2014 IEEE International Symposium on Information Theory最新文献

筛选
英文 中文
Efficient subnetwork selection in relay networks 中继网络中有效的子网选择
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875169
Siddhartha Brahma, Ayan Sengupta, C. Fragouli
{"title":"Efficient subnetwork selection in relay networks","authors":"Siddhartha Brahma, Ayan Sengupta, C. Fragouli","doi":"10.1109/ISIT.2014.6875169","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875169","url":null,"abstract":"We consider a source that would like to communicate with a destination over a layered Gaussian relay network.We present a computationally efficient method that enables to select a near-optimal (in terms of throughput) subnetwork of a given size connecting the source with the destination. Our method starts by formulating an integer optimization problem that maximizes the rates that the Quantize-Map-and-Forward relaying protocol can achieve over a selected subnetwork; we then relax the integer constraints to obtain a non-linear optimization over reals. For diamond networks, we prove that this optimization over reals is concave while for general layered networks we give empirical demonstrations of near-concavity, paving the way for efficient algorithms to solve the relaxed problem. We then round the relaxed solution to select a specific subnetwork. Simulations using off-the-shelf non-linear optimization algorithms demonstrate excellent performance with respect to the true integer optimum for both diamond networks as well as multi-layered networks. Even with these non-customized algorithms, significant time savings are observed vis-à-vis exhaustive integer optimization.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129272453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Scrutinizing the average error probability for Nakagami fading channels 中上衰落信道的平均误差概率研究
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875361
G. Alirezaei, R. Mathar
{"title":"Scrutinizing the average error probability for Nakagami fading channels","authors":"G. Alirezaei, R. Mathar","doi":"10.1109/ISIT.2014.6875361","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875361","url":null,"abstract":"The ultimate goal of the present paper is to provide mathematical tools for dealing with the complicated average error probability (AEP) in Nakagami fading channels. This is useful for analytical investigations as well as alleviating computational effort in simulations or on-line computations. We hence thoroughly analyze the mathematical structure of the AEP over Nakagami fading channels. First, the AEP is re-parameterized to obtain a mathematically concise form. The main contributions are then as follows. An ordinary differential equation is set up, which has the AEP as a solution. By this approach, a new representation of the AEP is found, which merely needs integration over a broken rational function. This paves the way to numerous amazing relations of the AEP, e.g., to the Gaussian hypergeometric and the incomplete beta function. Moreover, monotonicity and log-convexity are demonstrated. Finally, asymptotic expansions of the AEP are given.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125429179","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
One helper source coding problem for a class of correlated sources with memory 一类具有内存的相关源的辅助源编码问题
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6874899
Y. Oohama
{"title":"One helper source coding problem for a class of correlated sources with memory","authors":"Y. Oohama","doi":"10.1109/ISIT.2014.6874899","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6874899","url":null,"abstract":"We consider the one helper source coding problem posed and investigated by Ahlswede, Körner, and Wyner for a class of information sources with memory. For this class of information sources we give explicit inner and outer bounds of the admissible rate region. We also give one nontrivial example for the inner and outer bounds to match.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"331 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121584051","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Polarized random variables: Maximal correlations and common information 极化随机变量:最大相关性和共同信息
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875112
Naveen Goela
{"title":"Polarized random variables: Maximal correlations and common information","authors":"Naveen Goela","doi":"10.1109/ISIT.2014.6875112","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875112","url":null,"abstract":"New theorems are established regarding polarized Bernoulli random variables: (i) The maximal correlations between polarized Bernoulli variables converge to zero or one as do the conditional entropy and Bhattacharyya parameters; (ii) The graphical model of polarized Bernoulli variables provides a way to compute pair-wise and higher-order correlations; (iii) The Wyner common information between two sequences of correlated random variables may be extracted using Arikan's polar transform which leads to a low-complexity solution to the Wyner network. In addition, a joint polarization theorem is provided involving common information.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121261590","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
An information-spectrum approach to weak variable-length Slepian-Wolf coding 弱变长睡眠狼编码的信息谱方法
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875321
S. Kuzuoka, Shun Watanabe
{"title":"An information-spectrum approach to weak variable-length Slepian-Wolf coding","authors":"S. Kuzuoka, Shun Watanabe","doi":"10.1109/ISIT.2014.6875321","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875321","url":null,"abstract":"In this paper, we investigate weak variable-length Slepian-Wolf (VL-SW) coding of general sources. First, by using the information-spectrum method, we show novel non-asymptotic trade-off between the error probability and the codeword length of VL-SW coding. Then, we give an asymptotic formula for the optimal coding rate achievable by VL-SW coding. Especially, we investigate VL-SW coding for mixed sources. Our results spotlights the fact that distinguishability between component sources plays an important role in adjusting the coding rate at the encoder. We also demonstrate that our general results derive a known formula for the optimal achievable rate of VL-SW coding for mixture of i.i.d. sources and extend to countably infinite alphabet case with mild condition.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116752268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Cumulant generating function of codeword lengths in optimal lossless compression 最优无损压缩中码字长度累积量生成函数
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875283
T. Courtade, S. Verdú
