2019 IEEE Information Theory Workshop (ITW)最新文献

筛选
英文 中文
Trellis-based Decoding Techniques for Polar Codes with Large Kernels 基于栅格的大核极码解码技术
2019 IEEE Information Theory Workshop (ITW) Pub Date : 2019-08-01 DOI: 10.1109/ITW44776.2019.8989386
P. Trifonov
{"title":"Trellis-based Decoding Techniques for Polar Codes with Large Kernels","authors":"P. Trifonov","doi":"10.1109/ITW44776.2019.8989386","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989386","url":null,"abstract":"A recursive trellis-based algorithm is proposed for computing the probabilities arising in the successive cancellation (SC) decoding algorithm for polar codes with arbitrary linear kernels. This approach enables one to re-use intermediate values obtained at different phases. Arikan SC algorithm is shown to be a special case of this method.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123042032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Properties of the Conditional Mean Estimator in Poisson Noise 泊松噪声中条件均值估计量的性质
2019 IEEE Information Theory Workshop (ITW) Pub Date : 2019-08-01 DOI: 10.1109/ITW44776.2019.8989246
Alex Dytso, H. Poor
{"title":"Properties of the Conditional Mean Estimator in Poisson Noise","authors":"Alex Dytso, H. Poor","doi":"10.1109/ITW44776.2019.8989246","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989246","url":null,"abstract":"This paper considers estimation of a random variable in Poisson noise. Specifically, the paper focuses on properties of the conditional mean estimator as a function of the scaling coefficient, the dark current parameter, the distribution of the input random variable and channel realizations.With respect to the scaling coefficient and the dark current, several identities in terms of derivatives are established. For example, it is shown that the derivative of the conditional mean estimator with respect to the dark current parameter is proportional to the conditional variance. Moreover, a version of score function is proposed and a Tweedy-like formula for the conditional expectation is recovered.With respect to the distribution, several regularity conditions are shown. For instance, it is shown that the conditional mean estimator uniquely determines the input distribution. Moreover, it is shown that if the conditional expectation is close to a linear function in the mean squared error, then the input distribution is approximately gamma in the Lévy metric.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127928985","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
On Characterization of Entropic Vectors at the Boundary of Almost Entropic Cones 概熵锥边界上熵向量的刻画
2019 IEEE Information Theory Workshop (ITW) Pub Date : 2019-08-01 DOI: 10.1109/ITW44776.2019.8989116
Hitika Tiwari, Satyajit Thakor
{"title":"On Characterization of Entropic Vectors at the Boundary of Almost Entropic Cones","authors":"Hitika Tiwari, Satyajit Thakor","doi":"10.1109/ITW44776.2019.8989116","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989116","url":null,"abstract":"The entropy region is a fundamental object in information theory. An outer bound for the entropy region is defined by a minimal set of Shannon-type inequalities called elemental inequalities also referred to as the Shannon region. This paper focuses on characterization of the entropic points at the boundary of the Shannon region for three random variables. The proper faces of the Shannon region form its boundary. We give new outer bounds for the entropy region in certain faces and show by explicit construction of distributions that the existing inner bounds for the entropy region in certain faces are not tight.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131363969","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
On The Stability Region of the Layered Packet Erasure Broadcast Channel with Output Feedback 带输出反馈的分层包擦除广播信道的稳定域研究
2019 IEEE Information Theory Workshop (ITW) Pub Date : 2019-08-01 DOI: 10.1109/ITW44776.2019.8989326
Siyao Li, H. Seferoglu, Daniela Tuninetti, N. Devroye
{"title":"On The Stability Region of the Layered Packet Erasure Broadcast Channel with Output Feedback","authors":"Siyao Li, H. Seferoglu, Daniela Tuninetti, N. Devroye","doi":"10.1109/ITW44776.2019.8989326","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989326","url":null,"abstract":"This paper studies the Layered Packet Erasure Broadcast Channel (LPE-BC) with Channel Output Feedback (COF), which is a high-SNR approximation of the fading Gaussian BC, proposed by Tse and Yates in 2012 for the case without COF. This model is also a multi-layer generalization of the Binary Erasure Channel (BEC). In a past work, the Authors derived inner and outer bounds to the rate region (set of achievable rates with backlogged arrivals) of the LPE-BC with COF; here, the arrival region (set of exogenous arrival rates for which packet arrival queues are stable) for the same model is analyzed. For the case of K=2 users and Q$geq 1$ layers, the known achievable rate region and the derived arrival region coincide; both strategically employ a network-coding based retransmission protocol. For the case of Q = 2 layers, sufficient conditions are given for the achievable arrival region to coincide with the known converse rate region, thus showing that in those cases the optimal rate and arrival regions coincide.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131413345","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Capacity of Wideband Multipath Fading Networks with Physically Degraded Broadcast 带物理退化广播的宽带多径衰落网络容量研究
