2006 IEEE International Symposium on Information Theory最新文献

筛选
英文 中文
Lossy Data Compression over Zq by LDPC Code LDPC码在Zq上的有损数据压缩
2006 IEEE International Symposium on Information Theory Pub Date : 2006-07-09 DOI: 10.1109/ISIT.2006.261726
S. Miyake
{"title":"Lossy Data Compression over Zq by LDPC Code","authors":"S. Miyake","doi":"10.1109/ISIT.2006.261726","DOIUrl":"https://doi.org/10.1109/ISIT.2006.261726","url":null,"abstract":"For cases other than the binary alphabet, we construct an LDPC code with the fidelity criterion for uniformly distributed sources on Z q, which asymptotically achieves the rate-distortion limit. For the existence of the LDPC code, we derive some conditions for the distortion criterion and for the parameters of the parity check matrix","PeriodicalId":115298,"journal":{"name":"2006 IEEE International Symposium on Information Theory","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125225982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Block code reconstruction using iterative decoding techniques 使用迭代解码技术的分组代码重建
2006 IEEE International Symposium on Information Theory Pub Date : 2006-07-09 DOI: 10.1109/ISIT.2006.261971
M. Cluzeau
{"title":"Block code reconstruction using iterative decoding techniques","authors":"M. Cluzeau","doi":"10.1109/ISIT.2006.261971","DOIUrl":"https://doi.org/10.1109/ISIT.2006.261971","url":null,"abstract":"In this paper, we present a new algorithm for recovering a linear block code from noisy codewords. To achieve this, we introduce a version of Gallager algorithm with weighted parity-check equations. This new algorithm efficiently recovers LDPC codes and can also be used for other block codes","PeriodicalId":115298,"journal":{"name":"2006 IEEE International Symposium on Information Theory","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117110222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 58
An Efficient Girth-Locating Algorithm for Quasi-Cyclic LDPC Codes 一种有效的准循环LDPC码环定位算法
2006 IEEE International Symposium on Information Theory Pub Date : 2006-07-09 DOI: 10.1109/ISIT.2006.261727
Xiaofu Wu, X. You, Chunming Zhao
{"title":"An Efficient Girth-Locating Algorithm for Quasi-Cyclic LDPC Codes","authors":"Xiaofu Wu, X. You, Chunming Zhao","doi":"10.1109/ISIT.2006.261727","DOIUrl":"https://doi.org/10.1109/ISIT.2006.261727","url":null,"abstract":"The parity-check matrix of a quasi-cyclic code can be represented by a polynomial parity-check matrix with a significantly lower dimension. By using this compact representation, we can develop an efficient method for locating the girth of the quasi-cyclic code. The proposed girth-locating algorithm can be well employed to generate quasi-cyclic low-density parity-check codes with large girth","PeriodicalId":115298,"journal":{"name":"2006 IEEE International Symposium on Information Theory","volume":"14 6","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120846523","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Capacity Results for Multiple Access Channels with State and Feedback 带状态和反馈的多址信道容量结果
2006 IEEE International Symposium on Information Theory Pub Date : 2006-07-09 DOI: 10.1109/ISIT.2006.261802
Wei Wu, S. Vishwanath, A. Arapostathis
{"title":"Capacity Results for Multiple Access Channels with State and Feedback","authors":"Wei Wu, S. Vishwanath, A. Arapostathis","doi":"10.1109/ISIT.2006.261802","DOIUrl":"https://doi.org/10.1109/ISIT.2006.261802","url":null,"abstract":"In this paper, the multiple access channel (MAC) with channel state is analyzed in a scenario where a) the channel state is known non-causally to the transmitters and b) there is perfect causal feedback from the receiver to the transmitters. An achievable region and an outer bound are found for a discrete memoryless MAC that extend existing results, bringing together ideas from the two separate domains of MAC with state and MAC with feedback. Although this achievable region does not match the outer bound in general, non-trivial conditions are found where they meet. In the case of Gaussian MAC, a specialized achievable region is found by using a combination of dirty paper