{"title":"Linear complexity of prime n-square sequences","authors":"Young-Joon Kim, Hong‐Yeop Song","doi":"10.1109/ISIT.2008.4595422","DOIUrl":"https://doi.org/10.1109/ISIT.2008.4595422","url":null,"abstract":"We review prime n-square sequences of length pn which is originally defined by Ding and Helleseth in 1998, where p is an odd prime and n is a positive integer. In this paper, we determine the linear complexity and the minimal polynomial of these sequences for any n. It turned out that these sequences have linear complexity that is of the order of the period pn.","PeriodicalId":194674,"journal":{"name":"2008 IEEE International Symposium on Information Theory","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124464735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Explicit interleavers for a Repeat Accumulate Accumulate (RAA) code construction","authors":"V. Guruswami, Widad Machmouchi","doi":"10.1109/ISIT.2008.4595333","DOIUrl":"https://doi.org/10.1109/ISIT.2008.4595333","url":null,"abstract":"Repeat accumulate accumulate (RAA) codes are turbo-like codes where the message is first repeated k ges 2 times, passed through a first permutation (called interleaver), then an accumulator, then a second permutation, and finally a second accumulator. Bazzi, Mahdian, and Spielman (2003) prove that RAA codes are asymptotically good with high probability when the two permutations are chosen at random. RAA codes admit linear-time encoding algorithms, and are perhaps the simplest known family of linear-time encodable asymptotically good codes. An explicit construction of an asymptotically good RAA code is thus a very interesting goal. We focus on the case when k = 2 and we consider a variation of RAA codes where the inner repeat accumulate code is systematic. We give an explicit construction of the first permutation for which we show that the resulting code is asymptotically good with high probability when the second permutation is chosen at random. The explicit construction uses a cubic Hamiltonian graph with logarithmic girth.","PeriodicalId":194674,"journal":{"name":"2008 IEEE International Symposium on Information Theory","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125761773","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transmitter optimization and power allocation in double-scattering MIMO multiple access channels","authors":"Xiao Li, Shi Jin, Xiqi Gao, M. Mckay","doi":"10.1109/ISIT.2008.4595121","DOIUrl":"https://doi.org/10.1109/ISIT.2008.4595121","url":null,"abstract":"We investigate the sum capacity of a fading multiple-input multiple-output (MIMO) multiple access channel (MAC) under a general class of fading, known as double-scattering. We assume the receiver has perfect channel state information (CSI), while the transmitters only have access to statistical CSI. We show that the optimum transmit directions for each user coincide with the eigenvectors of the userpsilas own transmit spatial correlation matrix. We also derive new closed-form upper bounds on the sum capacity of the MIMO-MAC under double-scattering, which we employ to obtain suboptimal power allocation policies. These policies are easy to compute, and require each user to know only their own channel statistics.","PeriodicalId":194674,"journal":{"name":"2008 IEEE International Symposium on Information Theory","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126137505","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The capacity regions of some classes of deterministic relay channels","authors":"Hon-Fah Chong, M. Motani","doi":"10.1109/ISIT.2008.4595005","DOIUrl":"https://doi.org/10.1109/ISIT.2008.4595005","url":null,"abstract":"The capacity regions of two new classes of deterministic relay channels are established. In the first class of deterministic relay channels, the family of conditional probability distributions describing the relay channel can be written as p(y<sub>2</sub>, y<sub>3</sub>|x<sub>1</sub>, x<sub>2</sub>)=p(y<sub>3</sub>|x<sub>1</sub>, x<sub>2</sub>)p(y<sub>2</sub>|s, x<sub>2</sub>, y<sub>3</sub>) where s is a deterministic function of x<sub>1</sub>, i.e., s=f<sub>1</sub>(x<sub>1</sub>). In addition, we require that Srarr(X<sub>2</sub>, Y<sub>2</sub>)rarrY<sub>3</sub> form a Markov chain for all input probability distributions p(x<sub>1</sub>, x<sub>2</sub>). In the second class of deterministic relay channels, there is causal noiseless feedback from relay to sender and the relay output is a deterministic function of x<sub>1</sub>, x<sub>2</sub>, and y<sub>3</sub>, i.e., y<sub>2</sub>=f<sub>3</sub>(x<sub>2</sub>, x<sub>2</sub>, y<sub>3</sub>). We consider two alternative schemes to achieve the capacity. The first is based on a generalized strategy of Gabbai and Bross. The second strategy is based on a ldquohash-and-forwardrdquo scheme by Cover and Kim.","PeriodicalId":194674,"journal":{"name":"2008 IEEE International Symposium on Information Theory","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124772870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Hirakendu Das, A. Orlitsky, N. Santhanam, Junan Zhang
{"title":"Further results on relative redundancy","authors":"Hirakendu Das, A. Orlitsky, N. Santhanam, Junan Zhang","doi":"10.1109/ISIT.2008.4595327","DOIUrl":"https://doi.org/10.1109/ISIT.2008.4595327","url":null,"abstract":"Standard redundancy measures the excess number of bits needed to compress a sequence as a function of the sequencepsilas length. Since long sequences can have arbitrarily low minimum description length (MDL), even low standard redundancy can be arbitarily high compared to the sequencepsilas MDL. By contrast, relative redundancy evaluates the excess number of bits as a function of the sequencepsilas MDL. Hence unlike standard redundancy, low relative redundancy implies that the number of bits needed to compress any sequence is essentially the lowest possible. Results in [1] show that for iid distributions over binary alphabets, block relative redundancy essentially equals block standard redundancy while sequential relative redundancy is about twice its standard counterpart. We show that unlike binary alphabets, for larger alphabets both block and sequential relative redundancy essentially equal their standard counterparts. We also define and determine expected relative redundancy and show that it is almost same as worst-case