate the utility of the recently developed loop calculus for
improving the Belief Propagation (BP) algorithm. If the algorithm that
minimizes the Bethe free energy fails we modify the free energy by accounting
for a critical loop in a graphical representation of the code. The
log-likelihood specific critical loop is found by means of the loop calculus.
The general method is tested using an example of the Linear Programming (LP)
decoding, that can be viewed as a special limit of the BP decoding. Considering
the (155,64,20) code that performs over Additive-White-Gaussian-Noise channel
we show that the loop calculus improves the LP decoding and corrects all
previously found dangerous configurations of log-likelihoods related to
pseudo-codewords with low effective distance, thus reducing the code's
error-floor.
|
[
{
"version": "v1",
"created": "Thu, 28 Sep 2006 04:16:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Chertkov",
"Michael",
""
],
[
"Chernyak",
"Vladimir Y.",
""
]
] |
cs/0609155
|
Benjamin Belzer
|
Ying Zhu, Taikun Cheng, Krishnamoorthy Sivakumar, and Benjamin J.
Belzer
|
Detection of Markov Random Fields on Two-Dimensional Intersymbol
Interference Channels
|
8 pages, 17 figures
| null | null | null |
cs.IT math.IT
| null |
We present a novel iterative algorithm for detection of binary Markov random
fields (MRFs) corrupted by two-dimensional (2D) intersymbol interference (ISI)
and additive white Gaussian noise (AWGN). We assume a first-order binary MRF as
a simple model for correlated images. We assume a 2D digital storage channel,
where the MRF is interleaved before being written and then read by a 2D
transducer; such channels occur in recently proposed optical disk storage
systems. The detection algorithm is a concatenation of two
soft-input/soft-output (SISO) detectors: an iterative row-column soft-decision
feedback (IRCSDF) ISI detector, and a MRF detector. The MRF detector is a SISO
version of the stochastic relaxation algorithm by Geman and Geman in IEEE
Trans. Pattern Anal. and Mach. Intell., Nov. 1984. On the 2 x 2 averaging-mask
ISI channel, at a bit error rate (BER) of 10^{-5}, the concatenated algorithm
achieves SNR savings of between 0.5 and 2.0 dB over the IRCSDF detector alone;
the savings increase as the MRFs become more correlated, or as the SNR
decreases. The algorithm is also fairly robust to mismatches between the
assumed and actual MRF parameters.
|
[
{
"version": "v1",
"created": "Wed, 27 Sep 2006 23:47:00 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Zhu",
"Ying",
""
],
[
"Cheng",
"Taikun",
""
],
[
"Sivakumar",
"Krishnamoorthy",
""
],
[
"Belzer",
"Benjamin J.",
""
]
] |
cs/0609156
|
Massoud Amini
|
Hadi Rahiminia, Massoud Amini
|
Entangled Graphs
|
Part of M.Sc. Thesis of the first author
| null | null | null |
cs.IT cs.DM math.IT
| null |
In this paper we prove a separability criterion for mixed states in $\mathbb
C^p\otimes\mathbb C^q$. We also show that the density matrix of a graph with
only one entangled edge is entangled.
|
[
{
"version": "v1",
"created": "Thu, 28 Sep 2006 10:26:59 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Rahiminia",
"Hadi",
""
],
[
"Amini",
"Massoud",
""
]
] |
cs/0610012
|
N Rajesh Pillai
|
N Rajesh Pillai, Yogesh Kumar
|
On Shift Sequences for Interleaved Construction of Sequence Sets with
Low Correlation
|
Corrected typos. Added special case for v=2 for second problem
| null | null | null |
cs.IT math.IT
| null |
Construction of signal sets with low correlation property is of interest to
designers of CDMA systems. One of the preferred ways of constructing such sets
is the interleaved construction which uses two sequences a and b with 2-level
autocorrelation and a shift sequence e. The shift sequence has to satisfy
certain conditions for the resulting signal set to have low correlation
properties. This article shows that the conditions reported in literature are
too strong and gives a version which results in more number of shift sequences.
An open problem on the existence of shift sequences for attaining an
interleaved set with maximum correlation value bounded by v+2 is also taken up
and solved.
|
[
{
"version": "v1",
"created": "Wed, 4 Oct 2006 05:07:42 GMT"
},
{
"version": "v2",
"created": "Thu, 21 Jun 2007 09:30:42 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Pillai",
"N Rajesh",
""
],
[
"Kumar",
"Yogesh",
""
]
] |
cs/0610037
|
Nan Liu
|
Nan Liu and Sennur Ulukus
|
The Capacity Region of a Class of Discrete Degraded Interference
Channels
|
7 pages, 1 figure; presented at the 44th annual Allerton Conference
on Communication, Control and Computing, September 27-29, 2006
| null | null | null |
cs.IT math.IT
| null |
We provide a single-letter characterization for the capacity region of a
class of discrete degraded interference channels (DDICs). The class of DDICs
considered includes the discrete additive degraded interference channel (DADIC)
studied by Benzel. We show that for the class of DDICs studied, encoder
cooperation does not increase the capacity region, and therefore, the capacity
region of the class of DDICs is the same as the capacity region of the
corresponding degraded broadcast channel.
|
[
{
"version": "v1",
"created": "Fri, 6 Oct 2006 19:42:27 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Nan",
""
],
[
"Ulukus",
"Sennur",
""
]
] |
cs/0610050
|
Tony Lee T.
|
Tony T. Lee
|
The Mathematical Parallels Between Packet Switching and Information
Transmission
|
21 pages, 25 figures, Submitted to IEEE Transactions on Information
Theory
| null | null | null |
cs.IT cs.NI math.IT
| null |
All communication networks comprise of transmission systems and switching
systems, even though they are usually treated as two separate issues.
Communication channels are generally disturbed by noise from various sources.
In circuit switched networks, reliable communication requires the
error-tolerant transmission of bits over noisy channels. In packet switched
networks, however, not only can bits be corrupted with noise, but resources
along connection paths are also subject to contention. Thus, quality of service
(QoS) is determined by buffer delays and packet losses. The theme of this paper
is to show that transmission noise and packet contention actually have similar
characteristics and can be tamed by comparable means to achieve reliable
communication, and a number of analogies between switching and transmission are
identified. The sampling theorem of bandlimited signals provides the
cornerstone of digital communication and signal processing. Recently, the
Birkhoff-von Neumann decomposition of traffic matrices has been widely applied
to packet switches. With respect to the complexity reduction of packet
switching, we show that the decomposition of a doubly stochastic traffic matrix
plays a similar role to that of the sampling theorem in digital transmission.
We conclude that packet switching systems are governed by mathematical laws
that are similar to those of digital transmission systems as envisioned by
Shannon in his seminal 1948 paper, A Mathematical Theory of Communication.
|
[
{
"version": "v1",
"created": "Tue, 10 Oct 2006 08:09:23 GMT"
},
{
"version": "v2",
"created": "Wed, 22 Nov 2006 03:15:44 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Lee",
"Tony T.",
""
]
] |
cs/0610052
|
Chih-Chun Wang
|
Chih-Chun Wang (1), Sanjeev R. Kulkarni (2), H. Vincent Poor (2) ((1)
Purdue University, (2) Princeton University)
|
Finite-Dimensional Bounds on Zm and Binary LDPC Codes with Belief
Propagation Decoders
|
to appear in IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
This paper focuses on finite-dimensional upper and lower bounds on decodable
thresholds of Zm and binary low-density parity-check (LDPC) codes, assuming
belief propagation decoding on memoryless channels. A concrete framework is
presented, admitting systematic searches for new bounds. Two noise measures are
considered: the Bhattacharyya noise parameter and the soft bit value for a
maximum a posteriori probability (MAP) decoder on the uncoded channel. For Zm
LDPC codes, an iterative m-dimensional bound is derived for
m-ary-input/symmetric-output channels, which gives a sufficient stability
condition for Zm LDPC codes and is complemented by a matched necessary
stability condition introduced herein. Applications to coded modulation and to
codes with non-equiprobable distributed codewords are also discussed.
For binary codes, two new lower bounds are provided for symmetric channels,
including a two-dimensional iterative bound and a one-dimensional non-iterative
bound, the latter of which is the best known bound that is tight for binary
symmetric channels (BSCs), and is a strict improvement over the bound derived
by the channel degradation argument. By adopting the reverse channel
perspective, upper and lower bounds on the decodable Bhattacharyya noise
parameter are derived for non-symmetric channels, which coincides with the
existing bound for symmetric channels.
|
[
{
"version": "v1",
"created": "Tue, 10 Oct 2006 16:02:58 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wang",
"Chih-Chun",
""
],
[
"Kulkarni",
"Sanjeev R.",
""
],
[
"Poor",
"H. Vincent",
""
]
] |
cs/0610057
|
Pierre Loidreau
|
P. Loidreau
|
Properties of codes in rank metric
|
18 pages, 1 figure
| null | null | null |
cs.DM cs.IT math.IT
| null |
We study properties of rank metric and codes in rank metric over finite
fields. We show that in rank metric perfect codes do not exist. We derive an
existence bound that is the equivalent of the Gilbert--Varshamov bound in
Hamming metric. We study the asymptotic behavior of the minimum rank distance
of codes satisfying GV. We derive the probability distribution of minimum rank
distance for random and random $\F{q}$-linear codes. We give an asymptotic
equivalent of their average minimum rank distance and show that random
$\F{q}$-linear codes are on GV bound for rank metric.
