{"title":"Zero-Error Capacity of Multiple Access Channels via Nonstochastic Information","authors":"Ghassen Zafzouf, G. Nair, J. Evans","doi":"10.1109/ITW44776.2019.8989045","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989045","url":null,"abstract":"The problem of characterising the zero-error capacity region for multiple access channels even in the noiseless case has remained an open problem for over three decades. Motivated by this challenging question, a recently developed theory of nonstochastic information is applied to characterise the zero-error capacity region for the case of two correlated transmitters. Unlike previous contributions, this analysis does not assume that the blocklength is asymptotically large. Finally, a new notion of nonstochastic information is proposed for a non-cooperative problem involving three agents. These results are preliminary steps towards understanding information flows in worst-case distributed estimation and control problems.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129609440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Invariance pressure for linear discrete-time systems","authors":"F. Colonius, João A. N. Cossich, A. Santana","doi":"10.1109/ITW44776.2019.8989280","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989280","url":null,"abstract":"For linear control systems in discrete time controllability properties are characterized. In particular, a unique control set with nonvoid interior exists. The main result is a formula for the invariance pressure of this control set.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130245206","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Upper Bound on the Capacity of the DNA Storage Channel","authors":"A. Lenz, P. Siegel, A. Wachter-Zeh, Eitan Yaakobi","doi":"10.1109/ITW44776.2019.8989388","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989388","url":null,"abstract":"Paved by recent advances in sequencing and synthesis technologies, DNA has evolved to a competitive medium for long-term data storage. In this paper we conduct an information theoretic study of the storage channel-the entity that formulates the relation between stored and sequenced strands. In particular, we derive an upper bound on the Shannon capacity of the channel. In our channel model, we incorporate the main attributes that characterize DNA-based data storage. That is, information is synthesized on many short DNA strands, and each strand is copied many times. Due to the storage and sequencing methods, the receiver draws strands from the original sequences in an uncontrollable manner, where it is possible that copies of the same sequence are drawn multiple times. Additionally, due to imperfections, the obtained strands can be perturbed by errors. We show that for a large range of parameters, the channel decomposes into sub-channels from each input sequence to multiple output sequences, so-called clusters. The cluster sizes hereby follow a Poisson distribution. Furthermore, the ordering of sub-channels is unknown to the receiver. Our results can be used to guide future experiments for DNA-based data storage by giving an upper bound on the achievable rate of any error-correcting code. We further give a detailed discussion and intuitive interpretation of the channel that provide insights about the nature of the channel and can inspire new ideas for error-correcting codes and decoding methods.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121388451","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Closed-Form Expression for the Average Age of Information in a Multi-Source M/G/1 Queueing Model","authors":"Mohammad Moltafet, Markus Leinonen, M. Codreanu","doi":"10.1109/ITW44776.2019.8989346","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989346","url":null,"abstract":"In the context of the next generation wireless networks, freshness of status update packets is essential for enabling the services where a destination needs the most recent measurements of various sensors. In this paper, we study the information freshness of a multi-source M/G/1 first-come first-served (FCFS) queueing model, where each source independently generates status update packets according to a Poisson process. The information freshness of the status updates of each source is evaluated using the average age of information (AoI). To this end, we derive a closed-form expression for the average AoI of each source. As particular cases of our general expressions, we also derive closed-form expressions of the average AoI for both multi-source M/M/1 and single-source M/G/1 queueing models.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"150 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122758662","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Strongly Secure Ramp Secret Sharing Schemes from Any Linear Secret Sharing Schemes","authors":"Reo Eriguchi, N. Kunihiro","doi":"10.1109/ITW44776.2019.8989107","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989107","url":null,"abstract":"A secret sharing scheme (SSS) is a cryptographic tool to protect a secret from loss and leakage by dividing it into shares. A ramp SSS can improve the efficiency in terms of the sizes of shares by allowing partial information about the secret to leak out. In order to prevent the partial information from being recovered explicitly, the notion of the strong security has been introduced. However, there have been proposed few methods to construct strongly secure ramp SSSs for general access structures and they are not always sufficient. In this paper, we show that any linear ramp SSS can be transformed into a strongly secure scheme with the same access structure preserving the information ratio.