id
string
submitter
string
authors
string
title
string
comments
string
journal-ref
string
doi
string
report-no
string
categories
string
license
string
abstract
string
versions
list
update_date
timestamp[s]
authors_parsed
list
cs/0607027
Hans-Andrea Loeliger
Junli Hu, Hans-Andrea Loeliger, Justin Dauwels, and Frank Kschischang
A general computation rule for lossy summaries/messages with examples from equalization
Proc. of the 44th Allerton Conference on Communication, Control, and Computing, Monticello, Ill., USA, Sept. 2006
null
null
null
cs.IT math.IT
null
Elaborating on prior work by Minka, we formulate a general computation rule for lossy messages. An important special case (with many applications in communications) is the conversion of "soft-bit" messages to Gaussian messages. By this method, the performance of a Kalman equalizer is improved, both for uncoded and coded transmission.
[ { "version": "v1", "created": "Fri, 7 Jul 2006 17:03:46 GMT" }, { "version": "v2", "created": "Sun, 1 Oct 2006 14:33:19 GMT" } ]
2007-07-13T00:00:00
[ [ "Hu", "Junli", "" ], [ "Loeliger", "Hans-Andrea", "" ], [ "Dauwels", "Justin", "" ], [ "Kschischang", "Frank", "" ] ]
cs/0607030
Michael Vielhaber
Michael Vielhaber, Monica del Pilar Canales
Towards a General Theory of Simultaneous Diophantine Approximation of Formal Power Series: Multidimensional Linear Complexity
28 pages, 1 figure
null
null
null
cs.IT math.IT
null
We model the development of the linear complexity of multisequences by a stochastic infinite state machine, the Battery-Discharge-Model, BDM. The states s in S of the BDM have asymptotic probabilities or mass Pr(s)=1/(P(q,M) q^K(s)), where K(s) in N_0 is the class of the state s, and P(q,M)=\sum_(K in\N0) P_M(K)q^(-K)=\prod_(i=1..M) q^i/(q^i-1) is the generating function of the number of partitions into at most M parts. We have (for each timestep modulo M+1) just P_M(K) states of class K \. We obtain a closed formula for the asymptotic probability for the linear complexity deviation d(n) := L(n)-\lceil n\cdot M/(M+1)\rceil with Pr(d)=O(q^(-|d|(M+1))), for M in N, for d in Z. The precise formula is given in the text. It has been verified numerically for M=1..8, and is conjectured to hold for all M in N. From the asymptotic growth (proven for all M in N), we infer the Law of the Logarithm for the linear complexity deviation, -liminf_{n\to\infty} d_a(n) / log n = 1 /((M+1)log q) = limsup_{n\to\infty} d_a(n) / log n, which immediately yields L_a(n)/n \to M/(M+1) with measure one, for all M in N, a result recently shown already by Niederreiter and Wang. Keywords: Linear complexity, linear complexity deviation, multisequence, Battery Discharge Model, isometry.
[ { "version": "v1", "created": "Mon, 10 Jul 2006 18:03:06 GMT" } ]
2007-07-13T00:00:00
[ [ "Vielhaber", "Michael", "" ], [ "Canales", "Monica del Pilar", "" ] ]
cs/0607042
Rahul Jain
Rahul Jain
Towards a classical proof of exponential lower bound for 2-probe smooth codes
7 pages, no figure
null
null
null
cs.CR cs.IT math.IT
null
Let C: {0,1}^n -> {0,1}^m be a code encoding an n-bit string into an m-bit string. Such a code is called a (q, c, e) smooth code if there exists a decoding algorithm which while decoding any bit of the input, makes at most q probes on the code word and the probability that it looks at any location is at most c/m. The error made by the decoding algorithm is at most e. Smooth codes were introduced by Katz and Trevisan in connection with Locally decodable codes. For 2-probe smooth codes Kerenedis and de Wolf have shown exponential in n lower bound on m in case c and e are constants. Their lower bound proof went through quantum arguments and interestingly there is no completely classical argument as yet for the same (albeit completely classical !) statement. We do not match the bounds shown by Kerenedis and de Wolf but however show the following. Let C: {0,1}^n -> {0,1}^m be a (2,c,e) smooth code and if e <= c^2/8n^2, then m >= 2^(n/320c^2 - 1)$. We hope that the arguments and techniques used in this paper extend (or are helpful in making similar other arguments), to match the bounds shown using quantum arguments. More so, hopefully they extend to show bounds for codes with greater number of probes where quantum arguments unfortunately do not yield good bounds (even for 3-probe codes).
[ { "version": "v1", "created": "Tue, 11 Jul 2006 02:56:28 GMT" } ]
2007-07-13T00:00:00
[ [ "Jain", "Rahul", "" ] ]
cs/0607064
Andrea Montanari
Abdelaziz Amraoui, Andrea Montanari, Ruediger Urbanke
How to Find Good Finite-Length Codes: From Art Towards Science
13 pages, 13 eps figures, enhanced version of an invited paperat the 4th International Symposium on Turbo Codes and Related Topics, Munich, Germany, 2006
null
null
null
cs.IT math.IT
null
We explain how to optimize finite-length LDPC codes for transmission over the binary erasure channel. Our approach relies on an analytic approximation of the erasure probability. This is in turn based on a finite-length scaling result to model large scale erasures and a union bound involving minimal stopping sets to take into account small error events. We show that the performances of optimized ensembles as observed in simulations are well described by our approximation. Although we only address the case of transmission over the binary erasure channel, our method should be applicable to a more general setting.
[ { "version": "v1", "created": "Thu, 13 Jul 2006 09:54:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Amraoui", "Abdelaziz", "" ], [ "Montanari", "Andrea", "" ], [ "Urbanke", "Ruediger", "" ] ]
cs/0607068
Felice Manganiello
Felice Manganiello
Computation of the Weight Distribution of CRC Codes
16 pages, 1 figure, submitted for publication
null
null
null
cs.IT math.AC math.IT
null
In this article, we illustrate an algorithm for the computation of the weight distribution of CRC codes. The recursive structure of CRC codes will give us an iterative way to compute the weight distribution of their dual codes starting from just some ``representative'' words. Thanks to MacWilliams Theorem, the computation of the weight distribution of dual codes can be easily brought back to that of CRC codes. This algorithm is a good alternative to the standard algorithm that involves listing every word of the code.
[ { "version": "v1", "created": "Thu, 13 Jul 2006 17:24:20 GMT" } ]
2007-07-13T00:00:00
[ [ "Manganiello", "Felice", "" ] ]
cs/0607074
Xiaohong Peng
Xiao-Hong Peng and Paddy Farrell
On Construction of the (24,12,8) Golay Codes
To appear in IEEE Trans. on Information Theory Vol. 24 No. 8
null
null
null
cs.IT math.IT
null
Two product array codes are used to construct the (24, 12, 8) binary Golay code through the direct sum operation. This construction provides a systematic way to find proper (8, 4, 4) linear block component codes for generating the Golay code, and it generates and extends previously existing methods that use a similar construction framework. The code constructed is simple to decode.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 18:39:36 GMT" } ]
2007-07-13T00:00:00
[ [ "Peng", "Xiao-Hong", "" ], [ "Farrell", "Paddy", "" ] ]
cs/0607075
Chandra Nair
Chandra Nair, Balaji Prabhakar, Devavrat Shah
On entropy for mixtures of discrete and continuous variables
10 pages, two-column
null
null
null
cs.IT math.IT
null
Let $X$ be a discrete random variable with support $S$ and $f : S \to S^\prime$ be a bijection. Then it is well-known that the entropy of $X$ is the same as the entropy of $f(X)$. This entropy preservation property has been well-utilized to establish non-trivial properties of discrete stochastic processes, e.g. queuing process \cite{prg03}. Entropy as well as entropy preservation is well-defined only in the context of purely discrete or continuous random variables. However for a mixture of discrete and continuous random variables, which arise in many interesting situations, the notions of entropy and entropy preservation have not been well understood. In this paper, we extend the notion of entropy in a natural manner for a mixed-pair random variable, a pair of random variables with one discrete and the other continuous. Our extensions are consistent with the existing definitions of entropy in the sense that there exist natural injections from discrete or continuous random variables into mixed-pair random variables such that their entropy remains the same. This extension of entropy allows us to obtain sufficient conditions for entropy preservation in mixtures of discrete and continuous random variables under bijections. The extended definition of entropy leads to an entropy rate for continuous time Markov chains. As an application, we recover a known probabilistic result related to Poisson process. We strongly believe that the frame-work developed in this paper can be useful in establishing probabilistic properties of complex processes, such as load balancing systems, queuing network, caching algorithms.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 23:02:41 GMT" }, { "version": "v2", "created": "Wed, 17 Jan 2007 17:58:00 GMT" } ]
2007-07-13T00:00:00
[ [ "Nair", "Chandra", "" ], [ "Prabhakar", "Balaji", "" ], [ "Shah", "Devavrat", "" ] ]
cs/0607076
Oliver Kosut
Oliver Kosut and Lang Tong
Capacity of Cooperative Fusion in the Presence of Byzantine Sensors
8 pages, 2 figures
null
null
null
cs.IT math.IT
null
The problem of cooperative fusion in the presence of Byzantine sensors is considered. An information theoretic formulation is used to characterize the Shannon capacity of sensor fusion. It is shown that when less than half of the sensors are Byzantine, the effect of Byzantine attack can be entirely mitigated, and the fusion capacity is identical to that when all sensors are honest. But when at least half of the sensors are Byzantine, they can completely defeat the sensor fusion so that no information can be transmitted reliably. A capacity achieving transmit-then-verify strategy is proposed for the case that less than half of the sensors are Byzantine, and its error probability and coding rate is analyzed by using a Markov decision process modeling of the transmission protocol.
[ { "version": "v1", "created": "Fri, 14 Jul 2006 23:22:38 GMT" } ]
2007-07-13T00:00:00
[ [ "Kosut", "Oliver", "" ], [ "Tong", "Lang", "" ] ]
cs/0607078
Ying Hung Gan
Ying Hung Gan, Cong Ling and Wai Ho Mow
Complex Lattice Reduction Algorithm for Low-Complexity MIMO Detection
Submitted to IEEE Transactions on Wireless Communication in March 2006. Part of this work was presented at the 2005 Global Telecommunications Conference, United States, November 2005
null
null
null
cs.DS cs.IT math.IT
null
Recently, lattice-reduction-aided detectors have been proposed for multiple-input multiple-output (MIMO) systems to give performance with full diversity like maximum likelihood receiver, and yet with complexity similar to linear receivers. However, these lattice-reduction-aided detectors are based on the traditional LLL reduction algorithm that was originally introduced for reducing real lattice bases, in spite of the fact that the channel matrices are inherently complex-valued. In this paper, we introduce the complex LLL algorithm for direct application to reduce the basis of a complex lattice which is naturally defined by a complex-valued channel matrix. We prove that complex LLL reduction-aided detection can also achieve full diversity. Our analysis reveals that the new complex LLL algorithm can achieve a reduction in complexity of nearly 50% over the traditional LLL algorithm, and this is confirmed by simulation. It is noteworthy that the complex LLL algorithm aforementioned has nearly the same bit-error-rate performance as the traditional LLL algorithm.
[ { "version": "v1", "created": "Mon, 17 Jul 2006 09:01:33 GMT" } ]
2007-07-13T00:00:00
[ [ "Gan", "Ying Hung", "" ], [ "Ling", "Cong", "" ], [ "Mow", "Wai Ho", "" ] ]
cs/0607089
Ryan Hutchinson
R. Hutchinson, R. Smarandache, J. Trumpf
Superregular Matrices and the Construction of Convolutional Codes having a Maximum Distance Profile
20 pages. Replaced on 19/7/2006, because bibtex files were not included in the original submission
null
null
null
cs.IT math.CO math.IT
null
Superregular matrices are a class of lower triangular Toeplitz matrices that arise in the context of constructing convolutional codes having a maximum distance profile. These matrices are characterized by the property that no submatrix has a zero determinant unless it is trivially zero due to the lower triangular structure. In this paper, we discuss how superregular matrices may be used to construct codes having a maximum distance profile. We also introduce group actions that preserve the superregularity property and present an upper bound on the minimum size a finite field must have in order that a superregular matrix of a given size can exist over that field.
[ { "version": "v1", "created": "Tue, 18 Jul 2006 18:44:30 GMT" }, { "version": "v2", "created": "Wed, 19 Jul 2006 10:35:49 GMT" } ]
2007-07-13T00:00:00
[ [ "Hutchinson", "R.", "" ], [ "Smarandache", "R.", "" ], [ "Trumpf", "J.", "" ] ]
cs/0607095
Hyundong Shin
Hyundong Shin, Moe Z. Win
Gallager's Exponent for MIMO Channels: A Reliability-Rate Tradeoff
Submitted to the IEEE Transactions on Communications
null
null
null
cs.IT math.IT
null
In this paper, we derive Gallager's random coding error exponent for multiple-input multiple-output (MIMO) channels, assuming no channel-state information (CSI) at the transmitter and perfect CSI at the receiver. This measure gives insight into a fundamental tradeoff between the communication reliability and information rate of MIMO channels, enabling to determine the required codeword length to achieve a prescribed error probability at a given rate below the channel capacity. We quantify the effects of the number of antennas, channel coherence time, and spatial fading correlation on the MIMO exponent. In addition, general formulae for the ergodic capacity and the cutoff rate in the presence of spatial correlation are deduced from the exponent expressions. These formulae are applicable to arbitrary structures of transmit and receive correlation, encompassing all the previously known results as special cases of our expressions.
[ { "version": "v1", "created": "Thu, 20 Jul 2006 06:56:02 GMT" } ]
2007-07-13T00:00:00
[ [ "Shin", "Hyundong", "" ], [ "Win", "Moe Z.", "" ] ]
cs/0607099
Syed Jafar
Syed A. Jafar, Shlomo Shamai (Shitz)
Degrees of Freedom Region for the MIMO X Channel
31 pages
null
null
null
cs.IT math.IT
null
We provide achievability as well as converse results for the degrees of freedom region of a MIMO $X$ channel, i.e., a system with two transmitters, two receivers, each equipped with multiple antennas, where independent messages need to be conveyed over fixed channels from each transmitter to each receiver. With M=1 antennas at each node, we find that the total (sum rate) degrees of freedom are bounded above and below as $1 \leq\eta_X^\star \leq {4/3}$. If $M>1$ and channel matrices are non-degenerate then the precise degrees of freedom $\eta_X^\star = {4/3}M$. Simple zero forcing without dirty paper encoding or successive decoding, suffices to achieve the ${4/3}M$ degrees of freedom. With equal number of antennas at all nodes, we explore the increase in degrees of freedom when some of the messages are made available to a transmitter or receiver in the manner of cognitive radio. With a cognitive transmitter we show that the number of degrees of freedom $\eta = {3/2}M$ (for $M>1$) on the MIMO $X$ channel. The same degrees of freedom are obtained on the MIMO $X$ channel with a cognitive receiver as well. In contrast to the $X$ channel result, we show that for the MIMO \emph{interference} channel, the degrees of freedom are not increased even if both the transmitter and the receiver of one user know the other user's message. However, the interference channel can achieve the full $2M$ degrees of freedom if \emph{each} user has either a cognitive transmitter or a cognitive receiver. Lastly, if the channels vary with time/frequency then the $X$ channel with single antennas $(M=1)$ at all nodes has exactly 4/3 degrees of freedom with no shared messages and exactly 3/2 degrees of freedom with a cognitive transmitter or a cognitive receiver.
