{"title":"Finite-memory least squares universal prediction of individual continuous sequences","authors":"R. Dar, M. Feder","doi":"10.1109/ISIT.2011.6033961","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033961","url":null,"abstract":"In this paper we consider the problem of universal prediction of individual continuous sequences with square-error loss, using a deterministic finite-state machine (FSM). The goal is to attain universally the performance of the best constant predictor tuned to the sequence, which predicts the empirical mean and incurs the empirical variance as the loss. The paper analyzes the tradeoff between the number of states of the universal FSM and the excess loss (regret). We first present a machine, termed Exponential Decaying Memory (EDM) machine, used in the past for predicting binary sequences, and show bounds on its performance. Then we consider a new class of machines, Degenerated Tracking Memory (DTM) machines, find the optimal DTM machine and show that it outperforms the EDM machine for a small number of states. Incidentally, we prove a lower bound indicating that even with large number of states the regret of the DTM machine does not vanish. Finally, we show a lower bound on the achievable regret of any FSM, and suggest a new machine, the Enhanced Exponential Decaying Memory, which attains the bound and outperforms the EDM for any number of states.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127407721","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"When Alamouti codes meet interference alignment: Transmission schemes for two-user X channel","authors":"Liangbin Li, H. Jafarkhani, S. Jafar","doi":"10.1109/ISIT.2011.6034034","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034034","url":null,"abstract":"Interference alignment increases transmission rate in terms of multiplexing gain for X channel. In this paper, we propose a fixed-rate transmission scheme over a two-user X channel where each of the two double-antenna transmitters has independent messages for each of the two double-antenna receivers. Each transmitter encodes symbols using Alamouti codes followed by beamformers that align interference at unintended receivers. The receiver removes the aligned interference and decouples symbols using interference cancellation followed by symbol-by-symbol decoding. Our analysis shows that the proposed scheme achieves a diversity gain of 2 at the maximum node-to-node symbol-rate of 2 over 3.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"140 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115765059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A simple method to construct LDPC codes based on projective planes","authors":"S. Kovalev, V. Krachkovsky","doi":"10.1109/ISIT.2011.6034231","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034231","url":null,"abstract":"We consider a simple description of the incidence matrix of a projective plane over the field GF(q), using multiplication and addition tables of the finite field. Some basic properties of LDPC codes derived from such incidence matrices are discussed. Further, a class of LDPC codes of paper [1], derived from Reed-Solomon (RS) codes with two information symbols, is considered. By comparing these two classes, we give a simple equivalence proof for them.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115912187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Minimal trellis for systematic recursive convolutional encoders","authors":"C. Pimentel, R. Souza, B. Filho, Isaac Benchimol","doi":"10.1109/ISIT.2011.6034011","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034011","url":null,"abstract":"We consider high-rate systematic recursive convolutional encoders to be adopted as constituent encoders in turbo schemes. It has been shown by Douillard and Berrou that the construction of high-rate turbo codes by means of high-rate constituent encoders offers several advantages over the typical construction based on the puncturing of rate-1/2 constituent encoders. To reduce the decoding complexity associated with high-rate codes, we adopt the “minimal” trellis representation of convolutional codes introduced by McEliece and Lin. While in the literature this trellis has been obtained for nonrecursive nonsystematic generator matrices, we herein introduce the construction of the “minimal” trellis for a systematic recursive convolutional encoding matrix. We also derive expressions for the arithmetic decoding complexity when the max-log-MAP algorithm is applied over the conventional and the “minimal” trellises. Examples are provided, which show that significant savings in decoding complexity are obtained, while keeping the same error performance of conventional schemes, when the minimal trellis is used. Finally, a code search is conducted and examples are provided which indicate that a refinement in terms of decoding complexity-error performance trade-off is obtained.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114308824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Weeraddana, M. Codreanu, M. Latva-aho, A. Ephremides