We show that the covering density of optimum codes whose codewords can be
seen as square matrices is lower bounded by a function depending only on the
error-correcting capability of the codes. We show that there are quasi-perfect
codes in rank metric over fields of characteristic 2.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2006 07:58:39 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Loidreau",
"P.",
""
]
] |
cs/0610061
|
Thomas Michel
|
Gerhard Wunder, Thomas Michel
|
The Delay-Limited Capacity Region of OFDM Broadcast Channels
| null | null | null | null |
cs.IT math.IT
| null |
In this work, the delay limited capacity (DLC) of orthogonal frequency
division multiplexing (OFDM) systems is investigated. The analysis is organized
into two parts. In the first part, the impact of system parameters on the OFDM
DLC is analyzed in a general setting. The main results are that under weak
assumptions the maximum achievable single user DLC is almost independent of the
distribution of the path attenuations in the low signal-to-noise (SNR) region
but depends strongly on the delay spread. In the high SNR region the roles are
exchanged. Here, the impact of delay spread is negligible while the impact of
the distribution becomes dominant. The relevant asymptotic quantities are
derived without employing simplifying assumptions on the OFDM correlation
structure. Moreover, for both cases it is shown that the DLC is maximized if
the total channel energy is uniformly spread, i.e. the power delay profile is
uniform. It is worth pointing out that since universal bounds are obtained the
results can also be used for other classes of parallel channels with block
fading characteristic. The second part extends the setting to the broadcast
channel and studies the corresponding OFDM DLC BC region. An algorithm for
computing the OFDM BC DLC region is presented. To derive simple but smart
resource allocation strategies, the principle of rate water-filling employing
order statistics is introduced. This yields analytical lower bounds on the OFDM
DLC region based on orthogonal frequency division multiple access (OFDMA) and
ordinal channel state information (CSI). Finally, the schemes are compared to
an algorithm using full CSI.
|
[
{
"version": "v1",
"created": "Wed, 11 Oct 2006 10:42:41 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wunder",
"Gerhard",
""
],
[
"Michel",
"Thomas",
""
]
] |
cs/0610074
|
Georg Schmidt
|
Georg Schmidt, Vladimir R. Sidorenko, and Martin Bossert
|
Collaborative Decoding of Interleaved Reed-Solomon Codes and
Concatenated Code Designs
|
20 pages, 7 figures
| null | null | null |
cs.IT math.IT
| null |
Interleaved Reed-Solomon codes are applied in numerous data processing, data
transmission, and data storage systems. They are generated by interleaving
several codewords of ordinary Reed-Solomon codes. Usually, these codewords are
decoded independently by classical algebraic decoding methods. However, by
collaborative algebraic decoding approaches, such interleaved schemes allow the
correction of error patterns beyond half the minimum distance, provided that
the errors in the received signal occur in bursts. In this work, collaborative
decoding of interleaved Reed-Solomon codes by multi-sequence shift-register
synthesis is considered and analyzed. Based on the framework of interleaved
Reed-Solomon codes, concatenated code designs are investigated, which are
obtained by interleaving several Reed-Solomon codes, and concatenating them
with an inner block code.
|
[
{
"version": "v1",
"created": "Thu, 12 Oct 2006 18:02:47 GMT"
},
{
"version": "v2",
"created": "Thu, 12 Oct 2006 20:23:44 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Schmidt",
"Georg",
""
],
[
"Sidorenko",
"Vladimir R.",
""
],
[
"Bossert",
"Martin",
""
]
] |
cs/0610082
|
Sander Stepanov Dr.
|
Sander Stepanov, Ofer Hadar
|
Theoretical analysis of network cranback protocols performance
| null | null | null | null |
cs.IT math.IT
| null |
Suggested the decision of the network cranback protocols performance
analyzing problem from Eyal Felstine, Reuven Cohen and Ofer Hadar, " Crankback
Prediction in Hierarchical ATM networks", Journal of Network and Systems
Management, Vol. 10, No. 3, September 2002. It show that the false alarm
probability and probability of successful way crossing can be calculated. The
main optimization equations are developed for cranback protocol parameters by
using analytical expressions for statistical protocol characteristics.
|
[
{
"version": "v1",
"created": "Fri, 13 Oct 2006 11:21:42 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Stepanov",
"Sander",
""
],
[
"Hadar",
"Ofer",
""
]
] |
cs/0610083
|
Sander Stepanov Dr.
|
Sander Stepanov
|
Estimation of the traffic in the binary channel for data networks
| null | null | null | null |
cs.IT math.IT
| null |
It is impossible to provide an effective utilization of communication
networks without the analysis of the quantitative characteristics of the
traffic in real time. The constant supervision of all channels of the data
practically is impracticable because requires transfer of the significant
additional information on a network and large resources expenses for devices of
the control. Thus, the task on traffic estimation with small expenses in real
time is the urgent.
|
[
{
"version": "v1",
"created": "Fri, 13 Oct 2006 11:47:07 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Stepanov",
"Sander",
""
]
] |
cs/0610099
|
Maximilien Gadouleau
|
Maximilien Gadouleau and Zhiyuan Yan
|
Properties of Codes with the Rank Metric
|
5 pages, 4 figures, accepted to Globecom 2006
| null | null | null |
cs.IT math.IT
| null |
In this paper, we study properties of rank metric codes in general and
maximum rank distance (MRD) codes in particular. For codes with the rank
metric, we first establish Gilbert and sphere-packing bounds, and then obtain
the asymptotic forms of these two bounds and the Singleton bound. Based on the
asymptotic bounds, we observe that asymptotically Gilbert-Varsharmov bound is
exceeded by MRD codes and sphere-packing bound cannot be attained. We also
establish bounds on the rank covering radius of maximal codes, and show that
all MRD codes are maximal codes and all the MRD codes known so far achieve the
maximum rank covering radius.
|
[
{
"version": "v1",
"created": "Mon, 16 Oct 2006 20:16:42 GMT"
},
{
"version": "v2",
"created": "Wed, 25 Oct 2006 02:52:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
] |
cs/0610107
|
Jinhua Jiang
|
Jinhua Jiang, Yan Xin, and Hari Krishna Garg
|
Interference Channels with Common Information
|
23 pages, 5 figures, submitted to Trans. Inform. Theory
| null | null | null |
cs.IT math.IT
| null |
In this paper, we consider the discrete memoryless interference channel with
common information, in which two senders need deliver not only private messages
but also certain common messages to their corresponding receivers. We derive an
achievable rate region for such a channel by exploiting a random coding
strategy, namely cascaded superposition coding. We reveal that the derived
achievable rate region generalizes some important existing results for the
interference channels with or without common information. Furthermore, we
specialize to a class of deterministic interference channels with common
information, and show that the derived achievable rate region is indeed the
capacity region for this class of channels.
|
[
{
"version": "v1",
"created": "Wed, 18 Oct 2006 08:58:47 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jiang",
"Jinhua",
""
],
[
"Xin",
"Yan",
""
],
[
"Garg",
"Hari Krishna",
""
]
] |
cs/0610130
|
Evgueni Haroutunian
|
Evgueni A. Haroutunian (Associate Member, IEEE)
|
On Bounds for $E$-capacity of DMC
| null | null | null | null |
cs.IT math.IT
| null |
Random coding, expurgated and sphere packing bounds are derived by method of
types and method of graph decomposition for $E$-capacity of discrete memoryless
channel (DMC). Three decoding rules are considered, the random coding bound is
attainable by each of the three rules, but the expurgated bound is achievable
only by maximum-likelihood decoding. Sphere packing bound is obtained by very
simple combinatorial reasonings of the method of types. The paper joins and
reviews the results of previous hard achievable publications.
|
[
{
"version": "v1",
"created": "Mon, 23 Oct 2006 07:23:01 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Haroutunian",
"Evgueni A.",
"",
"Associate Member, IEEE"
]
] |
cs/0610132
|
Kwankyu Lee
|
Kwankyu Lee, Michael E. O'Sullivan
|
List Decoding of Hermitian Codes using Groebner Bases
|
19 pages, 2 figures
| null | null | null |
cs.IT cs.SC math.IT
| null |
List decoding of Hermitian codes is reformulated to allow an efficient and
simple algorithm for the interpolation step. The algorithm is developed using
the theory of Groebner bases of modules. The computational complexity of the
algorithm seems comparable to previously known algorithms achieving the same
task, and the algorithm is better suited for hardware implementation.
|
[
{
"version": "v1",
"created": "Mon, 23 Oct 2006 07:52:42 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Lee",
"Kwankyu",
""
],
[
"O'Sullivan",
"Michael E.",
""
]
] |
cs/0610139
|
Anant Sahai
|
Anant Sahai
|
How to beat the sphere-packing bound with feedback
|
9 pages, 3 figures, corrected typos and increased font size.
Submitted to IT Transactions
| null | null | null |
cs.IT math.IT
| null |
The sphere-packing bound $E_{sp}(R)$ bounds the reliability function for
fixed-length block-codes. For symmetric channels, it remains a valid bound even
when strictly causal noiseless feedback is allowed from the decoder to the
encoder. To beat the bound, the problem must be changed. While it has long been
known that variable-length block codes can do better when trading-off error
probability with expected block-length, this correspondence shows that the {\em
fixed-delay} setting also presents such an opportunity for generic channels.
