IEEE Transactions on Information Theory最新文献

筛选
英文 中文
Performance Bounds and Degree-Distribution Optimization of Finite-Length BATS Codes 有限长度BATS码的性能界与度分布优化
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2025-01-29 DOI: 10.1109/TIT.2025.3536295
Mingyang Zhu;Shenghao Yang;Ming Jiang;Chunming Zhao
{"title":"Performance Bounds and Degree-Distribution Optimization of Finite-Length BATS Codes","authors":"Mingyang Zhu;Shenghao Yang;Ming Jiang;Chunming Zhao","doi":"10.1109/TIT.2025.3536295","DOIUrl":"https://doi.org/10.1109/TIT.2025.3536295","url":null,"abstract":"Batched sparse (BATS) codes were proposed as a reliable communication solution for networks with packet loss. In the finite-length regime, the error probability of BATS codes under belief propagation (BP) decoding has been studied in the literature and can be analyzed by recursive formulae. However, all existing analyses have not considered precoding or have treated the BATS code and the precode as two separate entities. In this paper, we analyze the word-wise error probability of finite-length BATS codes with a precode under joint decoding, including BP decoding and maximum-likelihood (ML) decoding. The joint BP decoder performs peeling decoding on a joint Tanner graph constructed from both the BATS and the precode Tanner graphs, and the joint ML decoder solves a single linear system with all linear constraints implied by the BATS code and the precode. We derive closed-form upper bounds on the error probability for both decoders. Specifically, low-density parity-check (LDPC) precodes are used for BP decoding, and any generic precode can be used for ML decoding. Even for BATS codes without a precode, the derived upper bound for BP decoding is more accurate than the approximate recursive formula, and easier to compute than the exact recursive formula. The accuracy of the two upper bounds has been verified by many simulation results. Based on the two upper bounds, we formulate an optimization problem to optimize the degree distribution of LDPC-precoded BATS codes, which improves BP performance, ML performance, or both. In our experiments, to transmit 128 packets over a line network with packet loss, the optimized LDPC-precoded BATS codes reduce the transmission overhead to less than 50% of that of standard BATS codes under comparable decoding complexity constraints.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 4","pages":"2452-2481"},"PeriodicalIF":2.2,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676040","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Strong Secrecy for Multiple Access Channels With States and Causal CSI 具有状态和因果CSI的多址信道的强保密性
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2025-01-29 DOI: 10.1109/TIT.2025.3536017
Yiqi Chen;Tobias J. Oechtering;Mikael Skoglund;Yuan Luo
{"title":"On Strong Secrecy for Multiple Access Channels With States and Causal CSI","authors":"Yiqi Chen;Tobias J. Oechtering;Mikael Skoglund;Yuan Luo","doi":"10.1109/TIT.2025.3536017","DOIUrl":"https://doi.org/10.1109/TIT.2025.3536017","url":null,"abstract":"Strong secrecy communication over a discrete memoryless state-dependent multiple access channel (SD-MAC) with an external eavesdropper is investigated. The channel is governed by discrete memoryless and i.i.d. channel states, and the channel state information (CSI) is revealed to the encoders in a causal manner. The main results of this paper are inner and outer bounds of the capacity region, for which we investigate coding schemes incorporating wiretap coding and secret key agreements between the sender and the legitimate receiver. Two kinds of block Markov coding schemes are proposed. The first is a new coding scheme that uses backward decoding and the Wyner-Ziv coding, and the secret key is constructed from a lossy description of the CSI. The other is an extended version of an existing coding scheme for point-to-point wiretap channels with causal CSI. A numerical example shows that the achievable region given by the first coding scheme can be strictly larger than the second one. However, these two schemes do not outperform each other in general, and there exist some numerical examples in which each coding scheme achieves some rate pairs that cannot be achieved by another scheme. Our established inner bound reduces to some best-known results in the literature as special cases. We further investigate some capacity-achieving cases for state-dependent multiple access wiretap channels (SD-MAWCs) with degraded message sets. It turns out that the two coding schemes are both optimal in these cases.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 4","pages":"3070-3099"},"PeriodicalIF":2.2,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10857409","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143667307","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Capacity of a Finite Field Matrix Channel 有限场矩阵信道的容量
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2025-01-29 DOI: 10.1109/TIT.2025.3536077
Simon R. Blackburn;Jessica Claridge
