2014 IEEE International Symposium on Information Theory最新文献

筛选
英文 中文
Multi-terminal joint transceiver design for MIMO systems with contaminated source and individual power constraint 具有污染源和独立功率约束的MIMO系统多端联合收发器设计
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875402
Yang Liu, T. Li, Xuanxuan Lu
{"title":"Multi-terminal joint transceiver design for MIMO systems with contaminated source and individual power constraint","authors":"Yang Liu, T. Li, Xuanxuan Lu","doi":"10.1109/ISIT.2014.6875402","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875402","url":null,"abstract":"This paper considers optimal transceiver design for a multi-terminal multi-inputmulti-output (MIMO) system, where L sensors wirelessly communicate individually-contaminated observations of the same source to the fusion center. The constraint that each sensor has individual power cap significantly complicates the non-convex optimization problem, and the optimal (linear) precoding and postcoding are not previously known. Using the signal-to-noise-ratio (SNR) as the performance metric, and employing the alternative minimization approach, we decompose the original problem into multiple subproblems that will run iteratively. The key results include the development of a closed-form solution to the optimal postcoder given the precoders, and the development of a closed-form solution for the ε-optimal precoders given the postcoder. The former is achieved via eigenvalue decomposition, and the latter is achieved by bounding the optimal solutions from above and from below, designing a series of fast-converging bisection search, and developing the closed-form analytical solution for each search. The convergence and the complexity of the proposed algorithm is analyzed and simulations are provided to confirm the efficiency of our proposal.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127419756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Medium access control game with an enhanced physical-link layer interface 介质访问控制游戏具有增强的物理链路层接口
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875136
Yanru Tang, Tiegang Zhao, Jie Luo
{"title":"Medium access control game with an enhanced physical-link layer interface","authors":"Yanru Tang, Tiegang Zhao, Jie Luo","doi":"10.1109/ISIT.2014.6875136","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875136","url":null,"abstract":"We consider distributed medium access control in a wireless network where each link layer user (transmitter) is equipped with multiple transmission options as opposed to the classical binary options of transmitting/idling. In each time slot, a user randomly chooses a transmission option according to a “transmission probability vector”. Packets sent by the users are either received or lost depending on whether reliable decoding is supported by the communication channel. We propose a game theoretic model for distributed medium access control where each user adapts its transmission probability vector to maximize a utility function. Condition under which the medium access control game has a unique Nash equilibrium is obtained. Simulation results show that, when multiple transmission options are provided, users in a distributed network tend to converge to channel sharing schemes that are consistent with the well-known information theoretic understandings.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115451076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Algorithms for computing network coding rate regions via single element extensions of matroids 利用拟阵的单元素扩展计算网络编码率区域的算法
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875245
Jayant Apte, Congduan Li, J. Walsh
{"title":"Algorithms for computing network coding rate regions via single element extensions of matroids","authors":"Jayant Apte, Congduan Li, J. Walsh","doi":"10.1109/ISIT.2014.6875245","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875245","url":null,"abstract":"We propose algorithms for finding extreme rays of rate regions achievable with vector linear codes over finite fields Fq, q ∈ {2, 3, 4} for which there are known forbidden minors for matroid representability. We use the idea of single element extensions (SEEs) of matroids and enumeration of non-isomorphic matroids using SEEs, to first propose an algorithm to obtain lists of all non-isomorphic matroids representable over a given finite field.We modify this algorithm to produce only the list of all non-isomorphic connected matroids representable over the given finite field. We then integrate the process of testing which matroids in a list of matroids form valid linear network codes for a given network within matroid enumeration. We name this algorithm, which essentially builds all matroids that form valid network codes for a given network from scratch, as network-constrained matroid enumeration.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115939229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Compression for similarity identification: Fundamental limits 相似性识别的压缩:基本限制
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6874783
A. Ingber, T. Weissman
{"title":"Compression for similarity identification: Fundamental limits","authors":"A. Ingber, T. Weissman","doi":"10.1109/ISIT.2014.6874783","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6874783","url":null,"abstract":"We study the problem of compressing a source for the goal of answering similarity queries from the compressed data. Unlike classical compression, here there is no requirement that the source be reproduced from the compressed form. For discrete memoryless sources and an arbitrary similarity measure, we fully characterize the minimal compression rate that allows query answers, that are reliable in the sense of having a vanishing false-positive probability, when false negatives are not allowed. The result is partially based on a previous work by Ahlswede et al. [1], and the inherently typical subset lemma plays a key role in the converse proof. We then discuss the performance that is attainable by using schemes that use lossy source codes as a building block, and show that such schemes are, in general, suboptimal. Finally, we discuss the problem of computing the fundamental limit, and present numerical results.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124243364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Generalized binary independent component analysis 广义二元独立分量分析
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875048
Amichai Painsky, Saharon Rosset, M. Feder
{"title":"Generalized binary independent component analysis","authors":"Amichai Painsky, Saharon Rosset, M. Feder","doi":"10.1109/ISIT.2014.6875048","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875048","url":null,"abstract":"Independent component analysis (ICA) is a statistical method for transforming an observed multidimensional random vector into components that are as statistically independent as possible from each other. Usually the ICA framework assumes a model according to which the observations are generated (generative function, additive noise). Binary ICA (BICA) is a special case of ICA in which both the observations and the independent components are over the binary field GF(2). In this work we introduce a generalized BICA framework in which an observation vector is decomposed to its independent components (as much as possible) with no prior assumption on the way it was generated. We propose several theorems and show that this NP hard problem can be accurately solved with a branch and bound search tree algorithm, or tightly approximated with a series of linear programs. BICA was shown to have applications in many domains including medical diagnosis, multi-cluster assignment, network tomography and internet resource management. We suggest that BICA also applies in source coding; we argue that instead of generating statistically independent prediction errors, as in predictive coding, an improved encoder shall assemble a vector of observations and apply the generalized BICA on it. This is shown to achieve improved performance at the cost of introducing some time delay (working in batch).","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124285176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Group testing for non-uniformly quantized adder channels 非均匀量化加法器信道的群测试
