{"title":"Efficient subnetwork selection in relay networks","authors":"Siddhartha Brahma, Ayan Sengupta, C. Fragouli","doi":"10.1109/ISIT.2014.6875169","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875169","url":null,"abstract":"We consider a source that would like to communicate with a destination over a layered Gaussian relay network.We present a computationally efficient method that enables to select a near-optimal (in terms of throughput) subnetwork of a given size connecting the source with the destination. Our method starts by formulating an integer optimization problem that maximizes the rates that the Quantize-Map-and-Forward relaying protocol can achieve over a selected subnetwork; we then relax the integer constraints to obtain a non-linear optimization over reals. For diamond networks, we prove that this optimization over reals is concave while for general layered networks we give empirical demonstrations of near-concavity, paving the way for efficient algorithms to solve the relaxed problem. We then round the relaxed solution to select a specific subnetwork. Simulations using off-the-shelf non-linear optimization algorithms demonstrate excellent performance with respect to the true integer optimum for both diamond networks as well as multi-layered networks. Even with these non-customized algorithms, significant time savings are observed vis-à-vis exhaustive integer optimization.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129272453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Scrutinizing the average error probability for Nakagami fading channels","authors":"G. Alirezaei, R. Mathar","doi":"10.1109/ISIT.2014.6875361","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875361","url":null,"abstract":"The ultimate goal of the present paper is to provide mathematical tools for dealing with the complicated average error probability (AEP) in Nakagami fading channels. This is useful for analytical investigations as well as alleviating computational effort in simulations or on-line computations. We hence thoroughly analyze the mathematical structure of the AEP over Nakagami fading channels. First, the AEP is re-parameterized to obtain a mathematically concise form. The main contributions are then as follows. An ordinary differential equation is set up, which has the AEP as a solution. By this approach, a new representation of the AEP is found, which merely needs integration over a broken rational function. This paves the way to numerous amazing relations of the AEP, e.g., to the Gaussian hypergeometric and the incomplete beta function. Moreover, monotonicity and log-convexity are demonstrated. Finally, asymptotic expansions of the AEP are given.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125429179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One helper source coding problem for a class of correlated sources with memory","authors":"Y. Oohama","doi":"10.1109/ISIT.2014.6874899","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6874899","url":null,"abstract":"We consider the one helper source coding problem posed and investigated by Ahlswede, Körner, and Wyner for a class of information sources with memory. For this class of information sources we give explicit inner and outer bounds of the admissible rate region. We also give one nontrivial example for the inner and outer bounds to match.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121584051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Polarized random variables: Maximal correlations and common information","authors":"Naveen Goela","doi":"10.1109/ISIT.2014.6875112","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875112","url":null,"abstract":"New theorems are established regarding polarized Bernoulli random variables: (i) The maximal correlations between polarized Bernoulli variables converge to zero or one as do the conditional entropy and Bhattacharyya parameters; (ii) The graphical model of polarized Bernoulli variables provides a way to compute pair-wise and higher-order correlations; (iii) The Wyner common information between two sequences of correlated random variables may be extracted using Arikan's polar transform which leads to a low-complexity solution to the Wyner network. In addition, a joint polarization theorem is provided involving common information.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121261590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An information-spectrum approach to weak variable-length Slepian-Wolf coding","authors":"S. Kuzuoka, Shun Watanabe","doi":"10.1109/ISIT.2014.6875321","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875321","url":null,"abstract":"In this paper, we investigate weak variable-length Slepian-Wolf (VL-SW) coding of general sources. First, by using the information-spectrum method, we show novel non-asymptotic trade-off between the error probability and the codeword length of VL-SW coding. Then, we give an asymptotic formula for the optimal coding rate achievable by VL-SW coding. Especially, we investigate VL-SW coding for mixed sources. Our results spotlights the fact that distinguishability between component sources plays an important role in adjusting the coding rate at the encoder. We also demonstrate that our general results derive a known formula for the optimal achievable rate of VL-SW coding for mixture of i.i.d. sources and extend to countably infinite alphabet case with mild condition.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116752268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cumulant generating function of codeword lengths in optimal lossless compression","authors":"T. Courtade, S. Verdú","doi":"10.1109/ISIT.2014.6875283","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875283","url":null,"abstract":"This paper analyzes the distribution of the codeword lengths of the optimal lossless compression code without prefix constraints both in the non-asymptotic regime and in the asymptotic regime. The technique we use is based on upper and lower bounding the cumulant generating function of the optimum codeword lengths. In the context of prefix codes, the normalized version of this quantity was proposed by Campbell in 1965 as a generalized average length. We then use the one-shot bounds to analyze the large deviations (reliability function) and small deviations (normal approximation) of the asymptotic fundamental limit in the case of memoryless sources. In contrast to other approaches based on the method of types or the Berry-Esséen inequality, we are able to deal with sources with infinite alphabets.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dejian Xu, Kittipong Kittichokechai, T. Oechtering, M. Skoglund
