{"title":"Degrees of freedom of uplink-downlink multiantenna cellular networks","authors":"Sang-Woon Jeon, Changho Suh","doi":"10.1109/TIT.2016.2529839","DOIUrl":"https://doi.org/10.1109/TIT.2016.2529839","url":null,"abstract":"An uplink-downlink cellular network is studied in which the first base station (BS) with M<sub>1</sub> antennas receives independent messages from its N<sub>1</sub> serving users, while the second BS with M<sub>2</sub> antennas transmits independent messages to its N<sub>2</sub> serving users. Each user is assumed to have a single antenna. Under this uplink-downlink setting, the sum degrees of freedom (DoF) is completely characterized as the minimum of (N<sub>1</sub>N<sub>2</sub> + min(M<sub>1</sub>,N<sub>1</sub>)(N<sub>1</sub> - N<sub>2</sub>)<sup>+</sup> + min(M<sub>2</sub>,N<sub>2</sub>)(N<sub>2</sub> -N<sub>1</sub>)<sup>+</sup>)/ max(N<sub>1</sub>,N<sub>2</sub>), M<sub>1</sub> + N<sub>2</sub>,N<sub>1</sub> + M<sub>2</sub>, max(M<sub>1</sub>,M<sub>2</sub>), and max(N<sub>1</sub>,N<sub>2</sub>), where a<sup>+</sup> denotes max(0, a). The result demonstrates that, depending on the network configuration, operating one of the cells as uplink and the other cell as downlink can improve DoF compared to the conventional uplink or downlink operation, in which both cells operate as either uplink or downlink.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129842918","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal simultaneous detection and signal and noise power estimation","authors":"Long N. Le, Douglas L. Jones","doi":"10.1109/ISIT.2014.6874897","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6874897","url":null,"abstract":"Simultaneous detection and estimation is important in many engineering applications. In particular, there are many applications where it is important to perform signal detection and Signal-to-Noise-Ratio (SNR) estimation jointly. Application of existing frameworks in the literature that handle simultaneous detection and estimation is not straightforward for this class of application. This paper therefore aims at bridging the gap between an existing framework, specifically the work by Middleton et al., and the mentioned application class by presenting a jointly optimal detector and signal and noise power estimators. The detector and estimators are given for the Gaussian observation model with appropriate conjugate priors on the signal and noise power. Simulation results affirm the superior performance of the optimal solution compared to the separate detection and estimation approaches.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"308 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-10-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132096746","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-version coding in distributed storage","authors":"Zhiying Wang, V. Cadambe","doi":"10.1109/ALLERTON.2014.7028506","DOIUrl":"https://doi.org/10.1109/ALLERTON.2014.7028506","url":null,"abstract":"We investigate an information theoretic problem motivated by storing multiple versions of a data object in distributed storage systems. Specifically, in a storage system with n server nodes, where there are v independent message versions, each server receives message values corresponding to some arbitrary subset of the versions. The versions are assumed to be totally ordered. Each server is unaware of the set of versions at the other servers, and aims to encode the values corresponding to the versions it has. We investigate codes where, from any set of c nodes (c <; n), the value corresponding to the highest common version, as per the version ordering, available at this set of c nodes is decodable. We aim to design codes that minimize the storage cost. We present two main results in this paper. First, we show that the storage cost is lower bounded by 1 - (1 - 1/c)υ, measured in terms of the bits of the values. Second, for the cases of υ = 2 and υ = 3, we provide new code constructions that respectively achieve storage costs of (2c-1)/c2 and (3c-2)/c2, measured in terms of the bits of the values. Our code constructions are simple in that we do not code across versions. We argue that when the number of versions υ is much larger than c, then replication is close to optimal.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124778693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On topological properties of wireless sensor networks under the q-composite key predistribution scheme with on/off channels","authors":"Jun Zhao, Osman Yağan, V. Gligor","doi":"10.1109/ISIT.2014.6875009","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875009","url":null,"abstract":"The q-composite key predistribution scheme [2] is used prevalently for secure communications in large-scale wireless sensor networks (WSNs). Prior work [5], [13], [44] explores topological properties of WSNs employing the q-composite scheme for q = 1 with unreliable communication links modeled as independent on/off channels. In this paper, we investigate topological properties related to the node degree in WSNs operating under the q-composite scheme and the on/off channel model. Our results apply to general q and are stronger than those reported for the node degree in prior work even for the case of q being 1. Specifically, we show that the number of nodes with an arbitrary degree asymptotically converges to a Poisson distribution, present the asymptotic probability distribution for the minimum degree of the network, and establish the asymptotically exact probability for the property that the minimum degree is at least an arbitrary value. Numerical experiments confirm the validity of our analytical findings.