coding and a generalization of the Schalkwijk-Kailath (1966), Ozarow (1984) and Merhav-Weissman (2005) schemes, and this region is found to be capacity achieving. Specifically, it is shown that additive Gaussian interference that is known non-causally to the transmitter causes no loss in capacity for the Gaussian MAC with feedback","PeriodicalId":115298,"journal":{"name":"2006 IEEE International Symposium on Information Theory","volume":"1990 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120849128","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Precise Asymptotic Analysis of the Tunstall Code Tunstall 代码的精确渐近分析
2006 IEEE International Symposium on Information Theory Pub Date : 2006-07-09 DOI: 10.1109/ISIT.2006.261984
M. Drmota, Y. Reznik, S. Savari, W. Szpankowski
{"title":"Precise Asymptotic Analysis of the Tunstall Code","authors":"M. Drmota, Y. Reznik, S. Savari, W. Szpankowski","doi":"10.1109/ISIT.2006.261984","DOIUrl":"https://doi.org/10.1109/ISIT.2006.261984","url":null,"abstract":"We study the Tunstall code using the machinery from the analysis of algorithms literature. In particular, we propose an algebraic characterization of the Tunstall code which, together with tools like the Mellin transform and the Tauberian theorems, leads to new results on the variance and a central limit theorem for dictionary phrase lengths. This analysis also provides a new argument for obtaining asymptotic results about the mean dictionary phrase length and average redundancy rates","PeriodicalId":115298,"journal":{"name":"2006 IEEE International Symposium on Information Theory","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127088119","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Skew-Tolerant Gray Codes 容斜灰色码
2006 IEEE International Symposium on Information Theory Pub Date : 2006-07-09 DOI: 10.1109/ISIT.2006.261809
B. Wilson, M. Blaum
{"title":"Skew-Tolerant Gray Codes","authors":"B. Wilson, M. Blaum","doi":"10.1109/ISIT.2006.261809","DOIUrl":"https://doi.org/10.1109/ISIT.2006.261809","url":null,"abstract":"We consider a particular family of Gray codes having the property that codewords ci and ci+2 differ in a burst of length exactly two. These codes can be applied in the servo track-identification field to identify the correct track during seeks. We call these codes skew-tolerant Gray codes (STGC) and we present explicit constructions","PeriodicalId":115298,"journal":{"name":"2006 IEEE International Symposium on Information Theory","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115522979","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Water-filling is the Limiting Case of a General Capacity Maximization Principle 充水是一般容量最大化原则的极限情况
2006 IEEE International Symposium on Information Theory Pub Date : 2006-07-09 DOI: 10.1109/ISIT.2006.262032
A. Schmeink, R. Mathar
{"title":"Water-filling is the Limiting Case of a General Capacity Maximization Principle","authors":"A. Schmeink, R. Mathar","doi":"10.1109/ISIT.2006.262032","DOIUrl":"https://doi.org/10.1109/ISIT.2006.262032","url":null,"abstract":"The optimal power allocation for Gaussian vector channels subject to sum power constraints is achieved by the well known water-filling principle. In this correspondence, we show that the discontinuous water filling solution is obtained as the limiting case of p-norm bounds on the power covariance matrix as p tends to one. Directional derivatives are the main vehicle leading to this result. An easy graphical representation of the solution is derived by the level crossing points of simple power functions, which in the limit p = 1 gives a nice dual view of the classical representation","PeriodicalId":115298,"journal":{"name":"2006 IEEE International Symposium on Information Theory","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116033217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
The Impact of Link Layer Model on the Capacity of a Random Ad hoc Network 链路层模型对随机Ad hoc网络容量的影响
2006 IEEE International Symposium on Information Theory Pub Date : 2006-07-09 DOI: 10.1109/ISIT.2006.261642
V. Mhatre, C. Rosenberg