{"title":"Cumulant generating function of codeword lengths in optimal lossless compression","authors":"T. Courtade, S. Verdú","doi":"10.1109/ISIT.2014.6875283","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875283","url":null,"abstract":"This paper analyzes the distribution of the codeword lengths of the optimal lossless compression code without prefix constraints both in the non-asymptotic regime and in the asymptotic regime. The technique we use is based on upper and lower bounding the cumulant generating function of the optimum codeword lengths. In the context of prefix codes, the normalized version of this quantity was proposed by Campbell in 1965 as a generalized average length. We then use the one-shot bounds to analyze the large deviations (reliability function) and small deviations (normal approximation) of the asymptotic fundamental limit in the case of memoryless sources. In contrast to other approaches based on the method of types or the Berry-Esséen inequality, we are able to deal with sources with infinite alphabets.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123837250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Secure successive refinement with degraded side information 安全的连续细化与退化的侧信息
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875319
Dejian Xu, Kittipong Kittichokechai, T. Oechtering, M. Skoglund
{"title":"Secure successive refinement with degraded side information","authors":"Dejian Xu, Kittipong Kittichokechai, T. Oechtering, M. Skoglund","doi":"10.1109/ISIT.2014.6875319","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875319","url":null,"abstract":"In this paper, we investigate the problem of successive refinement with side information (SI) under secrecy constraint. In particular, under classical successive refinement coding scheme, there are degraded SI sequences Yn and Zn at two decoders and En at the eavesdropper. Based on the status of two switches, three different cases are investigated. In case 1 and 3, the eavesdropper only observes output of encoder 1 and 2, respectively, while in case 2, the eavesdropper observes outputs of both encoder 1 and 2. The Markov chain X - Y - (Z, E) holds in all cases. The equivocation is measured by the normalized entropy of source sequence conditioned on the observation of eavesdropper. We completely characterize the rate-distortion-equivocation regions for all three cases, and show that layered coding is optimal. Finally, a binary source example is given.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124948784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the design and throughput analysis of a new MME detector using Bartlett's method 基于Bartlett方法的新型MME检测器的设计与通量分析
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875406
E. G. Yousif, T. Ratnarajah
{"title":"On the design and throughput analysis of a new MME detector using Bartlett's method","authors":"E. G. Yousif, T. Ratnarajah","doi":"10.1109/ISIT.2014.6875406","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875406","url":null,"abstract":"Detection of primary users is a very crucial task for cognitive radio networks. On the other hand, the choice of the spectrum sensing algorithm affects the achievable throughput of the secondary network when the cognitive radios employ the interweave approach. Focusing on the eigenvalue-based detector, it can be seen that most proposed methods are based on time domain. Therefore, in this paper we present and analyse a new class of eigenvalue detectors in frequency domain (FD). The major contributions of this paper are of two parts. First, we introduce a new minimum-maximum eigenvalue (MME) spectrum sensing method based on Bartlett's method of estimation. By making use of the eigenvalues of the diagonalized quadratic form representation of Bartlett's estimate, the distribution of the ratio of extreme eigenvalues is studied, and then the performance of the detector is addressed and accurate expressions where obtained for the probabilities of false alarm and detection. Second, assuming that the secondary network employs an interweave approach we study the average achievable throughput. All obtained formulas are verified through Monte Carlo simulations. The obtained results gives an insight into the validity of using MME detection in FD.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125100257","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A novel collusion attack on finite alphabet digital fingerprinting systems 有限字母数字指纹系统的一种新型合谋攻击
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875231
Jalal Etesami, N. Kiyavash
{"title":"A novel collusion attack on finite alphabet digital fingerprinting systems","authors":"Jalal Etesami, N. Kiyavash","doi":"10.1109/ISIT.2014.6875231","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875231","url":null,"abstract":"To be considered for an IEEE Jack Keil Wolf ISIT Student Paper Award. This paper proposes a novel, non-linear collusion attack on digital fingerprints from a finite alphabet. We analyze the error probability of this attack for some classes of proposed random and deterministic schemes. We then obtain a threshold on the number of colluders necessary to correctly estimate the host signal. Our simulation results show that our attack is more powerful in practice than predicted by the theoretical threshold.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131266668","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Stable grassmann manifold embedding via Gaussian random matrices 基于高斯随机矩阵的稳定格拉斯曼流形嵌入
2014 IEEE International Symposium on Information Theory Pub Date : 2014-08-11 DOI: 10.1109/ISIT.2014.6875310
Hailong Shi, Hao Zhang, Gang Li, Xiqin Wang
{"title":"Stable grassmann manifold embedding via Gaussian random matrices","authors":"Hailong Shi, Hao Zhang, Gang Li, Xiqin Wang","doi":"10.1109/ISIT.2014.6875310","DOIUrl":"https://doi.org/10.1109/ISIT.2014.6875310","url":null,"abstract":"Compressive Sensing (CS) provides a new perspective for dimensionnality reduction without compromising performance. The theoretical foundation for most of existing studies of CS is a stable embedding (i.e., a distance-preserving property) of certain low-dimensional signal models such as sparse signals or signals in a union of linear subspaces. However, few existing literatures clearly discussed the embedding effect of points on the Grassmann manifold in under-sampled linear measurement systems. In this paper, we explore the stable embedding property of multi-dimensional signals based on Grassmann manifold, which is a topological space with each point being a linear subspace of ℝN (or ℂN), via the Gaussian random matrices. It should be noted that the stability mentioned here is about the volume-preserving instead of distance-preserving, because volume is the key characteristic for linear subspace spanned by multiple vectors. The theorem of the volume-preserving stable embedding property is proposed, and sketched proofs as well as discussions about our theorem is also given.","PeriodicalId":127191,"journal":{"name":"2014 IEEE International Symposium on Information Theory","volume":"79 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131421328","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信