While $E_{sp}(R)$ continues to bound the tradeoff between bit error and fixed
end-to-end latency for symmetric channels used {\em without} feedback, a new
bound called the ``focusing bound'' gives the limits on what can be done with
feedback. If low-rate reliable flow-control is free (ie. the noisy channel has
strictly positive zero-error capacity), then the focusing bound can be
asymptotically achieved. Even when the channel has no zero-error capacity, it
is possible to substantially beat the sphere-packing bound by synthesizing an
appropriately reliable channel to carry the flow-control information.
|
[
{
"version": "v1",
"created": "Tue, 24 Oct 2006 14:10:09 GMT"
},
{
"version": "v2",
"created": "Thu, 26 Oct 2006 16:10:37 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sahai",
"Anant",
""
]
] |
cs/0610141
|
Anant Sahai
|
Anant Sahai
|
Stabilization using both noisy and noiseless feedback
|
9 pages, 5 figures, originally presented at MTNS 06
| null | null | null |
cs.IT math.IT
| null |
When designing a distributed control system, the system designer has a choice
in how to connect the different units through communication channels. In
practice, noiseless and noisy channels may coexist. Using the standard toy
example of scalar stabilization, this paper shows how a small amount of
noiseless feedback can perform a ``supervisory'' role and thereby boost the
effectiveness of noisy feedback.
|
[
{
"version": "v1",
"created": "Tue, 24 Oct 2006 18:32:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sahai",
"Anant",
""
]
] |
cs/0610142
|
Anant Sahai
|
Mukul Agarwal, Anant Sahai, and Sanjoy Mitter
|
Coding into a source: a direct inverse Rate-Distortion theorem
|
18 pages, 3 figure, orginally presented at Allerton 06
| null | null | null |
cs.IT math.IT
| null |
Shannon proved that if we can transmit bits reliably at rates larger than the
rate distortion function $R(D)$, then we can transmit this source to within a
distortion $D$. We answer the converse question ``If we can transmit a source
to within a distortion $D$, can we transmit bits reliably at rates less than
the rate distortion function?'' in the affirmative. This can be viewed as a
direct converse of the rate distortion theorem.
|
[
{
"version": "v1",
"created": "Tue, 24 Oct 2006 18:49:37 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Agarwal",
"Mukul",
""
],
[
"Sahai",
"Anant",
""
],
[
"Mitter",
"Sanjoy",
""
]
] |
cs/0610144
|
Anant Sahai
|
Cheng Chang, Stark Draper, and Anant Sahai
|
Lossless coding for distributed streaming sources
|
40 pages, 11 figures, submitted to IT Transactions
| null | null | null |
cs.IT math.IT
| null |
Distributed source coding is traditionally viewed in the block coding context
-- all the source symbols are known in advance at the encoders. This paper
instead considers a streaming setting in which iid source symbol pairs are
revealed to the separate encoders in real time and need to be reconstructed at
the decoder with some tolerable end-to-end delay using finite rate noiseless
channels. A sequential random binning argument is used to derive a lower bound
on the error exponent with delay and show that both ML decoding and universal
decoding achieve the same positive error exponents inside the traditional
Slepian-Wolf rate region. The error events are different from the block-coding
error events and give rise to slightly different exponents. Because the
sequential random binning scheme is also universal over delays, the resulting
code eventually reconstructs every source symbol correctly with probability 1.
|
[
{
"version": "v1",
"created": "Wed, 25 Oct 2006 00:20:55 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Chang",
"Cheng",
""
],
[
"Draper",
"Stark",
""
],
[
"Sahai",
"Anant",
""
]
] |
cs/0610148
|
Maximilien Gadouleau
|
Maximilien Gadouleau and Zhiyuan Yan
|
Decoder Error Probability of MRD Codes
|
6 pages, 2 figures. Presented at ITW 2006, Chengdu, China
| null | null | null |
cs.IT math.IT
| null |
In this paper, we first introduce the concept of elementary linear subspace,
which has similar properties to those of a set of coordinates. Using this new
concept, we derive properties of maximum rank distance (MRD) codes that
parallel those of maximum distance separable (MDS) codes. Using these
properties, we show that the decoder error probability of MRD codes with error
correction capability t decreases exponentially with t^2 based on the
assumption that all errors with the same rank are equally likely. We argue that
the channel based on this assumption is an approximation of a channel corrupted
by crisscross errors.
|
[
{
"version": "v1",
"created": "Thu, 26 Oct 2006 03:12:31 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gadouleau",
"Maximilien",
""
],
[
"Yan",
"Zhiyuan",
""
]
] |
cs/0610150
|
Evgueni Haroutunian
|
Evgueni A. Haroutunian (Associate Member, IEEE) and Parandzem M.
Hakobyan
|
On LAO Testing of Multiple Hypotheses for Many Independent Objects
| null | null | null | null |
cs.IT math.IT
| null |
The problem of many hypotheses logarithmically asymptotically optimal (LAO)
testing for a model consisting of three or more independent objects is solved.
It is supposed that $M$ probability distributions are known and each object
independently of others follows to one of them. The matrix of asymptotic
interdependencies (reliability--reliability functions) of all possible pairs of
the error probability exponents (reliabilities) in optimal testing for this
model is studied.
This problem was introduced (and solved for the case of two objects and two
given probability distributions) by Ahlswede and Haroutunian. The model with
two independent objects with $M$ hypotheses was explored by Haroutunian and
Hakobyan.
|
[
{
"version": "v1",
"created": "Thu, 26 Oct 2006 06:42:47 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Haroutunian",
"Evgueni A.",
"",
"Associate Member, IEEE"
],
[
"Hakobyan",
"Parandzem M.",
""
]
] |
cs/0610151
|
Anant Sahai
|
Anant Sahai
|
Anytime coding on the infinite bandwidth AWGN channel: A sequential
semi-orthogonal optimal code
|
12 pages, 6 figures, submitted to IT Transactions
| null | null | null |
cs.IT math.IT
| null |
It is well known that orthogonal coding can be used to approach the Shannon
capacity of the power-constrained AWGN channel without a bandwidth constraint.
This correspondence describes a semi-orthogonal variation of pulse position
modulation that is sequential in nature -- bits can be ``streamed across''
without having to buffer up blocks of bits at the transmitter. ML decoding
results in an exponentially small probability of error as a function of
tolerated receiver delay and thus eventually a zero probability of error on
every transmitted bit. In the high-rate regime, a matching upper bound is given
on the delay error exponent. We close with some comments on the case with
feedback and the connections to the capacity per unit cost problem.
|
[
{
"version": "v1",
"created": "Thu, 26 Oct 2006 10:01:38 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sahai",
"Anant",
""
]
] |
cs/0610153
|
Michael Stay
|
Cristian S. Calude and Michael A. Stay
|
Most Programs Stop Quickly or Never Halt
|
Shortened abstract and changed format of references to match Adv.
Appl. Math guidelines
| null | null |
CDMTCS-284
|
cs.IT math.IT
| null |
Since many real-world problems arising in the fields of compiler
optimisation, automated software engineering, formal proof systems, and so
forth are equivalent to the Halting Problem--the most notorious undecidable
problem--there is a growing interest, not only academically, in understanding
the problem better and in providing alternative solutions. Halting computations
can be recognised by simply running them; the main difficulty is to detect
non-halting programs. Our approach is to have the probability space extend over
both space and time and to consider the probability that a random $N$-bit
program has halted by a random time. We postulate an a priori computable
probability distribution on all possible runtimes and we prove that given an
integer k>0, we can effectively compute a time bound T such that the
probability that an N-bit program will eventually halt given that it has not
halted by T is smaller than 2^{-k}. We also show that the set of halting
programs (which is computably enumerable, but not computable) can be written as
a disjoint union of a computable set and a set of effectively vanishing
probability. Finally, we show that ``long'' runtimes are effectively rare. More
formally, the set of times at which an N-bit program can stop after the time
2^{N+constant} has effectively zero density.
|
[
{
"version": "v1",
"created": "Thu, 26 Oct 2006 16:27:53 GMT"
},
{
"version": "v2",
"created": "Fri, 8 Dec 2006 07:39:05 GMT"
},
{
"version": "v3",
"created": "Sun, 7 Jan 2007 01:07:05 GMT"
},
{
"version": "v4",
"created": "Fri, 26 Jan 2007 20:39:47 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Calude",
"Cristian S.",
""
],
[
"Stay",
"Michael A.",
""
]
] |
cs/0610169
|
Alireza Bayesteh
|
Alireza Bayesteh and Amir Keyvan Khandani
|
On the User Selection for MIMO Broadcast Channels
|
57 pages 5 figures
| null | null |
Technical Report #2005-16
|
cs.IT math.IT
| null |
In this paper, a downlink communication system, in which a Base Station (BS)
equipped with $M$ antennas communicates with $N$ users each equipped with $K$
receive antennas, is considered. An efficient suboptimum algorithm is proposed
for selecting a set of users in order to maximize the sum-rate throughput of
the system. For the asymptotic case when $N$ tends to infinity, the necessary
and sufficient conditions in order to achieve the maximum sum-rate throughput,
such that the difference between the achievable sum-rate and the maximum value
approaches zero, is derived. The complexity of our algorithm is investigated in
terms of the required amount of feedback from the users to the base station, as
well as the number of searches required for selecting the users. It is shown
that the proposed method is capable of achieving a large portion of the
sum-rate capacity, with a very low complexity.
|
[
{
"version": "v1",
"created": "Mon, 30 Oct 2006 16:21:39 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Bayesteh",
"Alireza",
""
],
[
"Khandani",
"Amir Keyvan",
""
]
] |
cs/0611003
|
Sergio Servetto
|
An-swol Hu and Sergio D. Servetto (Cornell University)
|
A Scalable Protocol for Cooperative Time Synchronization Using Spatial
Averaging
|
Submitted to the IEEE/ACM Transactions on Networking, October 2006.
See also cs.IT/0503031
| null | null | null |
cs.NI cs.IT math.IT
| null |
Time synchronization is an important aspect of sensor network operation.