[ { "version": "v1", "created": "Fri, 21 Jul 2006 07:50:42 GMT" }, { "version": "v2", "created": "Tue, 12 Sep 2006 23:55:53 GMT" }, { "version": "v3", "created": "Fri, 11 May 2007 20:48:40 GMT" } ]
2007-07-13T00:00:00
[ [ "Jafar", "Syed A.", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
cs/0607107
Louis Mello
Louis Mello
Linear Predictive Coding as an Estimator of Volatility
null
null
null
null
cs.IT math.IT
null
In this paper, we present a method of estimating the volatility of a signal that displays stochastic noise (such as a risky asset traded on an open market) utilizing Linear Predictive Coding. The main purpose is to associate volatility with a series of statistical properties that can lead us, through further investigation, toward a better understanding of structural volatility as well as to improve the quality of our current estimates.
[ { "version": "v1", "created": "Mon, 24 Jul 2006 19:10:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Mello", "Louis", "" ] ]
cs/0607108
Pierre Loidreau
E. M. Gabidulin and P. Loidreau
Properties of subspace subcodes of optimum codes in rank metric
17 pages, Submitted to IEEE-IT
null
null
null
cs.IT cs.DM math.IT
null
Maximum rank distance codes denoted MRD-codes are the equivalent in rank metric of MDS-codes. Given any integer $q$ power of a prime and any integer $n$ there is a family of MRD-codes of length $n$ over $\FF{q^n}$ having polynomial-time decoding algorithms. These codes can be seen as the analogs of Reed-Solomon codes (hereafter denoted RS-codes) for rank metric. In this paper their subspace subcodes are characterized. It is shown that hey are equivalent to MRD-codes constructed in the same way but with smaller parameters. A specific polynomial-time decoding algorithm is designed. Moreover, it is shown that the direct sum of subspace subcodes is equivalent to the direct product of MRD-codes with smaller parameters. This implies that the decoding procedure can correct errors of higher rank than the error-correcting capability. Finally it is shown that, for given parameters, subfield subcodes are completely characterized by elements of the general linear group ${GL}_n(\FF{q})$ of non-singular $q$-ary matrices of size $n$.
[ { "version": "v1", "created": "Tue, 25 Jul 2006 07:37:48 GMT" } ]
2007-07-13T00:00:00
[ [ "Gabidulin", "E. M.", "" ], [ "Loidreau", "P.", "" ] ]
cs/0607112
Misha Stepanov
M.G. Stepanov, M. Chertkov
Improving convergence of Belief Propagation decoding
null
null
null
LA-UR-06-5058
cs.IT math.IT
null
The decoding of Low-Density Parity-Check codes by the Belief Propagation (BP) algorithm is revisited. We check the iterative algorithm for its convergence to a codeword (termination), we run Monte Carlo simulations to find the probability distribution function of the termination time, n_it. Tested on an example [155, 64, 20] code, this termination curve shows a maximum and an extended algebraic tail at the highest values of n_it. Aiming to reduce the tail of the termination curve we consider a family of iterative algorithms modifying the standard BP by means of a simple relaxation. The relaxation parameter controls the convergence of the modified BP algorithm to a minimum of the Bethe free energy. The improvement is experimentally demonstrated for Additive-White-Gaussian-Noise channel in some range of the signal-to-noise ratios. We also discuss the trade-off between the relaxation parameter of the improved iterative scheme and the number of iterations.
[ { "version": "v1", "created": "Tue, 25 Jul 2006 21:54:15 GMT" } ]
2007-07-13T00:00:00
[ [ "Stepanov", "M. G.", "" ], [ "Chertkov", "M.", "" ] ]
cs/0607132
Ludo M.G.M. Tolhuizen
R. Ahlswede, H. Aydinian, L.H. Khachatrian and L.M.G.M. Tolhuizen
On q-ary codes correcting all unidirectional errors of a limited magnitude
22 pages,no figures. Accepted for publication of Journal of Armenian Academy of Sciences, special issue dedicated to Rom Varshamov
null
null
null
cs.IT math.IT
null
We consider codes over the alphabet Q={0,1,..,q-1}intended for the control of unidirectional errors of level l. That is, the transmission channel is such that the received word cannot contain both a component larger than the transmitted one and a component smaller than the transmitted one. Moreover, the absolute value of the difference between a transmitted component and its received version is at most l. We introduce and study q-ary codes capable of correcting all unidirectional errors of level l. Lower and upper bounds for the maximal size of those codes are presented. We also study codes for this aim that are defined by a single equation on the codeword coordinates(similar to the Varshamov-Tenengolts codes for correcting binary asymmetric errors). We finally consider the problem of detecting all unidirectional errors of level l.
[ { "version": "v1", "created": "Thu, 27 Jul 2006 15:51:31 GMT" } ]
2007-07-13T00:00:00
[ [ "Ahlswede", "R.", "" ], [ "Aydinian", "H.", "" ], [ "Khachatrian", "L. H.", "" ], [ "Tolhuizen", "L. M. G. M.", "" ] ]
cs/0608006
S. Sandeep Pradhan
Suhan Choi and S. Sandeep Pradhan
A Graph-based Framework for Transmission of Correlated Sources over Broadcast Channels
36 pages, 9 figures
null
null
null
cs.IT math.IT
null
In this paper we consider the communication problem that involves transmission of correlated sources over broadcast channels. We consider a graph-based framework for this information transmission problem. The system involves a source coding module and a channel coding module. In the source coding module, the sources are efficiently mapped into a nearly semi-regular bipartite graph, and in the channel coding module, the edges of this graph are reliably transmitted over a broadcast channel. We consider nearly semi-regular bipartite graphs as discrete interface between source coding and channel coding in this multiterminal setting. We provide an information-theoretic characterization of (1) the rate of exponential growth (as a function of the number of channel uses) of the size of the bipartite graphs whose edges can be reliably transmitted over a broadcast channel and (2) the rate of exponential growth (as a function of the number of source samples) of the size of the bipartite graphs which can reliably represent a pair of correlated sources to be transmitted over a broadcast channel.
[ { "version": "v1", "created": "Tue, 1 Aug 2006 22:34:26 GMT" } ]
2007-07-13T00:00:00
[ [ "Choi", "Suhan", "" ], [ "Pradhan", "S. Sandeep", "" ] ]
cs/0608007
Renato Renner
Thomas Holenstein and Renato Renner
On the randomness of independent experiments
latex, 15 pages
null
null
null
cs.IT math.IT
null
Given a probability distribution P, what is the minimum amount of bits needed to store a value x sampled according to P, such that x can later be recovered (except with some small probability)? Or, what is the maximum amount of uniform randomness that can be extracted from x? Answering these and similar information-theoretic questions typically boils down to computing so-called smooth entropies. In this paper, we derive explicit and almost tight bounds on the smooth entropies of n-fold product distributions.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 03:25:06 GMT" } ]
2007-07-13T00:00:00
[ [ "Holenstein", "Thomas", "" ], [ "Renner", "Renato", "" ] ]
cs/0608010
Sander Stepanov
Sander Stepanov
MIMO scheme performance and detection in epsilon noise
30 pages
null
null
null
cs.IT math.IT
null
New approach for analysis and decoding MIMO signaling is developed for usual model of nongaussion noise consists of background and impulsive noise named epsilon - noise. It is shown that non-gaussion noise performance significantly worse than gaussion ones. Stimulation results strengthen out theory. Robust in statistical sense detection rule is suggested for such kind of noise features much best robust detector performance than detector designed for Gaussian noise in impulsive environment and modest margin in background noise. Proposed algorithms performance are comparable with developed potential bound. Proposed tool, is crucial issue for MIMO communication system design, since real noise environment has impulsive character that contradict with wide used Gaussian approach, so real MIMO performance much different for Gaussian a non-Gaussian noise model.
[ { "version": "v1", "created": "Wed, 2 Aug 2006 09:52:11 GMT" }, { "version": "v2", "created": "Fri, 29 Sep 2006 11:59:19 GMT" } ]
2007-07-13T00:00:00
[ [ "Stepanov", "Sander", "" ] ]
cs/0608023
Thomas Michel
Gerhard Wunder, Thomas Michel
Optimal resource allocation for OFDM multiuser channels
null
null
null
null
cs.IT math.IT
null
In this paper, a unifying framework for orthogonal frequency division multiplexing (OFDM) multiuser resource allocation is presented. The isolated seeming problems of maximizing a weighted sum of rates for a given power budget $\bar{P}$ and minimizing sum power for given rate requirements $\mathbf{\bar{R}}$ can be interpreted jointly in this framework. To this end we embed the problems in a higher dimensional space. Based on these results, we subsequently consider the combined problem of maximizing a weighted sum of rates under given rate requirements $\mathbf{\bar{R}}$ and a fixed power budget $\bar{P}$. This new problem is challenging, since the additional constraints do not allow to use the hitherto existing approaches. Interestingly, the optimal decoding orders turn out to be the ordering of the Lagrangian factors in all problems.
[ { "version": "v1", "created": "Fri, 4 Aug 2006 08:12:37 GMT" } ]
2007-07-13T00:00:00
[ [ "Wunder", "Gerhard", "" ], [ "Michel", "Thomas", "" ] ]
cs/0608029
Martin Wainwright
Alexandros G. Dimakis, Martin J. Wainwright
Guessing Facets: Polytope Structure and Improved LP Decoder
Appeared in International Symposium on Information Theory, Seattle, WA. July 2006. Revision: fixed author names in abstract (to be recognized as two separate authors)
null
null
null
cs.IT math.IT
null
A new approach for decoding binary linear codes by solving a linear program (LP) over a relaxed codeword polytope was recently proposed by Feldman et al. In this paper we investigate the structure of the polytope used in the LP relaxation decoding. We begin by showing that for expander codes, every fractional pseudocodeword always has at least a constant fraction of non-integral bits. We then prove that for expander codes, the active set of any fractional pseudocodeword is smaller by a constant fraction than the active set of any codeword. We exploit this fact to devise a decoding algorithm that provably outperforms the LP decoder for finite blocklengths. It proceeds by guessing facets of the polytope, and resolving the linear program on these facets. While the LP decoder succeeds only if the ML codeword has the highest likelihood over all pseudocodewords, we prove that for expander codes the proposed algorithm succeeds even with a constant number of pseudocodewords of higher likelihood. Moreover, the complexity of the proposed algorithm is only a constant factor larger than that of the LP decoder.
[ { "version": "v1", "created": "Sat, 5 Aug 2006 01:25:45 GMT" }, { "version": "v2", "created": "Fri, 11 Aug 2006 22:30:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Dimakis", "Alexandros G.", "" ], [ "Wainwright", "Martin J.", "" ] ]
cs/0608042
Igal Sason
Gil Wiechman and Igal Sason
An Improved Sphere-Packing Bound for Finite-Length Codes on Symmetric Memoryless Channels
Submitted to the IEEE Transactions on Information Theory (40 pages, 10 figures)
null
null
null
cs.IT math.IT
null
This paper derives an improved sphere-packing (ISP) bound for finite-length codes whose transmission takes place over symmetric memoryless channels. We first review classical results, i.e., the 1959 sphere-packing (SP59) bound of Shannon for the Gaussian channel, and the 1967 sphere-packing (SP67) bound of Shannon et al. for discrete memoryless channels. A recent improvement on the SP67 bound, as suggested by Valembois and Fossorier, is also discussed. These concepts are used for the derivation of a new lower bound on the decoding error probability (referred to as the ISP bound) which is uniformly tighter than the SP67 bound and its recent improved version. The ISP bound is applicable to symmetric memoryless channels, and some of its applications are exemplified. Its tightness is studied by comparing it with bounds on the ML decoding error probability, and computer simulations of iteratively decoded turbo-like codes. The paper also presents a technique which performs the entire calculation of the SP59 bound in the logarithmic domain, thus facilitating the exact calculation of this bound for moderate to large block lengths without the need for the asymptotic approximations provided by Shannon.
[ { "version": "v1", "created": "Tue, 8 Aug 2006 11:51:29 GMT" }, { "version": "v2", "created": "Fri, 1 Sep 2006 22:15:58 GMT" }, { "version": "v3", "created": "Sat, 17 Mar 2007 15:50:13 GMT" } ]
2007-07-13T00:00:00
[ [ "Wiechman", "Gil", "" ], [ "Sason", "Igal", "" ] ]
cs/0608056
Bin Dai
Bin Dai, Yuan Luo
Wiretap Channel With Side Information
null
null
null
null
cs.IT math.IT
null
This submission has been withdrawn by the author.
[ { "version": "v1", "created": "Mon, 14 Aug 2006 06:20:20 GMT" }, { "version": "v2", "created": "Fri, 25 Aug 2006 04:39:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Dai", "Bin", "" ], [ "Luo", "Yuan", "" ] ]
cs/0608060
Syed Jafar
Syed A. Jafar, Krishna S. Gomadam
Duality and Capacity Region of AF Relay MAC and BC
33 pages
null
null
null
cs.IT math.IT
null
We consider multi-hop multiple access (MAC) and broadcast channels (BC) where communication takes place with the assistance of relays that amplify and forward (AF) their received signals. For a two hop parallel AF relay MAC, assuming a sum power constraint across all relays we characterize optimal relay amplification factors and the resulting capacity regions. We find that the parallel AF relay MAC with total transmit power of the two users $P_1+P_2=P$ and total relay power $P_R$ is the dual of the parallel AF relay BC where the MAC source nodes become the BC destination nodes, the MAC destination node becomes the BC source node, the dual BC source transmit power is $P_R$ and the total transmit power of the AF relays is $P$. The duality means that the capacity region of the AF relay MAC with a sum power constraint $P$ on the transmitters is the same as that of the dual BC. The duality relationship is found to be useful in characterizing the capacity region of the AF relay BC as the union of MAC capacity regions. The duality extends to distributed relays with multiple antennas and more than 2 hops as well.
[ { "version": "v1", "created": "Mon, 14 Aug 2006 20:03:46 GMT" } ]
2007-07-13T00:00:00
[ [ "Jafar", "Syed A.", "" ], [ "Gomadam", "Krishna S.", "" ] ]
cs/0608071
Avi Steiner
Avi Steiner, Amichai Sanderovich, Shlomo Shamai (Shitz)
Broadcast Cooperation Strategies for Two Colocated Users
null
null
null
null
cs.IT math.IT
null
This work considers the problem of communication from a single transmitter, over a network with colocated users, through an independent block Rayleigh fading channel. The colocation nature of the users allows cooperation, which increases the overall achievable rate, from the transmitter to the destined user. The transmitter is ignorant of the fading coefficients, while receivers have access to perfect channel state information (CSI). This gives rise to the multi-layer broadcast approach used by the transmitter. The broadcast approach allows, in our network setting, to improve the cooperation between the colocated users. That is due to the nature of broadcasting, where the better the channel quality, the more layers that can be decoded. The cooperation between the users is performed over an additive white Gaussian channels (AWGN), with a relaying power constraint, and unlimited bandwidth. Three commonly used cooperation techniques are studied: amplify-forward (AF), compress-forward (CF), and decode-forward (DF). These methods are extended using the broadcast approach, for the case of relaxed decoding delay constraint. For this case a separated processing of the layers, which includes multi-session cooperation is shown to be beneficial. Further, closed form expressions for infinitely many AF sessions and recursive expressions for the more complex CF are given. Numerical results for the various cooperation strategies demonstrate the efficiency of multi-session cooperation.