2019 IEEE Information Theory Workshop (ITW) Pub Date : 2019-08-01 DOI: 10.1109/ITW44776.2019.8989322
D. C. González, Salman Salamatian, M. Médard, M. Yacoub
{"title":"Capacity of Wideband Multipath Fading Networks with Physically Degraded Broadcast","authors":"D. C. González, Salman Salamatian, M. Médard, M. Yacoub","doi":"10.1109/ITW44776.2019.8989322","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989322","url":null,"abstract":"In this work we investigate the capacity of multilayer relaying networks operating over multipath fading channels under a non-coherent wideband regime and physically degraded broadcast stages. First, based on hyper-graph models and network equivalence techniques, we derive an upper bound on the network capacity. Then, by considering a peaky, frequency-shift keying signaling scheme, we establish a set of point-to-point achievable rates for each communication link in the network. Finally, by capitalizing on this set of rates we devise an achievable transmission scheme for the entire network via network coding. Remarkably, it turns out that this achievable rate for the network coincides with its upper bound capacity. In other words, these results give ultimately the capacity of the investigated network.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"66 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133292669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mismatched Guesswork and One-to-One Codes 不匹配的猜测和一对一的代码
2019 IEEE Information Theory Workshop (ITW) Pub Date : 2019-08-01 DOI: 10.1109/ITW44776.2019.8989381
Salman Salamatian, Litian Liu, Ahmad Beirami, M. Médard
{"title":"Mismatched Guesswork and One-to-One Codes","authors":"Salman Salamatian, Litian Liu, Ahmad Beirami, M. Médard","doi":"10.1109/ITW44776.2019.8989381","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989381","url":null,"abstract":"We study the problem of mismatched guesswork, where we evaluate the number of symbols $y in mathcal{Y}$ which have higher likelihood than $X sim mu$ according to a mismatched distribution μ. We discuss the role of the tilted/exponential families of the source distribution μ and of the mismatched distribution ν. We show that the value of guesswork can be characterized using the tilted family of the mismatched distribution v, while the probability of guessing is characterized by an exponential family which passes through μ. Using this characterization, we demonstrate that the mismatched guesswork follows a large deviation principle (LDP), where the rate function is described implicitly using information theoretic quantities. We apply these results to one-to-one source coding (without prefix free constraint) to obtain the cost of mismatch in terms of average codeword length. We show that the cost of mismatch in one-to-one codes is no larger than that of the prefix-free codes, i.e., $D(muVertnu)$. Further, the cost of mismatch vanishes if and only if ν lies on the tilted family of the true distribution μ, which is in stark contrast to the prefix-free codes. These results imply that one-to-one codes are inherently more robust to mismatch.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"8 5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126128874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Optimizing Polar Codes Compatible with Off-the-Shelf LDPC Decoders 优化极性码兼容现成的LDPC解码器
2019 IEEE Information Theory Workshop (ITW) Pub Date : 2019-08-01 DOI: 10.1109/ITW44776.2019.8989269
Moustafa Ebada, Ahmed Elkelesh, S. Brink
{"title":"Optimizing Polar Codes Compatible with Off-the-Shelf LDPC Decoders","authors":"Moustafa Ebada, Ahmed Elkelesh, S. Brink","doi":"10.1109/ITW44776.2019.8989269","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989269","url":null,"abstract":"Previous work showed that polar codes can be decoded using off-the-shelf LDPC decoders by imposing special constraints on the LDPC code structure, which, however, resulted in some performance degradation. In this paper we show that this loss can be mitigated; in particular, we demonstrate how the gap between LDPC-style decoding and Arıkan’s Belief Propagation (BP) decoding of polar codes can be closed by taking into account the underlying graph structure of the LDPC decoder while jointly designing the polar code and the parity-check matrix of the corresponding LDPC-like code. The resulting polar codes under conventional LDPC-style decoding are shown to have similar error-rate performance when compared to some well-known and standardized LDPC codes. Moreover, we obtain performance gains in the high SNR region.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122731107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Codebooks of Complex Lines Based on Binary Subspace Chirps 基于二进制子空间啁啾的复线码本
