{"title":"Hierarchical and joint source-channel coding with coded state information at the transmitter","authors":"Yakup Cemal, Y. Steinberg","doi":"10.1109/ISIT.2005.1523413","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523413","url":null,"abstract":"This paper considers joint state-source-channel coding and multiple descriptions coding of channel state information (CSI), for state dependent channels. Specifically, we examine coded, non-causal CSI at the transmitter (CSIT) and full CSI at the receiver (CSIR)","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127439735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the design of efficient constrained parity-check codes for optical recording","authors":"K. Cai, Kees A. Schouhamer Immink","doi":"10.1109/ISIT.2005.1523588","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523588","url":null,"abstract":"This paper proposes a general and systematic way to efficiently combine constrained codes with parity-check (PC) codes for optical recording. The proposed constrained PC code includes two component codes: the normal constrained (NC) code and the parity-related constrained (PRC) code. They are designed based on the same finite state machine (FSM). The code rates are only a few tenths below the theoretical maximum. The parity-check constraint is defined by the generator matrix (or generator polynomial) of a linear binary PC code, which can detect any type of dominant error events as well as error event combinations of the system. Two approaches are proposed to design the code in the non-return-to-zero-inverse (NRZI) format and the non-return-to-zero (NRZ) format, respectively. Designing the codes in NRZ format may reduce the number of parity bits required for error detection and simplify post-processing for error correction. Finally, examples of several newly designed codes and their performances are illustrated","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127243639","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A comparison of adaptive belief propagation and the best graph algorithm for the decoding of linear block codes","authors":"Aditi Kothiyal, O. Takeshita","doi":"10.1109/ISIT.2005.1523431","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523431","url":null,"abstract":"In this paper, two iterative message passing algorithms based on belief propagation proposed for the decoding of any binary linear block code are compared. The innovation of these algorithms lies in the fact that the structure of the graph of the parity check matrix is adaptively modified to render it suitable to belief propagation decoding. The modification is done such that the least reliable bits received from the channel are leaves of the graph. These algorithms perform favorably when compared with existing hard and iterative soft decision decoding algorithms in terms of error rate while maintaining a complexity polynomial in block length. It was found that while these two algorithms are conceptually similar, their performance in terms of word error rate (as a function of signal-to-noise ratio), decoding time (average number of iterations) and the updated bit reliabilities are very different","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"05 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131055301","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ambedkar Dukkipati, Narasimha Murty Musti, S. Bhatnagar
{"title":"Properties of Kullback-Leibler cross-entropy minimization in nonextensive framework","authors":"Ambedkar Dukkipati, Narasimha Murty Musti, S. Bhatnagar","doi":"10.1109/ISIT.2005.1523773","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523773","url":null,"abstract":"Kullback-Leibler cross-entropy has unique properties in cases involving distributions resulting from cross-entropy minimization. Nonextensive entropy (Tsallis entropy), which is a one-parameter generalization of Shannon entropy, is proposed to study certain class of physical systems. Thermostatistics based on Tsallis entropy is termed as nonextensive statistics or Tsallis statistics. Previously, Kullback-Leibler cross-entropy has been generalized and studied in this framework. In this paper we study properties of generalized cross-entropy minimization and present some differences with the classical case. In the representation of such a minimum cross-entropy distribution, we highlight the use of the q-product, an operator that has been recently introduced, to derive the mathematical structure behind the Tsallis statistics. One of our main results is the generalization of the triangle equality of cross-entropy minimization, in nonextensive framework","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131080923","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Traitor tracing against powerful attacks","authors":"Simon McNicol, S. Boztaş, Asha Rao","doi":"10.1109/ISIT.2005.1523671","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523671","url":null,"abstract":"We describe narrow, erasure, hybrid and wide attacks on fingerprinting schemes used for securing digital content, and introduce new classes of codes, namely vector space block design codes and delta-nonlinear codes, which can be used to defend against such attacks by means of traitor tracing","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132502940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Lower bounds on the capacity of asymmetric two-dimensional (d, /spl infin/)-constraints","authors":"Jiangxin Chen, P. Siegel","doi":"10.1109/ISIT.2005.1523419","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523419","url":null,"abstract":"We derive lower bounds on the capacity of asymmetric two-dimensional (d, infin)-constraints from bounds on the output entropy of bit-stuffing encoders for general asymmetric (d, infin)-constraints on both the square lattice and the hexagonal lattice. For the (d, infin; 1, infin)-constraint on the square lattice and the (d, infin; 1, infin; 1, infin)-constraint on the hexagonal lattice, we derive exact encoder output entropies which provide even tighter bounds on the capacity of these constraints","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131965044","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gallager bounds for linear codes in binary-input output-symmetric memoryless channels","authors":"Alfonso Martinez, A. G. Fàbregas, G. Caire","doi":"10.1109/ISIT.2005.1523447","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523447","url":null,"abstract":"This paper presents a general methodology to extend Gallager bounds on the maximum-likelihood decoding error probability to arbitrary binary-input output-symmetric memoryless channels. Based on the log-likelihood ratios, a new space is constructed in which the signals naturally lie on a sphere, and for which geometric analysis is straightforward. In particular, we focus on Poltyrev's tangential-sphere bound, and we illustrate its connections with the Engdahl-Zigangirov bound. Approximations to these bounds are shown to be very tight","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132327225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Block turbo equalization for imperfect channel state information","authors":"M. Dangl, C. Sgraja, J. Lindner","doi":"10.1109/ISIT.2005.1523699","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523699","url":null,"abstract":"We propose a soft-input soft-output block equalizer based on constrained minimum variance filters. In contrast to other schemes, our receiver is designed for imperfect channel state information and incorporates the statistics of the channel estimation error. Thereby, we distinguish between data independent and data dependent evaluation of the covariance matrix of the estimation error. We show that the performance of our block equalizer is significantly improved when considering the influence of the actual data symbols on the estimation error. The additional complexity compared to the case when ignoring the data dependency of the estimation error increases quadratically with the block length. We assess the performance of our equalizer for block Rayleigh fading channels via Monte Carlo simulation, employing turbo equalization and one-shot training-based channel estimation","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128800840","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of code design requirements for single- and multi-carrier transmission over frequency-selective MIMO channel","authors":"R. Fischer, C. Stierstorfer","doi":"10.1109/ISIT.2005.1523519","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523519","url":null,"abstract":"Point-to-point transmission over multiple-input/multiple-output channels with intersymbol interference is considered. Two different equalization strategies - single-carrier transmission with spatial/temporal decision-feedback equalization and multicarrier transmission with V-BLAST in each carrier - and the respective requirements on channel coding are studied and compared. Via capacity arguments, it is shown that bit-inter-leaved coded modulation is not well suited for the situations at hand. This holds in particular if channel coding is used in combination with rate loading, i.e., non-uniform rate distribution over the carriers. Approaches to overcome this problem are discussed","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"221 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123246812","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Rates of convergence for adaptive regression estimates with multiple hidden layer feedforward neural networks","authors":"M. Kohler, A. Krzyżak","doi":"10.1109/ISIT.2005.1523580","DOIUrl":"https://doi.org/10.1109/ISIT.2005.1523580","url":null,"abstract":"We present a general bound on the expected L2 error of adaptive least squares estimates. By applying it to multiple hidden layer feedforward neural network regression function estimates we are able to obtain optimal (up to log factor) rates of convergence for Lipschitz classes and fast rates of convergence for some classes of regression functions such as additive functions","PeriodicalId":166130,"journal":{"name":"Proceedings. International Symposium on Information Theory, 2005. ISIT 2005.","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-10-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121451337","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}