2007 IEEE International Symposium on Information Theory最新文献

筛选
英文 中文
Cycle Analysis and Construction of Protographs for QC LDPC Codes With Girth Larger Than 12 周长大于12的QC LDPC码的循环分析及原型图的构造
2007 IEEE International Symposium on Information Theory Pub Date : 2007-06-24 DOI: 10.1109/ISIT.2007.4557555
Sunghwan Kim, Jong-Seon No, Habong Chung, Dong-joon Shin
{"title":"Cycle Analysis and Construction of Protographs for QC LDPC Codes With Girth Larger Than 12","authors":"Sunghwan Kim, Jong-Seon No, Habong Chung, Dong-joon Shin","doi":"10.1109/ISIT.2007.4557555","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557555","url":null,"abstract":"A quasi-cyclic (QC) low-density parity-check (LDPC) code can be viewed as the protograph code with circulant permutation matrices. In this paper, we find all the subgraph patterns of protographs of QC LDPC codes having inevitable cycles of length 2i, i = 6,7,8,9,10, i.e., the cycles existing regardless of the shift values of circulants. It is also derived that if the girth of the protograph is 2g, g ges 2, its protograph code cannot have the inevitable cycles of length smaller than 6g. Based on these subgraph patterns, we propose new combinatorial construction methods of the protographs, whose protograph codes can have girth larger than or equal to 14.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128694663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Signal Processing Algorithms to Decipher Brain Function 破译大脑功能的信号处理算法
2007 IEEE International Symposium on Information Theory Pub Date : 2007-06-24 DOI: 10.1109/ISIT.2007.4557073
E. Brown
{"title":"Signal Processing Algorithms to Decipher Brain Function","authors":"E. Brown","doi":"10.1109/ISIT.2007.4557073","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557073","url":null,"abstract":"these capabilities is limited severely by the scarcity of the two principal resources in wireless networks, namely energy and bandwidth. Much of the capacity growth of the past two decades has been enabled by major advances in the wireless physical layer. However, in recent years, attention has turned increasingly to the higher network layers to examine interactions among nodes that can lead to even greater efficiencies in the use of wireless resources. This talk examines two types of such interactions: competition among nodes in multiple-access communication networks, and collaboration among nodes in wireless sensor networks. In the first context, the network is viewed as an economic system, in which terminals behave as agents competing for radio resources to optimize the energy efficiency with which they transmit messages. A game theoretic formalism is used to analyze the effects of various design choices and quality-of-service constraints on energy efficiency. In the second context, collaborative techniques for optimizing the use of radio resources in sensor networks are considered. Here, the focus is primarily on distributed inference, in which distinctive features of wireless sensor networks can be exploited through collaboration among nodes to effect a tradeoff between inferential accuracy and energy consumption.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"40 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124670464","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Fast Control over Fiber Memory 光纤存储器的快速控制
2007 IEEE International Symposium on Information Theory Pub Date : 2007-06-24 DOI: 10.1109/ISIT.2007.4557580
S. Li, X. Tan
{"title":"Fast Control over Fiber Memory","authors":"S. Li, X. Tan","doi":"10.1109/ISIT.2007.4557580","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557580","url":null,"abstract":"To enhance the access flexibility and logical elasticity in the use as delay lines, fibers are combined with optical switches into various types of fiber memories. One type belongs to recursively constructed packet buffers with single-stream I/O for such applications as queueing, multiplexing, demultiplexing, and flexible delay. The present paper considers the switching control speed over some of such fiber-memory applications.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130414950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On the Gaussian MIMO Wiretap Channel 关于高斯MIMO窃听信道
2007 IEEE International Symposium on Information Theory Pub Date : 2007-06-24 DOI: 10.1109/ISIT.2007.4557590
A. Khisti, G. Wornell, A. Wiesel, Yonina C. Eldar
