2016 IEEE International Symposium on Information Theory (ISIT)最新文献

筛选
英文 中文
On the capacity of a class of dual-band interference channels 一类双频干扰信道的容量
2016 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541801
Subhajit Majhi, P. Mitran
{"title":"On the capacity of a class of dual-band interference channels","authors":"Subhajit Majhi, P. Mitran","doi":"10.1109/ISIT.2016.7541801","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541801","url":null,"abstract":"We consider a two-transmitter two-receiver dual-band Gaussian interference channel (GIC) which is motivated by the simultaneous use of both the conventional microwave band and the unconventional millimeter wave (mm-wave) band in future wireless networks where the traditional microwave band is complemented by additional spectrum in the mm-wave band. A key modeling feature of the mm-wave band is that due to severe path loss and relatively small wavelength, it must be used with highly directional antennas, and thus the transmitter is able to transmit to its intended receiver with negligible to no interference to other receivers. For this model, we derive some sufficient conditions on the channel gains under which the capacity of this type of dual-band GIC is determined. Specifically, these conditions are classified as when microwave band channel gains have (a) weak interference, i.e., both the cross channel gains are less than 1 and (b) mixed interference, i.e., only one of the cross channel gains is less than 1, while the channel gains in the dual-band GIC satisfy certain additional conditions in each case.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115991370","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Super-activation as a unique feature of arbitrarily varying wiretap channels 超激活是任意变化窃听通道的独特特征
2016 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541865
R. Schaefer, H. Boche, H. Poor
{"title":"Super-activation as a unique feature of arbitrarily varying wiretap channels","authors":"R. Schaefer, H. Boche, H. Poor","doi":"10.1109/ISIT.2016.7541865","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541865","url":null,"abstract":"The question of additivity of the capacity of a channel goes back to Shannon who asked this for the zero error capacity function. Despite the common sense that the capacity is usually additive, there is surprisingly little known for non-trivial channels. This paper addresses this question for the arbitrarily varying wiretap channel (AVWC) which models secure communication in the presence of arbitrarily varying channel (AVC) conditions. For orthogonal AVWCs it has been shown that the non-additivity phenomenon of super-activation occurs; that is, there are orthogonal AVWCs, each having zero secrecy capacity, which allow for transmission with positive secrecy rate if they are used together. It is shown that for such orthogonal AVWCs super-activation is generic in the sense that whenever super-activation is possible, it is possible for all AVWCs in a certain neighborhood as well. Moreover, it is shown that the issue of super-activation and the continuity of the secrecy capacity solely depend on the legitimate link. Accordingly, the single-user AVC is studied and it is shown that in this case, super-activation for non-secure message transmission is not possible, making it a unique feature of secure communication over AVWCs. However, the capacity for message transmission of the single-user AVC is shown to be super-additive including a complete characterization.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124029975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Distributed recursive composite hypothesis testing: Imperfect communication 分布式递归复合假设检验:不完全沟通
2016 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541785
Anit Kumar Sahu, S. Kar
{"title":"Distributed recursive composite hypothesis testing: Imperfect communication","authors":"Anit Kumar Sahu, S. Kar","doi":"10.1109/ISIT.2016.7541785","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541785","url":null,"abstract":"This paper focuses on the problem of distributed composite hypothesis testing in a noisy network of sparsely interconnected agents in which a pair of agents exchange information over an additive noise channel. The network objective is to test a simple null hypothesis against a composite alternative concerning the state of the field, modeled as a vector of (continuous) unknown parameters determining the parametric family of probability measures induced on the agents' observation spaces under the hypotheses. A recursive generalized likelihood ratio test (GLRT) type algorithm in a distributed setup of the consensus+innovations form is proposed, in which the agents update their parameter estimates and decision statistics by simultaneously processing the latest sensed information (innovations) and information obtained from neighboring agents (consensus). This paper characterizes the conditions and the testing algorithm design parameters which ensure that the probabilities of decision errors decay to zero asymptotically in the large sample limit.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121584629","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
QoS-driven energy-efficient power control with Markov arrivals and finite-alphabet inputs 具有马尔可夫到达和有限字母输入的qos驱动节能功率控制
2016 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541803
Gozde Ozcan, Mustafa Ozmen, M. C. Gursoy
{"title":"QoS-driven energy-efficient power control with Markov arrivals and finite-alphabet inputs","authors":"Gozde Ozcan, Mustafa Ozmen, M. C. Gursoy","doi":"10.1109/ISIT.2016.7541803","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541803","url":null,"abstract":"This paper proposes optimal power adaptation schemes that maximize the energy efficiency (EE) in the presence of Markovian sources and finite-alphabet inputs subject to quality of service (QoS) constraints. First, maximum average arrival rates supported by transmitting signals with arbitrary input distributions are characterized in closed-form by employing the effective bandwidth of time-varying sources (e.g., discrete-time Markov and Markov fluid sources) and effective capacity of the time-varying wireless channel. Subsequently, EE is defined as the ratio of the maximum average arrival rate to the total power consumption, in which circuit power is also taken into account. Following these characterizations, an optimization problem is formulated to maximize the EE of the system, and optimal power control schemes are determined. Through numerical results, the performance of the optimal power control policies is evaluated for different signal constellations and is also compared with that of constant power transmission. The impact of QoS constraints, source characteristics, input distributions on the maximum achievable EE and the throughput is analyzed.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133196527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Achievable rates for additive isotropic α-stable noise channels 可加性各向同性α-稳定噪声通道的可实现速率
2016 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541624
