IEEE Trans. Inf. Theory最新文献

筛选
英文 中文
The Approximate Capacity of the Gaussian $N$-Relay Diamond Network 高斯$N$中继菱形网络的近似容量
IEEE Trans. Inf. Theory Pub Date : 2013-02-01 DOI: 10.1109/TIT.2012.2219154
Urs Niesen, S. Diggavi
{"title":"The Approximate Capacity of the Gaussian $N$-Relay Diamond Network","authors":"Urs Niesen, S. Diggavi","doi":"10.1109/TIT.2012.2219154","DOIUrl":"https://doi.org/10.1109/TIT.2012.2219154","url":null,"abstract":"We consider the Gaussian “diamond” or parallel relay network, in which a source node transmits a message to a destination node with the help of N relays. Even for the symmetric setting, in which the channel gains to the relays are identical and the channel gains from the relays are identical, the capacity of this channel is unknown in general. The best known capacity approximation is up to an additive gap of order N bits and up to a multiplicative gap of order N2, with both gaps independent of the channel gains. In this paper, we approximate the capacity of the symmetric Gaussian N-relay diamond network up to an additive gap of 1.8 bits and up to a multiplicative gap of a factor 14. Both gaps are independent of the channel gains and, unlike the best previously known result, are also independent of the number of relays N in the network. Achievability is based on bursty amplify-and-forward, showing that this simple scheme is uniformly approximately optimal, both in the low-rate as well as in the high-rate regimes. The upper bound on capacity is based on a careful evaluation of the cut-set bound. We also present approximation results for the asymmetric Gaussian N-relay diamond network. In particular, we show that bursty amplify-and-forward combined with optimal relay selection achieves a rate within a factor O(log4(N)) of capacity with preconstant in the order notation independent of the channel gains.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"17 1","pages":"845-859"},"PeriodicalIF":0.0,"publicationDate":"2013-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"83907869","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
Restricted isometry constants where lpsparse recovery can fail for 0 < p <= 1 限制等距常数,当0 < p <= 1时,lp稀疏恢复可能失败
IEEE Trans. Inf. Theory Pub Date : 2009-05-01 DOI: 10.1109/TIT.2009.2016030
Mike Davies, Rémi Gribonval
{"title":"Restricted isometry constants where lpsparse recovery can fail for 0 < p <= 1","authors":"Mike Davies, Rémi Gribonval","doi":"10.1109/TIT.2009.2016030","DOIUrl":"https://doi.org/10.1109/TIT.2009.2016030","url":null,"abstract":"This paper investigates conditions under which the solution of an underdetermined linear system with minimal lP norm, 0 < p ≤ 1, is guaranteed to be also the sparsest one. Matrices are constructed with restricted isometry constants (RIC) δ2m arbitrarily close to 1/ √2 ≅ 0.707 where sparse recovery with p = 1 fails for at least one m-sparse vector, as well as matrices with δ2m arbitrarily close to one where l1 minimization succeeds for any m-sparse vector. This highlights the pessimism of sparse recovery prediction based on the RIC, and indicates that there is limited room for improving over the best known positive results of Foucart and Lai, which guarantee that l1 minimization recovers all m-sparse vedors for any matrix with δ2m < 2(3 - √2)/7 ≅ 0.4531. These constructions are a by-product of tight conditions for lp recovery (0 ≤ p ≤ 1) with matrices of unit spectral norm, which are expressed in terms of the minimal singular values of 2m-column submatrices. Compared to l1 minimization, lp minimization recovery failure is shown to be only slightly delayed in terms of the RIC values. Furthermore in this case the minimization is nonconvex and it is important to consider the specific minimization algorithm being used. It is shown that when lp optimization is attempted using an iterative reweighted l1 scheme, failure can still occur for δ2m arbitrarily close to 1/ √2.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"5 1","pages":"2203-2214"},"PeriodicalIF":0.0,"publicationDate":"2009-05-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"88624445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 63
Correction to "On the Capacity Game of Private Fingerprinting Systems Under Collusion Attacks" [Mar 05 884-899] 更正“合谋攻击下私人指纹识别系统的容量博弈”[05月884-899]
IEEE Trans. Inf. Theory Pub Date : 2008-11-01 DOI: 10.1109/TIT.2008.929955
A. Somekh-Baruch, N. Merhav