[ { "version": "v1", "created": "Thu, 17 Aug 2006 14:35:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Steiner", "Avi", "", "Shitz" ], [ "Sanderovich", "Amichai", "", "Shitz" ], [ "Shamai", "Shlomo", "", "Shitz" ] ]
cs/0608072
Dandan Luo
Dandan Luo, Yunmin Zhu
Applications of Random Parameter Matrices Kalman Filtering in Uncertain Observation and Multi-Model Systems
4 figures
null
null
null
cs.IT math.IT
null
This paper considers the Linear Minimum Variance recursive state estimation for the linear discrete time dynamic system with random state transition and measurement matrices, i.e., random parameter matrices Kalman filtering. It is shown that such system can be converted to a linear dynamic system with deterministic parameter matrices but state-dependent process and measurement noises. It is proved that under mild conditions, the recursive state estimation of this system is still of the form of a modified Kalman filtering. More importantly, this result can be applied to Kalman filtering with intermittent and partial observations as well as randomly variant dynamic systems.
[ { "version": "v1", "created": "Fri, 18 Aug 2006 00:15:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Luo", "Dandan", "" ], [ "Zhu", "Yunmin", "" ] ]
cs/0608089
Shuchin Aeron
Shuchin Aeron and Venkatesh Saligrama
Wireless ad-hoc networks: Strategies and Scaling laws for the fixed SNR regime
26 pages single column, submitted to Transactions on Information Theory
IEEE Transactions on Information Theory, Volume 53, No. 6, June 2007, pp. 2044-2059
10.1109/TIT.2007.896858
null
cs.IT math.IT
null
This paper deals with throughput scaling laws for random ad-hoc wireless networks in a rich scattering environment. We develop schemes to optimize the ratio, $\rho(n)$ of achievable network sum capacity to the sum of the point-to-point capacities of source-destinations pairs operating in isolation. For fixed SNR networks, i.e., where the worst case SNR over the source-destination pairs is fixed independent of $n$, we show that collaborative strategies yield a scaling law of $\rho(n) = {\cal O}(\frac{1}{n^{1/3}})$ in contrast to multi-hop strategies which yield a scaling law of $\rho(n) = {\cal O}(\frac{1}{\sqrt{n}})$. While, networks where worst case SNR goes to zero, do not preclude the possibility of collaboration, multi-hop strategies achieve optimal throughput. The plausible reason is that the gains due to collaboration cannot offset the effect of vanishing receive SNR. This suggests that for fixed SNR networks, a network designer should look for network protocols that exploit collaboration. The fact that most current networks operate in a fixed SNR interference limited environment provides further motivation for considering this regime.
[ { "version": "v1", "created": "Wed, 23 Aug 2006 02:02:16 GMT" } ]
2007-07-13T00:00:00
[ [ "Aeron", "Shuchin", "" ], [ "Saligrama", "Venkatesh", "" ] ]
cs/0608117
Chih-Chun Wang
Chih-Chun Wang (Purdue University)
Code Annealing and the Suppressing Effect of the Cyclically Lifted LDPC Code Ensemble
To appear in the Proc. 2006 IEEE Information Theory Workshop, Chengdu, China
null
null
null
cs.IT math.IT
null
Code annealing, a new method of designing good codes of short block length, is proposed, which is then concatenated with cyclic lifting to create finite codes of low frame error rate (FER) error floors without performance outliers. The stopping set analysis is performed on the cyclically lifted code ensemble assuming uniformly random lifting sequences, and the suppressing effect/weight of the cyclic lifting is identified for the first time, based on which the ensemble FER error floor can be analytically determined and a scaling law is derived. Both the first-order and high-order suppressing effects are discussed and quantified by different methods including the explicit expression, an algorithmic upper bound, and an algebraic lower bound. The mismatch between the suppressing weight and the stopping distances explains the dramatic performance discrepancy among different cyclically lifted codes when the underlying base codes have degree 2 variable nodes or not. For the former case, a degree augmentation method is further introduced to mitigate this metric mismatch, and a systematic method of constructing irregular codes of low FER error floors is presented. Both regular and irregular codes of very low FER error floors are reported, for which the improvement factor ranges from 10^6-10^4 when compared to the classic graph-based code ensembles.
[ { "version": "v1", "created": "Tue, 29 Aug 2006 14:10:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Wang", "Chih-Chun", "", "Purdue University" ] ]
cs/0609046
Chih-Chun Wang
Chih-Chun Wang (1), Sanjeev R. Kulkarni (2), H. Vincent Poor (2) ((1) Purdue University, (2) Princeton University)
Exhausting Error-Prone Patterns in LDPC Codes
submitted to IEEE Trans. Information Theory
null
null
null
cs.IT cs.DS math.IT
null
It is proved in this work that exhaustively determining bad patterns in arbitrary, finite low-density parity-check (LDPC) codes, including stopping sets for binary erasure channels (BECs) and trapping sets (also known as near-codewords) for general memoryless symmetric channels, is an NP-complete problem, and efficient algorithms are provided for codes of practical short lengths n~=500. By exploiting the sparse connectivity of LDPC codes, the stopping sets of size <=13 and the trapping sets of size <=11 can be efficiently exhaustively determined for the first time, and the resulting exhaustive list is of great importance for code analysis and finite code optimization. The featured tree-based narrowing search distinguishes this algorithm from existing ones for which inexhaustive methods are employed. One important byproduct is a pair of upper bounds on the bit-error rate (BER) & frame-error rate (FER) iterative decoding performance of arbitrary codes over BECs that can be evaluated for any value of the erasure probability, including both the waterfall and the error floor regions. The tightness of these upper bounds and the exhaustion capability of the proposed algorithm are proved when combining an optimal leaf-finding module with the tree-based search. These upper bounds also provide a worst-case-performance guarantee which is crucial to optimizing LDPC codes for extremely low error rate applications, e.g., optical/satellite communications. Extensive numerical experiments are conducted that include both randomly and algebraically constructed LDPC codes, the results of which demonstrate the superior efficiency of the exhaustion algorithm and its significant value for finite length code optimization.
[ { "version": "v1", "created": "Mon, 11 Sep 2006 00:50:16 GMT" } ]
2007-07-13T00:00:00
[ [ "Wang", "Chih-Chun", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Poor", "H. Vincent", "" ] ]
cs/0609049
Asaf Cohen
Asaf Cohen, Neri Merhav and Tsachy Weissman
Scanning and Sequential Decision Making for Multi-Dimensional Data - Part I: the Noiseless Case
46 pages, 2 figures. Revised version: title changed, section 1 revised, section 3.1 added, a few minor/technical corrections made
null
null
null
cs.IT cs.LG math.IT
null
We investigate the problem of scanning and prediction ("scandiction", for short) of multidimensional data arrays. This problem arises in several aspects of image and video processing, such as predictive coding, for example, where an image is compressed by coding the error sequence resulting from scandicting it. Thus, it is natural to ask what is the optimal method to scan and predict a given image, what is the resulting minimum prediction loss, and whether there exist specific scandiction schemes which are universal in some sense. Specifically, we investigate the following problems: First, modeling the data array as a random field, we wish to examine whether there exists a scandiction scheme which is independent of the field's distribution, yet asymptotically achieves the same performance as if this distribution was known. This question is answered in the affirmative for the set of all spatially stationary random fields and under mild conditions on the loss function. We then discuss the scenario where a non-optimal scanning order is used, yet accompanied by an optimal predictor, and derive bounds on the excess loss compared to optimal scanning and prediction. This paper is the first part of a two-part paper on sequential decision making for multi-dimensional data. It deals with clean, noiseless data arrays. The second part deals with noisy data arrays, namely, with the case where the decision maker observes only a noisy version of the data, yet it is judged with respect to the original, clean data.
[ { "version": "v1", "created": "Mon, 11 Sep 2006 09:35:57 GMT" }, { "version": "v2", "created": "Tue, 8 May 2007 07:34:29 GMT" } ]
2007-07-13T00:00:00
[ [ "Cohen", "Asaf", "" ], [ "Merhav", "Neri", "" ], [ "Weissman", "Tsachy", "" ] ]
cs/0609055
Tsachy Weissman
Nuno C Martins, Tsachy Weissman
Coding for Additive White Noise Channels with Feedback Corrupted by Uniform Quantization or Bounded Noise
null
null
null
null
cs.IT math.IT
null
We present simple coding strategies, which are variants of the Schalkwijk-Kailath scheme, for communicating reliably over additive white noise channels in the presence of corrupted feedback. More specifically, we consider a framework comprising an additive white forward channel and a backward link which is used for feedback. We consider two types of corruption mechanisms in the backward link. The first is quantization noise, i.e., the encoder receives the quantized values of the past outputs of the forward channel. The quantization is uniform, memoryless and time invariant (that is, symbol-by-symbol scalar quantization), with bounded quantization error. The second corruption mechanism is an arbitrarily distributed additive bounded noise in the backward link. Here we allow symbol-by-symbol encoding at the input to the backward channel. We propose simple explicit schemes that guarantee positive information rate, in bits per channel use, with positive error exponent. If the forward channel is additive white Gaussian then our schemes achieve capacity, in the limit of diminishing amplitude of the noise components at the backward link, while guaranteeing that the probability of error converges to zero as a doubly exponential function of the block length. Furthermore, if the forward channel is additive white Gaussian and the backward link consists of an additive bounded noise channel, with signal-to-noise ratio (SNR) constrained symbol-by-symbol encoding, then our schemes are also capacity-achieving in the limit of high SNR.
[ { "version": "v1", "created": "Mon, 11 Sep 2006 23:28:46 GMT" } ]
2007-07-13T00:00:00
[ [ "Martins", "Nuno C", "" ], [ "Weissman", "Tsachy", "" ] ]
cs/0609094
Igal Sason
Gil Wiechman and Igal Sason
An Improved Sphere-Packing Bound Targeting Codes of Short to Moderate Block Lengths and Applications
To be presented in the 44th Allerton conference, 27-29 September 2006. The full paper version was submitted to the IEEE Trans. on Information Theory, August 2006 (see http://www.ee.technion.ac.il/people/sason/ISP.pdf)
null
null
null
cs.IT math.IT
null
This paper derives an improved sphere-packing (ISP) bound targeting codes of short to moderate block lengths. We first review the 1967 sphere-packing (SP67) bound for discrete memoryless channels, and a recent improvement by Valembois and Fossorier. These concepts are used for the derivation of a new lower bound on the decoding error probability (referred to as the ISP bound) which is uniformly tighter than the SP67 bound and its recent improved version. Under a mild condition, the ISP bound is applicable to general memoryless channels, and some of its applications are exemplified. Its tightness is studied by comparing it with bounds on the ML decoding error probability. It is exemplified that the ISP bound suggests an interesting alternative to the 1959 sphere-packing (SP59) bound of Shannon for the Gaussian channel, especially for digital modulations of high spectral efficiency.
[ { "version": "v1", "created": "Sun, 17 Sep 2006 21:21:46 GMT" } ]
2007-07-13T00:00:00
[ [ "Wiechman", "Gil", "" ], [ "Sason", "Igal", "" ] ]
cs/0609099
Igal Sason
Igal Sason and Idan Goldenberg
Coding for Parallel Channels: Gallager Bounds and Applications to Repeat-Accumulate Codes
5 pages, 4 figures. To be presented in the IEEE Conference for Electrical Engineers in Israel, Eilat, Nov. 15-17, 2006. The full paper version was submitted to the IEEE Trans. on Information Theory in June 2006, and is available at http://arxiv.org/abs/cs.IT/0607002
null
null
null
cs.IT math.IT
null
This paper is focused on the performance analysis of binary linear block codes (or ensembles) whose transmission takes place over independent and memoryless parallel channels. New upper bounds on the maximum-likelihood (ML) decoding error probability are derived. The framework of the second version of the Duman and Salehi (DS2) bounds is generalized to the case of parallel channels, along with the derivation of optimized tilting measures. The connection between the generalized DS2 and the 1961 Gallager bounds, known previously for a single channel, is revisited for the case of parallel channels. The new bounds are used to obtain improved inner bounds on the attainable channel regions under ML decoding. These improved bounds are applied to ensembles of turbo-like codes, focusing on repeat-accumulate codes and their recent variations.
[ { "version": "v1", "created": "Mon, 18 Sep 2006 06:26:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Sason", "Igal", "" ], [ "Goldenberg", "Idan", "" ] ]
cs/0609123
Xiang Huang
Xiang Huang, Xiaolin Wu
Optimal Design of Multiple Description Lattice Vector Quantizers
Submitted to IEEE Trans. on Information Theory, Sep 2006 (30 pages, 7 figures)
null
null
null
cs.IT math.IT
null
In the design of multiple description lattice vector quantizers (MDLVQ), index assignment plays a critical role. In addition, one also needs to choose the Voronoi cell size of the central lattice v, the sublattice index N, and the number of side descriptions K to minimize the expected MDLVQ distortion, given the total entropy rate of all side descriptions Rt and description loss probability p. In this paper we propose a linear-time MDLVQ index assignment algorithm for any K >= 2 balanced descriptions in any dimensions, based on a new construction of so-called K-fraction lattice. The algorithm is greedy in nature but is proven to be asymptotically (N -> infinity) optimal for any K >= 2 balanced descriptions in any dimensions, given Rt and p. The result is stronger when K = 2: the optimality holds for finite N as well, under some mild conditions. For K > 2, a local adjustment algorithm is developed to augment the greedy index assignment, and conjectured to be optimal for finite N. Our algorithmic study also leads to better understanding of v, N and K in optimal MDLVQ design. For K = 2 we derive, for the first time, a non-asymptotical closed form expression of the expected distortion of optimal MDLVQ in p, Rt, N. For K > 2, we tighten the current asymptotic formula of the expected distortion, relating the optimal values of N and K to p and Rt more precisely.
[ { "version": "v1", "created": "Fri, 22 Sep 2006 02:14:03 GMT" } ]
2007-07-13T00:00:00
[ [ "Huang", "Xiang", "" ], [ "Wu", "Xiaolin", "" ] ]
cs/0609139
Sekhar Tatikonda
Sekhar Tatikonda and Sanjoy Mitter
The Capacity of Channels with Feedback
null
null
null
null
cs.IT math.IT
null
We introduce a general framework for treating channels with memory and feedback. First, we generalize Massey's concept of directed information and use it to characterize the feedback capacity of general channels. Second, we present coding results for Markov channels. This requires determining appropriate sufficient statistics at the encoder and decoder. Third, a dynamic programming framework for computing the capacity of Markov channels is presented. Fourth, it is shown that the average cost optimality equation (ACOE) can be viewed as an implicit single-letter characterization of the capacity. Fifth, scenarios with simple sufficient statistics are described.
[ { "version": "v1", "created": "Mon, 25 Sep 2006 14:04:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Tatikonda", "Sekhar", "" ], [ "Mitter", "Sanjoy", "" ] ]
cs/0609148
Roxana Smarandache
Roxana Smarandache, Ali E. Pusane, Pascal O. Vontobel, Daniel J. Costello Jr
Pseudo-Codeword Performance Analysis for LDPC Convolutional Codes
26 pages, 6 figures, 2 tables
null
null
null
cs.IT math.IT
null
Message-passing iterative decoders for low-density parity-check (LDPC) block codes are known to be subject to decoding failures due to so-called pseudo-codewords. These failures can cause the large signal-to-noise ratio performance of message-passing iterative decoding to be worse than that predicted by the maximum-likelihood decoding union bound. In this paper we address the pseudo-codeword problem from the convolutional-code perspective. In particular, we compare the performance of LDPC convolutional codes with that of their ``wrapped'' quasi-cyclic block versions and we show that the minimum pseudo-weight of an LDPC convolutional code is at least as large as the minimum pseudo-weight of an underlying quasi-cyclic code. This result, which parallels a well-known relationship between the minimum Hamming weight of convolutional codes and the minimum Hamming weight of their quasi-cyclic counterparts, is due to the fact that every pseudo-codeword in the convolutional code induces a pseudo-codeword in the block code with pseudo-weight no larger than that of the convolutional code's pseudo-codeword. This difference in the weight spectra leads to improved performance at low-to-moderate signal-to-noise ratios for the convolutional code, a conclusion supported by simulation results.