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"78 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127713386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Weakly Secure Symmetric Multilevel Diversity Coding","authors":"Tao Guo, C. Tian, Tie Liu, R. Yeung","doi":"10.1109/ITW44776.2019.8989083","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989083","url":null,"abstract":"Multilevel diversity coding is a classical coding model where multiple mutually independent information messages are encoded, such that different reliability requirements can be afforded to different messages. It is well known that superposition coding, namely separately encoding the independent messages, is optimal for symmetric multilevel diversity coding (SMDC) (Yeung-Zhang 1999). In the current paper, we consider weakly secure SMDC where secrecy constraints are injected on each individual message, and provide a complete characterization of the conditions under which superposition coding is sum-rate optimal. Two joint coding strategies, which lead to rate savings compared to superposition coding, are proposed, where some coding components for one message can be used as the encryption key for another. By applying different variants of Han’s inequality, we show that the lack of opportunities to apply these two coding strategies directly implies the optimality of superposition coding. It is further shown that under a particular security configuration, one of the proposed joint coding strategies can be used to achieve the optimal sum rate.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127799659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secrecy Capacity of a Gaussian Wiretap Channel with One-bit ADCs is Always Positive","authors":"S. Nam, Si-Hyeon Lee","doi":"10.1109/ITW44776.2019.8988965","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8988965","url":null,"abstract":"We consider the Gaussian wiretap channel with one-bit analog-to-digital converters (ADCs) at both the legitimate receiver and the eavesdropper. In this channel, we show that a positive secrecy rate is always achievable whenever the noise power $n_{1}^{2}$ at the legitimate receiver is not the same as the noise power $n_{2}^{2}$ at the eavesdropper. A binary phase-shift keying (BPSK) and an asymmetric BPSK are shown to achieve a positive secrecy rate for the cases of $n_{1} < n_{2}$ and $n_{1} > n_{2}$, respectively. We partially justify the choice of these signalings by showing that the optimal input distribution that achieves $R_{s}^{*}:= displaystyle sup _{P_{X}:mathrm {E}[X^{2}]leq P}I(X;Y_{1}) -I(X;Y_{2})$, where $X$ is the channel input with power constraint of $P$, and $Y_{1}$ and $Y_{2}$ are the channel outputs at the legitimate receiver and the eavesdropper, respectively, should satisfy some symmetric and asymmetric properties for the cases of $n_{1} < n_{2}$ and $n_{1} > n_{2}$, respectively. Moreover, for $n_{1} < n_{2}$ and sufficiently large $P$, it is shown that a BPSK using power smaller than $P$ achieves $R_{s}^{*}$.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"202 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132839802","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Coded Caching with Optimized Shared-Cache Sizes","authors":"Emanuele Parrinello, P. Elia","doi":"10.1109/ITW44776.2019.8989173","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989173","url":null,"abstract":"This work studies the K-user broadcast channel where each user is assisted by one of $Lambda$ caches with a cumulative memory constraint that is equal to t times the size of the library, and where each cache serves an arbitrary number of users. In this setting, under the assumption of uncoded cache placement, no prior scheme is known to achieve a sum degrees of freedom $(mathrm{D}mathrm{o}$F) of $t+1$, other than in the uniform case where all caches serve an equal number of users. We here show for the first time that allowing an optimized memory allocation across the caches as a function of the number of users served per cache, provides for the aforementioned DoF. A subsequent index-coding based converse proves that this performance can be close to optimal for bounded values of t.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133726976","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"On the Fundamental Limits of Cooperative Multiple-Access Channels with Distributed CSIT","authors":"Lorenzo Miretti, Paul de Kerret, D. Gesbert","doi":"10.1109/ITW44776.2019.8989227","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989227","url":null,"abstract":"The availability of accurate and, most importantly, shared channel state information at the transmitter (CSIT) is one of the key factors that enable transmitters cooperation in decentralized wireless systems. However, in some cases, channel information may not be easily or perfectly shared among the transmitters, thus limiting their coordination capabilities. In this paper we shed some light on the fundamental limits of networks with cooperating transmitters impaired by a general distributed CSIT assumption. To this end, we consider a state-dependent memory-less multiple-access channel with common message, and with noisy causal CSIT and noisy channel state information at the receiver (CSIR). Perhaps surprisingly, and in contrast to the same setting in absence of common message, we show that distributed precoding based on current CSIT only (namely, a Shannon strategy) achieves the sum-rate capacity of this channel, for every degree of CSIT and CSIR. By focusing on the transmission of a common message only, we then illustrate this result in a practically relevant Gaussian setting.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"372 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133994222","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improved decoding of second-order Reed-Muller codes","authors":"K. Ivanov, R. Urbanke","doi":"10.1109/ITW44776.2019.8988970","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8988970","url":null,"abstract":"In this paper, we consider low-complexity decoding of second-order Reed-Muller codes. A class of polynomial-time algorithms, based on the projections onto first-order codes, is studied. An old representative of this class, originally developed for binary symmetric channel, is brought back to life and applied for AWGN channel. Some improvements are proposed, which bring the performance closer to ML bound with lower complexity compared to other algorithms. Another potentially fruitful property is returning the list of codewords. In addition, a simple method for complexity reduction and its impact on the performance are demonstrated.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"139 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131841191","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}