{"title":"On the Gaussian MIMO Wiretap Channel","authors":"A. Khisti, G. Wornell, A. Wiesel, Yonina C. Eldar","doi":"10.1109/ISIT.2007.4557590","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557590","url":null,"abstract":"Wyner's wiretap channel is generalized to the case when the sender, the receiver and the eavesdropper have multiple antennas. We consider two cases: the deterministic case and the fading case. In the deterministic case, the channel matrices of the intended receiver and the eavesdropper are fixed and known to all the nodes. In the fading case, the channel matrices experience block fading and the sender has only the intended receiver's channel state information (CSI) and statistical knowledge of the eavesdropper's channel. For the deterministic case, a scheme based on the generalized-singular-value-decomposition (GSVD) of the channel matrices is proposed and shown to achieve the secrecy capacity in the high signal-to-noise-ratio (SNR) limit. When the intended receiver has only one antenna (MISO case) the secrecy-capacity is characterized for any SNR. Next, a suboptimal \"artificial noise\" based scheme is considered. Its performance is characterized and observed to be nearly optimal in the high SNR regime for the MISO case. This scheme extends naturally to the fading case and results are reported for the MISO case. For the independent Rayleigh fading distribution as we simultaneously increase the number of antennas at the sender and the eavesdropper, the secrecy capacity approaches zero if and only if the ratio of the number of eavesdropper antennas to transmitter antennas is at least two.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126706213","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 220
Complex Near-Orthogonal Designs with No Zero Entry 无零入口的复近正交设计
2007 IEEE International Symposium on Information Theory Pub Date : 2007-06-24 DOI: 10.1109/ISIT.2007.4557616
Gopu V. R. Muni Kumar, B. Rajan
{"title":"Complex Near-Orthogonal Designs with No Zero Entry","authors":"Gopu V. R. Muni Kumar, B. Rajan","doi":"10.1109/ISIT.2007.4557616","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557616","url":null,"abstract":"Zero entries in complex orthogonal designs (CODs) impede their practical implementation. In this paper, a method of obtaining a no zero entry (NZE) code for 2k+1 antennas whenever a NZE code exists for 2k antennas is presented. This is achieved with slight increase in the ML decoding complexity for regular QAM constellations and no increase for other complex constellations. Since NZE CODs have been constructed recently for 8 antennas our method leads to NZE codes for 16 antennas. Simulation results show good performance of our new codes compared to the well known constructions for 16 and 32 antennas under peak power constraints.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123493704","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Sequential Decoding with a Look-Ahead Path Metric 具有前瞻性路径度量的顺序解码
2007 IEEE International Symposium on Information Theory Pub Date : 2007-06-24 DOI: 10.1109/ISIT.2007.4557568
M. Sikora, D. Costello
{"title":"Sequential Decoding with a Look-Ahead Path Metric","authors":"M. Sikora, D. Costello","doi":"10.1109/ISIT.2007.4557568","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557568","url":null,"abstract":"Convolutional codes are an efficient means of achieving reliable communication with low latency and complexity constraints. Since optimal Viterbi decoding of long (say, above 8) constraint length codes can be prohibitively complex, sequential decoders, such as the Zigangirov-Jelinek (ZJ) stack algorithm or the Fano algorithm can be applied. However, the performance of sequential algorithms is limited by a steep increase in the average number of steps per information bit that takes place close to the cutoff rate, more than by the error correcting capabilities of the code itself. In this paper we examine the problem of improving the performance of sequential decoders by designing more sophisticated path metrics. In particular, we propose a look-ahead (LA) path metric, which equals the Fano metric of the best path stemming from the current path for a fixed number of time steps. We demonstrate that in the limit of a large number of look-ahead time steps, sequential decoding becomes equivalent to the backtracking step of the Viterbi algorithm. Direct computation of the LA metric requires searching an exponential number of partial paths at each state and is infeasible, since the extra cost of computing the metric outweighs the savings in the number of time steps. However, in some scenarios of interest, the LA metric can be computed by other means. In the particular case of a covolutional code transmitted over a binary symmetric channel (BSC), this metric can be obtained from a modified syndrome decoder that stores for each partial syndrome the weight of the minimum weight error event. We demonstrate through simulations that this structure leads to an efficient and computationally inexpensive sequential decoding algorithm.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114372584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Characterization of max-min fair performance in large networks via Szemeredi's Regularity Lemma 利用Szemeredi正则引理表征大型网络中最大最小公平性能
2007 IEEE International Symposium on Information Theory Pub Date : 2007-06-24 DOI: 10.1109/ISIT.2007.4557218
M. Wiczanowski, H. Boche, S. Stańczak