2019 IEEE Information Theory Workshop (ITW) Pub Date : 2019-08-01 DOI: 10.1109/ITW44776.2019.8989259
O. Tirkkonen, A. Calderbank
{"title":"Codebooks of Complex Lines Based on Binary Subspace Chirps","authors":"O. Tirkkonen, A. Calderbank","doi":"10.1109/ITW44776.2019.8989259","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989259","url":null,"abstract":"Motivated by problems in machine-type wireless communications, we consider codebooks of complex Grassmannian lines in $N = 2^{m}$ dimensions. Binary Chirp (BC) codebooks of prior art are expanded to codebooks of Binary Subspace Chirps (BSSCs), where there is a binary chirp in a subset of the dimensions, while in the remaining dimensions there is a zero. BSSC codebooks have the same minimum distance as BC codebooks, while the cardinality is asymptotically 2.38 times larger. We discuss how BC codebooks can be understood in terms of a subset of the binary symplectic group $mathrm{S}mathrm{p}(2m, 2)$ in 2m dimensions; $mathrm{S}mathrm{p}(2m, 2)$ is isomorphic to a quotient group of the Clifford group acting on the codewords in N dimensions. The Bruhat decomposition of $mathrm{S}mathrm{p}(2m, 2)$ can be described in terms of binary subspaces in m dimensions, with ranks ranging from $r=0$ to $r=m$. We provide a unique parameterization of the decomposition. The BCs arise directly from the full-rank part of the decomposition, while BSSCs are a group code arising from the action of the full group with generic r. The rank of the binary subspace is directly related to the number of zeros (sparsity) in the BSSC. We develop a reconstruction algorithm that finds the correct codeword with $O(Nlog^{2}N)$ complexity, and present performance results in an additive white Gaussian noise scenario.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123173283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Degree Tables for Secure Distributed Matrix Multiplication 安全分布式矩阵乘法的度数表
2019 IEEE Information Theory Workshop (ITW) Pub Date : 2019-08-01 DOI: 10.1109/ITW44776.2019.8989092
Rafael G. L. D'Oliveira, S. Rouayheb, Daniel Heinlein, David A. Karpuk
{"title":"Degree Tables for Secure Distributed Matrix Multiplication","authors":"Rafael G. L. D'Oliveira, S. Rouayheb, Daniel Heinlein, David A. Karpuk","doi":"10.1109/ITW44776.2019.8989092","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989092","url":null,"abstract":"We consider the problem of secure distributed matrix multiplication (SDMM) in which a user wishes to compute the product of two matrices with the assistance of honest but curious servers. We construct polynomial codes for SDMM by studying a recently introduced combinatorial tool called the degree table. Maximizing the download rate of a polynomial code for SDMM is equivalent to minimizing N, the number of distinct elements in the corresponding degree table. We propose new constructions of degree tables with a low number of distinct elements. These new constructions lead to a general family of polynomial codes for SDMM, which we call $GASP_{r}$ (Gap Additive Secure Polynomial codes) parametrized by an integer r. $GASP_{r}$ outperforms all previously known polynomial codes for SDMM. We also present lower bounds on N and show that $GASP_{r}$ achieves the lower bounds in the case of no server collusion.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"136 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124454058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Multi-access coded caching: gains beyond cache-redundancy 多访问编码缓存:超越缓存冗余的收益
2019 IEEE Information Theory Workshop (ITW) Pub Date : 2019-08-01 DOI: 10.1109/ITW44776.2019.8989128
Berksan Serbetci, Emanuele Parrinello, P. Elia
{"title":"Multi-access coded caching: gains beyond cache-redundancy","authors":"Berksan Serbetci, Emanuele Parrinello, P. Elia","doi":"10.1109/ITW44776.2019.8989128","DOIUrl":"https://doi.org/10.1109/ITW44776.2019.8989128","url":null,"abstract":"The work considers the K-user cache-aided shared- link broadcast channel where each user has access to exactly z caches of normalized size γ, and where each cache assists exactly z users. For this setting, for two opposing memory regimes, we propose novel caching and coded delivery schemes which maximize the local caching gain, and achieve a coding gain larger than $ 1+Kgamma$ (users served at a time) despite the fact that the total cache redundancy remains $ Kgamma$ irrespective of z. Interestingly, when $z = frac{K-1}{Kgamma}$, the derived optimal coding gain is $Kgamma z+1$, matching the performance of a hypothetical scenario where each user has its own dedicated cache of size $zgamma$.","PeriodicalId":214379,"journal":{"name":"2019 IEEE Information Theory Workshop (ITW)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-08-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131303093","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 40
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信