However, it is well known that synchronization error accumulates over multiple
hops. This presents a challenge for large-scale, multi-hop sensor networks with
a large number of nodes distributed over wide areas. In this work, we present a
protocol that uses spatial averaging to reduce error accumulation in
large-scale networks. We provide an analysis to quantify the synchronization
improvement achieved using spatial averaging and find that in a basic
cooperative network, the skew and offset variance decrease approximately as
$1/\bar{N}$ where $\bar{N}$ is the number of cooperating nodes. For general
networks, simulation results and a comparison to basic cooperative network
results are used to illustrate the improvement in synchronization performance.
|
[
{
"version": "v1",
"created": "Wed, 1 Nov 2006 08:47:12 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Hu",
"An-swol",
"",
"Cornell University"
],
[
"Servetto",
"Sergio D.",
"",
"Cornell University"
]
] |
cs/0611007
|
Shi Jin
|
Shi Jin, Matthew R. McKay, Xiqi Gao, Iain B. Collings
|
MIMO Multichannel Beamforming: SER and Outage Using New Eigenvalue
Distributions of Complex Noncentral Wishart Matrices
|
26 pages, 5 figures, to appear in IEEE Transactions on Communications
| null | null | null |
cs.IT math.IT
| null |
This paper analyzes MIMO systems with multichannel beamforming in Ricean
fading. Our results apply to a wide class of multichannel systems which
transmit on the eigenmodes of the MIMO channel. We first present new
closed-form expressions for the marginal ordered eigenvalue distributions of
complex noncentral Wishart matrices. These are used to characterize the
statistics of the signal to noise ratio (SNR) on each eigenmode. Based on this,
we present exact symbol error rate (SER) expressions. We also derive
closed-form expressions for the diversity order, array gain, and outage
probability. We show that the global SER performance is dominated by the
subchannel corresponding to the minimum channel singular value. We also show
that, at low outage levels, the outage probability varies inversely with the
Ricean K-factor for cases where transmission is only on the most dominant
subchannel (i.e. a singlechannel beamforming system). Numerical results are
presented to validate the theoretical analysis.
|
[
{
"version": "v1",
"created": "Thu, 2 Nov 2006 03:44:03 GMT"
},
{
"version": "v2",
"created": "Fri, 3 Nov 2006 11:33:13 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Jin",
"Shi",
""
],
[
"McKay",
"Matthew R.",
""
],
[
"Gao",
"Xiqi",
""
],
[
"Collings",
"Iain B.",
""
]
] |
cs/0611015
|
Kenneth Shum
|
Kenneth W. Shum and Chi Wan Sung
|
On the Fairness of Rate Allocation in Gaussian Multiple Access Channel
and Broadcast Channel
|
26 pages
| null | null | null |
cs.IT math.IT
| null |
The capacity region of a channel consists of all achievable rate vectors.
Picking a particular point in the capacity region is synonymous with rate
allocation. The issue of fairness in rate allocation is addressed in this
paper. We review several notions of fairness, including max-min fairness,
proportional fairness and Nash bargaining solution. Their efficiencies for
general multiuser channels are discussed. We apply these ideas to the Gaussian
multiple access channel (MAC) and the Gaussian broadcast channel (BC). We show
that in the Gaussian MAC, max-min fairness and proportional fairness coincide.
For both Gaussian MAC and BC, we devise efficient algorithms that locate the
fair point in the capacity region. Some elementary properties of fair rate
allocations are proved.
|
[
{
"version": "v1",
"created": "Fri, 3 Nov 2006 16:17:45 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Shum",
"Kenneth W.",
""
],
[
"Sung",
"Chi Wan",
""
]
] |
cs/0611037
|
Michael Baer
|
Michael B. Baer
|
On Conditional Branches in Optimal Decision Trees
|
5 pages, 2 illustrations; conference version of cs.PF/0604016,
accepted to ISIT 2007
| null | null | null |
cs.PF cs.IT math.IT
| null |
The decision tree is one of the most fundamental programming abstractions. A
commonly used type of decision tree is the alphabetic binary tree, which uses
(without loss of generality) ``less than'' versus ''greater than or equal to''
tests in order to determine one of $n$ outcome events. The process of finding
an optimal alphabetic binary tree for a known probability distribution on
outcome events usually has the underlying assumption that the cost (time) per
decision is uniform and thus independent of the outcome of the decision. This
assumption, however, is incorrect in the case of software to be optimized for a
given microprocessor, e.g., in compiling switch statements or in fine-tuning
program bottlenecks. The operation of the microprocessor generally means that
the cost for the more likely decision outcome can or will be less -- often far
less -- than the less likely decision outcome. Here we formulate a variety of
$O(n^3)$-time $O(n^2)$-space dynamic programming algorithms to solve such
optimal binary decision tree problems, optimizing for the behavior of
processors with predictive branch capabilities, both static and dynamic. In the
static case, we use existing results to arrive at entropy-based performance
bounds. Solutions to this formulation are often faster in practice than
``optimal'' decision trees as formulated in the literature, and, for small
problems, are easily worth the extra complexity in finding the better solution.
This can be applied in fast implementation of decoding Huffman codes.
|
[
{
"version": "v1",
"created": "Thu, 9 Nov 2006 03:57:33 GMT"
},
{
"version": "v2",
"created": "Tue, 17 Apr 2007 04:38:31 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Baer",
"Michael B.",
""
]
] |
cs/0611038
|
Chengshi Liu
|
Chengshi Liu
|
Nonsymmetric entropy I: basic concepts and results
|
5 pages
| null | null | null |
cs.IT math.IT
| null |
A new concept named nonsymmetric entropy which generalizes the concepts of
Boltzman's entropy and shannon's entropy, was introduced. Maximal nonsymmetric
entropy principle was proven. Some important distribution laws were derived
naturally from maximal nonsymmetric entropy principle.
|
[
{
"version": "v1",
"created": "Thu, 9 Nov 2006 07:03:44 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Chengshi",
""
]
] |
cs/0611043
|
Young-Han Kim
|
Young-Han Kim, Seung-Jean Kim
|
On the Convexity of log det (I + K X^{-1})
|
2 pages
| null | null | null |
cs.IT math.IT
| null |
A simple proof is given for the convexity of log det (I+K X^{-1}) in the
positive definite matrix variable X with a given positive semidefinite K.
|
[
{
"version": "v1",
"created": "Fri, 10 Nov 2006 06:41:52 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Kim",
"Young-Han",
""
],
[
"Kim",
"Seung-Jean",
""
]
] |
cs/0611054
|
James P. Crutchfield
|
Christopher C. Strelioff and James P. Crutchfield
|
How Random is a Coin Toss? Bayesian Inference and the Symbolic Dynamics
of Deterministic Chaos
|
8 pages, 1 figure; http://cse.ucdavis.edu/~cmg/compmech/pubs/hrct.htm
| null | null | null |
cs.LG cs.IT math.IT nlin.CD
| null |
Symbolic dynamics has proven to be an invaluable tool in analyzing the
mechanisms that lead to unpredictability and random behavior in nonlinear
dynamical systems. Surprisingly, a discrete partition of continuous state space
can produce a coarse-grained description of the behavior that accurately
describes the invariant properties of an underlying chaotic attractor. In
particular, measures of the rate of information production--the topological and
metric entropy rates--can be estimated from the outputs of Markov or generating
partitions. Here we develop Bayesian inference for k-th order Markov chains as
a method to finding generating partitions and estimating entropy rates from
finite samples of discretized data produced by coarse-grained dynamical
systems.
|
[
{
"version": "v1",
"created": "Mon, 13 Nov 2006 23:28:12 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Strelioff",
"Christopher C.",
""
],
[
"Crutchfield",
"James P.",
""
]
] |
cs/0611070
|
Olivier Leveque
|
Ayfer Ozgur, Olivier Leveque, David Tse
|
Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc
Networks
|
56 pages, 16 figures, submitted to IEEE Transactions on Information
Theory
| null | null | null |
cs.IT math.IT
| null |
n source and destination pairs randomly located in an area want to
communicate with each other. Signals transmitted from one user to another at
distance r apart are subject to a power loss of r^{-alpha}, as well as a random
phase. We identify the scaling laws of the information theoretic capacity of
the network. In the case of dense networks, where the area is fixed and the
density of nodes increasing, we show that the total capacity of the network
scales linearly with n. This improves on the best known achievability result of
n^{2/3} of Aeron and Saligrama, 2006. In the case of extended networks, where
the density of nodes is fixed and the area increasing linearly with n, we show
that this capacity scales as n^{2-alpha/2} for 2<alpha<3 and sqrt{n} for
alpha>3. The best known earlier result (Xie and Kumar 2006) identified the
scaling law for alpha > 4. Thus, much better scaling than multihop can be
achieved in dense networks, as well as in extended networks with low
attenuation. The performance gain is achieved by intelligent node cooperation
and distributed MIMO communication. The key ingredient is a hierarchical and
digital architecture for nodal exchange of information for realizing the
cooperation.
|
[
{
"version": "v1",
"created": "Wed, 15 Nov 2006 12:59:43 GMT"
},
{
"version": "v2",
"created": "Thu, 16 Nov 2006 08:28:14 GMT"
},
{
"version": "v3",
"created": "Mon, 12 Feb 2007 14:38:40 GMT"
},
{
"version": "v4",
"created": "Tue, 12 Jun 2007 13:06:47 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ozgur",
"Ayfer",
""
],
[
"Leveque",
"Olivier",
""
],
[
"Tse",
"David",
""
]
] |
cs/0611081
|
Rubens Ramos Viana
|
Rubens Viana Ramos
|
The Importance of the Algorithmic Information Theory to Construct a
Possible Example Where NP # P - II: An Irreducible Sentence
|
2 pages
| null | null | null |
cs.CC cs.IT math.IT
| null |
In this short communication it is discussed the relation between disentangled
states and algorithmic information theory aiming to construct an irreducible
sentence whose length increases in a non-polynomial way when the number of
qubits increases.
|
[
{
"version": "v1",
"created": "Thu, 16 Nov 2006 17:23:47 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Dec 2006 16:35:21 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ramos",
"Rubens Viana",
""
]
] |
cs/0611086
|
Emin Gabrielyan
|
Emin Gabrielyan, Roger D. Hersch
|
Reliable Multi-Path Routing Schemes for Real-Time Streaming
|
Emin Gabrielyan, "Reliable Multi-Path Routing Schemes for Voice over
Packet Networks", ICDT'06, International Conference on Digital
Telecommunications, Cote d'Azur, France, 29-31 August 2006, pp. 65-72
| null | null | null |
cs.NI cs.IT math.IT
| null |
In off-line streaming, packet level erasure resilient Forward Error
Correction (FEC) codes rely on the unrestricted buffering time at the receiver.
