{"title":"On the robustness of turbo decoders","authors":"Xiaoling Huang, N. Phamdo","doi":"10.1109/ISIT.1998.708740","DOIUrl":"https://doi.org/10.1109/ISIT.1998.708740","url":null,"abstract":"This paper investigates the sensitivity of turbo decoder performance to mismatch of the noise distribution and proposes a simple on-line procedure for estimating the unknown noise distribution from each block of received signal. For Gaussian and Laplacian noise, the proposed procedure leads to decoder performances which are comparable (within 0.1 dB) to the case where the noise distribution is known exactly.","PeriodicalId":133728,"journal":{"name":"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128280176","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Identity-based non-interactive key sharing equivalent to RSA public-key cryptosystem","authors":"H. Tanaka","doi":"10.1109/ISIT.1998.708989","DOIUrl":"https://doi.org/10.1109/ISIT.1998.708989","url":null,"abstract":"A new simply implemented identity-based non-interactive key sharing scheme (ID-NIKS) has been proposed. The security depends on the difficulty of factoring and is equivalent to RSA public-key cryptosystem even when the collusion among users is performed. The center algorithm is very simple and easily implemented. The extension to a common-key sharing scheme among multi-users is also possible.","PeriodicalId":133728,"journal":{"name":"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128379247","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Prequential and cross-validated mixture regression estimation","authors":"D.S. Modha, E. Masry","doi":"10.1109/ISIT.1998.708964","DOIUrl":"https://doi.org/10.1109/ISIT.1998.708964","url":null,"abstract":"Prequential model selection and cross-validation are data-driven methodologies for selecting a single \"best\" model from a collection of competing models. In contrast, we propose prequential and cross-validated mixtures which are suitably weighted combinations of all the rival models under consideration. We empirically study prequential and cross-validated mixtures (both based on neural networks) for regression estimation.","PeriodicalId":133728,"journal":{"name":"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128578140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A differential Viterbi algorithm for decoding rate-1/n doubly complementary convolutional codes and their high-rate punctured codes based on a compare-select-add principle","authors":"Shu Lin, M. Fossorier","doi":"10.1109/ISIT.1998.708970","DOIUrl":"https://doi.org/10.1109/ISIT.1998.708970","url":null,"abstract":"This paper presents a new algorithm for decoding doubly complementary convolutional codes based on a compare-select-add principle to process the code trellis. This new algorithm is more efficient than the conventional Viterbi (1967) algorithm.","PeriodicalId":133728,"journal":{"name":"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124586323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the asymptotics of the minimax redundancy arising in a universal coding","authors":"W. Szpankowski","doi":"10.1109/ISIT.1998.708954","DOIUrl":"https://doi.org/10.1109/ISIT.1998.708954","url":null,"abstract":"Let x/sup n/ denote a sequence built over a finite alphabet A, and let P(x/sup n/;w) be the probability of x/sup n/ generated by the source w. We define a uniquely decodable code /spl phi/(x/sup n/) of length |/spl phi/(x/sup n/)|=-logQ(x/sup n/) where Q(/spl middot/) is an arbitrary probability distribution on A/sup n/. The cumulative redundancy of the encoding x/sup n/ at the output of a source w is defined as p(x/sup n/;/spl phi//sub n/,w):=-logQ(x/sup n/)+logP(x/sup n/). Finally, let us consider a set of sources /spl Omega/, and define the minimax redundancy as p/sub n/(/spl Omega/):=inf/sub /spl phi/n/sup/sub w/spl isin//spl Omega//max/sub xn/spl isin/An/{p(x/sup n/;/spl phi//sub n/,w)}. We study asymptotically /spl rho//sub n/(/spl Omega/) for memoryless sources via analytic methods.","PeriodicalId":133728,"journal":{"name":"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)","volume":"27 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126667638","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient block entropy coding with low complexity","authors":"A. Said, W. Pearlman, A. Islam","doi":"10.1109/ISIT.1998.708731","DOIUrl":"https://doi.org/10.1109/ISIT.1998.708731","url":null,"abstract":"Efficient low-complexity block entropy coding requires careful exploitation of specific data characteristics to circumvent the practical difficulties associated with large alphabets. Two recent image coding methods, alphabet and group partitioning (AGP) and set partitioning in hierarchical trees (SPIHT) can be viewed as block entropy coding methods, which are successful because of the manner in which they partition the alphabet into sets and encode these sets very efficiently. Here we present analysis and numerical results to show that AGP and SPIHT are indeed efficient block entropy coders.","PeriodicalId":133728,"journal":{"name":"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129231095","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Unconditionally secure dynamic conference key distribution","authors":"Y. Desmedt, Vaidhyanathan Viswanathan","doi":"10.1109/ISIT.1998.708988","DOIUrl":"https://doi.org/10.1109/ISIT.1998.708988","url":null,"abstract":"We present a non-interactive conference key distribution protocol in which all n users receive initial secrets from a trusted server. When a subset of the n users want to communicate privately, each of the users involved can without interaction compute the common key. We prove that the length of the initial secrets we use, are optimal.","PeriodicalId":133728,"journal":{"name":"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124182362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Bossert, A. Hautle, H. Dieterich, S. Shavgulidze
{"title":"Generalized concatenated codes based on tamed frequency modulation","authors":"M. Bossert, A. Hautle, H. Dieterich, S. Shavgulidze","doi":"10.1109/ISIT.1998.708941","DOIUrl":"https://doi.org/10.1109/ISIT.1998.708941","url":null,"abstract":"Using the principles of generalized concatenation we introduce a new design for encoded TFM. New constructions are based on inner nested (sub)systems of TFM signals and outer convolutional codes.","PeriodicalId":133728,"journal":{"name":"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124247134","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Acceleration of the EM algorithm via proximal point iterations","authors":"S. Chrétien, A. Hero","doi":"10.1109/ISIT.1998.709049","DOIUrl":"https://doi.org/10.1109/ISIT.1998.709049","url":null,"abstract":"In this paper, a class of proximal point methods using the Kullback information measure is introduced. In particular, the EM algorithm is proved to belong to this class. A novel relaxation of the EM algorithm is proposed along with implementation strategies. Superlinear convergence of these methods is established.","PeriodicalId":133728,"journal":{"name":"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)","volume":"131 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124253150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Classical capacity of quantum channels, coherent quantum information and quantum privacy","authors":"B. Schjumacher, M. D. Westmorland","doi":"10.1109/ISIT.1998.708672","DOIUrl":"https://doi.org/10.1109/ISIT.1998.708672","url":null,"abstract":"We derive a relation between a quantum channel's capacity to convey classical information and its ability to convey quantum information. This relation is applied to the analysis of the privacy of a quantum channel.","PeriodicalId":133728,"journal":{"name":"Proceedings. 1998 IEEE International Symposium on Information Theory (Cat. No.98CH36252)","volume":"85 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1998-08-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123500064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}