{"title":"Characterization of max-min fair performance in large networks via Szemeredi's Regularity Lemma","authors":"M. Wiczanowski, H. Boche, S. Stańczak","doi":"10.1109/ISIT.2007.4557218","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557218","url":null,"abstract":"In this work, we provide asymptotically almost sure lower and upper bounds on the max-min fair performance in large single-hop networks with arbitrary channel fading. Our results are asymptotic in nature and we consider two cases of the limiting regime where the number of links (users) tends to infinity. The provided bounds apply to orthogonal networks as well as to a special class of nonorthogonal networks.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127725447","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Constellation Design via Capacity Maximization 基于容量最大化的星座设计
2007 IEEE International Symposium on Information Theory Pub Date : 2007-06-24 DOI: 10.1109/ISIT.2007.4557486
M. Barsoum, Christopher R. Jones, M. Fitz
{"title":"Constellation Design via Capacity Maximization","authors":"M. Barsoum, Christopher R. Jones, M. Fitz","doi":"10.1109/ISIT.2007.4557486","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557486","url":null,"abstract":"Traditional constellations are uniformally spaced. By giving up uniform spacing, constellations can be designed to have larger joint (i.e. overall) capacity or parallel decoding capacity. In this paper non-uniformally spaced (i.e. 'geometrically' shaped) constellations are designed to maximize either of these quantities. By way of numerical capacity computations we show that except in special cases, there are no universally optimal geometrically shaped constellations across all code rates, and that the optimization of a constellation has to target a specific code rate. Unlike joint capacity, optimizing for parallel decoding capacity is label dependent. For PAM and PSK constellations, we found the maximum parallel decoding capacity to be achieved using gray (not necessarily binary reflective gray) labels. However, for PAM constellations, not all gray labels can yield the highest parallel decoding capacity. Besides the conventional use of a (log2 (M) -1) /log2 (M) code rate with an M-point constellation for bandwidth efficient communications, the optimized constellations could offer further non-trivial gains at lower code rates (unlike traditional constellations). An optimized constellation is used with a state-of-the-art LDPC code and simulation results are presented. This paper also draws a distinction between probabilistic shaping and geometric shaping and in fact proves under broad conditions, that any gain in capacity which can be found via probabilistic shaping can also be achieved or exceeded solely through geometric shaping.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122260732","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 66
On the Burnashev exponent for Markov channels 关于马尔可夫通道的Burnashev指数
2007 IEEE International Symposium on Information Theory Pub Date : 2007-06-24 DOI: 10.1109/ISIT.2007.4557494
G. Como, S. Yüksel, S. Tatikonda
{"title":"On the Burnashev exponent for Markov channels","authors":"G. Como, S. Yüksel, S. Tatikonda","doi":"10.1109/ISIT.2007.4557494","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557494","url":null,"abstract":"We consider the reliability function of Markov channels with feedback and variable length channel codes. We extend Burnashev's [M.V. Burnashev, 1976] classic result to this case and present a single letter characterization for the reliability function.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127940318","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
N-Shift Cross-Orthogonal Sequences and Complete Complementary Codes n移交叉正交序列与完全互补码
2007 IEEE International Symposium on Information Theory Pub Date : 2007-06-24 DOI: 10.1109/ISIT.2007.4557612
Chenggao Han, N. Suehiro, T. Hashimoto
{"title":"N-Shift Cross-Orthogonal Sequences and Complete Complementary Codes","authors":"Chenggao Han, N. Suehiro, T. Hashimoto","doi":"10.1109/ISIT.2007.4557612","DOIUrl":"https://doi.org/10.1109/ISIT.2007.4557612","url":null,"abstract":"N-shift cross-orthogonal sequences are powerful materials for constructing complete complementary codes. In this paper, we present six theorems concerning general construction and expansion methods with the least upper bounds for N-shift cross-orthogonal sequences and complete complementary codes. Applying the theorems that about construction and expansion method of N-shift cross-orthogonal sequences, many types of N-shift cross orthogonal sequences are constructed systematically. Those include the sequence sets consisting of different lengths and include previous classes as special cases. Based on the generated N-shift cross orthogonal sequences, a complete complementary code are constructed by the theorem of construction method of complete complementary code. The last theorem which is about expansion method of complete complementary code are given for increase the number of sequence sets.","PeriodicalId":193467,"journal":{"name":"2007 IEEE International Symposium on Information Theory","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-06-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131460921","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信