In real-time streaming, the extremely short playback buffering time makes FEC
inefficient for protecting a single path communication against long link
failures. It has been shown that one alternative path added to a single path
route makes packet level FEC applicable even when the buffering time is
limited. Further path diversity, however, increases the number of underlying
links increasing the total link failure rate, requiring from the sender
possibly more FEC packets. We introduce a scalar coefficient for rating a
multi-path routing topology of any complexity. It is called Redundancy Overall
Requirement (ROR) and is proportional to the total number of adaptive FEC
packets required for protection of the communication. With the capillary
routing algorithm, introduced in this paper we build thousands of multi-path
routing patterns. By computing their ROR coefficients, we show that contrary to
the expectations the overall requirement in FEC codes is reduced when the
further diversity of dual-path routing is achieved by the capillary routing
algorithm.
|
[
{
"version": "v1",
"created": "Fri, 17 Nov 2006 20:36:00 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Gabrielyan",
"Emin",
""
],
[
"Hersch",
"Roger D.",
""
]
] |
cs/0611089
|
Thomas Halford
|
Thomas R. Halford and Keith M. Chugg
|
The Extraction and Complexity Limits of Graphical Models for Linear
Codes
|
18 pages, submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
Two broad classes of graphical modeling problems for codes can be identified
in the literature: constructive and extractive problems. The former class of
problems concern the construction of a graphical model in order to define a new
code. The latter class of problems concern the extraction of a graphical model
for a (fixed) given code. The design of a new low-density parity-check code for
some given criteria (e.g. target block length and code rate) is an example of a
constructive problem. The determination of a graphical model for a classical
linear block code which implies a decoding algorithm with desired performance
and complexity characteristics is an example of an extractive problem. This
work focuses on extractive graphical model problems and aims to lay out some of
the foundations of the theory of such problems for linear codes.
The primary focus of this work is a study of the space of all graphical
models for a (fixed) given code. The tradeoff between cyclic topology and
complexity in this space is characterized via the introduction of a new bound:
the tree-inducing cut-set bound. The proposed bound provides a more precise
characterization of this tradeoff than that which can be obtained using
existing tools (e.g. the Cut-Set Bound) and can be viewed as a generalization
of the square-root bound for tail-biting trellises to graphical models with
arbitrary cyclic topologies. Searching the space of graphical models for a
given code is then enabled by introducing a set of basic graphical model
transformation operations which are shown to span this space. Finally,
heuristics for extracting novel graphical models for linear block codes using
these transformations are investigated.
|
[
{
"version": "v1",
"created": "Sat, 18 Nov 2006 00:17:14 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Halford",
"Thomas R.",
""
],
[
"Chugg",
"Keith M.",
""
]
] |
cs/0611095
|
Nan Liu
|
Nan Liu and Sennur Ulukus
|
Dense Gaussian Sensor Networks: Minimum Achievable Distortion and the
Order Optimality of Separation
|
submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
We investigate the optimal performance of dense sensor networks by studying
the joint source-channel coding problem. The overall goal of the sensor network
is to take measurements from an underlying random process, code and transmit
those measurement samples to a collector node in a cooperative multiple access
channel with potential feedback, and reconstruct the entire random process at
the collector node. We provide lower and upper bounds for the minimum
achievable expected distortion when the underlying random process is Gaussian.
When the Gaussian random process satisfies some general conditions, we evaluate
the lower and upper bounds explicitly, and show that they are of the same order
for a wide range of power constraints. Thus, for these random processes, under
these power constraints, we express the minimum achievable expected distortion
as a function of the power constraint. Further, we show that the achievability
scheme that achieves the lower bound on the distortion is a separation-based
scheme that is composed of multi-terminal rate-distortion coding and
amplify-and-forward channel coding. Therefore, we conclude that separation is
order-optimal for the dense Gaussian sensor network scenario under
consideration, when the underlying random process satisfies some general
conditions.
|
[
{
"version": "v1",
"created": "Mon, 20 Nov 2006 15:19:23 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Liu",
"Nan",
""
],
[
"Ulukus",
"Sennur",
""
]
] |
cs/0611096
|
Jacob Binia
|
Jacob Binia
|
On the Rate Distortion Function of Certain Sources with a Proportional
Mean-Square Error Distortion Measure
|
Submitted to the IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
New bounds on the rate distortion function of certain non-Gaussian sources,
with a proportional-weighted mean-square error (MSE) distortion measure, are
given. The growth, g, of the rate distortion function, as a result of changing
from a non-weighted MSE distortion measure to a proportional-weighted
distortion criterion is analyzed. It is shown that for a small distortion, d,
the growth, g, and the difference between the rate distortion functions of a
Gaussian memoryless source and a source with memory, both with the same
marginal statistics and MSE distortion measure, share the same lower bound.
Several examples and applications are also given.
|
[
{
"version": "v1",
"created": "Mon, 20 Nov 2006 15:57:57 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Binia",
"Jacob",
""
]
] |
cs/0611097
|
Thomas Halford
|
Thomas R. Halford and Keith M. Chugg
|
Conditionally Cycle-Free Generalized Tanner Graphs: Theory and
Application to High-Rate Serially Concatenated Codes
|
5 pages, minor revisions, to be presented at the 2007 IEEE Int'l
Symposium on Information Theory
| null | null | null |
cs.IT math.IT
| null |
Generalized Tanner graphs have been implicitly studied by a number of authors
under the rubric of generalized parity-check matrices. This work considers the
conditioning of binary hidden variables in such models in order to break all
cycles and thus derive optimal soft-in soft-out (SISO) decoding algorithms.
Conditionally cycle-free generalized Tanner graphs are shown to imply optimal
SISO decoding algorithms for the first order Reed-Muller codes and their duals
- the extended Hamming codes - which are substantially less complex than
conventional bit-level trellis decoding. The study of low-complexity optimal
SISO decoding algorithms for the family of extended Hamming codes is
practically motivated. Specifically, it is shown that exended Hamming codes
offer an attractive alternative to high-rate convolutional codes in terms of
both performance and complexity for use in very high-rate, very low-floor,
serially concatenated coding schemes.
|
[
{
"version": "v1",
"created": "Mon, 20 Nov 2006 18:42:07 GMT"
},
{
"version": "v2",
"created": "Mon, 26 Mar 2007 19:22:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Halford",
"Thomas R.",
""
],
[
"Chugg",
"Keith M.",
""
]
] |
cs/0611112
|
Ali Pusane
|
Daniel J. Costello Jr., and G. David Forney Jr
|
Channel Coding: The Road to Channel Capacity
| null | null | null | null |
cs.IT math.IT
| null |
Starting from Shannon's celebrated 1948 channel coding theorem, we trace the
evolution of channel coding from Hamming codes to capacity-approaching codes.
We focus on the contributions that have led to the most significant
improvements in performance vs. complexity for practical applications,
particularly on the additive white Gaussian noise (AWGN) channel. We discuss
algebraic block codes, and why they did not prove to be the way to get to the
Shannon limit. We trace the antecedents of today's capacity-approaching codes:
convolutional codes, concatenated codes, and other probabilistic coding
schemes. Finally, we sketch some of the practical applications of these codes.
|
[
{
"version": "v1",
"created": "Wed, 22 Nov 2006 01:10:58 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Costello",
"Daniel J.",
"Jr."
],
[
"Forney",
"G. David",
"Jr"
]
] |
cs/0611114
|
Ping Li
|
Ping Li
|
Very Sparse Stable Random Projections, Estimators and Tail Bounds for
Stable Random Projections
| null | null | null | null |
cs.DS cs.IT cs.LG math.IT
| null |
This paper will focus on three different aspects in improving the current
practice of stable random projections.
Firstly, we propose {\em very sparse stable random projections} to
significantly reduce the processing and storage cost, by replacing the
$\alpha$-stable distribution with a mixture of a symmetric $\alpha$-Pareto
distribution (with probability $\beta$, $0<\beta\leq1$) and a point mass at the
origin (with a probability $1-\beta$). This leads to a significant
$\frac{1}{\beta}$-fold speedup for small $\beta$.
Secondly, we provide an improved estimator for recovering the original
$l_\alpha$ norms from the projected data. The standard estimator is based on
the (absolute) sample median, while we suggest using the geometric mean. The
geometric mean estimator we propose is strictly unbiased and is easier to
study. Moreover, the geometric mean estimator is more accurate, especially
non-asymptotically.
Thirdly, we provide an adequate answer to the basic question of how many
projections (samples) are needed for achieving some pre-specified level of
accuracy. \cite{Proc:Indyk_FOCS00,Article:Indyk_TKDE03} did not provide a
criterion that can be used in practice. The geometric mean estimator we propose
allows us to derive sharp tail bounds which can be expressed in exponential
forms with constants explicitly given.
|
[
{
"version": "v1",
"created": "Wed, 22 Nov 2006 11:38:25 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Dec 2006 14:55:06 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Li",
"Ping",
""
]
] |
cs/0611120
|
Matthieu Bloch
|
Matthieu Bloch, Joao Barros, Miguel R. D. Rodrigues, and Steven W.
McLaughlin
|
Wireless Information-Theoretic Security - Part I: Theoretical Aspects
|
27 pages, 14 figures, submitted to Special Issue of IEEE Trans. on
Info. Theory on Information Theoretic Security
| null | null | null |
cs.IT math.IT
| null |
In this two-part paper, we consider the transmission of confidential data
over wireless wiretap channels. The first part presents an
information-theoretic problem formulation in which two legitimate partners
communicate over a quasi-static fading channel and an eavesdropper observes
their transmissions through another independent quasi-static fading channel. We
define the secrecy capacity in terms of outage probability and provide a
complete characterization of the maximum transmission rate at which the
eavesdropper is unable to decode any information. In sharp contrast with known
results for Gaussian wiretap channels (without feedback), our contribution
shows that in the presence of fading information-theoretic security is
achievable even when the eavesdropper has a better average signal-to-noise
ratio (SNR) than the legitimate receiver - fading thus turns out to be a friend
and not a foe. The issue of imperfect channel state information is also
addressed. Practical schemes for wireless information-theoretic security are
presented in Part II, which in some cases comes close to the secrecy capacity
limits given in this paper.
|
[
{
"version": "v1",
"created": "Wed, 22 Nov 2006 22:54:46 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Bloch",
"Matthieu",
""
],
[
"Barros",
"Joao",
""
],
[
"Rodrigues",
"Miguel R. D.",
""
],
[
"McLaughlin",
"Steven W.",
""
]
] |
cs/0611121
|
Matthieu Bloch
|
Matthieu Bloch, Joao Barros, Miguel R. D. Rodrigues and Steven W.