{"title":"Secure successive refinement with degraded side information","authors":"Dejian Xu, Kittipong Kittichokechai, T. Oechtering, M. Skoglund","doi":"10.1109/ISIT.2014.6875319","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875319","url":null,"abstract":"In this paper, we investigate the problem of successive refinement with side information (SI) under secrecy constraint. In particular, under classical successive refinement coding scheme, there are degraded SI sequences Yn and Zn at two decoders and En at the eavesdropper. Based on the status of two switches, three different cases are investigated. In case 1 and 3, the eavesdropper only observes output of encoder 1 and 2, respectively, while in case 2, the eavesdropper observes outputs of both encoder 1 and 2. The Markov chain X - Y - (Z, E) holds in all cases. The equivocation is measured by the normalized entropy of source sequence conditioned on the observation of eavesdropper. We completely characterize the rate-distortion-equivocation regions for all three cases, and show that layered coding is optimal. Finally, a binary source example is given.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124948784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the design and throughput analysis of a new MME detector using Bartlett's method","authors":"E. G. Yousif, T. Ratnarajah","doi":"10.1109/ISIT.2014.6875406","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875406","url":null,"abstract":"Detection of primary users is a very crucial task for cognitive radio networks. On the other hand, the choice of the spectrum sensing algorithm affects the achievable throughput of the secondary network when the cognitive radios employ the interweave approach. Focusing on the eigenvalue-based detector, it can be seen that most proposed methods are based on time domain. Therefore, in this paper we present and analyse a new class of eigenvalue detectors in frequency domain (FD). The major contributions of this paper are of two parts. First, we introduce a new minimum-maximum eigenvalue (MME) spectrum sensing method based on Bartlett's method of estimation. By making use of the eigenvalues of the diagonalized quadratic form representation of Bartlett's estimate, the distribution of the ratio of extreme eigenvalues is studied, and then the performance of the detector is addressed and accurate expressions where obtained for the probabilities of false alarm and detection. Second, assuming that the secondary network employs an interweave approach we study the average achievable throughput. All obtained formulas are verified through Monte Carlo simulations. The obtained results gives an insight into the validity of using MME detection in FD.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125100257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A novel collusion attack on finite alphabet digital fingerprinting systems","authors":"Jalal Etesami, N. Kiyavash","doi":"10.1109/ISIT.2014.6875231","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875231","url":null,"abstract":"To be considered for an IEEE Jack Keil Wolf ISIT Student Paper Award. This paper proposes a novel, non-linear collusion attack on digital fingerprints from a finite alphabet. We analyze the error probability of this attack for some classes of proposed random and deterministic schemes. We then obtain a threshold on the number of colluders necessary to correctly estimate the host signal. Our simulation results show that our attack is more powerful in practice than predicted by the theoretical threshold.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131266668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stable grassmann manifold embedding via Gaussian random matrices","authors":"Hailong Shi, Hao Zhang, Gang Li, Xiqin Wang","doi":"10.1109/ISIT.2014.6875310","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875310","url":null,"abstract":"Compressive Sensing (CS) provides a new perspective for dimensionnality reduction without compromising performance. The theoretical foundation for most of existing studies of CS is a stable embedding (i.e., a distance-preserving property) of certain low-dimensional signal models such as sparse signals or signals in a union of linear subspaces. However, few existing literatures clearly discussed the embedding effect of points on the Grassmann manifold in under-sampled linear measurement systems. In this paper, we explore the stable embedding property of multi-dimensional signals based on Grassmann manifold, which is a topological space with each point being a linear subspace of ℝN (or ℂN), via the Gaussian random matrices. It should be noted that the stability mentioned here is about the volume-preserving instead of distance-preserving, because volume is the key characteristic for linear subspace spanned by multiple vectors. The theorem of the volume-preserving stable embedding property is proposed, and sketched proofs as well as discussions about our theorem is also given.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131421328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}