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875254
A. Emad, O. Milenkovic
{"title":"Group testing for non-uniformly quantized adder channels","authors":"A. Emad, O. Milenkovic","doi":"10.1109/ISIT.2014.6875254","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875254","url":null,"abstract":"We present a new family of codes for non-uniformly quantized adder channels. Quantized adder channels are generalizations of group testing models, which were studied under the name of semi-quantitative group testing. We describe non-binary group testing schemes in which the test matrices are generated by concatenating scaled disjunct codebooks, with the scaling parameters determined through lexicographical ordering constraints. In addition, we propose simple iterative decoding methods for one class of such codes.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114692860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Optimal strategies for dynamic joint source-channel coding with feedback 带反馈的动态联合源信道编码优化策略
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875088
Se Yong Park, T. Javidi, A. Goldsmith
{"title":"Optimal strategies for dynamic joint source-channel coding with feedback","authors":"Se Yong Park, T. Javidi, A. Goldsmith","doi":"10.1109/ISIT.2014.6875088","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875088","url":null,"abstract":"The optimal strategy for dynamic joint source-channel coding with feedback was recently shown to be a simple mapping between the source symbols and channel inputs, where the mapping only depends on the decoder's posterior belief about the source. In this work, we derive the optimal joint source-channel coding strategies for two specific channels - binary erasure channels and Z-channels. It is found that the mappings required for the optimal strategies and the way they are used vary significantly with the channel cost of transmission.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114944920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars 拦截加密协议中的令牌:帝国在克隆战争中反击
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875089
Özgür Dagdelen, M. Fischlin
{"title":"Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars","authors":"Özgür Dagdelen, M. Fischlin","doi":"10.1109/ISIT.2014.6875089","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875089","url":null,"abstract":"Achieving information-theoretically secure key exchange between two parties requires some “hardware set-up”, like the possibility to transmit quantum bits. An alternative approach, which recently emerged in the crypto community, is to use tamper-resistant hardware tokens in protocols. However, such tokens need to be transmitted physically between parties, opening up the possibility to attack the actual transfer of the token, possibly in combination with attacks on the digital protocol. We discuss such interception attacks on cryptographic protocols which rely on trustworthy hardware like one-time memory tokens (Goldwasser et al., Crypto 2008). In such attacks the adversary can mount man-in-the-middle attacks and access, or even substitute, transmitted tokens. We show that many of the existing token-based protocols are vulnerable against this kind of attack, which typically lies outside of the previously considered security models. We also give a positive result for protocols remaining secure against such attacks. We present a very efficient protocol for password-based authenticated key exchange based on the weak model of one-time memory tokens. Our protocol only requires four moves, very basic operations, and the sender to send ℓ tokens in the first step for passwords of length ℓ. At the same time we achieve information-theoretic security in Canetti's universal composition framework (FOCS 2001) against adaptive adversaries (assuming reliable erasure), even if the tokens are not guaranteed to be transferred securely, i.e., even if the adversary can read or substitute transmitted tokens.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
The impact of phase fading on the dirty paper coding channel 相位衰落对脏纸编码信道的影响
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875241
S. Rini, S. Shamai
{"title":"The impact of phase fading on the dirty paper coding channel","authors":"S. Rini, S. Shamai","doi":"10.1109/ISIT.2014.6875241","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875241","url":null,"abstract":"The impact of phase fading and side information on the classic Costa's dirty paper coding channel is studied. A variation of this model is considered in which the channel state is affected by a phase fading sequence which is known at the receiver but not at the transmitter. Although the capacity of this channel has been established, it is expressed as the solution of the maximization which cannot be easily determined. To circumvent such difficulty, we derive alternative inner and outer bounds to capacity and determine a regime in which the two expressions are to within a finite distance. We consider two distributions of the phase fading process: circular binomial and circular uniform. For circular binomial fading we show that binning with Gaussian signaling approaches capacity, as in the channel without phase fading. When fading is circular uniform, instead, binning with Gaussian signaling is no longer effective and novel interference avoidance strategies are developed for this case.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"42 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116989003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Noisy feedback improves the Gaussian channel reliability function 噪声反馈改进了高斯信道可靠性函数
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875295
M. Burnashev, Hirosuke Yamamoto
{"title":"Noisy feedback improves the Gaussian channel reliability function","authors":"M. Burnashev, Hirosuke Yamamoto","doi":"10.1109/ISIT.2014.6875295","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875295","url":null,"abstract":"For information transmission a discrete time channel with independent additive Gaussian noise is used. There is also a feedback channel with independent additive Gaussian noise, and the transmitter observes without delay all outputs of the forward channel via that noisy feedback channel. Transmission of nonexponential number of messages is considered and the achievable decoding error exponent for such a combination of channels is investigated. Transmission/decoding method used in the paper generalizes and strengthens the earlier method used by authors for BSC and Gaussian channel. It allows to improve essentially earlier results. In particular, for small feedback noise, it allows to gain 33.3% (instead of 23.6% in earlier papers).","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123967481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信