{"title":"Correction to \"On the Capacity Game of Private Fingerprinting Systems Under Collusion Attacks\" [Mar 05 884-899]","authors":"A. Somekh-Baruch, N. Merhav","doi":"10.1109/TIT.2008.929955","DOIUrl":"https://doi.org/10.1109/TIT.2008.929955","url":null,"abstract":"In this correspondence, we correct an error in the above paper by Somekh-Baruch and Merhav (see ibid., vol.51, no.3, p.884-99, 2005).","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"4 1","pages":"5263-5264"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82661532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Correction to "On Noncoherent MIMO Channels in the Wideband Regime: Capacity and Reliability" [Jun 07 1983-2009] 更正“宽频带下的非相干MIMO信道:容量与可靠性”[june 07 1983-2009]
IEEE Trans. Inf. Theory Pub Date : 2008-11-01 DOI: 10.1109/TIT.2008.929921
Surapol Tan-a-ram
{"title":"Correction to \"On Noncoherent MIMO Channels in the Wideband Regime: Capacity and Reliability\" [Jun 07 1983-2009]","authors":"Surapol Tan-a-ram","doi":"10.1109/TIT.2008.929921","DOIUrl":"https://doi.org/10.1109/TIT.2008.929921","url":null,"abstract":"For original paper see S. Ray, ibid., vol 53, no. 6, pp. 1983-2009, 2007. The multiple-input multiple-output (MIMO) wideband Rayleigh block-fading channel where the channel state is unknown to both the transmitter and the receiver and there is only an average power constraint on the input. This mutual information can be upper bounded by the capacity of AWGN channel with the same power constraint.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"289 1","pages":"5263"},"PeriodicalIF":0.0,"publicationDate":"2008-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"76875642","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Comments on "A New Construction of 16-QAM Golay Complementary Sequences" and Extension for 64-QAM Golay Sequences “16-QAM Golay互补序列的新构造”及64-QAM Golay序列的推广
IEEE Trans. Inf. Theory Pub Date : 2008-07-01 DOI: 10.1109/TIT.2008.924735
Ying Li
{"title":"Comments on \"A New Construction of 16-QAM Golay Complementary Sequences\" and Extension for 64-QAM Golay Sequences","authors":"Ying Li","doi":"10.1109/TIT.2008.924735","DOIUrl":"https://doi.org/10.1109/TIT.2008.924735","url":null,"abstract":"For original article by C.V. Chong see ibid. Vol.49, no.11, p.2953-2959, Nov. 2003. Some corrections are given for the sequence pairing descriptions of 16-QAM Golay complementary sequences in Chong, Venkataramani, and Tarokh's paper, together with a related correction for Lee and Golomb's 64-QAM Golay sequence construction. Lee and Golomb obtained 496, 808, and 976 offset pairs for length 2m 64-QAM Golay sequences, m = 2,3,4. We obtained 724, 972, and 1224 offset pairs. Adding w = 1 to Case III in Lee and Golomb's construction gives some additional offset pairs, others are new and exist for m ges 3 only. Descriptions of new offset pairs and enumeration for all first order offset pairs are proposed as conjectures. An example is given to show that there exist other 64-QAM Golay sequences not within this construction.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"30 1","pages":"3246-3251"},"PeriodicalIF":0.0,"publicationDate":"2008-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82380696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 55
On Z2k-Dual Binary Codes 关于z2k -双二进制码
IEEE Trans. Inf. Theory Pub Date : 2005-09-14 DOI: 10.1109/TIT.2007.892787
D. Krotov
{"title":"On Z2k-Dual Binary Codes","authors":"D. Krotov","doi":"10.1109/TIT.2007.892787","DOIUrl":"https://doi.org/10.1109/TIT.2007.892787","url":null,"abstract":"A new generalization of the Gray map is introduced. The new generalization Phi:Z2 kn rarr Z2 2k-1n is connected with the known generalized Gray map phi in the following way: if we take two dual linear Z2 k-codes and construct binary codes from them using the generalizations phi and Phi of the Gray map, then the weight enumerators of the binary codes obtained will satisfy the MacWilliams identity. The classes of Z2 k-linear Hadamard codes and co-Z2 k-linear extended 1-perfect codes are described, where co-Z2 k-linearity means that the code can be obtained from a linear Z2 k-code with the help of the new generalized Gray map","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"46 3 1","pages":"1532-1537"},"PeriodicalIF":0.0,"publicationDate":"2005-09-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79909572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 32
A new construction of 16-QAM Golay complementary sequences 16-QAM Golay互补序列的新构建
IEEE Trans. Inf. Theory Pub Date : 2003-11-01 DOI: 10.1109/TIT.2003.818418
C. Chong, R. Venkataramani, V. Tarokh
