{"title":"Thresholds for turbo codes","authors":"T. Richardson, R. Urbanke","doi":"10.1109/ISIT.2000.866615","DOIUrl":"https://doi.org/10.1109/ISIT.2000.866615","url":null,"abstract":"We prove the existence of thresholds for turbo codes and we prove concentration of the performance of turbo codes within the ensemble determined by the random interleaver. In effect, we show that the results obtained for low-density parity-check codes extend to turbo codes. The main technical innovation is to rigorously show that dependence of output extrinsic information on input priors decays with distance along the trellis. In an infinitely long turbo code the densities of the extrinsic information fulfill a certain symmetry condition which we call the consistency condition. This condition provides the basis for an efficient Monte-Carlo algorithm for the determination of thresholds for turbo codes. Thresholds of all symmetric parallel concatenated codes of memory up to 6 have been determined.","PeriodicalId":108752,"journal":{"name":"2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124758763","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On error-free filtering under dependent distortions","authors":"M. Pinsker, V.V. Prelov","doi":"10.1109/ISIT.2000.866657","DOIUrl":"https://doi.org/10.1109/ISIT.2000.866657","url":null,"abstract":"The problem of error-tree filtering for a discrete-time, stationary, singular, stochastic process X={X/sub n/} from observations Y={Y/sub n/} in the case of dependent distortions, i.e., where the pair (X,Y) forms a jointly stationary process is considered.","PeriodicalId":108752,"journal":{"name":"2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)","volume":"106 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124815384","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Interleavers for unpunctured symmetric turbo codes","authors":"J. A. Briffa, Victor Buttigieg","doi":"10.1109/ISIT.2000.866748","DOIUrl":"https://doi.org/10.1109/ISIT.2000.866748","url":null,"abstract":"The turbo code interleaver design problem is considered for relatively large block sizes, where the effect of trellis termination is less marked. An optimised interleaver design technique based on simulated annealing is proposed. The performance is significantly better than the Berrou-Glavieux interleaver without an increase in delay.","PeriodicalId":108752,"journal":{"name":"2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129416098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Iterating the Arimoto-Blahut algorithm for faster convergence","authors":"J. Sayir","doi":"10.1109/ISIT.2000.866533","DOIUrl":"https://doi.org/10.1109/ISIT.2000.866533","url":null,"abstract":"The Arimoto-Blahut algorithm determines the capacity of a discrete memoryless channel through an iterative process in which the input probability distribution is adapted at each iteration. While it converges towards the capacity-achieving distribution for any discrete memoryless channel, the convergence can be slow when the channel has a large input alphabet. This is unfortunate when only a small number of the input letters are assigned non-zero probabilities in the capacity-achieving distribution. If we knew which input letters will end up with a probability of zero, we could eliminate these letters and operate the algorithm on a subset of the input alphabet. The algorithm would converge towards the same solution faster. We present an algorithm which makes use of this fact to speed up the convergence of the Arimoto-Blahut algorithm in such situations.","PeriodicalId":108752,"journal":{"name":"2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128480526","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Soft decision decoding of Reed Solomon codes","authors":"V. Ponnampalam, B. Vucetic","doi":"10.1109/ISIT.2000.866352","DOIUrl":"https://doi.org/10.1109/ISIT.2000.866352","url":null,"abstract":"The paper presents a maximum likelihood decoding (MLD) and a sub-optimum decoding algorithm for Reed-Solomon codes. The proposed algorithms are based on the algebraic structure of RS codes represented in GF(2). Theoretical bounds on the performance are derived and shown to be accurate. The proposed sub-optimum algorithm is seen to have better error performance compared to other sub-optimum decoding algorithms while the new MLD algorithm has significantly lower decoding complexity when compared to other MLD algorithms.","PeriodicalId":108752,"journal":{"name":"2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128265400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On point-to-point communication networks","authors":"Lihua Song, R. Yeung","doi":"10.1109/ISIT.2000.866311","DOIUrl":"https://doi.org/10.1109/ISIT.2000.866311","url":null,"abstract":"A point-to-point communication network is represented by (G,C), where G=(V,/spl epsiv/) is a directed graph with vertex set V and edge set /spl epsiv/, and C=[C/sub ij/,(i,j)/spl