[ { "version": "v1", "created": "Wed, 27 Sep 2006 02:27:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Smarandache", "Roxana", "" ], [ "Pusane", "Ali E.", "" ], [ "Vontobel", "Pascal O.", "" ], [ "Costello", "Daniel J.", "Jr" ] ]
cs/0609154
Michael Chertkov
Michael Chertkov and Vladimir Y. Chernyak
Loop Calculus Helps to Improve Belief Propagation and Linear Programming Decodings of Low-Density-Parity-Check Codes
10 pages, 2 figures; Invited talk at 44-th annual Allerton Conference on Communications, Control and Computing, Sep 27-Sep 29, 2006
null
null
LAUR-06-6751
cs.IT cond-mat.dis-nn cond-mat.stat-mech math.IT
null
We illustrate the utility of the recently developed loop calculus for improving the Belief Propagation (BP) algorithm. If the algorithm that minimizes the Bethe free energy fails we modify the free energy by accounting for a critical loop in a graphical representation of the code. The log-likelihood specific critical loop is found by means of the loop calculus. The general method is tested using an example of the Linear Programming (LP) decoding, that can be viewed as a special limit of the BP decoding. Considering the (155,64,20) code that performs over Additive-White-Gaussian-Noise channel we show that the loop calculus improves the LP decoding and corrects all previously found dangerous configurations of log-likelihoods related to pseudo-codewords with low effective distance, thus reducing the code's error-floor.
[ { "version": "v1", "created": "Thu, 28 Sep 2006 04:16:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Chertkov", "Michael", "" ], [ "Chernyak", "Vladimir Y.", "" ] ]
cs/0609155
Benjamin Belzer
Ying Zhu, Taikun Cheng, Krishnamoorthy Sivakumar, and Benjamin J. Belzer
Detection of Markov Random Fields on Two-Dimensional Intersymbol Interference Channels
8 pages, 17 figures
null
null
null
cs.IT math.IT
null
We present a novel iterative algorithm for detection of binary Markov random fields (MRFs) corrupted by two-dimensional (2D) intersymbol interference (ISI) and additive white Gaussian noise (AWGN). We assume a first-order binary MRF as a simple model for correlated images. We assume a 2D digital storage channel, where the MRF is interleaved before being written and then read by a 2D transducer; such channels occur in recently proposed optical disk storage systems. The detection algorithm is a concatenation of two soft-input/soft-output (SISO) detectors: an iterative row-column soft-decision feedback (IRCSDF) ISI detector, and a MRF detector. The MRF detector is a SISO version of the stochastic relaxation algorithm by Geman and Geman in IEEE Trans. Pattern Anal. and Mach. Intell., Nov. 1984. On the 2 x 2 averaging-mask ISI channel, at a bit error rate (BER) of 10^{-5}, the concatenated algorithm achieves SNR savings of between 0.5 and 2.0 dB over the IRCSDF detector alone; the savings increase as the MRFs become more correlated, or as the SNR decreases. The algorithm is also fairly robust to mismatches between the assumed and actual MRF parameters.
[ { "version": "v1", "created": "Wed, 27 Sep 2006 23:47:00 GMT" } ]
2007-07-13T00:00:00
[ [ "Zhu", "Ying", "" ], [ "Cheng", "Taikun", "" ], [ "Sivakumar", "Krishnamoorthy", "" ], [ "Belzer", "Benjamin J.", "" ] ]
cs/0609156
Massoud Amini
Hadi Rahiminia, Massoud Amini
Entangled Graphs
Part of M.Sc. Thesis of the first author
null
null
null
cs.IT cs.DM math.IT
null
In this paper we prove a separability criterion for mixed states in $\mathbb C^p\otimes\mathbb C^q$. We also show that the density matrix of a graph with only one entangled edge is entangled.
[ { "version": "v1", "created": "Thu, 28 Sep 2006 10:26:59 GMT" } ]
2007-07-13T00:00:00
[ [ "Rahiminia", "Hadi", "" ], [ "Amini", "Massoud", "" ] ]
cs/0610012
N Rajesh Pillai
N Rajesh Pillai, Yogesh Kumar
On Shift Sequences for Interleaved Construction of Sequence Sets with Low Correlation
Corrected typos. Added special case for v=2 for second problem
null
null
null
cs.IT math.IT
null
Construction of signal sets with low correlation property is of interest to designers of CDMA systems. One of the preferred ways of constructing such sets is the interleaved construction which uses two sequences a and b with 2-level autocorrelation and a shift sequence e. The shift sequence has to satisfy certain conditions for the resulting signal set to have low correlation properties. This article shows that the conditions reported in literature are too strong and gives a version which results in more number of shift sequences. An open problem on the existence of shift sequences for attaining an interleaved set with maximum correlation value bounded by v+2 is also taken up and solved.
[ { "version": "v1", "created": "Wed, 4 Oct 2006 05:07:42 GMT" }, { "version": "v2", "created": "Thu, 21 Jun 2007 09:30:42 GMT" } ]
2007-07-13T00:00:00
[ [ "Pillai", "N Rajesh", "" ], [ "Kumar", "Yogesh", "" ] ]
cs/0610037
Nan Liu
Nan Liu and Sennur Ulukus
The Capacity Region of a Class of Discrete Degraded Interference Channels
7 pages, 1 figure; presented at the 44th annual Allerton Conference on Communication, Control and Computing, September 27-29, 2006
null
null
null
cs.IT math.IT
null
We provide a single-letter characterization for the capacity region of a class of discrete degraded interference channels (DDICs). The class of DDICs considered includes the discrete additive degraded interference channel (DADIC) studied by Benzel. We show that for the class of DDICs studied, encoder cooperation does not increase the capacity region, and therefore, the capacity region of the class of DDICs is the same as the capacity region of the corresponding degraded broadcast channel.
[ { "version": "v1", "created": "Fri, 6 Oct 2006 19:42:27 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Nan", "" ], [ "Ulukus", "Sennur", "" ] ]
cs/0610050
Tony Lee T.
Tony T. Lee
The Mathematical Parallels Between Packet Switching and Information Transmission
21 pages, 25 figures, Submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT cs.NI math.IT
null
All communication networks comprise of transmission systems and switching systems, even though they are usually treated as two separate issues. Communication channels are generally disturbed by noise from various sources. In circuit switched networks, reliable communication requires the error-tolerant transmission of bits over noisy channels. In packet switched networks, however, not only can bits be corrupted with noise, but resources along connection paths are also subject to contention. Thus, quality of service (QoS) is determined by buffer delays and packet losses. The theme of this paper is to show that transmission noise and packet contention actually have similar characteristics and can be tamed by comparable means to achieve reliable communication, and a number of analogies between switching and transmission are identified. The sampling theorem of bandlimited signals provides the cornerstone of digital communication and signal processing. Recently, the Birkhoff-von Neumann decomposition of traffic matrices has been widely applied to packet switches. With respect to the complexity reduction of packet switching, we show that the decomposition of a doubly stochastic traffic matrix plays a similar role to that of the sampling theorem in digital transmission. We conclude that packet switching systems are governed by mathematical laws that are similar to those of digital transmission systems as envisioned by Shannon in his seminal 1948 paper, A Mathematical Theory of Communication.
[ { "version": "v1", "created": "Tue, 10 Oct 2006 08:09:23 GMT" }, { "version": "v2", "created": "Wed, 22 Nov 2006 03:15:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Lee", "Tony T.", "" ] ]
cs/0610052
Chih-Chun Wang
Chih-Chun Wang (1), Sanjeev R. Kulkarni (2), H. Vincent Poor (2) ((1) Purdue University, (2) Princeton University)
Finite-Dimensional Bounds on Zm and Binary LDPC Codes with Belief Propagation Decoders
to appear in IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
This paper focuses on finite-dimensional upper and lower bounds on decodable thresholds of Zm and binary low-density parity-check (LDPC) codes, assuming belief propagation decoding on memoryless channels. A concrete framework is presented, admitting systematic searches for new bounds. Two noise measures are considered: the Bhattacharyya noise parameter and the soft bit value for a maximum a posteriori probability (MAP) decoder on the uncoded channel. For Zm LDPC codes, an iterative m-dimensional bound is derived for m-ary-input/symmetric-output channels, which gives a sufficient stability condition for Zm LDPC codes and is complemented by a matched necessary stability condition introduced herein. Applications to coded modulation and to codes with non-equiprobable distributed codewords are also discussed. For binary codes, two new lower bounds are provided for symmetric channels, including a two-dimensional iterative bound and a one-dimensional non-iterative bound, the latter of which is the best known bound that is tight for binary symmetric channels (BSCs), and is a strict improvement over the bound derived by the channel degradation argument. By adopting the reverse channel perspective, upper and lower bounds on the decodable Bhattacharyya noise parameter are derived for non-symmetric channels, which coincides with the existing bound for symmetric channels.
[ { "version": "v1", "created": "Tue, 10 Oct 2006 16:02:58 GMT" } ]
2007-07-13T00:00:00
[ [ "Wang", "Chih-Chun", "" ], [ "Kulkarni", "Sanjeev R.", "" ], [ "Poor", "H. Vincent", "" ] ]
cs/0610057
Pierre Loidreau
P. Loidreau
Properties of codes in rank metric
18 pages, 1 figure
null
null
null
cs.DM cs.IT math.IT
null
We study properties of rank metric and codes in rank metric over finite fields. We show that in rank metric perfect codes do not exist. We derive an existence bound that is the equivalent of the Gilbert--Varshamov bound in Hamming metric. We study the asymptotic behavior of the minimum rank distance of codes satisfying GV. We derive the probability distribution of minimum rank distance for random and random $\F{q}$-linear codes. We give an asymptotic equivalent of their average minimum rank distance and show that random $\F{q}$-linear codes are on GV bound for rank metric. We show that the covering density of optimum codes whose codewords can be seen as square matrices is lower bounded by a function depending only on the error-correcting capability of the codes. We show that there are quasi-perfect codes in rank metric over fields of characteristic 2.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 07:58:39 GMT" } ]
2007-07-13T00:00:00
[ [ "Loidreau", "P.", "" ] ]
cs/0610061
Thomas Michel
Gerhard Wunder, Thomas Michel
The Delay-Limited Capacity Region of OFDM Broadcast Channels
null
null
null
null
cs.IT math.IT
null
In this work, the delay limited capacity (DLC) of orthogonal frequency division multiplexing (OFDM) systems is investigated. The analysis is organized into two parts. In the first part, the impact of system parameters on the OFDM DLC is analyzed in a general setting. The main results are that under weak assumptions the maximum achievable single user DLC is almost independent of the distribution of the path attenuations in the low signal-to-noise (SNR) region but depends strongly on the delay spread. In the high SNR region the roles are exchanged. Here, the impact of delay spread is negligible while the impact of the distribution becomes dominant. The relevant asymptotic quantities are derived without employing simplifying assumptions on the OFDM correlation structure. Moreover, for both cases it is shown that the DLC is maximized if the total channel energy is uniformly spread, i.e. the power delay profile is uniform. It is worth pointing out that since universal bounds are obtained the results can also be used for other classes of parallel channels with block fading characteristic. The second part extends the setting to the broadcast channel and studies the corresponding OFDM DLC BC region. An algorithm for computing the OFDM BC DLC region is presented. To derive simple but smart resource allocation strategies, the principle of rate water-filling employing order statistics is introduced. This yields analytical lower bounds on the OFDM DLC region based on orthogonal frequency division multiple access (OFDMA) and ordinal channel state information (CSI). Finally, the schemes are compared to an algorithm using full CSI.
[ { "version": "v1", "created": "Wed, 11 Oct 2006 10:42:41 GMT" } ]
2007-07-13T00:00:00
[ [ "Wunder", "Gerhard", "" ], [ "Michel", "Thomas", "" ] ]
cs/0610074
Georg Schmidt
Georg Schmidt, Vladimir R. Sidorenko, and Martin Bossert
Collaborative Decoding of Interleaved Reed-Solomon Codes and Concatenated Code Designs
20 pages, 7 figures
null
null
null
cs.IT math.IT
null
Interleaved Reed-Solomon codes are applied in numerous data processing, data transmission, and data storage systems. They are generated by interleaving several codewords of ordinary Reed-Solomon codes. Usually, these codewords are decoded independently by classical algebraic decoding methods. However, by collaborative algebraic decoding approaches, such interleaved schemes allow the correction of error patterns beyond half the minimum distance, provided that the errors in the received signal occur in bursts. In this work, collaborative decoding of interleaved Reed-Solomon codes by multi-sequence shift-register synthesis is considered and analyzed. Based on the framework of interleaved Reed-Solomon codes, concatenated code designs are investigated, which are obtained by interleaving several Reed-Solomon codes, and concatenating them with an inner block code.
[ { "version": "v1", "created": "Thu, 12 Oct 2006 18:02:47 GMT" }, { "version": "v2", "created": "Thu, 12 Oct 2006 20:23:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Schmidt", "Georg", "" ], [ "Sidorenko", "Vladimir R.", "" ], [ "Bossert", "Martin", "" ] ]
cs/0610082
Sander Stepanov Dr.
Sander Stepanov, Ofer Hadar
Theoretical analysis of network cranback protocols performance
null
null
null
null
cs.IT math.IT
null
Suggested the decision of the network cranback protocols performance analyzing problem from Eyal Felstine, Reuven Cohen and Ofer Hadar, " Crankback Prediction in Hierarchical ATM networks", Journal of Network and Systems Management, Vol. 10, No. 3, September 2002. It show that the false alarm probability and probability of successful way crossing can be calculated. The main optimization equations are developed for cranback protocol parameters by using analytical expressions for statistical protocol characteristics.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 11:21:42 GMT" } ]
2007-07-13T00:00:00
[ [ "Stepanov", "Sander", "" ], [ "Hadar", "Ofer", "" ] ]
cs/0610083
Sander Stepanov Dr.
Sander Stepanov
Estimation of the traffic in the binary channel for data networks
null
null
null
null
cs.IT math.IT
null
It is impossible to provide an effective utilization of communication networks without the analysis of the quantitative characteristics of the traffic in real time. The constant supervision of all channels of the data practically is impracticable because requires transfer of the significant additional information on a network and large resources expenses for devices of the control. Thus, the task on traffic estimation with small expenses in real time is the urgent.
[ { "version": "v1", "created": "Fri, 13 Oct 2006 11:47:07 GMT" } ]
2007-07-13T00:00:00
[ [ "Stepanov", "Sander", "" ] ]
cs/0610099
Maximilien Gadouleau
Maximilien Gadouleau and Zhiyuan Yan
Properties of Codes with the Rank Metric
5 pages, 4 figures, accepted to Globecom 2006
null
null
null
cs.IT math.IT
null
In this paper, we study properties of rank metric codes in general and maximum rank distance (MRD) codes in particular. For codes with the rank metric, we first establish Gilbert and sphere-packing bounds, and then obtain the asymptotic forms of these two bounds and the Singleton bound. Based on the asymptotic bounds, we observe that asymptotically Gilbert-Varsharmov bound is exceeded by MRD codes and sphere-packing bound cannot be attained. We also establish bounds on the rank covering radius of maximal codes, and show that all MRD codes are maximal codes and all the MRD codes known so far achieve the maximum rank covering radius.