McLaughlin
|
Wireless Information-Theoretic Security - Part II: Practical
Implementation
|
25 pages, 11 figures, submitted to Special Issue of IEEE Trans. on
Info. Theory on Information Theoretic Security
| null | null | null |
cs.IT math.IT
| null |
In Part I of this two-part paper on confidential communication over wireless
channels, we studied the fundamental security limits of quasi-static fading
channels from the point of view of outage secrecy capacity with perfect and
imperfect channel state information. In Part II, we develop a practical secret
key agreement protocol for Gaussian and quasi-static fading wiretap channels.
The protocol uses a four-step procedure to secure communications: establish
common randomness via an opportunistic transmission, perform message
reconciliation, establish a common key via privacy amplification, and use of
the key. We introduce a new reconciliation procedure that uses multilevel
coding and optimized low density parity check codes which in some cases comes
close to achieving the secrecy capacity limits established in Part I. Finally,
we develop new metrics for assessing average secure key generation rates and
show that our protocol is effective in secure key renewal.
|
[
{
"version": "v1",
"created": "Fri, 24 Nov 2006 04:54:32 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Bloch",
"Matthieu",
""
],
[
"Barros",
"Joao",
""
],
[
"Rodrigues",
"Miguel R. D.",
""
],
[
"McLaughlin",
"Steven W.",
""
]
] |
cs/0611123
|
Maya Gupta
|
B. A. Frigyik, S. Srivastava, and M. R. Gupta
|
Functional Bregman Divergence and Bayesian Estimation of Distributions
|
26 pages, 1 figure
| null | null | null |
cs.IT cs.LG math.IT
| null |
A class of distortions termed functional Bregman divergences is defined,
which includes squared error and relative entropy. A functional Bregman
divergence acts on functions or distributions, and generalizes the standard
Bregman divergence for vectors and a previous pointwise Bregman divergence that
was defined for functions. A recently published result showed that the mean
minimizes the expected Bregman divergence. The new functional definition
enables the extension of this result to the continuous case to show that the
mean minimizes the expected functional Bregman divergence over a set of
functions or distributions. It is shown how this theorem applies to the
Bayesian estimation of distributions. Estimation of the uniform distribution
from independent and identically drawn samples is used as a case study.
|
[
{
"version": "v1",
"created": "Thu, 23 Nov 2006 19:12:30 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Frigyik",
"B. A.",
""
],
[
"Srivastava",
"S.",
""
],
[
"Gupta",
"M. R.",
""
]
] |
cs/0611125
|
Yasutada Oohama
|
Yasutada Oohama
|
Relay Channels with Confidential Messages
|
20 pages, 6 figures, submitted to IEEE Transactions on Information
Theory, Special issue on Information Theoretic Security
| null | null | null |
cs.IT math.IT
| null |
We consider a relay channel where a relay helps the transmission of messages
from one sender to one receiver. The relay is considered not only as a sender
that helps the message transmission but as a wire-tapper who can obtain some
knowledge about the transmitted messages. In this paper we study the coding
problem of the relay channel under the situation that some of transmitted
messages are confidential to the relay. A security of such confidential
messages is measured by the conditional entropy. The rate region is defined by
the set of transmission rates for which messages are reliably transmitted and
the security of confidential messages is larger than a prescribed level. In
this paper we give two definition of the rate region. We first define the rate
region in the case of deterministic encoder and call it the deterministic rate
region. Next, we define the rate region in the case of stochastic encoder and
call it the stochastic rate region. We derive explicit inner and outer bounds
for the above two rate regions and present a class of relay channels where two
bounds match. Furthermore, we show that stochastic encoder can enlarge the rate
region. We also evaluate the deterministic rate region of the Gaussian relay
channel with confidential messages.
|
[
{
"version": "v1",
"created": "Fri, 24 Nov 2006 12:39:46 GMT"
},
{
"version": "v2",
"created": "Mon, 27 Nov 2006 09:37:21 GMT"
},
{
"version": "v3",
"created": "Tue, 5 Dec 2006 11:15:29 GMT"
},
{
"version": "v4",
"created": "Thu, 21 Dec 2006 12:26:23 GMT"
},
{
"version": "v5",
"created": "Mon, 19 Feb 2007 13:22:09 GMT"
},
{
"version": "v6",
"created": "Wed, 21 Feb 2007 15:21:39 GMT"
},
{
"version": "v7",
"created": "Sat, 24 Mar 2007 12:22:17 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Oohama",
"Yasutada",
""
]
] |
cs/0611129
|
Neri Merhav
|
Neri Merhav
|
Shannon's secrecy system with informed receivers and its application to
systematic coding for wiretapped channels
| null | null | null | null |
cs.IT math.IT
| null |
Shannon's secrecy system is studied in a setting, where both the legitimate
decoder and the wiretapper have access to side information sequences correlated
to the source, but the wiretapper receives both the coded information and the
side information via channels that are more noisy than the respective channels
of the legitmate decoder, which in turn, also shares a secret key with the
encoder. A single--letter characterization is provided for the achievable
region in the space of five figures of merit: the equivocation at the
wiretapper, the key rate, the distortion of the source reconstruction at the
legitimate receiver, the bandwidth expansion factor of the coded channels, and
the average transmission cost (generalized power). Beyond the fact that this is
an extension of earlier studies, it also provides a framework for studying
fundamental performance limits of systematic codes in the presence of a wiretap
channel. The best achievable performance of systematic codes is then compared
to that of a general code in several respects, and a few examples are given.
|
[
{
"version": "v1",
"created": "Sun, 26 Nov 2006 09:34:45 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Merhav",
"Neri",
""
]
] |
cs/0611144
|
Lei Ying
|
Lei Ying, Sichao Yang and R. Srikant
|
Coding Improves the Optimal Delay-Throughput Trade-offs in Mobile Ad-Hoc
Networks: Two-Dimensional I.I.D. Mobility Models
|
Minor changes
| null | null | null |
cs.NI cs.IT math.IT
| null |
In this paper, we investigate the delay-throughput trade-offs in mobile
ad-hoc networks under two-dimensional i.i.d. mobility models. We consider two
mobility time-scales: (i) Fast mobility where node mobility is at the same
time-scale as data transmissions; (ii) Slow mobility where node mobility is
assumed to occur at a much slower time-scale than data transmissions. Given a
delay constraint $D,$ the main results are as follows: (1) For the
two-dimensional i.i.d. mobility model with fast mobiles, the maximum throughput
per source-destination (S-D) pair is shown to be $O(\sqrt{D/n}),$ where $n$ is
the number of mobiles. (2) For the two-dimensional i.i.d. mobility model with
slow mobiles, the maximum throughput per S-D pair is shown to be
$O(\sqrt[3]{D/n}).$ (3) For each case, we propose a joint coding-scheduling
algorithm to achieve the optimal delay-throughput trade-offs.
|
[
{
"version": "v1",
"created": "Wed, 29 Nov 2006 01:29:04 GMT"
},
{
"version": "v2",
"created": "Fri, 1 Dec 2006 18:15:33 GMT"
},
{
"version": "v3",
"created": "Fri, 1 Dec 2006 22:40:07 GMT"
},
{
"version": "v4",
"created": "Sat, 9 Dec 2006 16:03:00 GMT"
},
{
"version": "v5",
"created": "Sat, 24 Mar 2007 03:52:43 GMT"
},
{
"version": "v6",
"created": "Wed, 2 May 2007 15:18:20 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ying",
"Lei",
""
],
[
"Yang",
"Sichao",
""
],
[
"Srikant",
"R.",
""
]
] |
cs/0611156
|
K Vinodh
|
Petros Elia, K. Vinodh, M. Anand and P. Vijay Kumar
|
D-MG Tradeoff and Optimal Codes for a Class of AF and DF Cooperative
Communication Protocols
|
17 pages, 5 figures
| null | null | null |
cs.IT math.IT
| null |
We consider cooperative relay communication in a fading channel environment
under the Orthogonal Amplify and Forward (OAF) and Orthogonal and
Non-Orthogonal Selection Decode and Forward (OSDF and NSDF) protocols. For all
these protocols, we compute the Diversity-Multiplexing Gain Tradeoff (DMT). We
construct DMT optimal codes for the protocols which are sphere decodable and,
in certain cases, incur minimum possible delay. Our results establish that the
DMT of the OAF protocol is identical to the DMT of the Non-Orthogonal Amplify
and Forward (NAF) protocol. Two variants of the NSDF protocol are considered:
fixed-NSDF and variable-NSDF protocol. In the variable-NSDF protocol, the
fraction of time duration for which the source alone transmits is allowed to
vary with the rate of communication. Among the class of static
amplify-and-forward and decode-and-forward protocols, the variable-NSDF
protocol is shown to have the best known DMT for any number of relays apart
from the two-relay case. When there are two relays, the variable-NSDF protocol
is shown to improve on the DMT of the best previously-known protocol for higher
values of the multiplexing gain. Our results also establish that the fixed-NSDF
protocol has a better DMT than the NAF protocol for any number of relays.
