{"title":"Communicating remote Gaussian sources over Gaussian multiple access channels","authors":"A. Lapidoth, I-Hsiang Wang","doi":"10.1109/ISIT.2011.6034242","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034242","url":null,"abstract":"We study a multiple-terminal joint source-channel coding problem, where two remote correlated Gaussian sources are transmitted over a Gaussian multiple-access channel with two transmitters. Each transmitter observes one of the sources contaminated in Gaussian noise. The receiver wishes to reconstruct both sources. We derive necessary conditions and sufficient conditions for the receiver to be able to reconstruct the sources with given expected squared-error distortions. These conditions establish the optimality of uncoded transmission below some signal-to-noise ratio (SNR) threshold, and they also establish the high-SNR asymptotics. To achieve the latter, a coding scheme is proposed that superimposes analog uncoded transmission and digital combined source-channel Gaussian vector quantization.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121881694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A transform approach for computing the ranks of parity-check matrices of quasi-cyclic LDPC codes","authors":"Qiuju Diao, Qin Huang, Shu Lin, K. Abdel-Ghaffar","doi":"10.1109/ISIT.2011.6034147","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034147","url":null,"abstract":"Several classes of quasi-cyclic LDPC codes have been proposed in the literature and shown to have excellent performance over noisy channels when decoded with iterative message-passing algorithms. However, by and large, important properties of the codes, including their dimensions, are only given for specific codes based on computer programming. Using Fourier transforms, it is shown that the ranks of parity-check matrices of quasi-cyclic codes can be computed. From these ranks, the dimensions of the codes can be determined. The approach, which unifies most of the known algebraic constructions, is given in detail for three large classes of quasi-cyclic LDPC codes which appear in the literature.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"287 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121072747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
S. Pawar, Nima Noorshams, S. Rouayheb, K. Ramchandran
{"title":"DRESS codes for the storage cloud: Simple randomized constructions","authors":"S. Pawar, Nima Noorshams, S. Rouayheb, K. Ramchandran","doi":"10.1109/ISIT.2011.6033980","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033980","url":null,"abstract":"We introduce an efficient family of exact regenerating codes for data storage in large-scale distributed systems. We refer to these new codes as Distributed Replication-based Exact Simple Storage (DRESS) codes. A key property of DRESS codes is their very efficient distributed and uncoded repair and growth processes that have minimum bandwidth, reads and computational overheads. This property is essential for large-scale systems with high reliability and availability requirements. DRESS codes will first encode the file using a Maximum Distance Separable (MDS) code, then place multiple replicas of the coded packets on different nodes in the system. We propose a simple and flexible randomized scheme for placing those replicas based on the balls-and-bins model. Our construction showcases the power of the probabilistic approach in constructing regenerating codes that can be efficiently repaired and grown.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"62 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121583995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Worst-case linear transmit strategies with limited relay information in Gaussian relay networks","authors":"S. Corroy, R. Mathar","doi":"10.1109/ISIT.2011.6034028","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034028","url":null,"abstract":"In practical large scale relay networks, it is often an unfeasible task to adapt the strategy of the relays to each source/sink pair communicating through the network. In this paper we consider the strategy of the relays as fixed and chosen in advance. In this context, it is a crucial problem for the source node transmitting information, to know the strategy of the relays in the network. Therefore we optimize the transmit strategy of the source node, assuming only partial relay information knowledge, i.e., channel state information and relay strategies. We also study the impact of getting complete relay information from certain relays only, derive the reduction in the problem uncertainty due to this knowledge and evaluate numerically the performance of the network.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122639785","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Half-duplex relaying based on quantize-and-forward","authors":"Sha Yao, M. Skoglund, Thanh Tùng Kim, H. Poor","doi":"10.1109/ISIT.2011.6034004","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034004","url":null,"abstract":"The original compress-and-forward relaying scheme uses the technique of random binning at the relay node and successive decoding at the destination node. Recently, a scheme (termed the quantize-and-forward scheme in this paper) without binning and using joint decoding at the destination node has been proposed, which has been shown to achieve the same rate as the original compress-and-forward scheme. Since the previous work focuses on the so-called full duplex relay network, in this paper, an adaption of it for relay networks with a half-duplex relay is provided. Coding schemes and achievable rate results are presented for discrete memoryless half-duplex relay channels and half-duplex additive white Gaussian noise (AWGN) relay channels. Moreover, slow fading channels are considered, for which outage-related performance measures are evaluated. Specifically, the outage probability and the expected rate of the quantize-and-forward scheme are derived and compared with other well-known schemes. Furthermore, the diversity-multiplexing tradeoff is derived. It is shown that the quantize-and-forward scheme is a more suitable scheme than the compress-and-forward scheme over slow fading channels and it achieves the optimal diversity-multiplexing trade-off of a half-duplex relay channel.