{"title":"A new construction of 16-QAM Golay complementary sequences","authors":"C. Chong, R. Venkataramani, V. Tarokh","doi":"10.1109/TIT.2003.818418","DOIUrl":"https://doi.org/10.1109/TIT.2003.818418","url":null,"abstract":"We present a new construction of 16-QAM Golay sequences of length n = 2/sup m/. The number of constructed sequences is (14 + 12m)(m!/2)4/sup m+1/. When employed as a code in an orthogonal frequency-division multiplexing (OFDM) system; this set of sequences has a peak-to-mean envelope power ratio (PMEPR) of 3.6. By considering two specific subsets of these sequences, we obtain new codes with PMEPR bounds of 2.0 and 2.8 and respective code sizes of (2 + 2m)(m!/2)4/sup m+1/ and (4 + 4m)(m!/2)4/sup m+1/. These are larger than previously known codes for the same PMEPR bounds.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"79 1","pages":"2953-2959"},"PeriodicalIF":0.0,"publicationDate":"2003-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"81417224","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 115
Reed-Solomon codes for correcting phased error bursts 里德-所罗门码用于校正相位误差爆发
IEEE Trans. Inf. Theory Pub Date : 2003-11-01 DOI: 10.1109/TIT.2003.819333
V. Krachkovsky
{"title":"Reed-Solomon codes for correcting phased error bursts","authors":"V. Krachkovsky","doi":"10.1109/TIT.2003.819333","DOIUrl":"https://doi.org/10.1109/TIT.2003.819333","url":null,"abstract":"A code structure is introduced that represents a Reed-Solomon (RS) code in two-dimensional format. Based on this structure, a novel approach to multiple error burst correction using RS codes is proposed. For a model of phased error bursts, where each burst can affect one of the columns in a two-dimensional transmitted word, it is shown that the bursts can be corrected using a known multisequence shift-register synthesis algorithm. It is further shown that the resulting codes posses nearly optimal burst correction capability, under certain probability of decoding failure. Finally, low-complexity systematic encoding and syndrome computation algorithms for these codes are discussed. The proposed scheme may also find use in decoding of different coding schemes based on RS codes, such as product or concatenated codes.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"283 1","pages":"2975-2984"},"PeriodicalIF":0.0,"publicationDate":"2003-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79538205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 48
On constant-composition codes over Zq 关于Zq上的常数组合码
IEEE Trans. Inf. Theory Pub Date : 2003-11-01 DOI: 10.1109/TIT.2003.819339
Luo Yuan, Fang-Wei Fu, A. Vinck, Wende Chen
{"title":"On constant-composition codes over Zq","authors":"Luo Yuan, Fang-Wei Fu, A. Vinck, Wende Chen","doi":"10.1109/TIT.2003.819339","DOIUrl":"https://doi.org/10.1109/TIT.2003.819339","url":null,"abstract":"A constant-composition code is a special constant-weight code under the restriction that each symbol should appear a given number of times in each codeword. In this correspondence, we give a lower bound for the maximum size of the q-ary constant-composition codes with minimum distance at least 3. This bound is asymptotically optimal and generalizes the Graham-Sloane bound for binary constant-weight codes. In addition, three construction methods of constant-composition codes are presented, and a number of optimum constant-composition codes are obtained by using these constructions.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"111 1","pages":"3010-3016"},"PeriodicalIF":0.0,"publicationDate":"2003-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"79622744","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 76
On Z4-linear Preparata-like and Kerdock-like code 关于z4 -线性类prepare和类kerdock代码
IEEE Trans. Inf. Theory Pub Date : 2003-11-01 DOI: 10.1109/TIT.2003.819329
J. Borges, K. Phelps, J. Rifà, V. Zinoviev
{"title":"On Z4-linear Preparata-like and Kerdock-like code","authors":"J. Borges, K. Phelps, J. Rifà, V. Zinoviev","doi":"10.1109/TIT.2003.819329","DOIUrl":"https://doi.org/10.1109/TIT.2003.819329","url":null,"abstract":"We say that a binary code of length n is additive if it is isomorphic to a subgroup of /spl Zopf//sub 2//sup /spl alpha// /spl times/ /spl Zopf//sub 4//sup /spl beta//, where the quaternary coordinates are transformed to binary by means of the usual Gray map and hence /spl alpha/ + 2/spl beta/ = n. In this paper, we prove that any additive extended Preparata (1968) -like code always verifies /spl alpha/ = 0, i.e., it is always a /spl Zopf//sub 4/-linear code. Moreover, we compute the rank and the dimension of the kernel of such Preparata-like codes and also the rank and the kernel of the /spl Zopf//sub 4/-dual of these codes, i.e., the /spl Zopf//sub 4/-linear Kerdock-like codes.","PeriodicalId":13250,"journal":{"name":"IEEE Trans. Inf. Theory","volume":"3 1","pages":"2834-2843"},"PeriodicalIF":0.0,"publicationDate":"2003-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73952129","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 38
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信