[ { "version": "v1", "created": "Mon, 16 Oct 2006 20:16:42 GMT" }, { "version": "v2", "created": "Wed, 25 Oct 2006 02:52:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Gadouleau", "Maximilien", "" ], [ "Yan", "Zhiyuan", "" ] ]
cs/0610107
Jinhua Jiang
Jinhua Jiang, Yan Xin, and Hari Krishna Garg
Interference Channels with Common Information
23 pages, 5 figures, submitted to Trans. Inform. Theory
null
null
null
cs.IT math.IT
null
In this paper, we consider the discrete memoryless interference channel with common information, in which two senders need deliver not only private messages but also certain common messages to their corresponding receivers. We derive an achievable rate region for such a channel by exploiting a random coding strategy, namely cascaded superposition coding. We reveal that the derived achievable rate region generalizes some important existing results for the interference channels with or without common information. Furthermore, we specialize to a class of deterministic interference channels with common information, and show that the derived achievable rate region is indeed the capacity region for this class of channels.
[ { "version": "v1", "created": "Wed, 18 Oct 2006 08:58:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Jiang", "Jinhua", "" ], [ "Xin", "Yan", "" ], [ "Garg", "Hari Krishna", "" ] ]
cs/0610130
Evgueni Haroutunian
Evgueni A. Haroutunian (Associate Member, IEEE)
On Bounds for $E$-capacity of DMC
null
null
null
null
cs.IT math.IT
null
Random coding, expurgated and sphere packing bounds are derived by method of types and method of graph decomposition for $E$-capacity of discrete memoryless channel (DMC). Three decoding rules are considered, the random coding bound is attainable by each of the three rules, but the expurgated bound is achievable only by maximum-likelihood decoding. Sphere packing bound is obtained by very simple combinatorial reasonings of the method of types. The paper joins and reviews the results of previous hard achievable publications.
[ { "version": "v1", "created": "Mon, 23 Oct 2006 07:23:01 GMT" } ]
2007-07-13T00:00:00
[ [ "Haroutunian", "Evgueni A.", "", "Associate Member, IEEE" ] ]
cs/0610132
Kwankyu Lee
Kwankyu Lee, Michael E. O'Sullivan
List Decoding of Hermitian Codes using Groebner Bases
19 pages, 2 figures
null
null
null
cs.IT cs.SC math.IT
null
List decoding of Hermitian codes is reformulated to allow an efficient and simple algorithm for the interpolation step. The algorithm is developed using the theory of Groebner bases of modules. The computational complexity of the algorithm seems comparable to previously known algorithms achieving the same task, and the algorithm is better suited for hardware implementation.
[ { "version": "v1", "created": "Mon, 23 Oct 2006 07:52:42 GMT" } ]
2007-07-13T00:00:00
[ [ "Lee", "Kwankyu", "" ], [ "O'Sullivan", "Michael E.", "" ] ]
cs/0610139
Anant Sahai
Anant Sahai
How to beat the sphere-packing bound with feedback
9 pages, 3 figures, corrected typos and increased font size. Submitted to IT Transactions
null
null
null
cs.IT math.IT
null
The sphere-packing bound $E_{sp}(R)$ bounds the reliability function for fixed-length block-codes. For symmetric channels, it remains a valid bound even when strictly causal noiseless feedback is allowed from the decoder to the encoder. To beat the bound, the problem must be changed. While it has long been known that variable-length block codes can do better when trading-off error probability with expected block-length, this correspondence shows that the {\em fixed-delay} setting also presents such an opportunity for generic channels. While $E_{sp}(R)$ continues to bound the tradeoff between bit error and fixed end-to-end latency for symmetric channels used {\em without} feedback, a new bound called the ``focusing bound'' gives the limits on what can be done with feedback. If low-rate reliable flow-control is free (ie. the noisy channel has strictly positive zero-error capacity), then the focusing bound can be asymptotically achieved. Even when the channel has no zero-error capacity, it is possible to substantially beat the sphere-packing bound by synthesizing an appropriately reliable channel to carry the flow-control information.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 14:10:09 GMT" }, { "version": "v2", "created": "Thu, 26 Oct 2006 16:10:37 GMT" } ]
2007-07-13T00:00:00
[ [ "Sahai", "Anant", "" ] ]
cs/0610141
Anant Sahai
Anant Sahai
Stabilization using both noisy and noiseless feedback
9 pages, 5 figures, originally presented at MTNS 06
null
null
null
cs.IT math.IT
null
When designing a distributed control system, the system designer has a choice in how to connect the different units through communication channels. In practice, noiseless and noisy channels may coexist. Using the standard toy example of scalar stabilization, this paper shows how a small amount of noiseless feedback can perform a ``supervisory'' role and thereby boost the effectiveness of noisy feedback.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 18:32:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Sahai", "Anant", "" ] ]
cs/0610142
Anant Sahai
Mukul Agarwal, Anant Sahai, and Sanjoy Mitter
Coding into a source: a direct inverse Rate-Distortion theorem
18 pages, 3 figure, orginally presented at Allerton 06
null
null
null
cs.IT math.IT
null
Shannon proved that if we can transmit bits reliably at rates larger than the rate distortion function $R(D)$, then we can transmit this source to within a distortion $D$. We answer the converse question ``If we can transmit a source to within a distortion $D$, can we transmit bits reliably at rates less than the rate distortion function?'' in the affirmative. This can be viewed as a direct converse of the rate distortion theorem.
[ { "version": "v1", "created": "Tue, 24 Oct 2006 18:49:37 GMT" } ]
2007-07-13T00:00:00
[ [ "Agarwal", "Mukul", "" ], [ "Sahai", "Anant", "" ], [ "Mitter", "Sanjoy", "" ] ]
cs/0610144
Anant Sahai
Cheng Chang, Stark Draper, and Anant Sahai
Lossless coding for distributed streaming sources
40 pages, 11 figures, submitted to IT Transactions
null
null
null
cs.IT math.IT
null
Distributed source coding is traditionally viewed in the block coding context -- all the source symbols are known in advance at the encoders. This paper instead considers a streaming setting in which iid source symbol pairs are revealed to the separate encoders in real time and need to be reconstructed at the decoder with some tolerable end-to-end delay using finite rate noiseless channels. A sequential random binning argument is used to derive a lower bound on the error exponent with delay and show that both ML decoding and universal decoding achieve the same positive error exponents inside the traditional Slepian-Wolf rate region. The error events are different from the block-coding error events and give rise to slightly different exponents. Because the sequential random binning scheme is also universal over delays, the resulting code eventually reconstructs every source symbol correctly with probability 1.
[ { "version": "v1", "created": "Wed, 25 Oct 2006 00:20:55 GMT" } ]
2007-07-13T00:00:00
[ [ "Chang", "Cheng", "" ], [ "Draper", "Stark", "" ], [ "Sahai", "Anant", "" ] ]
cs/0610148
Maximilien Gadouleau
Maximilien Gadouleau and Zhiyuan Yan
Decoder Error Probability of MRD Codes
6 pages, 2 figures. Presented at ITW 2006, Chengdu, China
null
null
null
cs.IT math.IT
null
In this paper, we first introduce the concept of elementary linear subspace, which has similar properties to those of a set of coordinates. Using this new concept, we derive properties of maximum rank distance (MRD) codes that parallel those of maximum distance separable (MDS) codes. Using these properties, we show that the decoder error probability of MRD codes with error correction capability t decreases exponentially with t^2 based on the assumption that all errors with the same rank are equally likely. We argue that the channel based on this assumption is an approximation of a channel corrupted by crisscross errors.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 03:12:31 GMT" } ]
2007-07-13T00:00:00
[ [ "Gadouleau", "Maximilien", "" ], [ "Yan", "Zhiyuan", "" ] ]
cs/0610150
Evgueni Haroutunian
Evgueni A. Haroutunian (Associate Member, IEEE) and Parandzem M. Hakobyan
On LAO Testing of Multiple Hypotheses for Many Independent Objects
null
null
null
null
cs.IT math.IT
null
The problem of many hypotheses logarithmically asymptotically optimal (LAO) testing for a model consisting of three or more independent objects is solved. It is supposed that $M$ probability distributions are known and each object independently of others follows to one of them. The matrix of asymptotic interdependencies (reliability--reliability functions) of all possible pairs of the error probability exponents (reliabilities) in optimal testing for this model is studied. This problem was introduced (and solved for the case of two objects and two given probability distributions) by Ahlswede and Haroutunian. The model with two independent objects with $M$ hypotheses was explored by Haroutunian and Hakobyan.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 06:42:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Haroutunian", "Evgueni A.", "", "Associate Member, IEEE" ], [ "Hakobyan", "Parandzem M.", "" ] ]
cs/0610151
Anant Sahai
Anant Sahai
Anytime coding on the infinite bandwidth AWGN channel: A sequential semi-orthogonal optimal code
12 pages, 6 figures, submitted to IT Transactions
null
null
null
cs.IT math.IT
null
It is well known that orthogonal coding can be used to approach the Shannon capacity of the power-constrained AWGN channel without a bandwidth constraint. This correspondence describes a semi-orthogonal variation of pulse position modulation that is sequential in nature -- bits can be ``streamed across'' without having to buffer up blocks of bits at the transmitter. ML decoding results in an exponentially small probability of error as a function of tolerated receiver delay and thus eventually a zero probability of error on every transmitted bit. In the high-rate regime, a matching upper bound is given on the delay error exponent. We close with some comments on the case with feedback and the connections to the capacity per unit cost problem.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 10:01:38 GMT" } ]
2007-07-13T00:00:00
[ [ "Sahai", "Anant", "" ] ]
cs/0610153
Michael Stay
Cristian S. Calude and Michael A. Stay
Most Programs Stop Quickly or Never Halt
Shortened abstract and changed format of references to match Adv. Appl. Math guidelines
null
null
CDMTCS-284
cs.IT math.IT
null
Since many real-world problems arising in the fields of compiler optimisation, automated software engineering, formal proof systems, and so forth are equivalent to the Halting Problem--the most notorious undecidable problem--there is a growing interest, not only academically, in understanding the problem better and in providing alternative solutions. Halting computations can be recognised by simply running them; the main difficulty is to detect non-halting programs. Our approach is to have the probability space extend over both space and time and to consider the probability that a random $N$-bit program has halted by a random time. We postulate an a priori computable probability distribution on all possible runtimes and we prove that given an integer k>0, we can effectively compute a time bound T such that the probability that an N-bit program will eventually halt given that it has not halted by T is smaller than 2^{-k}. We also show that the set of halting programs (which is computably enumerable, but not computable) can be written as a disjoint union of a computable set and a set of effectively vanishing probability. Finally, we show that ``long'' runtimes are effectively rare. More formally, the set of times at which an N-bit program can stop after the time 2^{N+constant} has effectively zero density.
[ { "version": "v1", "created": "Thu, 26 Oct 2006 16:27:53 GMT" }, { "version": "v2", "created": "Fri, 8 Dec 2006 07:39:05 GMT" }, { "version": "v3", "created": "Sun, 7 Jan 2007 01:07:05 GMT" }, { "version": "v4", "created": "Fri, 26 Jan 2007 20:39:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Calude", "Cristian S.", "" ], [ "Stay", "Michael A.", "" ] ]
cs/0610169
Alireza Bayesteh
Alireza Bayesteh and Amir Keyvan Khandani
On the User Selection for MIMO Broadcast Channels
57 pages 5 figures
null
null
Technical Report #2005-16
cs.IT math.IT
null
In this paper, a downlink communication system, in which a Base Station (BS) equipped with $M$ antennas communicates with $N$ users each equipped with $K$ receive antennas, is considered. An efficient suboptimum algorithm is proposed for selecting a set of users in order to maximize the sum-rate throughput of the system. For the asymptotic case when $N$ tends to infinity, the necessary and sufficient conditions in order to achieve the maximum sum-rate throughput, such that the difference between the achievable sum-rate and the maximum value approaches zero, is derived. The complexity of our algorithm is investigated in terms of the required amount of feedback from the users to the base station, as well as the number of searches required for selecting the users. It is shown that the proposed method is capable of achieving a large portion of the sum-rate capacity, with a very low complexity.
[ { "version": "v1", "created": "Mon, 30 Oct 2006 16:21:39 GMT" } ]
2007-07-13T00:00:00
[ [ "Bayesteh", "Alireza", "" ], [ "Khandani", "Amir Keyvan", "" ] ]
cs/0611003
Sergio Servetto
An-swol Hu and Sergio D. Servetto (Cornell University)
A Scalable Protocol for Cooperative Time Synchronization Using Spatial Averaging
Submitted to the IEEE/ACM Transactions on Networking, October 2006. See also cs.IT/0503031
null
null
null
cs.NI cs.IT math.IT
null
Time synchronization is an important aspect of sensor network operation. However, it is well known that synchronization error accumulates over multiple hops. This presents a challenge for large-scale, multi-hop sensor networks with a large number of nodes distributed over wide areas. In this work, we present a protocol that uses spatial averaging to reduce error accumulation in large-scale networks. We provide an analysis to quantify the synchronization improvement achieved using spatial averaging and find that in a basic cooperative network, the skew and offset variance decrease approximately as $1/\bar{N}$ where $\bar{N}$ is the number of cooperating nodes. For general networks, simulation results and a comparison to basic cooperative network results are used to illustrate the improvement in synchronization performance.
[ { "version": "v1", "created": "Wed, 1 Nov 2006 08:47:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Hu", "An-swol", "", "Cornell University" ], [ "Servetto", "Sergio D.", "", "Cornell University" ] ]
cs/0611007
Shi Jin
Shi Jin, Matthew R. McKay, Xiqi Gao, Iain B. Collings
MIMO Multichannel Beamforming: SER and Outage Using New Eigenvalue Distributions of Complex Noncentral Wishart Matrices
26 pages, 5 figures, to appear in IEEE Transactions on Communications
null
null
null
cs.IT math.IT
null
This paper analyzes MIMO systems with multichannel beamforming in Ricean fading. Our results apply to a wide class of multichannel systems which transmit on the eigenmodes of the MIMO channel. We first present new closed-form expressions for the marginal ordered eigenvalue distributions of complex noncentral Wishart matrices. These are used to characterize the statistics of the signal to noise ratio (SNR) on each eigenmode. Based on this, we present exact symbol error rate (SER) expressions. We also derive closed-form expressions for the diversity order, array gain, and outage probability. We show that the global SER performance is dominated by the subchannel corresponding to the minimum channel singular value. We also show that, at low outage levels, the outage probability varies inversely with the Ricean K-factor for cases where transmission is only on the most dominant subchannel (i.e. a singlechannel beamforming system). Numerical results are presented to validate the theoretical analysis.
[ { "version": "v1", "created": "Thu, 2 Nov 2006 03:44:03 GMT" }, { "version": "v2", "created": "Fri, 3 Nov 2006 11:33:13 GMT" } ]
2007-07-13T00:00:00
[ [ "Jin", "Shi", "" ], [ "McKay", "Matthew R.", "" ], [ "Gao", "Xiqi", "" ], [ "Collings", "Iain B.", "" ] ]
cs/0611015
Kenneth Shum
Kenneth W. Shum and Chi Wan Sung
On the Fairness of Rate Allocation in Gaussian Multiple Access Channel and Broadcast Channel
26 pages
null
null
null
cs.IT math.IT
null
The capacity region of a channel consists of all achievable rate vectors. Picking a particular point in the capacity region is synonymous with rate allocation. The issue of fairness in rate allocation is addressed in this paper. We review several notions of fairness, including max-min fairness, proportional fairness and Nash bargaining solution. Their efficiencies for general multiuser channels are discussed. We apply these ideas to the Gaussian multiple access channel (MAC) and the Gaussian broadcast channel (BC). We show that in the Gaussian MAC, max-min fairness and proportional fairness coincide. For both Gaussian MAC and BC, we devise efficient algorithms that locate the fair point in the capacity region. Some elementary properties of fair rate allocations are proved.