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"51 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122878567","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of fast sparse superposition codes","authors":"A. Barron, Antony Joseph","doi":"10.1109/ISIT.2011.6033853","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033853","url":null,"abstract":"Sparse superposition codes with a fast adaptive successive decoder for the additive white Gaussian noise channel were introduced last year by the authors, along with presentation of reliability at rates approaching capacity. The present work presents ingredients of the distributional analysis of the decoder.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"123 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124219059","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cooperative computation in wireless networks","authors":"M. Nokleby, B. Aazhang","doi":"10.1109/ISIT.2011.6034251","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034251","url":null,"abstract":"We study user cooperation in the context of physical-layer network coding. We examine a system in which users cooperatively transmit their messages to receivers whose task is to recover a finite-field linear combination of the users' messages. We present a cooperative scheme, based on a lattice-coding approach to block Markov encoding, that improves the computation rate over that of existing non-cooperative techniques. We apply our results to a simple relay network, showing that when inter-user gains are relatively strong, cooperative computation significantly improves network throughput.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125326212","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Caner Nazaroglu, B. Ebrahimi, Ayfer Özgür, C. Fragouli
{"title":"Network Simplification: The Gaussian diamond network with multiple antennas","authors":"Caner Nazaroglu, B. Ebrahimi, Ayfer Özgür, C. Fragouli","doi":"10.1109/ISIT.2011.6034245","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034245","url":null,"abstract":"We consider the N-relay Gaussian diamond network when the source and the destination have n<inf>s</inf> ≥ 2 and n<inf>d</inf> ≥ 2 antennas respectively. We show that when n<inf>s</inf> = n<inf>d</inf> = 2 and when the individual MISO channels from the source to each relay and the SIMO channels from each relay to the destination have the same capacity, there exists a two relay sub-network that achieves approximately all the capacity of the network. To prove this result, we establish a simple relation between the joint entropies of three Gaussian random variables, which is not implied by standard Shannon-type entropy inequalities.<sup>1</sup>","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126164007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"List decoding of polar codes","authors":"I. Tal, A. Vardy","doi":"10.1109/ISIT.2011.6033904","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6033904","url":null,"abstract":"We describe a successive-cancellation list decoder for polar codes, which is a generalization of the classic successive-cancellation decoder of Arikan. In the proposed list decoder, up to L decoding paths are considered concurrently at each decoding stage. Simulation results show that the resulting performance is very close to that of a maximum-likelihood decoder, even for moderate values of L. Thus it appears that the proposed list decoder bridges the gap between successive-cancellation and maximum-likelihood decoding of polar codes. The specific list-decoding algorithm that achieves this performance doubles the number of decoding paths at each decoding step, and then uses a pruning procedure to discard all but the L “best” paths. In order to implement this algorithm, we introduce a natural pruning criterion that can be easily evaluated. Nevertheless, straightforward implementation still requires O(L · n2) time, which is in stark contrast with the O(n log n) complexity of the original successive-cancellation decoder. We utilize the structure of polar codes to overcome this problem. Specifically, we devise an efficient, numerically stable, implementation taking only O(L · n log n) time and O(L · n) space.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125792676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance bounds for active sequential hypothesis testing","authors":"Mohammad Naghshvar, T. Javidi","doi":"10.1109/ISIT.2011.6034055","DOIUrl":"https://doi.org/10.1109/ISIT.2011.6034055","url":null,"abstract":"Consider a decision maker who is responsible to dynamically collect observations so as to enhance his information in a speedy manner about an underlying phenomena of interest while accounting for the cost of data collection. Due to the sequential nature of the problem, the decision maker relies on his current information state to adaptively (re-)evaluate the tradeoff between the cost of various sensing actions and the precision of their outcomes. In this paper, using results in dynamic programming, a lower bound for the optimal total cost is established. Moreover, an upper bound is obtained using a heuristic policy for dynamic selection of actions. Using the obtained bounds, the closed loop (feedback) gain is shown to be at least logarithmic in the penalty associated with wrong declarations. Furthermore, it is shown that the proposed heuristic achieves asymptotic optimality in many practically relevant problems such as variable-length coding with feedback and noisy dynamic search.","PeriodicalId":208375,"journal":{"name":"2011 IEEE International Symposium on Information Theory Proceedings","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2011-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125953291","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}