2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)最新文献

筛选
英文 中文
Scaling laws for reliable data dissemination in shared loss multicast trees 共享损失组播树中可靠数据传播的尺度规律
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447101
Ron Yadgar, A. Cohen, Omer Gurewitz
{"title":"Scaling laws for reliable data dissemination in shared loss multicast trees","authors":"Ron Yadgar, A. Cohen, Omer Gurewitz","doi":"10.1109/ALLERTON.2015.7447101","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447101","url":null,"abstract":"The completion time for the dissemination of information to all nodes in a network plays a critical role in the design and analysis of communication systems. In this work, we analyse the completion time of data dissemination in a shared loss (i.e., unreliable links) multicast tree, at the limit of large number of nodes. Specifically, analytic expressions for upper and lower bounds on the expected completion time are provided, and, in particular, it is shown that both these bounds scale as α log n, where n is the number of nodes. Clearly, the completion time is determined by the last end user who receives the message, that is, a maximum over all arrival times. We derive asymptotic bounds on the expectation of this maximum and use them to obtain tight bounds on the completion time. The results are validated by simulations and numerical analysis.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"215 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131964762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimizing large-scale MIMO cellular downlink: Multiplexing, diversity, or interference nulling? 优化大规模MIMO蜂窝下行链路:多路复用,多样性,或干扰消除?
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447014
Kianoush Hosseini, Wei Yu, R. Adve
{"title":"Optimizing large-scale MIMO cellular downlink: Multiplexing, diversity, or interference nulling?","authors":"Kianoush Hosseini, Wei Yu, R. Adve","doi":"10.1109/ALLERTON.2015.7447014","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447014","url":null,"abstract":"A base-station (BS) equipped with multiple antennas can use its spatial dimensions in three ways: (1) serve multiple users to achieve a multiplexing gain, (2) provide diversity to its users, and/or (3) null interference at a chosen subset of out-of-cell users. The main contribution of this paper is to answer the following question: what is the optimal balance between the three competing benefits of multiplexing, diversity and interference nulling? We answer this question in the context of the downlink of a cellular network in which each user chooses its best serving BS, and requests nearby interfering BSs for interference nulling. BSs are equipped with a large number of antennas, serve multiple single-antenna users using zero-forcing beamforming and equal power assignment, and null interference at a subset of out-of-cell users. The remaining spatial dimensions provide transmit diversity. We assume perfect channel state information at the BSs and users. Utilizing tools from stochastic geometry, we show that, surprisingly, to maximize the per-BS ergodic sum rate, at the optimal allocation of spatial resources, interference nulling does not bring tangible benefit. A close-to-optimal strategy is to use none of the spatial resources for interference nulling, while reserving 60% of spatial resources for achieving multiplexing and the rest for providing diversity.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120997736","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
On the Eschenauer-Gligor key predistribution scheme under on-off communication channels: The absence of isolated nodes 开关通信信道下的Eschenauer-Gligor密钥预分发方案:无孤立节点
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447186
A. Makowski, Osman Yağan
{"title":"On the Eschenauer-Gligor key predistribution scheme under on-off communication channels: The absence of isolated nodes","authors":"A. Makowski, Osman Yağan","doi":"10.1109/ALLERTON.2015.7447186","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447186","url":null,"abstract":"We consider the Eschenauer-Gligor key predistribution scheme under the condition of partial visibility with i.i.d. on-off links between pairs of nodes. This situation is modeled as the intersection of two random graphs, namely a random key graph and an Erdös-Rényi (ER) graph. For this class of composite random graphs we give various improvements on a recent result by Yağan [17] concerning zero-one laws for the absence of isolated nodes.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130916127","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Optimal scheduling of real-time traffic in wireless networks with delayed feedback 具有延迟反馈的无线网络实时流量的最优调度
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447137
Kyu Seob Kim, Chih-Ping Li, I. Kadota, E. Modiano
{"title":"Optimal scheduling of real-time traffic in wireless networks with delayed feedback","authors":"Kyu Seob Kim, Chih-Ping Li, I. Kadota, E. Modiano","doi":"10.1109/ALLERTON.2015.7447137","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447137","url":null,"abstract":"In this paper we consider a wireless network composed of a base station and a number of clients, with the goal of scheduling real-time traffic. Even though this problem has been extensively studied in the literature, the impact of delayed acknowledgment has not been assessed. Delayed feedback is of increasing importance in systems where the round trip delay is much greater than the packet transmission time, and it has a significant effect on the scheduling decisions and network performance. Previous work considered the problem of scheduling real-time traffic with instantaneous feedback and without feedback. In this work, we address the general case of delayed feedback and use Dynamic Programming to characterize the optimal scheduling policy. An optimal algorithm that fulfills any feasible minimum delivery ratio requirements is proposed. Moreover, we develop a low-complexity suboptimal heuristic algorithm which is suitable for platforms with low computational power. Both algorithms are evaluated through simulations.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134416916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Performance analysis for multi-user systems under distributed opportunistic scheduling 分布式机会调度下的多用户系统性能分析
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447184
O. Shmuel, A. Cohen, Omer Gurewitz