[ { "version": "v1", "created": "Fri, 3 Nov 2006 16:17:45 GMT" } ]
2007-07-13T00:00:00
[ [ "Shum", "Kenneth W.", "" ], [ "Sung", "Chi Wan", "" ] ]
cs/0611037
Michael Baer
Michael B. Baer
On Conditional Branches in Optimal Decision Trees
5 pages, 2 illustrations; conference version of cs.PF/0604016, accepted to ISIT 2007
null
null
null
cs.PF cs.IT math.IT
null
The decision tree is one of the most fundamental programming abstractions. A commonly used type of decision tree is the alphabetic binary tree, which uses (without loss of generality) ``less than'' versus ''greater than or equal to'' tests in order to determine one of $n$ outcome events. The process of finding an optimal alphabetic binary tree for a known probability distribution on outcome events usually has the underlying assumption that the cost (time) per decision is uniform and thus independent of the outcome of the decision. This assumption, however, is incorrect in the case of software to be optimized for a given microprocessor, e.g., in compiling switch statements or in fine-tuning program bottlenecks. The operation of the microprocessor generally means that the cost for the more likely decision outcome can or will be less -- often far less -- than the less likely decision outcome. Here we formulate a variety of $O(n^3)$-time $O(n^2)$-space dynamic programming algorithms to solve such optimal binary decision tree problems, optimizing for the behavior of processors with predictive branch capabilities, both static and dynamic. In the static case, we use existing results to arrive at entropy-based performance bounds. Solutions to this formulation are often faster in practice than ``optimal'' decision trees as formulated in the literature, and, for small problems, are easily worth the extra complexity in finding the better solution. This can be applied in fast implementation of decoding Huffman codes.
[ { "version": "v1", "created": "Thu, 9 Nov 2006 03:57:33 GMT" }, { "version": "v2", "created": "Tue, 17 Apr 2007 04:38:31 GMT" } ]
2007-07-13T00:00:00
[ [ "Baer", "Michael B.", "" ] ]
cs/0611038
Chengshi Liu
Chengshi Liu
Nonsymmetric entropy I: basic concepts and results
5 pages
null
null
null
cs.IT math.IT
null
A new concept named nonsymmetric entropy which generalizes the concepts of Boltzman's entropy and shannon's entropy, was introduced. Maximal nonsymmetric entropy principle was proven. Some important distribution laws were derived naturally from maximal nonsymmetric entropy principle.
[ { "version": "v1", "created": "Thu, 9 Nov 2006 07:03:44 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Chengshi", "" ] ]
cs/0611043
Young-Han Kim
Young-Han Kim, Seung-Jean Kim
On the Convexity of log det (I + K X^{-1})
2 pages
null
null
null
cs.IT math.IT
null
A simple proof is given for the convexity of log det (I+K X^{-1}) in the positive definite matrix variable X with a given positive semidefinite K.
[ { "version": "v1", "created": "Fri, 10 Nov 2006 06:41:52 GMT" } ]
2007-07-13T00:00:00
[ [ "Kim", "Young-Han", "" ], [ "Kim", "Seung-Jean", "" ] ]
cs/0611054
James P. Crutchfield
Christopher C. Strelioff and James P. Crutchfield
How Random is a Coin Toss? Bayesian Inference and the Symbolic Dynamics of Deterministic Chaos
8 pages, 1 figure; http://cse.ucdavis.edu/~cmg/compmech/pubs/hrct.htm
null
null
null
cs.LG cs.IT math.IT nlin.CD
null
Symbolic dynamics has proven to be an invaluable tool in analyzing the mechanisms that lead to unpredictability and random behavior in nonlinear dynamical systems. Surprisingly, a discrete partition of continuous state space can produce a coarse-grained description of the behavior that accurately describes the invariant properties of an underlying chaotic attractor. In particular, measures of the rate of information production--the topological and metric entropy rates--can be estimated from the outputs of Markov or generating partitions. Here we develop Bayesian inference for k-th order Markov chains as a method to finding generating partitions and estimating entropy rates from finite samples of discretized data produced by coarse-grained dynamical systems.
[ { "version": "v1", "created": "Mon, 13 Nov 2006 23:28:12 GMT" } ]
2007-07-13T00:00:00
[ [ "Strelioff", "Christopher C.", "" ], [ "Crutchfield", "James P.", "" ] ]
cs/0611070
Olivier Leveque
Ayfer Ozgur, Olivier Leveque, David Tse
Hierarchical Cooperation Achieves Optimal Capacity Scaling in Ad Hoc Networks
56 pages, 16 figures, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
n source and destination pairs randomly located in an area want to communicate with each other. Signals transmitted from one user to another at distance r apart are subject to a power loss of r^{-alpha}, as well as a random phase. We identify the scaling laws of the information theoretic capacity of the network. In the case of dense networks, where the area is fixed and the density of nodes increasing, we show that the total capacity of the network scales linearly with n. This improves on the best known achievability result of n^{2/3} of Aeron and Saligrama, 2006. In the case of extended networks, where the density of nodes is fixed and the area increasing linearly with n, we show that this capacity scales as n^{2-alpha/2} for 2<alpha<3 and sqrt{n} for alpha>3. The best known earlier result (Xie and Kumar 2006) identified the scaling law for alpha > 4. Thus, much better scaling than multihop can be achieved in dense networks, as well as in extended networks with low attenuation. The performance gain is achieved by intelligent node cooperation and distributed MIMO communication. The key ingredient is a hierarchical and digital architecture for nodal exchange of information for realizing the cooperation.
[ { "version": "v1", "created": "Wed, 15 Nov 2006 12:59:43 GMT" }, { "version": "v2", "created": "Thu, 16 Nov 2006 08:28:14 GMT" }, { "version": "v3", "created": "Mon, 12 Feb 2007 14:38:40 GMT" }, { "version": "v4", "created": "Tue, 12 Jun 2007 13:06:47 GMT" } ]
2007-07-13T00:00:00
[ [ "Ozgur", "Ayfer", "" ], [ "Leveque", "Olivier", "" ], [ "Tse", "David", "" ] ]
cs/0611081
Rubens Ramos Viana
Rubens Viana Ramos
The Importance of the Algorithmic Information Theory to Construct a Possible Example Where NP # P - II: An Irreducible Sentence
2 pages
null
null
null
cs.CC cs.IT math.IT
null
In this short communication it is discussed the relation between disentangled states and algorithmic information theory aiming to construct an irreducible sentence whose length increases in a non-polynomial way when the number of qubits increases.
[ { "version": "v1", "created": "Thu, 16 Nov 2006 17:23:47 GMT" }, { "version": "v2", "created": "Fri, 1 Dec 2006 16:35:21 GMT" } ]
2007-07-13T00:00:00
[ [ "Ramos", "Rubens Viana", "" ] ]
cs/0611086
Emin Gabrielyan
Emin Gabrielyan, Roger D. Hersch
Reliable Multi-Path Routing Schemes for Real-Time Streaming
Emin Gabrielyan, "Reliable Multi-Path Routing Schemes for Voice over Packet Networks", ICDT'06, International Conference on Digital Telecommunications, Cote d'Azur, France, 29-31 August 2006, pp. 65-72
null
null
null
cs.NI cs.IT math.IT
null
In off-line streaming, packet level erasure resilient Forward Error Correction (FEC) codes rely on the unrestricted buffering time at the receiver. In real-time streaming, the extremely short playback buffering time makes FEC inefficient for protecting a single path communication against long link failures. It has been shown that one alternative path added to a single path route makes packet level FEC applicable even when the buffering time is limited. Further path diversity, however, increases the number of underlying links increasing the total link failure rate, requiring from the sender possibly more FEC packets. We introduce a scalar coefficient for rating a multi-path routing topology of any complexity. It is called Redundancy Overall Requirement (ROR) and is proportional to the total number of adaptive FEC packets required for protection of the communication. With the capillary routing algorithm, introduced in this paper we build thousands of multi-path routing patterns. By computing their ROR coefficients, we show that contrary to the expectations the overall requirement in FEC codes is reduced when the further diversity of dual-path routing is achieved by the capillary routing algorithm.
[ { "version": "v1", "created": "Fri, 17 Nov 2006 20:36:00 GMT" } ]
2007-07-13T00:00:00
[ [ "Gabrielyan", "Emin", "" ], [ "Hersch", "Roger D.", "" ] ]
cs/0611089
Thomas Halford
Thomas R. Halford and Keith M. Chugg
The Extraction and Complexity Limits of Graphical Models for Linear Codes
18 pages, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
Two broad classes of graphical modeling problems for codes can be identified in the literature: constructive and extractive problems. The former class of problems concern the construction of a graphical model in order to define a new code. The latter class of problems concern the extraction of a graphical model for a (fixed) given code. The design of a new low-density parity-check code for some given criteria (e.g. target block length and code rate) is an example of a constructive problem. The determination of a graphical model for a classical linear block code which implies a decoding algorithm with desired performance and complexity characteristics is an example of an extractive problem. This work focuses on extractive graphical model problems and aims to lay out some of the foundations of the theory of such problems for linear codes. The primary focus of this work is a study of the space of all graphical models for a (fixed) given code. The tradeoff between cyclic topology and complexity in this space is characterized via the introduction of a new bound: the tree-inducing cut-set bound. The proposed bound provides a more precise characterization of this tradeoff than that which can be obtained using existing tools (e.g. the Cut-Set Bound) and can be viewed as a generalization of the square-root bound for tail-biting trellises to graphical models with arbitrary cyclic topologies. Searching the space of graphical models for a given code is then enabled by introducing a set of basic graphical model transformation operations which are shown to span this space. Finally, heuristics for extracting novel graphical models for linear block codes using these transformations are investigated.
[ { "version": "v1", "created": "Sat, 18 Nov 2006 00:17:14 GMT" } ]
2007-07-13T00:00:00
[ [ "Halford", "Thomas R.", "" ], [ "Chugg", "Keith M.", "" ] ]
cs/0611095
Nan Liu
Nan Liu and Sennur Ulukus
Dense Gaussian Sensor Networks: Minimum Achievable Distortion and the Order Optimality of Separation
submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
We investigate the optimal performance of dense sensor networks by studying the joint source-channel coding problem. The overall goal of the sensor network is to take measurements from an underlying random process, code and transmit those measurement samples to a collector node in a cooperative multiple access channel with potential feedback, and reconstruct the entire random process at the collector node. We provide lower and upper bounds for the minimum achievable expected distortion when the underlying random process is Gaussian. When the Gaussian random process satisfies some general conditions, we evaluate the lower and upper bounds explicitly, and show that they are of the same order for a wide range of power constraints. Thus, for these random processes, under these power constraints, we express the minimum achievable expected distortion as a function of the power constraint. Further, we show that the achievability scheme that achieves the lower bound on the distortion is a separation-based scheme that is composed of multi-terminal rate-distortion coding and amplify-and-forward channel coding. Therefore, we conclude that separation is order-optimal for the dense Gaussian sensor network scenario under consideration, when the underlying random process satisfies some general conditions.
[ { "version": "v1", "created": "Mon, 20 Nov 2006 15:19:23 GMT" } ]
2007-07-13T00:00:00
[ [ "Liu", "Nan", "" ], [ "Ulukus", "Sennur", "" ] ]
cs/0611096
Jacob Binia
Jacob Binia
On the Rate Distortion Function of Certain Sources with a Proportional Mean-Square Error Distortion Measure
Submitted to the IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
New bounds on the rate distortion function of certain non-Gaussian sources, with a proportional-weighted mean-square error (MSE) distortion measure, are given. The growth, g, of the rate distortion function, as a result of changing from a non-weighted MSE distortion measure to a proportional-weighted distortion criterion is analyzed. It is shown that for a small distortion, d, the growth, g, and the difference between the rate distortion functions of a Gaussian memoryless source and a source with memory, both with the same marginal statistics and MSE distortion measure, share the same lower bound. Several examples and applications are also given.
[ { "version": "v1", "created": "Mon, 20 Nov 2006 15:57:57 GMT" } ]
2007-07-13T00:00:00
[ [ "Binia", "Jacob", "" ] ]
cs/0611097
Thomas Halford
Thomas R. Halford and Keith M. Chugg
Conditionally Cycle-Free Generalized Tanner Graphs: Theory and Application to High-Rate Serially Concatenated Codes
5 pages, minor revisions, to be presented at the 2007 IEEE Int'l Symposium on Information Theory
null
null
null
cs.IT math.IT
null
Generalized Tanner graphs have been implicitly studied by a number of authors under the rubric of generalized parity-check matrices. This work considers the conditioning of binary hidden variables in such models in order to break all cycles and thus derive optimal soft-in soft-out (SISO) decoding algorithms. Conditionally cycle-free generalized Tanner graphs are shown to imply optimal SISO decoding algorithms for the first order Reed-Muller codes and their duals - the extended Hamming codes - which are substantially less complex than conventional bit-level trellis decoding. The study of low-complexity optimal SISO decoding algorithms for the family of extended Hamming codes is practically motivated. Specifically, it is shown that exended Hamming codes offer an attractive alternative to high-rate convolutional codes in terms of both performance and complexity for use in very high-rate, very low-floor, serially concatenated coding schemes.
[ { "version": "v1", "created": "Mon, 20 Nov 2006 18:42:07 GMT" }, { "version": "v2", "created": "Mon, 26 Mar 2007 19:22:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Halford", "Thomas R.", "" ], [ "Chugg", "Keith M.", "" ] ]
cs/0611112
Ali Pusane
Daniel J. Costello Jr., and G. David Forney Jr
Channel Coding: The Road to Channel Capacity
null
null
null
null
cs.IT math.IT
null
Starting from Shannon's celebrated 1948 channel coding theorem, we trace the evolution of channel coding from Hamming codes to capacity-approaching codes. We focus on the contributions that have led to the most significant improvements in performance vs. complexity for practical applications, particularly on the additive white Gaussian noise (AWGN) channel. We discuss algebraic block codes, and why they did not prove to be the way to get to the Shannon limit. We trace the antecedents of today's capacity-approaching codes: convolutional codes, concatenated codes, and other probabilistic coding schemes. Finally, we sketch some of the practical applications of these codes.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 01:10:58 GMT" } ]
2007-07-13T00:00:00
[ [ "Costello", "Daniel J.", "Jr." ], [ "Forney", "G. David", "Jr" ] ]
cs/0611114
Ping Li
Ping Li
Very Sparse Stable Random Projections, Estimators and Tail Bounds for Stable Random Projections
null
null
null
null
cs.DS cs.IT cs.LG math.IT
null
This paper will focus on three different aspects in improving the current practice of stable random projections. Firstly, we propose {\em very sparse stable random projections} to significantly reduce the processing and storage cost, by replacing the $\alpha$-stable distribution with a mixture of a symmetric $\alpha$-Pareto distribution (with probability $\beta$, $0<\beta\leq1$) and a point mass at the origin (with a probability $1-\beta$). This leads to a significant $\frac{1}{\beta}$-fold speedup for small $\beta$. Secondly, we provide an improved estimator for recovering the original $l_\alpha$ norms from the projected data. The standard estimator is based on the (absolute) sample median, while we suggest using the geometric mean. The geometric mean estimator we propose is strictly unbiased and is easier to study. Moreover, the geometric mean estimator is more accurate, especially non-asymptotically. Thirdly, we provide an adequate answer to the basic question of how many projections (samples) are needed for achieving some pre-specified level of accuracy. \cite{Proc:Indyk_FOCS00,Article:Indyk_TKDE03} did not provide a criterion that can be used in practice. The geometric mean estimator we propose allows us to derive sharp tail bounds which can be expressed in exponential forms with constants explicitly given.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 11:38:25 GMT" }, { "version": "v2", "created": "Fri, 1 Dec 2006 14:55:06 GMT" } ]
2007-07-13T00:00:00
[ [ "Li", "Ping", "" ] ]
cs/0611120
Matthieu Bloch
Matthieu Bloch, Joao Barros, Miguel R. D. Rodrigues, and Steven W. McLaughlin
Wireless Information-Theoretic Security - Part I: Theoretical Aspects
27 pages, 14 figures, submitted to Special Issue of IEEE Trans. on Info. Theory on Information Theoretic Security
null
null
null
cs.IT math.IT
null
In this two-part paper, we consider the transmission of confidential data over wireless wiretap channels. The first part presents an information-theoretic problem formulation in which two legitimate partners communicate over a quasi-static fading channel and an eavesdropper observes their transmissions through another independent quasi-static fading channel. We define the secrecy capacity in terms of outage probability and provide a complete characterization of the maximum transmission rate at which the eavesdropper is unable to decode any information. In sharp contrast with known results for Gaussian wiretap channels (without feedback), our contribution shows that in the presence of fading information-theoretic security is achievable even when the eavesdropper has a better average signal-to-noise ratio (SNR) than the legitimate receiver - fading thus turns out to be a friend and not a foe. The issue of imperfect channel state information is also addressed. Practical schemes for wireless information-theoretic security are presented in Part II, which in some cases comes close to the secrecy capacity limits given in this paper.
