{"title":"The Gaussian Interference Channel with lack of codebook knowledge at one receiver: Symmetric capacity to within a gap with a PAM input","authors":"Alex Dytso, Daniela Tuninetti, N. Devroye","doi":"10.1109/ITW.2015.7133097","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133097","url":null,"abstract":"The study of the two-user Gaussian Interference Channel (IC) where one receiver lacks knowledge of the interfering codebook, also dubbed the IC with an oblivious receiver (IC-OR), is motivated by: (1) in heterogeneous, cognitive, distributed or dynamic networks, assuming that every node posses codebooks of every other node may not be practical, and (2) it is not clear whether and how much lack of codebook knowledge would affect the Han and Kobayashi (HK) achievable scheme, which involves joint decoding of intended and interfering messages and which appears not possible if nodes do not possess all codebooks. To address these issues, we evaluate a simplified HK (where the oblivious receiver treats interference as noise) with mixed inputs at the non-oblivious transmitter, i.e., a mixture of discrete and Gaussian random variables, where the power split between the two and the number of points of the discrete part are carefully chosen as a function of the channel parameters. The oblivious transmitter uses a purely Gaussian input. Surprisingly, for this choice of inputs, the capacity region of the symmetric Gaussian IC-OR is shown to be within 1 over 2 log (12πe) ≈ 3.34 bits of the best known outer bound for the classical Gaussian IC with full codebook knowledge at both receivers. Interestingly, this shows that a simplified HK where one receiver is restricted to treat interference as noise loses at most 1 over 2 log (12πe) ≈ 3.34 bits in performance. Moreover, the discrete part of the input behaves like a “common message” even though it is not jointly decoded (together with the intended messages) at the oblivious receiver.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130096283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Can feedback increase the capacity of the energy harvesting channel?","authors":"Dor Shaviv, Ayfer Özgür, H. Permuter","doi":"10.1109/ITW.2015.7133161","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133161","url":null,"abstract":"We investigate if feedback can increase the capacity of an energy harvesting communication channel where a transmitter powered by an exogenous energy arrival process and equipped with a finite battery communicates to a receiver over a memoryless channel. For a simple special case where the energy arrival process is deterministic and the channel is a BEC, we explicitly compute the feed-forward and feedback capacities and show that feedback can strictly increase the capacity of this channel. Building on this example, we also show that feedback can increase the capacity when the energy arrivals are i.i.d. known noncausally at the transmitter and the receiver.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"9 ","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-06-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132915159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coordinating partially-informed agents over state-dependent networks","authors":"Benjamin Larrousse, S. Lasaulce, M. Wigger","doi":"10.1109/ITW.2015.7133152","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133152","url":null,"abstract":"We consider a multi-agent scenario with K ≥ 2 agents that have partial information about some random nature state, and that take actions in a repeated manner. Each agent also has imperfect observations of the other agents' past actions and the nature state realization. Our goal is to characterize the set of asymptotically implementable distributions on the agents' actions and the nature state. We solve this problem for general K when all agents have only causal nature state information (NSI) and for K = 2 when: one agent has causal NSI and the other agent has non-causal NSI; or in some special cases when both agents have non-causal NSI.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125467901","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"New directions in information theoretic security: Benefits of bidirectional signaling","authors":"A. Yener","doi":"10.1109/ITW.2015.7133165","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133165","url":null,"abstract":"The past decade has witnessed significant effort towards establishing reliable and information theoretically secure rates in communication networks, taking advantage of the properties of the communication medium. Such efforts include those in the wireless medium where simultaneous transmissions and the ensuing interference can prove advantageous from an information theoretic secrecy point of view. With the goal of obtaining a secrecy rate that scales with transmit power, structured signaling with simultaneous favorable signal alignment at the legitimate receiver(s) and unfavorable signal alignment at the eavesdropper(s) has proven particularly useful in multi-terminal Gaussian channels. Many challenges remain however in realizing the vision of absolute security provided by the wireless physical layer including handling more realistic models. In this paper, we provide a brief overview of the state of the art, the forward look and argue for an additional asset that could be utilized for secrecy, i.e., bidirectional signaling. Taking the bidirectional wiretap channel as an example, Gaussian signaling is demonstrated to be as good as structured signaling from the degrees of freedom point of view, while observed to be performing better with finite transmit power. Moreover, taking bidirectional signals explicitly into account for encoding performs even better and provides a way forward to synergistically combine physical layer based secrecy and encryption.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123090323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Capacity of the (1, ∞)-RLL input-constrained erasure channel with feedback","authors":"Oron Sabag, H. Permuter, N. Kashyap","doi":"10.1109/ITW.2015.7133107","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133107","url":null,"abstract":"The input-constrained erasure channel with feedback is considered, where the input sequence contains no consecutive 1's, i.e. the (1, ∞)-RLL constraint. The capacity is calculated using an equivalent dynamic program, which shows that the optimal average reward is equal to the capacity. The capacity can be expressed as Hb(p) C<sub>ϵ</sub> = max<sub>0≤p≤1</sub>(H<sub>b</sub>(p))/(p+(1/1-ε)) , where ϵ is the erasure probability and Hb(·) is the binary entropy. This capacity also serves as an upper bound on the capacity of the input-constrained erasure channel without feedback, a problem that is still open.