{"title":"Optimal MaxWeight scheduling in a multihop wireless network via branch and bound","authors":"C. Weeraddana, M. Codreanu, M. Latva-aho, A. Ephremides","doi":"10.1109/ISIT.2011.6034102","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034102","url":null,"abstract":"We consider the problem of MaxWeight scheduling in wireless multihop networks. This problem is known to be NP-hard. We propose a solution method, based on the branch and bound technique, which solves globally the MaxWeight scheduling problem with an optimality certificate. Efficient analytic bounding techniques are introduced as well.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114652767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The ordered Hamming metric and ordered symmetric channels","authors":"Woomyoung Park, A. Barg","doi":"10.1109/ISIT.2011.6033968","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033968","url":null,"abstract":"The ordered Hamming metric is a generalization of the usual Hamming distance derived from a partial order on the set of coordinates. So far, coding theory in ordered spaces has primarily focused on combinatorial aspects. The main object of this paper is to develop the relation of the ordered Hamming space to the context of information transmission. Using the models in previous works of Rosenbloom and Tsfasman (1997) and Tavildar and Viswanath (2006) as a starting point, we define the ordered symmetric channel and the ordered erasure channel which are counterparts of the q-ary symmetric channel and the q-ary erasure channel, respectively. We establish a set of basic results for these channels as well as their relation to linear ordered codes.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116929621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Relaying via hybrid coding","authors":"Young-Han Kim, S. Lim, P. Minero","doi":"10.1109/ISIT.2011.6033877","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033877","url":null,"abstract":"Motivated by the recently developed hybrid coding scheme for joint source-channel coding, this paper proposes a new coding scheme for noisy relay networks. The proposed coding scheme operates in a similar manner to the noisy network coding scheme, except that each relay node uses the hybrid coding interface to transmit a symbol-by-symbol function of the received sequence and its quantized version. This coding scheme unifies both amplify-forward and noisy network coding and can strictly outperform both. The potential of the hybrid coding interface for relaying is demonstrated through the diamond relay network and two-way relay channel examples.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"115 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117211821","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Some constructions of maximal witness codes","authors":"Nikolaos Makriyannis, Bertrand Meyer","doi":"10.1109/ISIT.2011.6033928","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033928","url":null,"abstract":"Given a code C ∈ F<sup>n</sup><inf>2</inf> and a word c ∈ C, a witness of c is a subset W ⊆ {, 1∦, n} of coordinate positions such that c differs from any other codeword c′ ∈ C on the indices in W. If any codeword posseses a witness of given length w, C is called a w-witness code. This paper gives new constructions of large w-witness codes and proves with a numerical method that their sizes are maximal for certain values of n and w. Our technique is in the spirit of Delsarte's linear programming bound on the size of classical codes and relies on the Lovász theta number, semidefinite programming, and reduction through symmetry.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"53 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125937970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Constrained Flash memory programming","authors":"A. Berman, Y. Birk","doi":"10.1109/ISIT.2011.6033933","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033933","url":null,"abstract":"In NAND Flash memory featuring multi-level cells (MLC), the width of threshold voltage distributions about their nominal values affects the permissible number of levels and thus storage capacity. Unfortunately, inter-cell coupling causes a cell's charge to affect its neighbors' sensed threshold voltage, resulting in an apparent broadening of these distributions. We present a novel approach, whereby the data written to Flash is constrained, e.g., by forbidding certain adjacent-cell level combinations, so as to limit the maximum voltage shift and thus narrow the distributions. To this end, we present a new family of constrained codes. Our technique can serve for capacity enhancement (more levels) or for improving endurance, retention and bit error rate (wider guard bands between adjacent levels). It may also be combined with various programming order techniques that mitigate the inter-cell coupling effects and with decoding techniques that compensate for them.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"168 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125983019","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
C. Avin, Michael Borokhovich, A. Cohen, Zvi Lotker
{"title":"Efficient distributed source coding for multiple receivers via matrix sparsification","authors":"C. Avin, Michael Borokhovich, A. Cohen, Zvi Lotker","doi":"10.1109/ISIT.2011.6033914","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033914","url":null,"abstract":"Consider the problem of source coding with side information in large networks with multiple receivers. In this case, standard coding techniques are either prohibitively complex to decode, or require source-network coding separation, resulting in sub-optimal transmission schemes. To alleviate this problem, we offer a joint network-source coding scheme based on matrix sparsification at the code design phase, which allows the terminals to use an efficient decoding procedure (syndrome decoding using LDPC), despite the network coding throughout the network. Via a novel relation between matrix sparsification and rate-distortion theory, we give lower and upper bounds on the best achievable sparsification performance, and analyze our scheme in the limit of weak side information at the receivers. Simulation results motivate the use of this scheme at non-limiting rates as well.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"103 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124635861","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}