{"title":"The Impact of Link Layer Model on the Capacity of a Random Ad hoc Network","authors":"V. Mhatre, C. Rosenberg","doi":"10.1109/ISIT.2006.261642","DOIUrl":"https://doi.org/10.1109/ISIT.2006.261642","url":null,"abstract":"The problem of determining asymptotic bounds on the capacity of a random ad hoc network is considered. Previous approaches assumed a threshold-based link layer model in which a packet transmission is successful if the SINR at the receiver is greater than a fixed threshold. In reality, the mapping from SINR to packet success probability is continuous. Hence, over each hop, for every finite SINR, there is a non-zero probability of packet loss. With this more realistic link model, it is shown that for a broad class of routing and scheduling schemes, a fixed fraction of hops on each route have a fixed non-zero packet loss probability. In a large network, a packet travels an asymptotically large number of hops from source to destination. Consequently, it is shown that the cumulative effect of per-hop packet loss results in a per-node throughput of only O (1/n) (instead of thetas[1/radic(n log n)] as shown previously for the threshold-based link model)","PeriodicalId":115298,"journal":{"name":"2006 IEEE International Symposium on Information Theory","volume":"126 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116583681","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
s-Extremal Additive Codes over GF(4) GF(4)上的s极值加性码
2006 IEEE International Symposium on Information Theory Pub Date : 2006-07-09 DOI: 10.1109/ISIT.2006.262035
Evangeline P. Bautista, P. Gaborit, Jon-Lark Kim, Judy L. Walker
{"title":"s-Extremal Additive Codes over GF(4)","authors":"Evangeline P. Bautista, P. Gaborit, Jon-Lark Kim, Judy L. Walker","doi":"10.1109/ISIT.2006.262035","DOIUrl":"https://doi.org/10.1109/ISIT.2006.262035","url":null,"abstract":"Recently Bachoc and Gaborit introduced the notion of s-extremality for binary self-dual codes, generalizing Elkies' study on the highest possible minimum weight of the shadows of binary self-dual codes. In this paper, we introduce a concept of s-extremality for additive self-dual codes over F4, give a bound on the length of these codes with even distance d, classify them up to minimum distance d = 4, give possible lengths (only strongly conjectured for odd d) for which there exist s-extremal codes with 5 les d les 11, and give five s-extremal codes with d = 7 as well as four new s-extremal codes with d = 5. We also describe codes related to s-extremal codes","PeriodicalId":115298,"journal":{"name":"2006 IEEE International Symposium on Information Theory","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122323545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Properties of the 1-error Linear Complexity of pn-periodic Sequences Over Fp p -周期序列的1误差线性复杂度的性质
2006 IEEE International Symposium on Information Theory Pub Date : 2006-07-09 DOI: 10.1109/ISIT.2006.261899
Ming Su, Lusheng Chen
{"title":"The Properties of the 1-error Linear Complexity of pn-periodic Sequences Over Fp","authors":"Ming Su, Lusheng Chen","doi":"10.1109/ISIT.2006.261899","DOIUrl":"https://doi.org/10.1109/ISIT.2006.261899","url":null,"abstract":"Some properties of p<sup>n</sup>-periodic sequences over F<sub>p </sub> with fixed linear complexity value are found. Based on this, the distribution of the 1-error linear complexity of p<sup>n</sup>-periodic sequences over F<sub>p</sub> is provided. The expectation of the 1-error linear complexity of random p<sup>n</sup>-periodic sequences over F<sub>p</sub> is calculated and its estimated range is given. According to these results, an efficient algorithm for computing the 1-error linear complexity of a p<sup>n</sup>-periodic sequence, as well as a new algorithm for determining all the error vectors that give the 1-error linear complexity, is proposed","PeriodicalId":115298,"journal":{"name":"2006 IEEE International Symposium on Information Theory","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-07-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122772801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信