Finally, we present a DMT optimal code construction for the NAF protocol.
|
[
{
"version": "v1",
"created": "Thu, 30 Nov 2006 07:26:10 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Elia",
"Petros",
""
],
[
"Vinodh",
"K.",
""
],
[
"Anand",
"M.",
""
],
[
"Kumar",
"P. Vijay",
""
]
] |
cs/0612011
|
Hua Xiao
|
Hua Xiao, Amir H. Banihashemi
|
Estimation of Bit and Frame Error Rates of Low-Density Parity-Check
Codes on Binary Symmetric Channels
|
15 pages, 5 figures, submitted to IEEE Transactions on Communications
on Apr. 24, 2006, revised on Oct. 31, 2006 and Jan. 30, 2007
| null | null | null |
cs.IT math.IT
| null |
A method for estimating the performance of low-density parity-check (LDPC)
codes decoded by hard-decision iterative decoding algorithms on binary
symmetric channels (BSC) is proposed. Based on the enumeration of the smallest
weight error patterns that can not be all corrected by the decoder, this method
estimates both the frame error rate (FER) and the bit error rate (BER) of a
given LDPC code with very good precision for all crossover probabilities of
practical interest. Through a number of examples, we show that the proposed
method can be effectively applied to both regular and irregular LDPC codes and
to a variety of hard-decision iterative decoding algorithms. Compared with the
conventional Monte Carlo simulation, the proposed method has a much smaller
computational complexity, particularly for lower error rates.
|
[
{
"version": "v1",
"created": "Sun, 3 Dec 2006 03:07:25 GMT"
},
{
"version": "v2",
"created": "Wed, 31 Jan 2007 22:04:37 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Xiao",
"Hua",
""
],
[
"Banihashemi",
"Amir H.",
""
]
] |
cs/0612024
|
Guanding Yu
|
Peng Cheng, Guanding Yu, Zhaoyang Zhang, Hsiao-Hwa Chen and Peiliang
Qiu
|
On the Maximum Sum-rate Capacity of Cognitive Multiple Access Channel
|
3 pages, 4 figures
| null | null | null |
cs.IT math.IT
| null |
We consider the communication scenario where multiple cognitive users wish to
communicate to the same receiver, in the presence of primary transmission. The
cognitive transmitters are assumed to have the side information about the
primary transmission. The capacity region of cognitive users is formulated
under the constraint that the capacity of primary transmission is not changed
as if no cognitive users exist. Moreover, the maximum sum-rate point of the
capacity region is characterized, by optimally allocating the power of each
cognitive user to transmit its own information.
|
[
{
"version": "v1",
"created": "Tue, 5 Dec 2006 05:27:28 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Cheng",
"Peng",
""
],
[
"Yu",
"Guanding",
""
],
[
"Zhang",
"Zhaoyang",
""
],
[
"Chen",
"Hsiao-Hwa",
""
],
[
"Qiu",
"Peiliang",
""
]
] |
cs/0612027
|
Igor Grabec
|
Igor Grabec
|
Experimental Information and Statistical Modeling of Physical Laws
|
an article submitted to "IEEE Transactions on Information Theory"
| null | null | null |
cs.IT cs.IR math.IT
| null |
Statistical modeling of physical laws connects experiments with mathematical
descriptions of natural phenomena. The modeling is based on the probability
density of measured variables expressed by experimental data via a kernel
estimator. As an objective kernel the scattering function determined by
calibration of the instrument is introduced. This function provides for a new
definition of experimental information and redundancy of experimentation in
terms of information entropy. The redundancy increases with the number of
experiments, while the experimental information converges to a value that
describes the complexity of the data. The difference between the redundancy and
the experimental information is proposed as the model cost function. From its
minimum, a proper number of data in the model is estimated. As an optimal,
nonparametric estimator of the relation between measured variables the
conditional average extracted from the kernel estimator is proposed. The
modeling is demonstrated on noisy chaotic data.
|
[
{
"version": "v1",
"created": "Tue, 5 Dec 2006 13:08:24 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Grabec",
"Igor",
""
]
] |
cs/0612044
|
Lifeng Lai
|
Lifeng Lai and Hesham El Gamal
|
The Relay-Eavesdropper Channel: Cooperation for Secrecy
|
33 pages, submitted to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
This paper establishes the utility of user cooperation in facilitating secure
wireless communications. In particular, the four-terminal relay-eavesdropper
channel is introduced and an outer-bound on the optimal rate-equivocation
region is derived. Several cooperation strategies are then devised and the
corresponding achievable rate-equivocation region are characterized. Of
particular interest is the novel Noise-Forwarding (NF) strategy, where the
relay node sends codewords independent of the source message to confuse the
eavesdropper. This strategy is used to illustrate the deaf helper phenomenon,
where the relay is able to facilitate secure communications while being totally
ignorant of the transmitted messages. Furthermore, NF is shown to increase the
secrecy capacity in the reversely degraded scenario, where the relay node fails
to offer performance gains in the classical setting. The gain offered by the
proposed cooperation strategies is then proved theoretically and validated
numerically in the additive White Gaussian Noise (AWGN) channel.
|
[
{
"version": "v1",
"created": "Thu, 7 Dec 2006 17:15:14 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Lai",
"Lifeng",
""
],
[
"Gamal",
"Hesham El",
""
]
] |
cs/0612053
|
Xiaofei Huang
|
Xiaofei Huang, Xiaowu Huang
|
Deriving Schrodinger Equation From A Soft-Decision Iterative Decoding
Algorithm
|
An extended abstract version of this paper has been presented at
International Conference on Quantum Foundation and Technology, August, 2006,
HangZhou, China (ICQFT'06)
| null | null | null |
cs.IT math.IT
| null |
The belief propagation algorithm has been recognized in the information
theory community as a soft-decision iterative decoding algorithm. It is the
most powerful algorithm found so far for attacking hard optimization problems
in channel decoding. Quantum mechanics is the foundation of modern physics with
the time-independent Schrodinger equation being one of the most important
equations. This paper shows that the equation can be derived from a generalized
belief propagation algorithm. Such a connection on a mathematical basis might
shed new insights into the foundations of quantum mechanics and quantum
computing.
|
[
{
"version": "v1",
"created": "Fri, 8 Dec 2006 18:06:29 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Huang",
"Xiaofei",
""
],
[
"Huang",
"Xiaowu",
""
]
] |
cs/0612067
|
Jianwen Zhang
|
Jianwen Zhang, Marc A. Armand
|
Retrieving Reed-Solomon coded data under interpolation-based list
decoding
|
10 pages. Submitted to IEEE information theory for possible
publication
| null | null | null |
cs.IT math.IT
| null |
A transform that enables generator-matrix-based Reed-Solomon (RS) coded data
to be recovered under interpolation-based list decoding is presented. The
transform matrix needs to be computed only once and the transformation of an
element from the output list to the desired RS coded data block incurs $k^{2}$
field multiplications, given a code of dimension $k$.
|
[
{
"version": "v1",
"created": "Tue, 12 Dec 2006 05:08:05 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Zhang",
"Jianwen",
""
],
[
"Armand",
"Marc A.",
""
]
] |
cs/0612075
|
Sujay Sanghavi
|
Sujay Sanghavi
|
Intermediate Performance of Rateless Codes
| null | null | null | null |
cs.IT math.IT
| null |
Rateless/fountain codes are designed so that all input symbols can be
recovered from a slightly larger number of coded symbols, with high probability
using an iterative decoder. In this paper we investigate the number of input
symbols that can be recovered by the same decoder, but when the number of coded
symbols available is less than the total number of input symbols. Of course
recovery of all inputs is not possible, and the fraction that can be recovered
will depend on the output degree distribution of the code.
In this paper we (a) outer bound the fraction of inputs that can be recovered
for any output degree distribution of the code, and (b) design degree
distributions which meet/perform close to this bound. Our results are of
interest for real-time systems using rateless codes, and for Raptor-type
two-stage designs.
|
[
{
"version": "v1",
"created": "Fri, 15 Dec 2006 04:18:56 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sanghavi",
"Sujay",
""
]
] |
cs/0612076
|
Walid Hachem
|
Walid Hachem (LTCI), Oleksiy Khorunzhiy, Philippe Loubaton
(IGM-LabInfo), Jamal Najim (LTCI), Leonid Pastur
|
A New Approach for Capacity Analysis of Large Dimensional Multi-Antenna
Channels
| null | null | null | null |
cs.IT math.IT math.PR
| null |
This paper adresses the behaviour of the mutual information of correlated
MIMO Rayleigh channels when the numbers of transmit and receive antennas
converge to infinity at the same rate. Using a new and simple approach based on
Poincar\'{e}-Nash inequality and on an integration by parts formula, it is
rigorously established that the mutual information converges to a Gaussian
random variable whose mean and variance are evaluated. These results confirm
previous evaluations based on the powerful but non rigorous replica method. It
is believed that the tools that are used in this paper are simple, robust, and
of interest for the communications engineering community.
|
[
{
"version": "v1",
"created": "Fri, 15 Dec 2006 15:34:38 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Hachem",
"Walid",
"",
"LTCI"
],
[
"Khorunzhiy",
"Oleksiy",
"",
"IGM-LabInfo"
],
[
"Loubaton",
"Philippe",
"",
"IGM-LabInfo"
],
[
"Najim",
"Jamal",
"",
"LTCI"
],
[
"Pastur",
"Leonid",
""
]
] |
cs/0612078
|
Wei Dai
|
Wei Dai, Youjian Liu, Brian Rider
|
Effect of Finite Rate Feedback on CDMA Signature Optimization and MIMO
Beamforming Vector Selection
|
24 pages, submitted to IEEE Trans. on Information Theory
| null | null | null |
cs.IT math.IT
| null |
We analyze the effect of finite rate feedback on CDMA (code-division multiple
access) signature optimization and MIMO (multi-input-multi-output) beamforming
vector selection. In CDMA signature optimization, for a particular user, the
receiver selects a signature vector from a codebook to best avoid interference
from other users, and then feeds the corresponding index back to the specified
user. For MIMO beamforming vector selection, the receiver chooses a beamforming
vector from a given codebook to maximize throughput, and feeds back the
corresponding index to the transmitter. These two problems are dual: both can
be modeled as selecting a unit norm vector from a finite size codebook to
"match" a randomly generated Gaussian matrix. In signature optimization, the
least match is required while the maximum match is preferred for beamforming
selection.