{"title":"The Capacity of a Finite Field Matrix Channel","authors":"Simon R. Blackburn;Jessica Claridge","doi":"10.1109/TIT.2025.3536077","DOIUrl":"https://doi.org/10.1109/TIT.2025.3536077","url":null,"abstract":"The Additive-Multiplicative Matrix Channel (AMMC) was introduced by Silva, Kschischang and Kötter in 2010 to model data transmission using random linear network coding. The input and output of the channel are <inline-formula> <tex-math>$ntimes m$ </tex-math></inline-formula> matrices over a finite field <inline-formula> <tex-math>$mathbb {F}_{q}$ </tex-math></inline-formula>. When the matrix X is input, the channel outputs <inline-formula> <tex-math>$Y=A(X+W)$ </tex-math></inline-formula> where A is a uniformly chosen <inline-formula> <tex-math>$ntimes n$ </tex-math></inline-formula> invertible matrix over <inline-formula> <tex-math>$mathbb {F}_{q}$ </tex-math></inline-formula> and where W is a uniformly chosen <inline-formula> <tex-math>$ntimes m$ </tex-math></inline-formula> matrix over <inline-formula> <tex-math>$mathbb {F}_{q}$ </tex-math></inline-formula> of rank t. Silva et al. considered the case when <inline-formula> <tex-math>$2nleq m$ </tex-math></inline-formula>. They determined the asymptotic capacity of the AMMC when t, n and m are fixed and <inline-formula> <tex-math>$qrightarrow infty $ </tex-math></inline-formula>. They also determined the leading term of the capacity when q is fixed, and t, n and m grow linearly. We generalise these results, showing that the condition <inline-formula> <tex-math>$2ngeq m$ </tex-math></inline-formula> can be removed. (Our formula for the capacity falls into two cases, one of which generalises the <inline-formula> <tex-math>$2ngeq m$ </tex-math></inline-formula> case.) We also improve the error term in the case when q is fixed.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 4","pages":"2482-2493"},"PeriodicalIF":2.2,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Algebraic Geometry Codes for Secure Distributed Matrix Multiplication 安全分布式矩阵乘法的代数几何代码
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2025-01-29 DOI: 10.1109/TIT.2025.3535091
Okko Makkonen;Elif Saçıkara;Camilla Hollanti
{"title":"Algebraic Geometry Codes for Secure Distributed Matrix Multiplication","authors":"Okko Makkonen;Elif Saçıkara;Camilla Hollanti","doi":"10.1109/TIT.2025.3535091","DOIUrl":"https://doi.org/10.1109/TIT.2025.3535091","url":null,"abstract":"In this paper, we propose a novel construction for secure distributed matrix multiplication (SDMM) based on algebraic geometry (AG) codes, which we call the PoleGap SDMM scheme. The proposed construction is inspired by the Gap Additive Secure Polynomial (GASP) code, where so-called gaps in a certain polynomial are utilized to achieve higher communication rates. Our construction considers the gaps in a Weierstrass semigroup of a rational place in an algebraic function field to achieve a similar increase in the rate. This construction shows that there is potential in utilizing AG codes and their subcodes in SDMM since we demonstrate a better performance compared to state-of-the-art schemes in some parameter regimes.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 4","pages":"2373-2382"},"PeriodicalIF":2.2,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10858081","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676082","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Minimal Pseudocodewords of Binary Hamming Codes 论二进制汉明码的最小伪码字
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2025-01-29 DOI: 10.1109/TIT.2025.3535947
Haiyang Liu;Xiaopeng Jiao;Lianrong Ma
{"title":"On Minimal Pseudocodewords of Binary Hamming Codes","authors":"Haiyang Liu;Xiaopeng Jiao;Lianrong Ma","doi":"10.1109/TIT.2025.3535947","DOIUrl":"https://doi.org/10.1109/TIT.2025.3535947","url":null,"abstract":"Pseudocodewords, and in particular minimal pseudocodewords, play an important role in understanding the performance of linear programming (LP) decoding. In this paper, we investigate minimal pseudocodewords of binary Hamming codes described by full-rank parity-check matrices. We first provide some general results on minimal pseudocodewords with support size 3 of a binary parity-check matrix. We also prove a lower bound on the minimum binary symmetric channel (BSC) pseudoweight of a binary parity-check matrix. Then we prove that a full-rank parity-check matrix of a binary Hamming code has minimal pseudocodewords of certain types whose support sizes are larger than 3. Interestingly enough, the BSC pseudoweight of all these minimal pseudocodewords is 2. Using this fact as well as the above-mentioned lower bound, we further prove that a full-rank parity-check matrix of a binary Hamming code has minimum BSC pseudoweight 2. Moreover, the additive white Gaussian noise channel (AWGNC) pseudoweight of all these minimal pseudocodewords is 3. Based on numerical observations, we conjecture that a full-rank parity-check matrix of a binary Hamming code has minimum AWGNC pseudoweight 3. Finally, we provide more properties of a subset of minimal pseudocodewords of a full-rank parity-check matrix of a binary Hamming code.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 4","pages":"2360-2372"},"PeriodicalIF":2.2,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal Short-Term Forecast for Locally Stationary Functional Time Series 局部平稳函数时间序列的最优短期预测