isin//spl epsiv/] is a nonnegative-valued vector. A vertex in V represents a node in the communication network, and an edge (i,j) represents a point-to-point discrete memoryless channel (DMC) from node i to node j whose capacity is C/sub ij/. We assume that the channels in the network are independent of each other. An information source with entropy rate h is generated at source node /spl delta/ and recovered at sink node t with arbitrarily small probability of error. We show that the value of a max-flow from node /spl delta/ to node t in (G,C) must be greater than or equal to h. This results implies a separation theorem for network coding and channel coding in such a communication network.","PeriodicalId":108752,"journal":{"name":"2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128621764","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Pruned convolutional codes for flexible unequal error protection against insertion/deletion/reversal errors","authors":"B. Brink, H. C. Ferreira, W. A. Clarke","doi":"10.1109/ISIT.2000.866558","DOIUrl":"https://doi.org/10.1109/ISIT.2000.866558","url":null,"abstract":"The class of punctured convolutional codes were first constructed by starting with low rate convolutional codes, and by periodically puncturing single bits out of some code symbols in a time varying trellis diagram. Thus, simplified Viterbi decoders could decode the resulting codes, with only two branches entering each state in the trellis diagram. This concept was ingeniously extended by J. Hagenhauer (1988) to construct incrementally variable rate codes for unequal error protection. Here we somewhat reverse the above procedure, and name the resulting codes \"pruned codes\". We start with optimal high rate convolutional codes, and periodically delete complete code symbols and branches to obtain a time varying trellis diagram. Hence, lower rate codes capable also of correcting insertions and deletions can be constructed.","PeriodicalId":108752,"journal":{"name":"2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128642527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Space-time codes based on rank codes","authors":"E. Gabidulin, M. Bossert, P. Lusina","doi":"10.1109/ISIT.2000.866582","DOIUrl":"https://doi.org/10.1109/ISIT.2000.866582","url":null,"abstract":"The application of maximum rank distance (MRD) codes is investigated with respect to the space-time code scenario. A construction method is presented based on primitive polynomials over extended Galois fields. A one-to-one mapping is then performed between the Galois field code symbols and the complex transmission symbols.","PeriodicalId":108752,"journal":{"name":"2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129364809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Collusion-secure fingerprinting and B/sub 2/-sequences","authors":"G. Cohen, S. Litsyn, G. Zémor","doi":"10.1109/ISIT.2000.866540","DOIUrl":"https://doi.org/10.1109/ISIT.2000.866540","url":null,"abstract":"We discuss a strategy initiated by Boneh and Shaw (see IEEE Trans. Inform. Theory, vol.44, p.1897-1905, 1998) for collusion-secure fingerprinting. We show that under this strategy, finding fingerprinting schemes that resist coalitions of two users amounts to finding B/sub 2/-sequences of binary vectors. A sequence of vectors v/sub 1/, v/sub 2/,..., v/sub n/ is a B/sub 2/-sequence if all sums v/sub i/+v/sub j/, 1/spl les/i/spl les/j/spl les/n, are different: the associated extremal set-theoretic problem is what is the maximal size of a B/sub 2/-sequence? We shed new light on this old combinatorial problem and improve on previously known upper bounds.","PeriodicalId":108752,"journal":{"name":"2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129542663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cycle length distributions in graphical models for iterative decoding","authors":"Xianping Ge, D. Eppstein, Padhraic Smyth","doi":"10.1109/ISIT.2000.866440","DOIUrl":"https://doi.org/10.1109/ISIT.2000.866440","url":null,"abstract":"This paper analyses the distribution of cycle lengths in turbo decoding graphs. It is known that the widely-used iterative decoding algorithm for turbo codes is in fact a special case of a quite general local message-passing algorithm for efficiently computing posterior probabilities in acyclic directed graphical (ADG) models (also known as \"belief networks\"). However, this local message-passing algorithm in theory only works for graphs with no cycles. Why it works in practice (i.e., performs near-optimally in terms of bit decisions) on ADGs for turbo codes is not well understood since turbo decoding graphs can have many cycles.","PeriodicalId":108752,"journal":{"name":"2000 IEEE International Symposium on Information Theory (Cat. No.00CH37060)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2000-06-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129579609","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}