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128021791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"LDPC convolutional codes versus QC LDPC block codes in communication standard scenarios","authors":"I. Bocharova, B. Kudryashov, R. Johannesson","doi":"10.1109/ISIT.2014.6875339","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875339","url":null,"abstract":"Outstanding asymptotical performance demonstrated by low-density parity-check (LDPC) convolutional codes (CC) makes them strong competitors with respect to quasi-cyclic (QC) LDPC block codes (BC) currently used in a variety of communication standards. However, typically communication standards, for example, DVB-S2 or WIMax standards impose rather serious restrictions on the structure of the employed codes. These restrictions are related to different implementation issues such as existence of low-complexity encoding and decoding, short decoding delay etc. Two scenarios are considered. In one scenario, short-delay and low-complexity constraints are taken into account. In the other scenario, the complexity requirement is relaxed. Both LDPC CCs and QC LDPC BCs with optimized degree distribution and girth profile, which enable low-complexity encoding, are constructed for these scenarios. Having both delay and complexity constraints yields QC LDPC BCs that outperform the LDPC CCs. In this scenario LDPC CCs play an important role mostly for constructing tailbiting QC LDPC BCs. On the other hand, assuming only a decoding delay constraint the LDPC CCs can be superior compared to the QC LDPC BCs at the relatively low signal-to-noise ratio region. Moreover, under practically acceptable decoding delays also the LDPC CCs with low-complexity encoding structure beat records in approaching the Shannon limit. A new LDPC CC is presented achieving the BER 10-7 with decoding delay 96000 bits at 0.62 dB, that is, performing only about 0.43 dB from the Shannon limit.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"97 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125210668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dispersion of quasi-static MIMO fading channels via Stokes' theorem","authors":"Wei Yang, G. Durisi, T. Koch, Yury Polyanskiy","doi":"10.1109/ISIT.2014.6875198","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875198","url":null,"abstract":"This paper analyzes the channel dispersion of quasi-static multiple-input multiple-output fading channels with no channel state information at the transmitter. We show that the channel dispersion is zero under mild conditions on the fading distribution. The proof of our result is based on Stokes' theorem, which deals with the integration of differential forms on manifolds with boundary.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"62 22","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120816896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Absorbing set characterization of array-based spatially coupled LDPC codes","authors":"David G. M. Mitchell, L. Dolecek, D. Costello","doi":"10.1109/ISIT.2014.6874960","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6874960","url":null,"abstract":"Absorbing sets are combinatorially defined objects existing in the Tanner graph of a low-density parity-check (LDPC) code that have been shown to cause failures in the iterative message-passing decoder when transmission occurs over the additive white Gaussian noise channel. In this paper, we study the absorbing set properties of a class of high-rate array-based spatially coupled LDPC (SC-LDPC) codes that are constructed by coupling together L array-based LDPC block codes. We prove that the smallest absorbing sets existing in the Tanner graph of the SC-LDPC code have the same size as those in the corresponding uncoupled LDPC codes, and the number of such sets grow linearly with L. We show that spatial coupling greatly reduces the average number (per symbol) of minimal sets compared to the uncoupled codes, and we explain that this reduction is due to many absorbing sets and small cycles being `broken' by the coupling process. The large reduction in the number of minimal absorbing sets suggests that array-based SC-LDPC codes will have significantly improved decoding performance in the high signal-to-noise ratio regime compared to the corresponding uncoupled LDPC codes.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127119414","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the upper bound on undetected error probability for LDPC code","authors":"P. Rybin, V. Zyablov","doi":"10.1109/ISIT.2014.6875417","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875417","url":null,"abstract":"This paper deals with the method of undetected error probability estimation for a low-density parity-check (LDPC) code under any given iterative decoding algorithm. We propose such modification of a given iterative decoding algorithm, that almost preserves a decoding failure exponent and decoding complexity of this algorithm. We obtain the upper bound on the undetected error probability for the modified algorithm. We show how to use the proposed method to estimate the undetected error probability of LDPC code under the belief propagation (BP) algorithm at the end of this paper.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125119055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"List decoding of crisscross error patterns","authors":"A. Wachter-Zeh","doi":"10.1109/ISIT.2014.6875030","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875030","url":null,"abstract":"List decoding of crisscross errors in arrays over finite fields is considered. A Johnson-like upper bound on the maximum list size in the cover metric is derived, showing that the list of codewords has polynomial size up to a certain radius. Further, a simple list decoding algorithm for a known optimal code construction is presented, which decodes errors in the cover metric up to our upper bound. These results reveal significant differences between the cover metric and the rank metric.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125827801","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The induced correlations of Zadoff-Chu sequences","authors":"Tae-Kyo Lee, Kyeongcheol Yang","doi":"10.1109/ISIT.2014.6875113","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875113","url":null,"abstract":"The induced correlations of a pair of sequences are defined as the full-period correlations between the linear phase-shifting sequences of one of the given pair and the other one. This concept was introduced in the analysis of their partial-period correlations which are an important performance measurement of the employed communication system. In this paper, we investigate the induced correlations of Zadoff-Chu sequences in a transform approach. For a pair of Zadoff-Chu sequences, we first compute the spectrums of their induced correlations. By taking the inverse discrete Fourier transform (IDFT) on these spectrums, we then derive their induced correlations in a closed form. As a result, we show that their induced correlations can be viewed as expanded and scaled Zadoff-Chu sequences of a smaller period. Not only does our approach give the magnitudes of the induced correlations of Zadoff-Chu sequences, but it also gives the phase information which is applicable to computation of their partial-period correlations.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125388265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}