{"title":"Performance analysis for multi-user systems under distributed opportunistic scheduling","authors":"O. Shmuel, A. Cohen, Omer Gurewitz","doi":"10.1109/ALLERTON.2015.7447184","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447184","url":null,"abstract":"Consider a multiple access channel with a large number of users. In most practical scenarios, due to decoding complexity, users are not scheduled together, and only one user may transmit at any given time. In this work, we analyze the delay and QoS of such systems under a specific, opportunistic and distributed scheduling algorithm, in which each user, at the beginning of each slot, estimates its channel gain and transmits only if it is greater than a given threshold. Specifically, we analyze the performance while assuming the users are not necessarily fully backlogged, focusing on the queueing problem and, especially, on the strong dependence between the queues. We first adopt the celebrated model of Ephremides and Zhu to give new results on the convergence of the probability of collision to its average value (as the number of users grows), and hence for the ensuing system performance metrics, such as throughput and delay. We then utilize this finding to suggest a much simpler approximate model, which accurately describes the system behaviour when the number of users is large. The system performance as predicted by the approximate models shows excellent agreement with simulation results.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129813200","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Variable-length channel codes with probabilistic delay guarantees 具有概率延迟保证的变长信道码
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447065
Y. Altug, H. Poor, S. Verdú
{"title":"Variable-length channel codes with probabilistic delay guarantees","authors":"Y. Altug, H. Poor, S. Verdú","doi":"10.1109/ALLERTON.2015.7447065","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447065","url":null,"abstract":"Variable-length channel codes over discrete memoryless channels subject to probabilistic delay guarantees are examined in the non-vanishing error probability regime. Fundamental limits of these codes in several different settings, which depend on the availability of noiseless feedback and a termination option, are investigated. In stark contrast with average delay guarantees, the first-order terms of the fundamental limits turn out to be the same as those for fixed-length codes in all cases. Further, feedback is shown to improve the second-order term, even in the absence of a termination option.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114905568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the communication complexity of greater-than 论通信的复杂性大于
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447037
Sivaramakrishnan Natarajan Ramamoorthy, Makrand Sinha
{"title":"On the communication complexity of greater-than","authors":"Sivaramakrishnan Natarajan Ramamoorthy, Makrand Sinha","doi":"10.1109/ALLERTON.2015.7447037","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447037","url":null,"abstract":"We give a simple information theoretic proof that the public-coin randomized communication complexity of the greater-than function is Ω(logn) for bit-strings of length n.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116339874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Linear approximations to AC power flow in rectangular coordinates 在直角坐标下交流功率流的线性近似
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447006
S. Dhople, Swaroop S. Guggilam, Y. Chen
{"title":"Linear approximations to AC power flow in rectangular coordinates","authors":"S. Dhople, Swaroop S. Guggilam, Y. Chen","doi":"10.1109/ALLERTON.2015.7447006","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447006","url":null,"abstract":"This paper explores solutions to linearized power-flow equations with bus-voltage phasors represented in rectangular coordinates. The key idea is to solve for complex-valued perturbations around a nominal voltage profile from a set of linear equations that are obtained by neglecting quadratic terms in the original nonlinear power-flow equations. We prove that for lossless networks, the voltage profile where the real part of the perturbation is suppressed satisfies active-power balance in the original nonlinear system of equations. This result motivates the development of approximate solutions that improve over conventional DC power-flow approximations, since the model includes ZIP loads. For distribution networks that only contain ZIP loads in addition to a slack bus, we recover a linear relationship between the approximate voltage profile and the constant-current component of the loads and the nodal active-and reactive-power injections.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448111","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 88
Single letter characterization of average-case strong redundancy of compressing memoryless sequences 压缩无记忆序列的平均大小写强冗余的单字母表征
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447108
Maryam Hosseini, N. Santhanam
{"title":"Single letter characterization of average-case strong redundancy of compressing memoryless sequences","authors":"Maryam Hosseini, N. Santhanam","doi":"10.1109/ALLERTON.2015.7447108","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447108","url":null,"abstract":"We obtain a condition that is both necessary and sufficient to characterize strong universal compressibility (in the average sense) of sequences generated by iid sampling from a collection cP of distributions over a countably infinite alphabet. Contrary to the worst case regret formulation of universal compression, finite single letter (average case) redundancy of cP does not automatically imply that the expected redundancy of describing length-n strings sampled iid from cP grows sublinearly with n. Instead, we prove that asymptotic per-symbol redundancy of universally compressing length-n iid sequences from cP is characterized by how well the tails of their single letter marginals can be universally described, and we formalize the later as the tail-redundancy of cP.","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114698660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Exploring connections between Sparse Fourier Transform computation and decoding of product codes 探索稀疏傅里叶变换计算与产品编码解码之间的联系
2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton) Pub Date : 2015-09-01 DOI: 10.1109/ALLERTON.2015.7447167
N. Janakiraman, Santosh K. Emmadi, K. Narayanan, K. Ramchandran
{"title":"Exploring connections between Sparse Fourier Transform computation and decoding of product codes","authors":"N. Janakiraman, Santosh K. Emmadi, K. Narayanan, K. Ramchandran","doi":"10.1109/ALLERTON.2015.7447167","DOIUrl":"https://doi.org/10.1109/ALLERTON.2015.7447167","url":null,"abstract":"We show that the recently proposed Fast Fourier Aliasing-based Sparse Transform (FFAST) algorithm for computing the Discrete Fourier Transform (DFT) [1] of signals with a sparse DFT is equivalent to iterative hard decision decoding of product codes. This connection is used to derive the thresholds for sparse recovery based on a recent analysis by Justensen [2] for computing thresholds for product codes. We first extend Justesen's analysis to d-dimensional product codes and compute thresholds for the FFAST algorithm based on this. Additionally, this connection also allows us to analyze the performance of the FFAST algorithm under a burst sparsity model in addition to the uniformly random sparsity model which was assumed in prior work [1].","PeriodicalId":112948,"journal":{"name":"2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114804488","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信