2011 IEEE International Symposium on Information Theory Proceedings最新文献

筛选
英文 中文
Finite-memory least squares universal prediction of individual continuous sequences 单个连续序列的有限记忆最小二乘法普遍预测
2011 IEEE International Symposium on Information Theory Proceedings Pub Date : 2011-10-03 DOI: 10.1109/ISIT.2011.6033961
R. Dar, M. Feder
{"title":"Finite-memory least squares universal prediction of individual continuous sequences","authors":"R. Dar, M. Feder","doi":"10.1109/ISIT.2011.6033961","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033961","url":null,"abstract":"In this paper we consider the problem of universal prediction of individual continuous sequences with square-error loss, using a deterministic finite-state machine (FSM). The goal is to attain universally the performance of the best constant predictor tuned to the sequence, which predicts the empirical mean and incurs the empirical variance as the loss. The paper analyzes the tradeoff between the number of states of the universal FSM and the excess loss (regret). We first present a machine, termed Exponential Decaying Memory (EDM) machine, used in the past for predicting binary sequences, and show bounds on its performance. Then we consider a new class of machines, Degenerated Tracking Memory (DTM) machines, find the optimal DTM machine and show that it outperforms the EDM machine for a small number of states. Incidentally, we prove a lower bound indicating that even with large number of states the regret of the DTM machine does not vanish. Finally, we show a lower bound on the achievable regret of any FSM, and suggest a new machine, the Enhanced Exponential Decaying Memory, which attains the bound and outperforms the EDM for any number of states.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127407721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
When Alamouti codes meet interference alignment: Transmission schemes for two-user X channel 当Alamouti码满足干扰对准时:双用户X信道的传输方案
2011 IEEE International Symposium on Information Theory Proceedings Pub Date : 2011-10-03 DOI: 10.1109/ISIT.2011.6034034
Liangbin Li, H. Jafarkhani, S. Jafar
{"title":"When Alamouti codes meet interference alignment: Transmission schemes for two-user X channel","authors":"Liangbin Li, H. Jafarkhani, S. Jafar","doi":"10.1109/ISIT.2011.6034034","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034034","url":null,"abstract":"Interference alignment increases transmission rate in terms of multiplexing gain for X channel. In this paper, we propose a fixed-rate transmission scheme over a two-user X channel where each of the two double-antenna transmitters has independent messages for each of the two double-antenna receivers. Each transmitter encodes symbols using Alamouti codes followed by beamformers that align interference at unintended receivers. The receiver removes the aligned interference and decouples symbols using interference cancellation followed by symbol-by-symbol decoding. Our analysis shows that the proposed scheme achieves a diversity gain of 2 at the maximum node-to-node symbol-rate of 2 over 3.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115765059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 39
A simple method to construct LDPC codes based on projective planes 一种基于投影平面构造LDPC码的简单方法
2011 IEEE International Symposium on Information Theory Proceedings Pub Date : 2011-10-03 DOI: 10.1109/ISIT.2011.6034231
S. Kovalev, V. Krachkovsky
{"title":"A simple method to construct LDPC codes based on projective planes","authors":"S. Kovalev, V. Krachkovsky","doi":"10.1109/ISIT.2011.6034231","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034231","url":null,"abstract":"We consider a simple description of the incidence matrix of a projective plane over the field GF(q), using multiplication and addition tables of the finite field. Some basic properties of LDPC codes derived from such incidence matrices are discussed. Further, a class of LDPC codes of paper [1], derived from Reed-Solomon (RS) codes with two information symbols, is considered. By comparing these two classes, we give a simple equivalence proof for them.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115912187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Minimal trellis for systematic recursive convolutional encoders 最小网格系统递归卷积编码器
2011 IEEE International Symposium on Information Theory Proceedings Pub Date : 2011-10-03 DOI: 10.1109/ISIT.2011.6034011
C. Pimentel, R. Souza, B. Filho, Isaac Benchimol