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2025-01-29 DOI: 10.1109/TIT.2025.3536463
Yan Cui;Zhou Zhou
{"title":"Optimal Short-Term Forecast for Locally Stationary Functional Time Series","authors":"Yan Cui;Zhou Zhou","doi":"10.1109/TIT.2025.3536463","DOIUrl":"https://doi.org/10.1109/TIT.2025.3536463","url":null,"abstract":"Accurate curve forecasting is of vital importance for policy planning, decision making and resource allocation in many engineering and industrial applications. In this paper we establish a theoretical foundation for the optimal short-term linear prediction of non-stationary functional or curve time series with smoothly time-varying data generating mechanisms. The core of this work is to establish a unified functional auto-regressive approximation result for a general class of locally stationary functional time series. A double sieve expansion method is proposed and theoretically verified for the asymptotic optimal forecasting. A telecommunication traffic data set is used to illustrate the usefulness of the proposed theory and methodology.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 4","pages":"2872-2887"},"PeriodicalIF":2.2,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143667676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sphere Packing Proper Colorings of an Expander Graph 膨胀图的球填充色
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2025-01-28 DOI: 10.1109/TIT.2025.3535747
Honglin Zhu
{"title":"Sphere Packing Proper Colorings of an Expander Graph","authors":"Honglin Zhu","doi":"10.1109/TIT.2025.3535747","DOIUrl":"https://doi.org/10.1109/TIT.2025.3535747","url":null,"abstract":"We introduce graphical error-correcting codes, a new notion of error-correcting codes on <inline-formula> <tex-math>$[q]^{n}$ </tex-math></inline-formula> where a code is a set of proper q-colorings of some fixed n-vertex graph G. We then say that a set of M proper q-colorings of G form a <inline-formula> <tex-math>$(G, M, d)$ </tex-math></inline-formula> code if any pair of colorings in the set have Hamming distance at least d. This directly generalizes typical <inline-formula> <tex-math>$(n, M, d)$ </tex-math></inline-formula> codes of q-ary strings of length n since we can take G as the empty graph on n vertices. We investigate how one-sided spectral expansion relates to the largest possible set of error-correcting colorings on a graph. For fixed <inline-formula> <tex-math>$(delta, lambda) in [{0, 1}] times [-1, 1]$ </tex-math></inline-formula> and positive integer d, let <inline-formula> <tex-math>$f_{delta, lambda, d}(n)$ </tex-math></inline-formula> denote the maximum M such that there exists some d-regular graph G on at most n vertices with normalized second eigenvalue at most <inline-formula> <tex-math>$lambda $ </tex-math></inline-formula> that has a <inline-formula> <tex-math>$(G, M, d)$ </tex-math></inline-formula> code. We study the growth of f as n goes to infinity. We partially characterize the regimes of <inline-formula> <tex-math>$(delta, lambda)$ </tex-math></inline-formula> where f grows exponentially or is bounded by a constant, respectively. We also prove several sharp phase transitions between these regimes.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 4","pages":"2539-2549"},"PeriodicalIF":2.2,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Self-Dual Cyclic Codes With Square-Root-Like Lower Bounds on Their Minimum Distances 最小距离上具有平方根下界的自对偶循环码
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2025-01-28 DOI: 10.1109/TIT.2025.3535533
Hao Chen;Cunsheng Ding
{"title":"Self-Dual Cyclic Codes With Square-Root-Like Lower Bounds on Their Minimum Distances","authors":"Hao Chen;Cunsheng Ding","doi":"10.1109/TIT.2025.3535533","DOIUrl":"https://doi.org/10.1109/TIT.2025.3535533","url":null,"abstract":"Binary self-dual cyclic codes have been studied since the classical work of Sloane and Thompson published in IEEE Trans. Inf. Theory, vol. 29, 1983. Twenty five years later, an infinite family of binary self-dual cyclic codes with lengths <inline-formula> <tex-math>$n_{i}$ </tex-math></inline-formula> and minimum distances <inline-formula> <tex-math>$d_{i} geq frac {1}{2} sqrt {n_{i}+2}$ </tex-math></inline-formula> was presented in a paper of IEEE Trans. Inf. Theory, vol. 55, 2009. However, no infinite family of Euclidean self-dual binary cyclic codes whose minimum distances have the square-root lower bound and no infinite family of Euclidean self-dual nonbinary cyclic codes whose minimum distances have a lower bound better than the square-root lower bound are known in the literature. In this paper, an infinite family of Euclidean self-dual cyclic codes over the fields <inline-formula> <tex-math>${mathrm { F}}_{2^{s}}$ </tex-math></inline-formula> with a square-root-like lower bound is