Assuming that the feedback link is rate limited, our main result is an exact
asymptotic performance formulae where the length of the signature/beamforming
vector, the dimensions of interference/channel matrix, and the feedback rate
approach infinity with constant ratios. The proof rests on a large deviation
principle over a random matrix ensemble. Further, we show that random codebooks
generated from the isotropic distritution are asymptotically optimal not only
on average, but also with probability one.
|
[
{
"version": "v1",
"created": "Sat, 16 Dec 2006 20:41:32 GMT"
},
{
"version": "v2",
"created": "Fri, 2 Mar 2007 22:47:29 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Dai",
"Wei",
""
],
[
"Liu",
"Youjian",
""
],
[
"Rider",
"Brian",
""
]
] |
cs/0612080
|
Jacob Binia
|
Jacob Binia
|
On the Decrease Rate of the Non-Gaussianness of the Sum of Independent
Random Variables
|
Submitted to the Trasactions of the IEEE on Information Theory
| null | null | null |
cs.IT math.IT
| null |
Several proofs of the monotonicity of the non-Gaussianness (divergence with
respect to a Gaussian random variable with identical second order statistics)
of the sum of n independent and identically distributed (i.i.d.) random
variables were published. We give an upper bound on the decrease rate of the
non-Gaussianness which is proportional to the inverse of n, for large n. The
proof is based on the relationship between non-Gaussianness and minimum
mean-square error (MMSE) and causal minimum mean-square error (CMMSE) in the
time-continuous Gaussian channel.
|
[
{
"version": "v1",
"created": "Sun, 17 Dec 2006 14:52:04 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Binia",
"Jacob",
""
]
] |
cs/0612084
|
Ender Tekin
|
Ender Tekin and Aylin Yener
|
Achievable Rates for the General Gaussian Multiple Access Wire-Tap
Channel with Collective Secrecy
|
Presented at the 44th Annual Allerton Conference on Communication,
Control, and Computing, September 27-29, 2006
| null | null | null |
cs.IT cs.CR math.IT
| null |
We consider the General Gaussian Multiple Access Wire-Tap Channel (GGMAC-WT).
In this scenario, multiple users communicate with an intended receiver in the
presence of an intelligent and informed eavesdropper who is as capable as the
intended receiver, but has different channel parameters. We aim to provide
perfect secrecy for the transmitters in this multi-access environment. Using
Gaussian codebooks, an achievable secrecy region is determined and the power
allocation that maximizes the achievable sum-rate is found. Numerical results
showing the new rate region are presented. It is shown that the multiple-access
nature of the channel may be utilized to allow users with zero single-user
secrecy capacity to be able to transmit in perfect secrecy. In addition, a new
collaborative scheme is shown that may increase the achievable sum-rate. In
this scheme, a user who would not transmit to maximize the sum rate can help
another user who (i) has positive secrecy capacity to increase its rate, or
(ii) has zero secrecy capacity to achieve a positive secrecy capacity.
|
[
{
"version": "v1",
"created": "Mon, 18 Dec 2006 15:33:15 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Tekin",
"Ender",
""
],
[
"Yener",
"Aylin",
""
]
] |
cs/0612087
|
Lester Ingber
|
Lester Ingber
|
Statistical mechanics of neocortical interactions: Portfolio of
Physiological Indicators
| null | null | null | null |
cs.CE cs.IT cs.NE math.IT q-bio.QM
| null |
There are several kinds of non-invasive imaging methods that are used to
collect data from the brain, e.g., EEG, MEG, PET, SPECT, fMRI, etc. It is
difficult to get resolution of information processing using any one of these
methods. Approaches to integrate data sources may help to get better resolution
of data and better correlations to behavioral phenomena ranging from attention
to diagnoses of disease. The approach taken here is to use algorithms developed
for the author's Trading in Risk Dimensions (TRD) code using modern methods of
copula portfolio risk management, with joint probability distributions derived
from the author's model of statistical mechanics of neocortical interactions
(SMNI). The author's Adaptive Simulated Annealing (ASA) code is for
optimizations of training sets, as well as for importance-sampling. Marginal
distributions will be evolved to determine their expected duration and
stability using algorithms developed by the author, i.e., PATHTREE and PATHINT
codes.
|
[
{
"version": "v1",
"created": "Mon, 18 Dec 2006 21:02:03 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Ingber",
"Lester",
""
]
] |
cs/0612101
|
Maxime Guillaud
|
M. Guillaud, M. Debbah, A. L. Moustakas
|
Maximum Entropy MIMO Wireless Channel Models
|
Submitted to IEEE Trans. Information Theory Dec. 2006; 16 pages, 4
figures
| null | null | null |
cs.IT math.IT
| null |
In this contribution, models of wireless channels are derived from the
maximum entropy principle, for several cases where only limited information
about the propagation environment is available. First, analytical models are
derived for the cases where certain parameters (channel energy, average energy,
spatial correlation matrix) are known deterministically. Frequently, these
parameters are unknown (typically because the received energy or the spatial
correlation varies with the user position), but still known to represent
meaningful system characteristics. In these cases, analytical channel models
are derived by assigning entropy-maximizing distributions to these parameters,
and marginalizing them out. For the MIMO case with spatial correlation, we show
that the distribution of the covariance matrices is conveniently handled
through its eigenvalues. The entropy-maximizing distribution of the covariance
matrix is shown to be a Wishart distribution. Furthermore, the corresponding
probability density function of the channel matrix is shown to be described
analytically by a function of the channel Frobenius norm. This technique can
provide channel models incorporating the effect of shadow fading and spatial
correlation between antennas without the need to assume explicit values for
these parameters. The results are compared in terms of mutual information to
the classical i.i.d. Gaussian model.
|
[
{
"version": "v1",
"created": "Wed, 20 Dec 2006 14:41:25 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Guillaud",
"M.",
""
],
[
"Debbah",
"M.",
""
],
[
"Moustakas",
"A. L.",
""
]
] |
cs/0612118
|
Sujay Sanghavi
|
Sujay Sanghavi, Bruce Hajek, and Laurent Massoulie
|
Gossiping with Multiple Messages
|
Accepted to IEEE INFOCOM 2007
| null | null | null |
cs.NI cs.IT math.IT
| null |
This paper investigates the dissemination of multiple pieces of information
in large networks where users contact each other in a random uncoordinated
manner, and users upload one piece per unit time. The underlying motivation is
the design and analysis of piece selection protocols for peer-to-peer networks
which disseminate files by dividing them into pieces. We first investigate
one-sided protocols, where piece selection is based on the states of either the
transmitter or the receiver. We show that any such protocol relying only on
pushes, or alternatively only on pulls, is inefficient in disseminating all
pieces to all users. We propose a hybrid one-sided piece selection protocol --
INTERLEAVE -- and show that by using both pushes and pulls it disseminates $k$
pieces from a single source to $n$ users in $10(k+\log n)$ time, while obeying
the constraint that each user can upload at most one piece in one unit of time,
with high probability for large $n$. An optimal, unrealistic centralized
protocol would take $k+\log_2 n$ time in this setting. Moreover, efficient
dissemination is also possible if the source implements forward erasure coding,
and users push the latest-released coded pieces (but do not pull). We also
investigate two-sided protocols where piece selection is based on the states of
both the transmitter and the receiver. We show that it is possible to
disseminate $n$ pieces to $n$ users in $n+O(\log n)$ time, starting from an
initial state where each user has a unique piece.
|
[
{
"version": "v1",
"created": "Fri, 22 Dec 2006 06:34:18 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Sanghavi",
"Sujay",
""
],
[
"Hajek",
"Bruce",
""
],
[
"Massoulie",
"Laurent",
""
]
] |
cs/0612122
|
Joerg Wagner
|
Joerg Wagner, Boris Rankov, and Armin Wittneben
|
Large N Analysis of Amplify-and-Forward MIMO Relay Channels with
Correlated Rayleigh Fading
|
submitted for publication to IEEE Transactions on Information Theory
| null | null | null |
cs.IT math.IT
| null |
In this correspondence the cumulants of the mutual information of the flat
Rayleigh fading amplify-and-forward MIMO relay channel without direct link
between source and destination are derived in the large array limit. The
analysis is based on the replica trick and covers both spatially independent
and correlated fading in the first and the second hop, while beamforming at all
terminals is restricted to deterministic weight matrices. Expressions for mean
and variance of the mutual information are obtained. Their parameters are
determined by a nonlinear equation system. All higher cumulants are shown to
vanish as the number of antennas n goes to infinity. In conclusion the
distribution of the mutual information I becomes Gaussian in the large n limit
and is completely characterized by the expressions obtained for mean and
variance of I. Comparisons with simulation results show that the asymptotic
results serve as excellent approximations for systems with only few antennas at
each node. The derivation of the results follows the technique formalized by
Moustakas et al. in [1]. Although the evaluations are more involved for the
MIMO relay channel compared to point-to-point MIMO channels, the structure of
the results is surprisingly simple again. In particular an elegant formula for
the mean of the mutual information is obtained, i.e., the ergodic capacity of
the two-hop amplify-and-forward MIMO relay channel without direct link.
|
[
{
"version": "v1",
"created": "Fri, 22 Dec 2006 15:42:57 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Wagner",
"Joerg",
""
],
[
"Rankov",
"Boris",
""
],
[
"Wittneben",
"Armin",
""
]
] |
cs/0612124
|
Emmanuel Candes
|
Emmanuel J. Candes and Paige A. Randall
|
Highly robust error correction by convex programming
|
23 pages, 2 figures
| null | null | null |
cs.IT math.IT math.PR math.ST stat.TH
| null |
This paper discusses a stylized communications problem where one wishes to
transmit a real-valued signal x in R^n (a block of n pieces of information) to
a remote receiver. We ask whether it is possible to transmit this information
reliably when a fraction of the transmitted codeword is corrupted by arbitrary
gross errors, and when in addition, all the entries of the codeword are
contaminated by smaller errors (e.g. quantization errors).
We show that if one encodes the information as Ax where A is a suitable m by
n coding matrix (m >= n), there are two decoding schemes that allow the
recovery of the block of n pieces of information x with nearly the same
accuracy as if no gross errors occur upon transmission (or equivalently as if
one has an oracle supplying perfect information about the sites and amplitudes
of the gross errors). Moreover, both decoding strategies are very concrete and
only involve solving simple convex optimization programs, either a linear
program or a second-order cone program. We complement our study with numerical
simulations showing that the encoder/decoder pair performs remarkably well.
|
[
{
"version": "v1",
"created": "Fri, 22 Dec 2006 18:05:29 GMT"
}
] | 2007-07-13T00:00:00 |
[
[
"Candes",
"Emmanuel J.",
""
],
[
"Randall",
"Paige A.",
""
]
] |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.