{"title":"Minimal trellis for systematic recursive convolutional encoders","authors":"C. Pimentel, R. Souza, B. Filho, Isaac Benchimol","doi":"10.1109/ISIT.2011.6034011","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034011","url":null,"abstract":"We consider high-rate systematic recursive convolutional encoders to be adopted as constituent encoders in turbo schemes. It has been shown by Douillard and Berrou that the construction of high-rate turbo codes by means of high-rate constituent encoders offers several advantages over the typical construction based on the puncturing of rate-1/2 constituent encoders. To reduce the decoding complexity associated with high-rate codes, we adopt the “minimal” trellis representation of convolutional codes introduced by McEliece and Lin. While in the literature this trellis has been obtained for nonrecursive nonsystematic generator matrices, we herein introduce the construction of the “minimal” trellis for a systematic recursive convolutional encoding matrix. We also derive expressions for the arithmetic decoding complexity when the max-log-MAP algorithm is applied over the conventional and the “minimal” trellises. Examples are provided, which show that significant savings in decoding complexity are obtained, while keeping the same error performance of conventional schemes, when the minimal trellis is used. Finally, a code search is conducted and examples are provided which indicate that a refinement in terms of decoding complexity-error performance trade-off is obtained.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114308824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Optimal MaxWeight scheduling in a multihop wireless network via branch and bound 基于分支和绑定的多跳无线网络的最优MaxWeight调度
2011 IEEE International Symposium on Information Theory Proceedings Pub Date : 2011-10-03 DOI: 10.1109/ISIT.2011.6034102
C. Weeraddana, M. Codreanu, M. Latva-aho, A. Ephremides
{"title":"Optimal MaxWeight scheduling in a multihop wireless network via branch and bound","authors":"C. Weeraddana, M. Codreanu, M. Latva-aho, A. Ephremides","doi":"10.1109/ISIT.2011.6034102","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034102","url":null,"abstract":"We consider the problem of MaxWeight scheduling in wireless multihop networks. This problem is known to be NP-hard. We propose a solution method, based on the branch and bound technique, which solves globally the MaxWeight scheduling problem with an optimality certificate. Efficient analytic bounding techniques are introduced as well.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114652767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The ordered Hamming metric and ordered symmetric channels 有序汉明度量和有序对称信道
2011 IEEE International Symposium on Information Theory Proceedings Pub Date : 2011-10-03 DOI: 10.1109/ISIT.2011.6033968
Woomyoung Park, A. Barg
{"title":"The ordered Hamming metric and ordered symmetric channels","authors":"Woomyoung Park, A. Barg","doi":"10.1109/ISIT.2011.6033968","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033968","url":null,"abstract":"The ordered Hamming metric is a generalization of the usual Hamming distance derived from a partial order on the set of coordinates. So far, coding theory in ordered spaces has primarily focused on combinatorial aspects. The main object of this paper is to develop the relation of the ordered Hamming space to the context of information transmission. Using the models in previous works of Rosenbloom and Tsfasman (1997) and Tavildar and Viswanath (2006) as a starting point, we define the ordered symmetric channel and the ordered erasure channel which are counterparts of the q-ary symmetric channel and the q-ary erasure channel, respectively. We establish a set of basic results for these channels as well as their relation to linear ordered codes.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116929621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
Relaying via hybrid coding 通过混合编码中继
2011 IEEE International Symposium on Information Theory Proceedings Pub Date : 2011-10-03 DOI: 10.1109/ISIT.2011.6033877
Young-Han Kim, S. Lim, P. Minero
{"title":"Relaying via hybrid coding","authors":"Young-Han Kim, S. Lim, P. Minero","doi":"10.1109/ISIT.2011.6033877","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033877","url":null,"abstract":"Motivated by the recently developed hybrid coding scheme for joint source-channel coding, this paper proposes a new coding scheme for noisy relay networks. The proposed coding scheme operates in a similar manner to the noisy network coding scheme, except that each relay node uses the hybrid coding interface to transmit a symbol-by-symbol function of the received sequence and its quantized version. This coding scheme unifies both amplify-forward and noisy network coding and can strictly outperform both. The potential of the hybrid coding interface for relaying is demonstrated through the diamond relay network and two-way relay channel examples.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117211821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Some constructions of maximal witness codes 最大见证码的一些构造