constructed. An infinite subfamily of this family consists of self-dual binary cyclic codes with the square-root lower bound. Another infinite subfamily of this family consists of self-dual cyclic codes over the fields <inline-formula> <tex-math>${mathrm { F}}_{2^{s}}$ </tex-math></inline-formula> with a lower bound better than the square-root bound for <inline-formula> <tex-math>$s geq 2$ </tex-math></inline-formula>. Consequently, two breakthroughs in coding theory are made in this paper. An infinite family of self-dual binary cyclic codes with a square-root-like lower bound is also presented in this paper. An infinite family of Hermitian self-dual cyclic codes over the fields <inline-formula> <tex-math>${mathrm { F}}_{2^{2s}}$ </tex-math></inline-formula> with a square-root-like lower bound and an infinite family of Euclidean self-dual linear codes over <inline-formula> <tex-math>${mathrm { F}}_{q}$ </tex-math></inline-formula> with <inline-formula> <tex-math>$q equiv 1 pmod {4}$ </tex-math></inline-formula> with a square-root-like lower bound are also constructed in this paper.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 4","pages":"2389-2396"},"PeriodicalIF":2.2,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143676038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Error Exponents for Entanglement Transformations From Degenerations 由退化引起的纠缠变换的误差指数
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2025-01-27 DOI: 10.1109/TIT.2025.3534327
Dávid Bugár;Péter Vrana
{"title":"Error Exponents for Entanglement Transformations From Degenerations","authors":"Dávid Bugár;Péter Vrana","doi":"10.1109/TIT.2025.3534327","DOIUrl":"https://doi.org/10.1109/TIT.2025.3534327","url":null,"abstract":"This paper explores the trade-off relation between the rate and the strong converse exponent for asymptotic LOCC transformations between pure multipartite states. Any single-copy probabilistic transformation between a pair of states implies that an asymptotic transformation at rate 1 is possible with an exponentially decreasing success probability. However, it is possible that an asymptotic transformation is feasible with nonzero probability, but there is no transformation between any finite number of copies with the same rate, even probabilistically. In such cases it is not known if the optimal success probability decreases exponentially or faster. A fundamental tool for showing the feasibility of an asymptotic transformation is degeneration. Any degeneration gives rise to a sequence of stochastic LOCC transformations from copies of the initial state plus a sublinear number of GHZ states to the same number of copies of the target state. These protocols involve parameters that can be freely chosen, but the choice affects the success probability. In this paper, we characterize an asymptotically optimal choice of the parameters and derive a single-letter expression for the error exponent of the resulting protocol. In particular, this implies an exponential lower bound on the success probability when the stochastic transformation arises from a degeneration.","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 3","pages":"1874-1895"},"PeriodicalIF":2.2,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143465639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum and Classical Communication Complexity of Permutation-Invariant Functions 置换不变函数的量子和经典通信复杂性
IF 2.2 3区 计算机科学
IEEE Transactions on Information Theory Pub Date : 2025-01-27 DOI: 10.1109/TIT.2025.3534920
Ziyi Guan;Yunqi Huang;Penghui Yao;Zekun Ye
{"title":"Quantum and Classical Communication Complexity of Permutation-Invariant Functions","authors":"Ziyi Guan;Yunqi Huang;Penghui Yao;Zekun Ye","doi":"10.1109/TIT.2025.3534920","DOIUrl":"https://doi.org/10.1109/TIT.2025.3534920","url":null,"abstract":"This paper gives a nearly tight characterization of the quantum communication complexity of permutation-invariant Boolean functions. With such a characterization, we show that the quantum and randomized communication complexity of permutation-invariant Boolean functions are quadratically equivalent (up to a polylogarithmic factor of the input size). Our results extend a recent line of research regarding query complexity to communication complexity, showing symmetry prevents exponential quantum speedups. Furthermore, we show that the Log-rank Conjecture holds for any non-trivial total permutation-invariant Boolean function. Moreover, we establish a relationship between the quantum/classical communication complexity and the approximate rank of permutation-invariant Boolean functions. This implies the correctness of the Log-approximate-rank Conjecture for permutation-invariant Boolean functions in both randomized and quantum settings (up to a polylogarithmic factor of the input size).","PeriodicalId":13494,"journal":{"name":"IEEE Transactions on Information Theory","volume":"71 4","pages":"2782-2799"},"PeriodicalIF":2.2,"publicationDate":"2025-01-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143667308","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信