[ { "version": "v1", "created": "Wed, 22 Nov 2006 22:54:46 GMT" } ]
2007-07-13T00:00:00
[ [ "Bloch", "Matthieu", "" ], [ "Barros", "Joao", "" ], [ "Rodrigues", "Miguel R. D.", "" ], [ "McLaughlin", "Steven W.", "" ] ]
cs/0611121
Matthieu Bloch
Matthieu Bloch, Joao Barros, Miguel R. D. Rodrigues and Steven W. McLaughlin
Wireless Information-Theoretic Security - Part II: Practical Implementation
25 pages, 11 figures, submitted to Special Issue of IEEE Trans. on Info. Theory on Information Theoretic Security
null
null
null
cs.IT math.IT
null
In Part I of this two-part paper on confidential communication over wireless channels, we studied the fundamental security limits of quasi-static fading channels from the point of view of outage secrecy capacity with perfect and imperfect channel state information. In Part II, we develop a practical secret key agreement protocol for Gaussian and quasi-static fading wiretap channels. The protocol uses a four-step procedure to secure communications: establish common randomness via an opportunistic transmission, perform message reconciliation, establish a common key via privacy amplification, and use of the key. We introduce a new reconciliation procedure that uses multilevel coding and optimized low density parity check codes which in some cases comes close to achieving the secrecy capacity limits established in Part I. Finally, we develop new metrics for assessing average secure key generation rates and show that our protocol is effective in secure key renewal.
[ { "version": "v1", "created": "Fri, 24 Nov 2006 04:54:32 GMT" } ]
2007-07-13T00:00:00
[ [ "Bloch", "Matthieu", "" ], [ "Barros", "Joao", "" ], [ "Rodrigues", "Miguel R. D.", "" ], [ "McLaughlin", "Steven W.", "" ] ]
cs/0611123
Maya Gupta
B. A. Frigyik, S. Srivastava, and M. R. Gupta
Functional Bregman Divergence and Bayesian Estimation of Distributions
26 pages, 1 figure
null
null
null
cs.IT cs.LG math.IT
null
A class of distortions termed functional Bregman divergences is defined, which includes squared error and relative entropy. A functional Bregman divergence acts on functions or distributions, and generalizes the standard Bregman divergence for vectors and a previous pointwise Bregman divergence that was defined for functions. A recently published result showed that the mean minimizes the expected Bregman divergence. The new functional definition enables the extension of this result to the continuous case to show that the mean minimizes the expected functional Bregman divergence over a set of functions or distributions. It is shown how this theorem applies to the Bayesian estimation of distributions. Estimation of the uniform distribution from independent and identically drawn samples is used as a case study.
[ { "version": "v1", "created": "Thu, 23 Nov 2006 19:12:30 GMT" } ]
2007-07-13T00:00:00
[ [ "Frigyik", "B. A.", "" ], [ "Srivastava", "S.", "" ], [ "Gupta", "M. R.", "" ] ]
cs/0611125
Yasutada Oohama
Yasutada Oohama
Relay Channels with Confidential Messages
20 pages, 6 figures, submitted to IEEE Transactions on Information Theory, Special issue on Information Theoretic Security
null
null
null
cs.IT math.IT
null
We consider a relay channel where a relay helps the transmission of messages from one sender to one receiver. The relay is considered not only as a sender that helps the message transmission but as a wire-tapper who can obtain some knowledge about the transmitted messages. In this paper we study the coding problem of the relay channel under the situation that some of transmitted messages are confidential to the relay. A security of such confidential messages is measured by the conditional entropy. The rate region is defined by the set of transmission rates for which messages are reliably transmitted and the security of confidential messages is larger than a prescribed level. In this paper we give two definition of the rate region. We first define the rate region in the case of deterministic encoder and call it the deterministic rate region. Next, we define the rate region in the case of stochastic encoder and call it the stochastic rate region. We derive explicit inner and outer bounds for the above two rate regions and present a class of relay channels where two bounds match. Furthermore, we show that stochastic encoder can enlarge the rate region. We also evaluate the deterministic rate region of the Gaussian relay channel with confidential messages.
[ { "version": "v1", "created": "Fri, 24 Nov 2006 12:39:46 GMT" }, { "version": "v2", "created": "Mon, 27 Nov 2006 09:37:21 GMT" }, { "version": "v3", "created": "Tue, 5 Dec 2006 11:15:29 GMT" }, { "version": "v4", "created": "Thu, 21 Dec 2006 12:26:23 GMT" }, { "version": "v5", "created": "Mon, 19 Feb 2007 13:22:09 GMT" }, { "version": "v6", "created": "Wed, 21 Feb 2007 15:21:39 GMT" }, { "version": "v7", "created": "Sat, 24 Mar 2007 12:22:17 GMT" } ]
2007-07-13T00:00:00
[ [ "Oohama", "Yasutada", "" ] ]
cs/0611129
Neri Merhav
Neri Merhav
Shannon's secrecy system with informed receivers and its application to systematic coding for wiretapped channels
null
null
null
null
cs.IT math.IT
null
Shannon's secrecy system is studied in a setting, where both the legitimate decoder and the wiretapper have access to side information sequences correlated to the source, but the wiretapper receives both the coded information and the side information via channels that are more noisy than the respective channels of the legitmate decoder, which in turn, also shares a secret key with the encoder. A single--letter characterization is provided for the achievable region in the space of five figures of merit: the equivocation at the wiretapper, the key rate, the distortion of the source reconstruction at the legitimate receiver, the bandwidth expansion factor of the coded channels, and the average transmission cost (generalized power). Beyond the fact that this is an extension of earlier studies, it also provides a framework for studying fundamental performance limits of systematic codes in the presence of a wiretap channel. The best achievable performance of systematic codes is then compared to that of a general code in several respects, and a few examples are given.
[ { "version": "v1", "created": "Sun, 26 Nov 2006 09:34:45 GMT" } ]
2007-07-13T00:00:00
[ [ "Merhav", "Neri", "" ] ]
cs/0611144
Lei Ying
Lei Ying, Sichao Yang and R. Srikant
Coding Improves the Optimal Delay-Throughput Trade-offs in Mobile Ad-Hoc Networks: Two-Dimensional I.I.D. Mobility Models
Minor changes
null
null
null
cs.NI cs.IT math.IT
null
In this paper, we investigate the delay-throughput trade-offs in mobile ad-hoc networks under two-dimensional i.i.d. mobility models. We consider two mobility time-scales: (i) Fast mobility where node mobility is at the same time-scale as data transmissions; (ii) Slow mobility where node mobility is assumed to occur at a much slower time-scale than data transmissions. Given a delay constraint $D,$ the main results are as follows: (1) For the two-dimensional i.i.d. mobility model with fast mobiles, the maximum throughput per source-destination (S-D) pair is shown to be $O(\sqrt{D/n}),$ where $n$ is the number of mobiles. (2) For the two-dimensional i.i.d. mobility model with slow mobiles, the maximum throughput per S-D pair is shown to be $O(\sqrt[3]{D/n}).$ (3) For each case, we propose a joint coding-scheduling algorithm to achieve the optimal delay-throughput trade-offs.
[ { "version": "v1", "created": "Wed, 29 Nov 2006 01:29:04 GMT" }, { "version": "v2", "created": "Fri, 1 Dec 2006 18:15:33 GMT" }, { "version": "v3", "created": "Fri, 1 Dec 2006 22:40:07 GMT" }, { "version": "v4", "created": "Sat, 9 Dec 2006 16:03:00 GMT" }, { "version": "v5", "created": "Sat, 24 Mar 2007 03:52:43 GMT" }, { "version": "v6", "created": "Wed, 2 May 2007 15:18:20 GMT" } ]
2007-07-13T00:00:00
[ [ "Ying", "Lei", "" ], [ "Yang", "Sichao", "" ], [ "Srikant", "R.", "" ] ]
cs/0611156
K Vinodh
Petros Elia, K. Vinodh, M. Anand and P. Vijay Kumar
D-MG Tradeoff and Optimal Codes for a Class of AF and DF Cooperative Communication Protocols
17 pages, 5 figures
null
null
null
cs.IT math.IT
null
We consider cooperative relay communication in a fading channel environment under the Orthogonal Amplify and Forward (OAF) and Orthogonal and Non-Orthogonal Selection Decode and Forward (OSDF and NSDF) protocols. For all these protocols, we compute the Diversity-Multiplexing Gain Tradeoff (DMT). We construct DMT optimal codes for the protocols which are sphere decodable and, in certain cases, incur minimum possible delay. Our results establish that the DMT of the OAF protocol is identical to the DMT of the Non-Orthogonal Amplify and Forward (NAF) protocol. Two variants of the NSDF protocol are considered: fixed-NSDF and variable-NSDF protocol. In the variable-NSDF protocol, the fraction of time duration for which the source alone transmits is allowed to vary with the rate of communication. Among the class of static amplify-and-forward and decode-and-forward protocols, the variable-NSDF protocol is shown to have the best known DMT for any number of relays apart from the two-relay case. When there are two relays, the variable-NSDF protocol is shown to improve on the DMT of the best previously-known protocol for higher values of the multiplexing gain. Our results also establish that the fixed-NSDF protocol has a better DMT than the NAF protocol for any number of relays. Finally, we present a DMT optimal code construction for the NAF protocol.
[ { "version": "v1", "created": "Thu, 30 Nov 2006 07:26:10 GMT" } ]
2007-07-13T00:00:00
[ [ "Elia", "Petros", "" ], [ "Vinodh", "K.", "" ], [ "Anand", "M.", "" ], [ "Kumar", "P. Vijay", "" ] ]
cs/0612011
Hua Xiao
Hua Xiao, Amir H. Banihashemi
Estimation of Bit and Frame Error Rates of Low-Density Parity-Check Codes on Binary Symmetric Channels
15 pages, 5 figures, submitted to IEEE Transactions on Communications on Apr. 24, 2006, revised on Oct. 31, 2006 and Jan. 30, 2007
null
null
null
cs.IT math.IT
null
A method for estimating the performance of low-density parity-check (LDPC) codes decoded by hard-decision iterative decoding algorithms on binary symmetric channels (BSC) is proposed. Based on the enumeration of the smallest weight error patterns that can not be all corrected by the decoder, this method estimates both the frame error rate (FER) and the bit error rate (BER) of a given LDPC code with very good precision for all crossover probabilities of practical interest. Through a number of examples, we show that the proposed method can be effectively applied to both regular and irregular LDPC codes and to a variety of hard-decision iterative decoding algorithms. Compared with the conventional Monte Carlo simulation, the proposed method has a much smaller computational complexity, particularly for lower error rates.
[ { "version": "v1", "created": "Sun, 3 Dec 2006 03:07:25 GMT" }, { "version": "v2", "created": "Wed, 31 Jan 2007 22:04:37 GMT" } ]
2007-07-13T00:00:00
[ [ "Xiao", "Hua", "" ], [ "Banihashemi", "Amir H.", "" ] ]
cs/0612024
Guanding Yu
Peng Cheng, Guanding Yu, Zhaoyang Zhang, Hsiao-Hwa Chen and Peiliang Qiu
On the Maximum Sum-rate Capacity of Cognitive Multiple Access Channel
3 pages, 4 figures
null
null
null
cs.IT math.IT
null
We consider the communication scenario where multiple cognitive users wish to communicate to the same receiver, in the presence of primary transmission. The cognitive transmitters are assumed to have the side information about the primary transmission. The capacity region of cognitive users is formulated under the constraint that the capacity of primary transmission is not changed as if no cognitive users exist. Moreover, the maximum sum-rate point of the capacity region is characterized, by optimally allocating the power of each cognitive user to transmit its own information.
[ { "version": "v1", "created": "Tue, 5 Dec 2006 05:27:28 GMT" } ]
2007-07-13T00:00:00
[ [ "Cheng", "Peng", "" ], [ "Yu", "Guanding", "" ], [ "Zhang", "Zhaoyang", "" ], [ "Chen", "Hsiao-Hwa", "" ], [ "Qiu", "Peiliang", "" ] ]
cs/0612027
Igor Grabec
Igor Grabec
Experimental Information and Statistical Modeling of Physical Laws
an article submitted to "IEEE Transactions on Information Theory"
null
null
null
cs.IT cs.IR math.IT
null
Statistical modeling of physical laws connects experiments with mathematical descriptions of natural phenomena. The modeling is based on the probability density of measured variables expressed by experimental data via a kernel estimator. As an objective kernel the scattering function determined by calibration of the instrument is introduced. This function provides for a new definition of experimental information and redundancy of experimentation in terms of information entropy. The redundancy increases with the number of experiments, while the experimental information converges to a value that describes the complexity of the data. The difference between the redundancy and the experimental information is proposed as the model cost function. From its minimum, a proper number of data in the model is estimated. As an optimal, nonparametric estimator of the relation between measured variables the conditional average extracted from the kernel estimator is proposed. The modeling is demonstrated on noisy chaotic data.
[ { "version": "v1", "created": "Tue, 5 Dec 2006 13:08:24 GMT" } ]
2007-07-13T00:00:00
[ [ "Grabec", "Igor", "" ] ]
cs/0612044
Lifeng Lai
Lifeng Lai and Hesham El Gamal
The Relay-Eavesdropper Channel: Cooperation for Secrecy
33 pages, submitted to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
This paper establishes the utility of user cooperation in facilitating secure wireless communications. In particular, the four-terminal relay-eavesdropper channel is introduced and an outer-bound on the optimal rate-equivocation region is derived. Several cooperation strategies are then devised and the corresponding achievable rate-equivocation region are characterized. Of particular interest is the novel Noise-Forwarding (NF) strategy, where the relay node sends codewords independent of the source message to confuse the eavesdropper. This strategy is used to illustrate the deaf helper phenomenon, where the relay is able to facilitate secure communications while being totally ignorant of the transmitted messages. Furthermore, NF is shown to increase the secrecy capacity in the reversely degraded scenario, where the relay node fails to offer performance gains in the classical setting. The gain offered by the proposed cooperation strategies is then proved theoretically and validated numerically in the additive White Gaussian Noise (AWGN) channel.