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128384217","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"WOM codes with uninformed encoder","authors":"M. Horovitz, Eitan Yaakobi","doi":"10.1109/ITW.2015.7133105","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133105","url":null,"abstract":"Write-once memory (WOM) is a storage device consisting of q-ary cells that can only increase their value. A WOM code is a coding scheme which allows one to write multiple times to the WOM without decreasing the levels of the cells. In the conventional model of WOM, it is assumed that the encoder can read the memory state before encoding, while the decoder reads only the memory state after encoding, but not before that. However, there are three more models in this setup. We follow an earlier work by Wolf et al. who studied the capacity results of all possible four models in which the encoder/decoder is or is not informed with the previous state of the memory before encoding, respectively. The two challenging models we study here assume that the encoder is uninformed with the memory state (that is, the encoder cannot read the memory prior to encoding). We show that if the decoder is also uninformed with the memory state before encoding, then codes in the Z channel provide constructions for the binary case, and codes correcting non-binary asymmetric errors are used for non-binary codes. In case the decoder is informed with the previous state, then erasure-correcting codes are invoked in the binary case, and codes in the Manhattan distance are used for the non-binary case.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128964835","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"One-to-one lossless codes in the variable input-length regime: Back to Kraft's inequality","authors":"M. Weinberger","doi":"10.1109/ITW.2015.7133101","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133101","url":null,"abstract":"Unique decodability in the “one-shot” lossless coding scenario, where a single block of source samples is compressed, requires the assignment of distinct codewords to different blocks (one-to-one mapping), without the prefix constraint. As a result, for fixed-length blocks, the corresponding block entropy is not a lower bound on the expected code length, a fact that has recently attracted renewed interest. In this note, we consider an alternative scenario, where the encoder is fed with blocks of arbitrary length, which we argue better reflects the conditions under which one-shot codes may be of any interest. Elaborating on an argument by Rissanen, we first show that the block-entropy is still a fundamental performance bound for one-to-one codes. We then design a code that essentially achieves this bound and satisfies Kraft's inequality for each block length. This code can be implemented with a modification to the termination procedure of the popular Shannon-Fano-Elias code. We conclude that Kraft's inequality is relevant also in the one-shot coding scenario.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"392 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115853076","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Exponential rates of convergence for waiting times and generalized AEP","authors":"Ayush Jain, R. Bansal","doi":"10.1109/ITW.2015.7133104","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133104","url":null,"abstract":"In this work, we first relate rate of convergence of waiting times Wn(D), until a D-close version of the first n symbols of a realization of a process appears in the realization of another independent process, with rate of convergence in generalized AEP. We then identify the conditions under which exponential rates of convergence holds in generalized AEP and for waiting times.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"28 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132291267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Information-theory-friendly models for fiber-optic channels: A primer","authors":"E. Agrell, G. Durisi, P. Johannisson","doi":"10.1109/ITW.2015.7133157","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133157","url":null,"abstract":"There exists a rich flora of channel models for optical fiber channels, which differ not only in the types of transmission scenario they describe but also in the type of analysis they support. In this tutorial paper, we review several channel models used in optical communications, and discuss their suitability for information-theoretic analyses. Key issues are how nonlinearity, channel memory, and multiuser interference are modeled.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115603116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Combinatorial channels from partially ordered sets","authors":"Daniel Cullina, N. Kiyavash","doi":"10.1109/ITW.2015.7133160","DOIUrl":"https://doi.org/10.1109/ITW.2015.7133160","url":null,"abstract":"A combinatorial channel specifies a set of possible channel outputs for each channel input. A ranked partially ordered set, or ranked poset, gives us a notion of up errors and down errors. This allows us to define a variety of combinatorial channels. There is a family of channels that have the rank-n elements of the poset as the input, and introduce s total errors, each performing a different mixture of up errors and down errors. If a ranked poset has the “parallelogram property,” the family of channels all have the same confusion graph and thus the same codes. Furthermore, there is a natural metric on each rank of the poset. In the common confusion graph of the channel, vertices are adjacent if and only if their distance in this metric is at most 2s. Although all of the channels in the family have the same set of codes, each channel corresponds to a different integer linear program that characterizes the set of codes. Because each integer linear program has a different fractional relaxation, each leads to a different sphere-packing upper bound for the codes. We take advantage of this phenomenon by optimizing across the family of channels to obtain the best bound. This formulation includes many of classical error models, including erasures and substitutions in q-ary vectors, Hamming errors in constant weight binary codes, insertions and deletions in q-ary strings, the error model of subspace codes, the natural error model for compositions, and various errors models for permutations.","PeriodicalId":174797,"journal":{"name":"2015 IEEE Information Theory Workshop (ITW)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-04-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123510366","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}