relative redundancy.","PeriodicalId":194674,"journal":{"name":"2008 IEEE International Symposium on Information Theory","volume":"142 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129315143","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Stability analysis of random linear coding across multicast sessions","authors":"R. Cogill, B. Shrader, A. Ephremides","doi":"10.1109/ISIT.2008.4594942","DOIUrl":"https://doi.org/10.1109/ISIT.2008.4594942","url":null,"abstract":"We consider a problem of managing separate multicast sessions from a single transmitter. Each of K sessions has an associated packet stream, and a single transmitter must transmit these packet streams to a group of receivers. The multicast sessions are separate in the sense that each receiver only wants packets from one of the K streams. We will compare the maximum stable arrival rates that can be supported with and without using random linear coding across the K sessions. Intuitively, it seems that coding across sessions is not beneficial. Coding across sessions appears to introduce unnecessary additional delay since each receiver does not receive its next packet until it can decode the head-of-line packets from all K streams. However, we show that in many cases the maximum stable arrival rate that can be supported when coding across sessions is significantly greater than maximum stable arrival rate that can be supported when not coding across sessions. We provide a sufficient condition that indicates when coding across sessions is preferable. This condition is expressed in terms of the number of sessions, the number of receivers per session, and the reliability of the channels connecting the transmitter to the receivers.","PeriodicalId":194674,"journal":{"name":"2008 IEEE International Symposium on Information Theory","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129351244","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Basic limits on protocol information in slotted communication networks","authors":"Brian P. Dunn, J. N. Laneman","doi":"10.1109/ISIT.2008.4595401","DOIUrl":"https://doi.org/10.1109/ISIT.2008.4595401","url":null,"abstract":"We investigate the amount of protocol information required for a communication network to meet an average delay constraint for the delivery of messages that arrive according to a Bernoulli random process. We obtain a lower bound on this overhead as a function of the arrival rate and average delay. Our model is a discretetime analog of the Poisson arrival process considered by Gallager, and we show that in the limit as slot duration goes to zero, Gallagerpsilas bound is recovered.","PeriodicalId":194674,"journal":{"name":"2008 IEEE International Symposium on Information Theory","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127450904","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cryptographic primitives based on discrete-input AWGN channels","authors":"M. Isaka, Yuki Shimizu","doi":"10.1109/ISIT.2008.4595084","DOIUrl":"https://doi.org/10.1109/ISIT.2008.4595084","url":null,"abstract":"Two cryptographic primitives, commitment and oblivious transfer, are devised based on the additive white Gaussian noise channel and discrete input alphabet. We present protocols and analyze the security and information theoretic efficiencies.","PeriodicalId":194674,"journal":{"name":"2008 IEEE International Symposium on Information Theory","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127459532","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Transporting information and energy simultaneously","authors":"L. Varshney","doi":"10.1109/ISIT.2008.4595260","DOIUrl":"https://doi.org/10.1109/ISIT.2008.4595260","url":null,"abstract":"The fundamental tradeoff between the rates at which energy and reliable information can be transmitted over a single noisy line is studied. Engineering inspiration for this problem is provided by powerline communication, RFID systems, and covert packet timing systems as well as communication systems that scavenge received energy. A capacity-energy function is defined and a coding theorem is given. The capacity-energy function is a non-increasing concave cap function. Capacity-energy functions for several channels are computed.","PeriodicalId":194674,"journal":{"name":"2008 IEEE International Symposium on Information Theory","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127471653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"DMT of multi-hop cooperative networks-Part I: K-Parallel-Path networks","authors":"K. Sreeram, B. Sasidharan, P. V. Kumar","doi":"10.1109/ISIT.2008.4595355","DOIUrl":"https://doi.org/10.1109/ISIT.2008.4595355","url":null,"abstract":"We consider single-source, single-sink multi-hop relay networks, with slow-fading Rayleigh fading links and single- antenna relay nodes operating under the half-duplex constraint. While two hop relay networks have been studied in great detail in terms of the diversity-multiplexing tradeoff (DMT), few results are available for more general networks. In this two-part paper, we identify two families of networks that are multi-hop generalizations of the two hop network: if-Parallel-Path (KPP) networks and Layered networks. In the first part, we initially consider KPP networks, which can be viewed as the union of K node-disjoint parallel paths, each of length > 1. The results are then generalized to KPP(I) networks, which permit interference between paths and to KPP(D) networks, which possess a direct link from source to sink. We characterize the optimal DMT of KPP(D) networks with K ges 4, and KPP(I) networks with K ges 3. Along the way, we derive lower bounds for the DMT of triangular channel matrices, which are useful in DMT computation of various protocols. As a special case, the DMT of two-hop relay network without direct link is obtained. Two key implications of the results in the two-part paper are that the half-duplex constraint does not necessarily entail rate loss by a factor of two, as previously believed and that, simple AF protocols are often sufficient to attain the best possible DMT.","PeriodicalId":194674,"journal":{"name":"2008 IEEE International Symposium on Information Theory","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-07-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127492504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}