2011 IEEE International Symposium on Information Theory Proceedings Pub Date : 2011-10-03 DOI: 10.1109/ISIT.2011.6033928
Nikolaos Makriyannis, Bertrand Meyer
{"title":"Some constructions of maximal witness codes","authors":"Nikolaos Makriyannis, Bertrand Meyer","doi":"10.1109/ISIT.2011.6033928","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033928","url":null,"abstract":"Given a code C ∈ F<sup>n</sup><inf>2</inf> and a word c ∈ C, a witness of c is a subset W ⊆ {, 1∦, n} of coordinate positions such that c differs from any other codeword c′ ∈ C on the indices in W. If any codeword posseses a witness of given length w, C is called a w-witness code. This paper gives new constructions of large w-witness codes and proves with a numerical method that their sizes are maximal for certain values of n and w. Our technique is in the spirit of Delsarte's linear programming bound on the size of classical codes and relies on the Lovász theta number, semidefinite programming, and reduction through symmetry.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125937970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Constrained Flash memory programming 受限闪存编程
2011 IEEE International Symposium on Information Theory Proceedings Pub Date : 2011-10-03 DOI: 10.1109/ISIT.2011.6033933
A. Berman, Y. Birk
{"title":"Constrained Flash memory programming","authors":"A. Berman, Y. Birk","doi":"10.1109/ISIT.2011.6033933","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033933","url":null,"abstract":"In NAND Flash memory featuring multi-level cells (MLC), the width of threshold voltage distributions about their nominal values affects the permissible number of levels and thus storage capacity. Unfortunately, inter-cell coupling causes a cell's charge to affect its neighbors' sensed threshold voltage, resulting in an apparent broadening of these distributions. We present a novel approach, whereby the data written to Flash is constrained, e.g., by forbidding certain adjacent-cell level combinations, so as to limit the maximum voltage shift and thus narrow the distributions. To this end, we present a new family of constrained codes. Our technique can serve for capacity enhancement (more levels) or for improving endurance, retention and bit error rate (wider guard bands between adjacent levels). It may also be combined with various programming order techniques that mitigate the inter-cell coupling effects and with decoding techniques that compensate for them.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125983019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 59
Efficient distributed source coding for multiple receivers via matrix sparsification 通过矩阵稀疏化实现多接收机的高效分布式源编码
2011 IEEE International Symposium on Information Theory Proceedings Pub Date : 2011-10-03 DOI: 10.1109/ISIT.2011.6033914
C. Avin, Michael Borokhovich, A. Cohen, Zvi Lotker
{"title":"Efficient distributed source coding for multiple receivers via matrix sparsification","authors":"C. Avin, Michael Borokhovich, A. Cohen, Zvi Lotker","doi":"10.1109/ISIT.2011.6033914","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033914","url":null,"abstract":"Consider the problem of source coding with side information in large networks with multiple receivers. In this case, standard coding techniques are either prohibitively complex to decode, or require source-network coding separation, resulting in sub-optimal transmission schemes. To alleviate this problem, we offer a joint network-source coding scheme based on matrix sparsification at the code design phase, which allows the terminals to use an efficient decoding procedure (syndrome decoding using LDPC), despite the network coding throughout the network. Via a novel relation between matrix sparsification and rate-distortion theory, we give lower and upper bounds on the best achievable sparsification performance, and analyze our scheme in the limit of weak side information at the receivers. Simulation results motivate the use of this scheme at non-limiting rates as well.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"103 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124635861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信