[ { "version": "v1", "created": "Thu, 7 Dec 2006 17:15:14 GMT" } ]
2007-07-13T00:00:00
[ [ "Lai", "Lifeng", "" ], [ "Gamal", "Hesham El", "" ] ]
cs/0612053
Xiaofei Huang
Xiaofei Huang, Xiaowu Huang
Deriving Schrodinger Equation From A Soft-Decision Iterative Decoding Algorithm
An extended abstract version of this paper has been presented at International Conference on Quantum Foundation and Technology, August, 2006, HangZhou, China (ICQFT'06)
null
null
null
cs.IT math.IT
null
The belief propagation algorithm has been recognized in the information theory community as a soft-decision iterative decoding algorithm. It is the most powerful algorithm found so far for attacking hard optimization problems in channel decoding. Quantum mechanics is the foundation of modern physics with the time-independent Schrodinger equation being one of the most important equations. This paper shows that the equation can be derived from a generalized belief propagation algorithm. Such a connection on a mathematical basis might shed new insights into the foundations of quantum mechanics and quantum computing.
[ { "version": "v1", "created": "Fri, 8 Dec 2006 18:06:29 GMT" } ]
2007-07-13T00:00:00
[ [ "Huang", "Xiaofei", "" ], [ "Huang", "Xiaowu", "" ] ]
cs/0612067
Jianwen Zhang
Jianwen Zhang, Marc A. Armand
Retrieving Reed-Solomon coded data under interpolation-based list decoding
10 pages. Submitted to IEEE information theory for possible publication
null
null
null
cs.IT math.IT
null
A transform that enables generator-matrix-based Reed-Solomon (RS) coded data to be recovered under interpolation-based list decoding is presented. The transform matrix needs to be computed only once and the transformation of an element from the output list to the desired RS coded data block incurs $k^{2}$ field multiplications, given a code of dimension $k$.
[ { "version": "v1", "created": "Tue, 12 Dec 2006 05:08:05 GMT" } ]
2007-07-13T00:00:00
[ [ "Zhang", "Jianwen", "" ], [ "Armand", "Marc A.", "" ] ]
cs/0612075
Sujay Sanghavi
Sujay Sanghavi
Intermediate Performance of Rateless Codes
null
null
null
null
cs.IT math.IT
null
Rateless/fountain codes are designed so that all input symbols can be recovered from a slightly larger number of coded symbols, with high probability using an iterative decoder. In this paper we investigate the number of input symbols that can be recovered by the same decoder, but when the number of coded symbols available is less than the total number of input symbols. Of course recovery of all inputs is not possible, and the fraction that can be recovered will depend on the output degree distribution of the code. In this paper we (a) outer bound the fraction of inputs that can be recovered for any output degree distribution of the code, and (b) design degree distributions which meet/perform close to this bound. Our results are of interest for real-time systems using rateless codes, and for Raptor-type two-stage designs.
[ { "version": "v1", "created": "Fri, 15 Dec 2006 04:18:56 GMT" } ]
2007-07-13T00:00:00
[ [ "Sanghavi", "Sujay", "" ] ]
cs/0612076
Walid Hachem
Walid Hachem (LTCI), Oleksiy Khorunzhiy, Philippe Loubaton (IGM-LabInfo), Jamal Najim (LTCI), Leonid Pastur
A New Approach for Capacity Analysis of Large Dimensional Multi-Antenna Channels
null
null
null
null
cs.IT math.IT math.PR
null
This paper adresses the behaviour of the mutual information of correlated MIMO Rayleigh channels when the numbers of transmit and receive antennas converge to infinity at the same rate. Using a new and simple approach based on Poincar\'{e}-Nash inequality and on an integration by parts formula, it is rigorously established that the mutual information converges to a Gaussian random variable whose mean and variance are evaluated. These results confirm previous evaluations based on the powerful but non rigorous replica method. It is believed that the tools that are used in this paper are simple, robust, and of interest for the communications engineering community.
[ { "version": "v1", "created": "Fri, 15 Dec 2006 15:34:38 GMT" } ]
2007-07-13T00:00:00
[ [ "Hachem", "Walid", "", "LTCI" ], [ "Khorunzhiy", "Oleksiy", "", "IGM-LabInfo" ], [ "Loubaton", "Philippe", "", "IGM-LabInfo" ], [ "Najim", "Jamal", "", "LTCI" ], [ "Pastur", "Leonid", "" ] ]
cs/0612078
Wei Dai
Wei Dai, Youjian Liu, Brian Rider
Effect of Finite Rate Feedback on CDMA Signature Optimization and MIMO Beamforming Vector Selection
24 pages, submitted to IEEE Trans. on Information Theory
null
null
null
cs.IT math.IT
null
We analyze the effect of finite rate feedback on CDMA (code-division multiple access) signature optimization and MIMO (multi-input-multi-output) beamforming vector selection. In CDMA signature optimization, for a particular user, the receiver selects a signature vector from a codebook to best avoid interference from other users, and then feeds the corresponding index back to the specified user. For MIMO beamforming vector selection, the receiver chooses a beamforming vector from a given codebook to maximize throughput, and feeds back the corresponding index to the transmitter. These two problems are dual: both can be modeled as selecting a unit norm vector from a finite size codebook to "match" a randomly generated Gaussian matrix. In signature optimization, the least match is required while the maximum match is preferred for beamforming selection. Assuming that the feedback link is rate limited, our main result is an exact asymptotic performance formulae where the length of the signature/beamforming vector, the dimensions of interference/channel matrix, and the feedback rate approach infinity with constant ratios. The proof rests on a large deviation principle over a random matrix ensemble. Further, we show that random codebooks generated from the isotropic distritution are asymptotically optimal not only on average, but also with probability one.
[ { "version": "v1", "created": "Sat, 16 Dec 2006 20:41:32 GMT" }, { "version": "v2", "created": "Fri, 2 Mar 2007 22:47:29 GMT" } ]
2007-07-13T00:00:00
[ [ "Dai", "Wei", "" ], [ "Liu", "Youjian", "" ], [ "Rider", "Brian", "" ] ]
cs/0612080
Jacob Binia
Jacob Binia
On the Decrease Rate of the Non-Gaussianness of the Sum of Independent Random Variables
Submitted to the Trasactions of the IEEE on Information Theory
null
null
null
cs.IT math.IT
null
Several proofs of the monotonicity of the non-Gaussianness (divergence with respect to a Gaussian random variable with identical second order statistics) of the sum of n independent and identically distributed (i.i.d.) random variables were published. We give an upper bound on the decrease rate of the non-Gaussianness which is proportional to the inverse of n, for large n. The proof is based on the relationship between non-Gaussianness and minimum mean-square error (MMSE) and causal minimum mean-square error (CMMSE) in the time-continuous Gaussian channel.
[ { "version": "v1", "created": "Sun, 17 Dec 2006 14:52:04 GMT" } ]
2007-07-13T00:00:00
[ [ "Binia", "Jacob", "" ] ]
cs/0612084
Ender Tekin
Ender Tekin and Aylin Yener
Achievable Rates for the General Gaussian Multiple Access Wire-Tap Channel with Collective Secrecy
Presented at the 44th Annual Allerton Conference on Communication, Control, and Computing, September 27-29, 2006
null
null
null
cs.IT cs.CR math.IT
null
We consider the General Gaussian Multiple Access Wire-Tap Channel (GGMAC-WT). In this scenario, multiple users communicate with an intended receiver in the presence of an intelligent and informed eavesdropper who is as capable as the intended receiver, but has different channel parameters. We aim to provide perfect secrecy for the transmitters in this multi-access environment. Using Gaussian codebooks, an achievable secrecy region is determined and the power allocation that maximizes the achievable sum-rate is found. Numerical results showing the new rate region are presented. It is shown that the multiple-access nature of the channel may be utilized to allow users with zero single-user secrecy capacity to be able to transmit in perfect secrecy. In addition, a new collaborative scheme is shown that may increase the achievable sum-rate. In this scheme, a user who would not transmit to maximize the sum rate can help another user who (i) has positive secrecy capacity to increase its rate, or (ii) has zero secrecy capacity to achieve a positive secrecy capacity.
[ { "version": "v1", "created": "Mon, 18 Dec 2006 15:33:15 GMT" } ]
2007-07-13T00:00:00
[ [ "Tekin", "Ender", "" ], [ "Yener", "Aylin", "" ] ]
cs/0612087
Lester Ingber
Lester Ingber
Statistical mechanics of neocortical interactions: Portfolio of Physiological Indicators
null
null
null
null
cs.CE cs.IT cs.NE math.IT q-bio.QM
null
There are several kinds of non-invasive imaging methods that are used to collect data from the brain, e.g., EEG, MEG, PET, SPECT, fMRI, etc. It is difficult to get resolution of information processing using any one of these methods. Approaches to integrate data sources may help to get better resolution of data and better correlations to behavioral phenomena ranging from attention to diagnoses of disease. The approach taken here is to use algorithms developed for the author's Trading in Risk Dimensions (TRD) code using modern methods of copula portfolio risk management, with joint probability distributions derived from the author's model of statistical mechanics of neocortical interactions (SMNI). The author's Adaptive Simulated Annealing (ASA) code is for optimizations of training sets, as well as for importance-sampling. Marginal distributions will be evolved to determine their expected duration and stability using algorithms developed by the author, i.e., PATHTREE and PATHINT codes.
[ { "version": "v1", "created": "Mon, 18 Dec 2006 21:02:03 GMT" } ]
2007-07-13T00:00:00
[ [ "Ingber", "Lester", "" ] ]
cs/0612101
Maxime Guillaud
M. Guillaud, M. Debbah, A. L. Moustakas
Maximum Entropy MIMO Wireless Channel Models
Submitted to IEEE Trans. Information Theory Dec. 2006; 16 pages, 4 figures
null
null
null
cs.IT math.IT
null
In this contribution, models of wireless channels are derived from the maximum entropy principle, for several cases where only limited information about the propagation environment is available. First, analytical models are derived for the cases where certain parameters (channel energy, average energy, spatial correlation matrix) are known deterministically. Frequently, these parameters are unknown (typically because the received energy or the spatial correlation varies with the user position), but still known to represent meaningful system characteristics. In these cases, analytical channel models are derived by assigning entropy-maximizing distributions to these parameters, and marginalizing them out. For the MIMO case with spatial correlation, we show that the distribution of the covariance matrices is conveniently handled through its eigenvalues. The entropy-maximizing distribution of the covariance matrix is shown to be a Wishart distribution. Furthermore, the corresponding probability density function of the channel matrix is shown to be described analytically by a function of the channel Frobenius norm. This technique can provide channel models incorporating the effect of shadow fading and spatial correlation between antennas without the need to assume explicit values for these parameters. The results are compared in terms of mutual information to the classical i.i.d. Gaussian model.
[ { "version": "v1", "created": "Wed, 20 Dec 2006 14:41:25 GMT" } ]
2007-07-13T00:00:00
[ [ "Guillaud", "M.", "" ], [ "Debbah", "M.", "" ], [ "Moustakas", "A. L.", "" ] ]
cs/0612118
Sujay Sanghavi
Sujay Sanghavi, Bruce Hajek, and Laurent Massoulie
Gossiping with Multiple Messages
Accepted to IEEE INFOCOM 2007
null
null
null
cs.NI cs.IT math.IT
null
This paper investigates the dissemination of multiple pieces of information in large networks where users contact each other in a random uncoordinated manner, and users upload one piece per unit time. The underlying motivation is the design and analysis of piece selection protocols for peer-to-peer networks which disseminate files by dividing them into pieces. We first investigate one-sided protocols, where piece selection is based on the states of either the transmitter or the receiver. We show that any such protocol relying only on pushes, or alternatively only on pulls, is inefficient in disseminating all pieces to all users. We propose a hybrid one-sided piece selection protocol -- INTERLEAVE -- and show that by using both pushes and pulls it disseminates $k$ pieces from a single source to $n$ users in $10(k+\log n)$ time, while obeying the constraint that each user can upload at most one piece in one unit of time, with high probability for large $n$. An optimal, unrealistic centralized protocol would take $k+\log_2 n$ time in this setting. Moreover, efficient dissemination is also possible if the source implements forward erasure coding, and users push the latest-released coded pieces (but do not pull). We also investigate two-sided protocols where piece selection is based on the states of both the transmitter and the receiver. We show that it is possible to disseminate $n$ pieces to $n$ users in $n+O(\log n)$ time, starting from an initial state where each user has a unique piece.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 06:34:18 GMT" } ]
2007-07-13T00:00:00
[ [ "Sanghavi", "Sujay", "" ], [ "Hajek", "Bruce", "" ], [ "Massoulie", "Laurent", "" ] ]
cs/0612122
Joerg Wagner
Joerg Wagner, Boris Rankov, and Armin Wittneben
Large N Analysis of Amplify-and-Forward MIMO Relay Channels with Correlated Rayleigh Fading
submitted for publication to IEEE Transactions on Information Theory
null
null
null
cs.IT math.IT
null
In this correspondence the cumulants of the mutual information of the flat Rayleigh fading amplify-and-forward MIMO relay channel without direct link between source and destination are derived in the large array limit. The analysis is based on the replica trick and covers both spatially independent and correlated fading in the first and the second hop, while beamforming at all terminals is restricted to deterministic weight matrices. Expressions for mean and variance of the mutual information are obtained. Their parameters are determined by a nonlinear equation system. All higher cumulants are shown to vanish as the number of antennas n goes to infinity. In conclusion the distribution of the mutual information I becomes Gaussian in the large n limit and is completely characterized by the expressions obtained for mean and variance of I. Comparisons with simulation results show that the asymptotic results serve as excellent approximations for systems with only few antennas at each node. The derivation of the results follows the technique formalized by Moustakas et al. in [1]. Although the evaluations are more involved for the MIMO relay channel compared to point-to-point MIMO channels, the structure of the results is surprisingly simple again. In particular an elegant formula for the mean of the mutual information is obtained, i.e., the ergodic capacity of the two-hop amplify-and-forward MIMO relay channel without direct link.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 15:42:57 GMT" } ]
2007-07-13T00:00:00
[ [ "Wagner", "Joerg", "" ], [ "Rankov", "Boris", "" ], [ "Wittneben", "Armin", "" ] ]
cs/0612124
Emmanuel Candes
Emmanuel J. Candes and Paige A. Randall
Highly robust error correction by convex programming
23 pages, 2 figures
null
null
null
cs.IT math.IT math.PR math.ST stat.TH
null
This paper discusses a stylized communications problem where one wishes to transmit a real-valued signal x in R^n (a block of n pieces of information) to a remote receiver. We ask whether it is possible to transmit this information reliably when a fraction of the transmitted codeword is corrupted by arbitrary gross errors, and when in addition, all the entries of the codeword are contaminated by smaller errors (e.g. quantization errors). We show that if one encodes the information as Ax where A is a suitable m by n coding matrix (m >= n), there are two decoding schemes that allow the recovery of the block of n pieces of information x with nearly the same accuracy as if no gross errors occur upon transmission (or equivalently as if one has an oracle supplying perfect information about the sites and amplitudes of the gross errors). Moreover, both decoding strategies are very concrete and only involve solving simple convex optimization programs, either a linear program or a second-order cone program. We complement our study with numerical simulations showing that the encoder/decoder pair performs remarkably well.
[ { "version": "v1", "created": "Fri, 22 Dec 2006 18:05:29 GMT" } ]
2007-07-13T00:00:00
[ [ "Candes", "Emmanuel J.", "" ], [ "Randall", "Paige A.", "" ] ]