{"title":"Multi-terminal joint transceiver design for MIMO systems with contaminated source and individual power constraint","authors":"Yang Liu, T. Li, Xuanxuan Lu","doi":"10.1109/ISIT.2014.6875402","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875402","url":null,"abstract":"This paper considers optimal transceiver design for a multi-terminal multi-inputmulti-output (MIMO) system, where L sensors wirelessly communicate individually-contaminated observations of the same source to the fusion center. The constraint that each sensor has individual power cap significantly complicates the non-convex optimization problem, and the optimal (linear) precoding and postcoding are not previously known. Using the signal-to-noise-ratio (SNR) as the performance metric, and employing the alternative minimization approach, we decompose the original problem into multiple subproblems that will run iteratively. The key results include the development of a closed-form solution to the optimal postcoder given the precoders, and the development of a closed-form solution for the ε-optimal precoders given the postcoder. The former is achieved via eigenvalue decomposition, and the latter is achieved by bounding the optimal solutions from above and from below, designing a series of fast-converging bisection search, and developing the closed-form analytical solution for each search. The convergence and the complexity of the proposed algorithm is analyzed and simulations are provided to confirm the efficiency of our proposal.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127419756","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Medium access control game with an enhanced physical-link layer interface","authors":"Yanru Tang, Tiegang Zhao, Jie Luo","doi":"10.1109/ISIT.2014.6875136","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875136","url":null,"abstract":"We consider distributed medium access control in a wireless network where each link layer user (transmitter) is equipped with multiple transmission options as opposed to the classical binary options of transmitting/idling. In each time slot, a user randomly chooses a transmission option according to a “transmission probability vector”. Packets sent by the users are either received or lost depending on whether reliable decoding is supported by the communication channel. We propose a game theoretic model for distributed medium access control where each user adapts its transmission probability vector to maximize a utility function. Condition under which the medium access control game has a unique Nash equilibrium is obtained. Simulation results show that, when multiple transmission options are provided, users in a distributed network tend to converge to channel sharing schemes that are consistent with the well-known information theoretic understandings.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115451076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithms for computing network coding rate regions via single element extensions of matroids","authors":"Jayant Apte, Congduan Li, J. Walsh","doi":"10.1109/ISIT.2014.6875245","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875245","url":null,"abstract":"We propose algorithms for finding extreme rays of rate regions achievable with vector linear codes over finite fields Fq, q ∈ {2, 3, 4} for which there are known forbidden minors for matroid representability. We use the idea of single element extensions (SEEs) of matroids and enumeration of non-isomorphic matroids using SEEs, to first propose an algorithm to obtain lists of all non-isomorphic matroids representable over a given finite field.We modify this algorithm to produce only the list of all non-isomorphic connected matroids representable over the given finite field. We then integrate the process of testing which matroids in a list of matroids form valid linear network codes for a given network within matroid enumeration. We name this algorithm, which essentially builds all matroids that form valid network codes for a given network from scratch, as network-constrained matroid enumeration.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115939229","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Compression for similarity identification: Fundamental limits","authors":"A. Ingber, T. Weissman","doi":"10.1109/ISIT.2014.6874783","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6874783","url":null,"abstract":"We study the problem of compressing a source for the goal of answering similarity queries from the compressed data. Unlike classical compression, here there is no requirement that the source be reproduced from the compressed form. For discrete memoryless sources and an arbitrary similarity measure, we fully characterize the minimal compression rate that allows query answers, that are reliable in the sense of having a vanishing false-positive probability, when false negatives are not allowed. The result is partially based on a previous work by Ahlswede et al. [1], and the inherently typical subset lemma plays a key role in the converse proof. We then discuss the performance that is attainable by using schemes that use lossy source codes as a building block, and show that such schemes are, in general, suboptimal. Finally, we discuss the problem of computing the fundamental limit, and present numerical results.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124243364","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Generalized binary independent component analysis","authors":"Amichai Painsky, Saharon Rosset, M. Feder","doi":"10.1109/ISIT.2014.6875048","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875048","url":null,"abstract":"Independent component analysis (ICA) is a statistical method for transforming an observed multidimensional random vector into components that are as statistically independent as possible from each other. Usually the ICA framework assumes a model according to which the observations are generated (generative function, additive noise). Binary ICA (BICA) is a special case of ICA in which both the observations and the independent components are over the binary field GF(2). In this work we introduce a generalized BICA framework in which an observation vector is decomposed to its independent components (as much as possible) with no prior assumption on the way it was generated. We propose several theorems and show that this NP hard problem can be accurately solved with a branch and bound search tree algorithm, or tightly approximated with a series of linear programs. BICA was shown to have applications in many domains including medical diagnosis, multi-cluster assignment, network tomography and internet resource