Malcolm Egan, Mauro L. de Freitas, L. Clavier, A. Goupil, G. Peters, Nourddine Azzaoui
{"title":"Achievable rates for additive isotropic α-stable noise channels","authors":"Malcolm Egan, Mauro L. de Freitas, L. Clavier, A. Goupil, G. Peters, Nourddine Azzaoui","doi":"10.1109/ISIT.2016.7541624","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541624","url":null,"abstract":"Impulsive noise arises in many communication systems - ranging from wireless to molecular - and is often modeled via the α-stable distribution. In this paper, we investigate properties of the capacity of complex isotropic α-stable noise channels, which can arise in the context of wireless cellular communications and are not well understood at present. In particular, we derive a tractable lower bound, as well as prove existence and uniqueness of the optimal input distribution. We then apply our lower bound to study the case of parallel α-stable noise channels and derive a bound that provides insight into the effect of the tail index α on the achievable rate.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"63 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123252009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Exact closed-form expression for the inverse moments of one-sided correlated Gram matrices 单侧相关格拉姆矩阵逆矩的精确封闭表达式
2016 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541684
Khalil Elkhalil, A. Kammoun, T. Al-Naffouri, Mohamed-Slim Alouini
{"title":"Exact closed-form expression for the inverse moments of one-sided correlated Gram matrices","authors":"Khalil Elkhalil, A. Kammoun, T. Al-Naffouri, Mohamed-Slim Alouini","doi":"10.1109/ISIT.2016.7541684","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541684","url":null,"abstract":"In this paper, we derive a closed-form expression for the inverse moments of one sided-correlated random Gram matrices. Such a question is mainly motivated by applications in signal processing and wireless communications for which evaluating this quantity is a question of major interest. This is for instance the case of the best linear unbiased estimator, in which the average estimation error corresponds to the first inverse moment of a random Gram matrix.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121867844","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Voronoi constellations for high-dimensional lattice codes 高维晶格码的Voronoi星座
2016 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541550
Nuwan S. Ferdinand, M. Nokleby, B. Aazhang
{"title":"Voronoi constellations for high-dimensional lattice codes","authors":"Nuwan S. Ferdinand, M. Nokleby, B. Aazhang","doi":"10.1109/ISIT.2016.7541550","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541550","url":null,"abstract":"This paper proposes a low-complexity scheme to construct Voronoi constellations for the shaping of high-dimensional lattice codes. The Voronoi region of a low-dimensional lattice is used as a prototype for the shaping region for a high-dimensional lattice codebook. The proposed scheme retains the shaping and coding gains of the respective lattices. Further, the proposed scheme provides a general approach for shaping popular high-dimensional lattices, including LDA lattices, for which no practical shaping algorithm exists to our knowledge. Finally, the proposed scheme preserves the algebraic properties of nested lattice codes, making it suitable for compute-and-forward applications. Using E8 and BW16 as prototype shaping lattices, we numerically show that the proposed scheme results in 0:65 dB and 0:86 dB shaping gains.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125349784","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real interference alignment for vector channels 矢量通道的真实干涉对准
2016 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541544
P. Mukherjee, S. Ulukus
{"title":"Real interference alignment for vector channels","authors":"P. Mukherjee, S. Ulukus","doi":"10.1109/ISIT.2016.7541544","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541544","url":null,"abstract":"We present a real interference alignment technique for multiple-input multiple-output (MIMO) networks. This technique is based on a theorem due to Dirichlet and Khintchine for simultaneous Diophantine approximation and uses the outputs of all the antennas at the receiver simultaneously for decoding, instead of using them in an antenna-by-antenna basis. This allows us to forgo asymptotic real interference alignment for several multi-user scenarios such as the two-user MIMO interference channel with confidential messages and the two-user MIMO multiple access wiretap channel.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125524386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Near-capacity protograph doubly-generalized LDPC codes with block thresholds 具有块阈值的近容量原型双广义LDPC码
2016 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541756
A. K. Pradhan, A. Thangaraj
{"title":"Near-capacity protograph doubly-generalized LDPC codes with block thresholds","authors":"A. K. Pradhan, A. Thangaraj","doi":"10.1109/ISIT.2016.7541756","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541756","url":null,"abstract":"Protograph doubly-generalized low-density parity-check (DGLDPC) codes, which allow for arbitrary component codes at the variable and check nodes of a protograph, are considered. Exact density evolution is derived over the binary erasure channel. Conditions on the protograph and component codes to ensure equality of block-error threshold and density evolution threshold for large-girth ensembles are established. Conditions for stability of density evolution are derived, and block-error threshold property is extended to binary-input symmetric channels. Optimized low-rate protographs for DGLDPC codes over the erasure channel are presented.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115497560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
String concatenation construction for Chebyshev permutation channel codes 切比雪夫排列信道代码的字符串连接构造
2016 IEEE International Symposium on Information Theory (ISIT) Pub Date : 2016-08-11 DOI: 10.1109/ISIT.2016.7541814
Y. M. Chee, H. M. Kiah, S. Ling, T. T. Nguyen, Van Khu Vu, Xiande Zhang
{"title":"String concatenation construction for Chebyshev permutation channel codes","authors":"Y. M. Chee, H. M. Kiah, S. Ling, T. T. Nguyen, Van Khu Vu, Xiande Zhang","doi":"10.1109/ISIT.2016.7541814","DOIUrl":"https://doi.org/10.1109/ISIT.2016.7541814","url":null,"abstract":"We construct codes for the Chebyshev permutation channels whose study was initiated by Langberg et al. (2015). We establish several recursive code constructions and present efficient decoding algorithms for our codes. In particular, our constructions yield a family of binary codes of rate 0.643 when r = 1. The upper bound on the rate in this case is 2/3 and the previous highest rate is 0.609.","PeriodicalId":198767,"journal":{"name":"2016 IEEE International Symposium on Information Theory (ISIT)","volume":" 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-08-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113950989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信