management. We suggest that BICA also applies in source coding; we argue that instead of generating statistically independent prediction errors, as in predictive coding, an improved encoder shall assemble a vector of observations and apply the generalized BICA on it. This is shown to achieve improved performance at the cost of introducing some time delay (working in batch).","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"194 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124285176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Group testing for non-uniformly quantized adder channels","authors":"A. Emad, O. Milenkovic","doi":"10.1109/ISIT.2014.6875254","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875254","url":null,"abstract":"We present a new family of codes for non-uniformly quantized adder channels. Quantized adder channels are generalizations of group testing models, which were studied under the name of semi-quantitative group testing. We describe non-binary group testing schemes in which the test matrices are generated by concatenating scaled disjunct codebooks, with the scaling parameters determined through lexicographical ordering constraints. In addition, we propose simple iterative decoding methods for one class of such codes.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114692860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimal strategies for dynamic joint source-channel coding with feedback","authors":"Se Yong Park, T. Javidi, A. Goldsmith","doi":"10.1109/ISIT.2014.6875088","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875088","url":null,"abstract":"The optimal strategy for dynamic joint source-channel coding with feedback was recently shown to be a simple mapping between the source symbols and channel inputs, where the mapping only depends on the decoder's posterior belief about the source. In this work, we derive the optimal joint source-channel coding strategies for two specific channels - binary erasure channels and Z-channels. It is found that the mappings required for the optimal strategies and the way they are used vary significantly with the channel cost of transmission.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114944920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Intercepting tokens in cryptographic protocols: The empire strikes back in the clone wars","authors":"Özgür Dagdelen, M. Fischlin","doi":"10.1109/ISIT.2014.6875089","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875089","url":null,"abstract":"Achieving information-theoretically secure key exchange between two parties requires some “hardware set-up”, like the possibility to transmit quantum bits. An alternative approach, which recently emerged in the crypto community, is to use tamper-resistant hardware tokens in protocols. However, such tokens need to be transmitted physically between parties, opening up the possibility to attack the actual transfer of the token, possibly in combination with attacks on the digital protocol. We discuss such interception attacks on cryptographic protocols which rely on trustworthy hardware like one-time memory tokens (Goldwasser et al., Crypto 2008). In such attacks the adversary can mount man-in-the-middle attacks and access, or even substitute, transmitted tokens. We show that many of the existing token-based protocols are vulnerable against this kind of attack, which typically lies outside of the previously considered security models. We also give a positive result for protocols remaining secure against such attacks. We present a very efficient protocol for password-based authenticated key exchange based on the weak model of one-time memory tokens. Our protocol only requires four moves, very basic operations, and the sender to send ℓ tokens in the first step for passwords of length ℓ. At the same time we achieve information-theoretic security in Canetti's universal composition framework (FOCS 2001) against adaptive adversaries (assuming reliable erasure), even if the tokens are not guaranteed to be transferred securely, i.e., even if the adversary can read or substitute transmitted tokens.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116907288","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The impact of phase fading on the dirty paper coding channel","authors":"S. Rini, S. Shamai","doi":"10.1109/ISIT.2014.6875241","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875241","url":null,"abstract":"The impact of phase fading and side information on the classic Costa's dirty paper coding channel is studied. A variation of this model is considered in which the channel state is affected by a phase fading sequence which is known at the receiver but not at the transmitter. Although the capacity of this channel has been established, it is expressed as the solution of the maximization which cannot be easily determined. To circumvent such difficulty, we derive alternative inner and outer bounds to capacity and determine a regime in which the two expressions are to within a finite distance. We consider two distributions of the phase fading process: circular binomial and circular uniform. For circular binomial fading we show that binning with Gaussian signaling approaches capacity, as in the channel without phase fading. When fading is circular uniform, instead, binning with Gaussian signaling is no longer effective and novel interference avoidance strategies are developed for this case.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"42 1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116989003","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Noisy feedback improves the Gaussian channel reliability function","authors":"M. Burnashev, Hirosuke Yamamoto","doi":"10.1109/ISIT.2014.6875295","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875295","url":null,"abstract":"For information transmission a discrete time channel with independent additive Gaussian noise is used. There is also a feedback channel with independent additive Gaussian noise, and the transmitter observes without delay all outputs of the forward channel via that noisy feedback channel. Transmission of nonexponential number of messages is considered and the achievable decoding error exponent for such a combination of channels is investigated. Transmission/decoding method used in the paper generalizes and strengthens the earlier method used by authors for BSC and Gaussian channel. It allows to improve essentially earlier results. In particular, for small feedback noise, it allows to gain 33.3% (instead of 23.6% in earlier papers).","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123967481","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}